Remote Object Query for Ad-hoc Computing Environment CS851 Biologically Inspired Computing

advertisement

Remote Object Query for

Ad-hoc Computing Environment

CS851 Biologically Inspired Computing

Presented By Qing Cao

Computer Science Department UVA

April 2003

Background & Motivation

 Large Ad-hoc Computing

Environment such as

Sensor Network, etc, has to be effectively controlled.

Smart

Sensor

Node

Challenge: How to know where are the

Targets and Control them?

Smart

Sensor

Node

Smart

Sensor

Node

Target

Smart

Sensor

Node

Smart

Sensor

Node

Target

Target

Overview of this research work

 A quantitative approach and analysis of the design and deployment of sensor network, with Guiding Parameters and Results.

 A novel, biologically inspired control mechanism for sensor networks event query based on the results.

 Result: A service-client Control structure for Sensor networks, especially suitable for security. Research results have been simulated and evaluated and a prototype will be implemented on MICA2 motes.

Story Begins:

 You are a tourist. You are now in a forest.

Now the forest is caught on FIRE!

 So what kinds of tools can you use to

 escape?

Helicopters?

Call for help? (cell phone)

And now , A single mote.

The complete Scenario

 The forest can be monitored.

 The motes detect fire and deposit results.

 The mote in your hand is used to retrieve the results.

 You use the results to find path out of the forest.

Main Challenge:

The query of the event in the network.

Problem: How to find the position of the events in a real time manner?

Inspiration from the biological world

Termites send out pheromone to notify other termites of its current location.

 Such information is sent uniformly.

Directed Information

Sending might help.

Inspiration from the biological world

 Animals leave trails as the presence of themselves, such as bees or mice.

Can we import this idea in large colony of computing units?

My Method of such simulation

Fire

Information

Fire!

Time, Type,

Location, etc

H Arm

Location

Time Type

Basic Info.

H Arm

Location

Time Type

Basic Info.

H Arm

H Arm

Location

Time Type

Basic Info.

H Arm

Location

Time Type

Basic Info.

Intersect

H Arm

Location

Time Type

Basic Info.

H Arm

H Arm

Time Type

Basic Info.

H Arm

Basic Info.

H Arm

Time Type

Basic Info.

Fire

Information

V Arm

Basic Info.

Fire

Information

V Arm

Basic Info.

No Sensor

Fire

Information

V Arm

Basic Info.

Fire

Information

V Arm

Basic Info.

Fire

Information

V Arm

Basic Info.

Fire

Information

V Arm

Basic Info.

Fire

Information

V Arm

Basic Info.

Fire

Information

V Arm

Basic Info.

No Sensor

Fire

Information

Context Grid

V Arm

No Sensor

No Sensor

No Sensor

No Sensor

No Sensor

No Sensor

No Sensor

Query

Station

Idea

 Assumption: The communication range is larger than sensing range.

 How this idea works

 Two different Algorithms.

Single Node Relay.

Lower possibility, less messages

Multiple Node Relay

Higher possibility, more messages

Simulation Results

 The density of motes to ensure coverage

Comm Range Percentage Effect

0.6

0.5

0.4

0.3

0.2

0.1

1

0.9

0.8

0.7

0

10 50 90 130 170 210 250 290 330 370 410 450 490 530 570 610

Number of nodes

Comm 0.1

Comm 0.25

Comm 0.15

Simulation Results

 Conclusion :Communication range percentage is the only reason that determines how many nodes we need.

Nodes Vs Percentage

3500 3150

3000

2500 2100

2000

1450

1500

1000

500

1000

750

600 500

410 390 280 270 230 200 190

170 160 125 120 110 100 85

0

0.05 0.06 0.07 0.08 0.09

0.1

0.11 0.12 0.13 0.14 0.15 0.16 0.17 0.18 0.19

0.2

0.21 0.22 0.23 0.24 0.25

Range Percentage

Number of Nodes

Simulation Results

 The density of motes to ensure query

The Possiblity and Arm Length for 0.1 Comm Range

1

0.9

0.8

0.7

0.6

0.5

0.4

0.3

0.2

0.1

0

20 40 60 80 100 120 140 160 180 200 220 240 260 280 300 320 340 360 380 400

N u m b e r o f N o d e s

Possbility Arm Length

Simulation Results

 The density of motes to ensure query (cont.)

The effect of the comm range

1.1

0.9

0.7

0.5

0.3

0.1

-0.1

10 28 46 64 82 100 118 136 154 172 190 208 226 244 262 280 298 316 334 352 370 388 406

Number of Nodes

0.25

0.15

0.1

Simulation Results

 The effect of Arm Width

The effect of Arm width

1

0.9

0.8

0.7

0.6

0.5

0.4

0.3

0.2

0.1

0

10 34 58 82 106 130 154 178 202 226 250 274 298 322 346 370 394 418 442 466 490 514 538 562 586

Node Number

0.33

0.5

1

So how do motes intersect with each other?

 Lemma: If a query arm meets with a service arm and both arms keep unbroken, then at least one node in the query arm is bound to be able to communicate with at least one node in the service arm. (Proof omitted here)

 As a result of this lemma, there are two kinds of intersections:

 Direct Intersection and Indirect Intersection

Direct Vs Indirect

0.6

0.5

0.4

0.3

0.2

1

0.9

0.8

0.7

0.1

0

10 43 76 109 142 175 208 241 274 307 340 373 406 439 472 505 538 571 604 637

Direct Indirect

System Overview

Request and

Receive

Client Node

User

Security

Sensor

Network

Service

Layer

Client Node

Query Arm setup everytime

Buildup of the service arms in advance

Client Node

System Advantages

 This is a secure system

Since C/S Architecture is used, the user must be authenticated to use the service.

Traditional Security methods, such as

RSA can be used to defeat any possible attack.

System Advantages

 The structure is simple.

 It is application independent.

 It provides basic functions , such as query, count, etc, inherently.

Now how you escape from the forest?

 You have a mote with your user private key.

 You send out the message which requests current fire locations.

 Your request is authenticated by the sensor network, which is nearby, but you don

’ t need to know where they are.

 The sensor system now monitoring the forest gives you the fire information.

 The information is displayed on your PDA.

 RUN, FOREST, RUN!

… from the movie Forrest Gump

End of Show

For CS851 University of Virginia

Qing Cao Presents

Download