1 / 32

Peer to Peer Overlay Network for Sensor net

Peer to Peer Overlay Network for Sensor net. Eng. Husam Alzaq Computer Engineering Department Islamic University of Gaza hzaq@iugaza.edu.ps. Agenda. Introduction Background on Wireless Sensor Network Peer to Peer Systems Concept Implementation Results Conclusion. Introduction.

osborn
Download Presentation

Peer to Peer Overlay Network for Sensor net

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Peer to Peer Overlay Network for Sensor net Eng. Husam Alzaq Computer Engineering Department Islamic University of Gaza hzaq@iugaza.edu.ps

  2. Agenda Introduction Background on Wireless Sensor Network Peer to Peer Systems Concept Implementation Results Conclusion Introduction Background Design & Evaluation Conclusion

  3. What are Wireless Sensor Nodes? They are small electronic components capable of sensing many types of information from the environment. They are equipped with a certain amount of computational power, communication, storage and often actuation resources. Introduction Background Design & Evaluation Conclusion

  4. What is WSN? It is a network that has multiple nodes connected to each other wirelessly Sensor Network is distributed and is not structured. Introduction Background Design & Evaluation Conclusion

  5. Constraints/Challanges Hardware Power Consumption Software Issues to be addresses: Lifetime maximization Robustness and fault tolerance Self-configuration Algorithms Design of energy-aware algorithms Introduction Background Design & Evaluation Conclusion

  6. Motivation Motivation Home/Office Observing How can a user connect to Wireless Sensor Network over Internet? How can a user retrieve the sensor data? Introduction Background Design & Evaluation Conclusion What is the temperature at lab146??

  7. Motivation Solution Peer to Peer Systems provide an overlay network that is able to connect a user to a Wireless Sensor Network. Declarative Query would serve as a way to express user’s requests. Introduction Background Design & Evaluation Conclusion

  8. A Middleware for Sensor Networks A middleware for sensor networks supports the development, maintenance, deployment, and execution of sensing-based applications. Building a Peer to Peer application on existing WSN is important. The complexity of accessing different sensor nodes must be hidden. Many services can be offered. Discovering Sensor gateway Obtaining sensor data Distributed Wireless Sensor Networks (WSNs) can be observed. Introduction Background Design & Evaluation Conclusion

  9. Peer to Peer Systems A Peer to Peer system is defined as a class of systems and applications that employs distributed resources to perform a critical function in a decentralized manner. The resources encompass computing power, data, network bandwidth ...etc. The critical function can be distributed computing, data/content sharing, communication and collaboration, or platform services. Introduction Background Design & Evaluation Conclusion

  10. Peer to Peer Characteristics Symmetry Decentralization Scalability Fault tolerant Self-Organization Resources Sharing Fast Resource Location to determine where to find the resource Introduction Background Design & Evaluation Conclusion

  11. Peer to Peer Classification Introduction Background Design & Evaluation Conclusion

  12. Peer to Peer Classification Introduction Background Design & Evaluation Conclusion

  13. Why Jxta? Jxta is a generic overlay network system. It consists of a set of protocols that are language, platform and network independent. Java based and C implementation It connects devices on the network ranging from embedded system and cellular phones to PCs and servers. Introduction Background Design & Evaluation Conclusion

  14. Application Overview Introduction Background Design & Evaluation Conclusion

  15. Requirements Introduction Background Design & Evaluation Conclusion • Application Requirements • Detect sensor gateways. • Express user‘s requests in a SQL language. • Filter sensor data according to user request. • Technical Requirements. • Scalability. • Interoperability.

  16. Conceptual Design - Architecture Jxta Layer Governs the connection between a gateway and user agents, and the overlay network. Ensures the interoperability between a gateway and user agents. Introduction Background Design & Evaluation Conclusion

  17. Conceptual Design - Architecture Sensor Gateway Layers Sensor Network Interface Layer. Extracts data from a sensor UDP packet and hands it to the Sensor Application layer. Sensor Application Layer. Manages all interactions between users and sensor nodes such as filtering data. User Agents Layers User Interface Layer. WSN Application Layer. Handles all user queries. Handles all messages. Introduction Background Design & Evaluation Conclusion

  18. Conceptual Design Block Diagram Introduction Background Design & Evaluation Conclusion User Agent Sensor Gateway

  19. Publishing & Discovery Process Sensor Gateway publishes Advertisements on sensor nodes. Jxta Overlay Network indexes these advertisements. User Agent searches for advertisements. Each advertisement includes Set of properties that describe the sensor gateway Name Location Description Set of attributes that are provided by each sensor node. types of data that the specified sensor can measure i.e. temperature, light ... etc. and their units. Introduction Background Design & Evaluation Conclusion

  20. Message Handler A gateway and a user agents exchange a Jxta XML messages over a Jxta pipe. Messages are used to Create a new filter Remove a filter Send the filter results Introduction Background Design & Evaluation Conclusion

  21. Distributed Query Process Requests are expressed in a SQL-like query language to retrieve sensor data. User query consists of SELECT clause: specifies attributes, in which user is interested in. FROM clause: specifies the name of the sensor gateway. WHERE clause: filters sensor records by a predicate. DURATION clause: is the period of time, which specifies how long the query should be run before terminated and removed from the filter list. Introduction Background Design & Evaluation Conclusion (Select * From lab146.ibr.cs.tu-bs.de where Temperature < 20 duration = 600)

  22. Distributed Query Process Query is distributively processed as follows: The gateway name is extracted from the user query (specified in FROM) in order to establish a connection with the gateway. The WHERE clause is encapsulated in a Query XML-based message. The Query message is sent out to the gateway. After that, the received results are displayed according to SELECT clause. Query is terminated either by user or by gateway. Introduction Background Design & Evaluation Conclusion

  23. Filter Process Filter process is a way to suppress sensor tuples from randomly propagation and hand them in graceful manner to all interested users Sensor tuples are a discrete raw of data generated at discrete time not stored in a data warehouse. Filter is created by a user query. Filter is activated for each received tuples. Filter is only deleted in two cases by user -> explicitly or implicitly time is up Introduction Background Design & Evaluation Conclusion

  24. Filter Process Filter mechanism is based on attributes, which are described by key-value-operator. Key indicates the semantics of the attribute Operator describes how attributes will match when two attributes are compared (<, >, =, ... etc.). . Typical attributes values Sensor reading includes, temperature, voltage, light ....etc. Meta-data encompasses general information about a sensor node e.g. sensor ID. Internal state is any information that is not related to sensor reading, such as timestamps. Introduction Background Design & Evaluation Conclusion

  25. Implementation A Sensor Gateway implements the basic functionality of the sensor agent. The implementation is based on Jxta-C (version 2.5). Introduction Background Design & Evaluation Conclusion • A prototype for a sensor application over a Peer to Peer System is named as Jxta Middleware for Sensor Network (JMSN). It consists of: • A User Agentprototype implements a user interface for JMSN, which is able to • discover advertisements • access any available sensor network. • The implementation is based on Jxta J2SE platform.

  26. User Agent, GUI Introduction Background Design & Evaluation Conclusion

  27. Evaluation Test-bed Equipments Tests ware performed at the Workstation pool of IBR, where twelve machines of identical hardware are used. They are equipped with Intel Pentium(r) D CPU 3.2GHz 2.00 GB of RAM Fast Ethernet card. Half of them run Windows XP and the other run Debian GNU/Linux distribution. Introduction Background Design & Evaluation Conclusion

  28. Evaluation - Memory Performance This memory footprint is mainly due to the Apache Runtime (APR), which is embedded in the Jxta-C implementation. It is observed that 8 threads are created (using DDD - Data Display Debugger) Introduction Background Design & Evaluation Conclusion Summary of memory consumption tests.

  29. Evaluation – Filter Overhead Constant message size Time is linear in n with a slope of 210.4 ms/filter operation. The overhead of each filter process includes the time to process the filter searching for user PipeAdvertisement establishing a connection sending the message. TCP transport is using blocking I/O. Introduction Background Design & Evaluation Conclusion

  30. Conclusion Peer to Peer Systems provide a decentralized approach that does not require any costly infrastructure. Jxta was selected among other systems since it is a generic overlay network that connects devices on the network. The design of “Peer to Peer overlay network for sensornets” combines a peer service discovery with a distributed query processing. JMSN design doesn‘t come without cost. Results showed that the current implementation of Jxta-C consumes memory, which is not efficient for embedded system with limited memory. Introduction Background Design & Evaluation Conclusion

  31. Future Work It is essential to extend the current version of Jxta-C implementation to cope with the limited memory devices. It is necessary to enhance the user agent with complex query searching by partial names and attributes such as Location. Aggregate function such as Average, Max, Count ...etc. Introduction Background Design & Evaluation Conclusion

  32. Introduction Background Design & Evaluation Conclusion • شكراًَ لاستماعكم • Thanks for your attention

More Related