Page 1
© 2007 IBM Corporation
IBM T J Watson Research Center
Slide 1 Invited talk at KAIST, 4/30/2007
Networking Research in the International Technology Alliance- Topology control and data dissemination in wireless networks
Kang-Won Lee
IBM T. J. Watson Research Center
Research was sponsored by the U.S. Army Research Laboratory and the U.K. Ministry of Defense and was accomplished under Agreement Number W911NF-06-3-0001. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the U.S. Army Research Laboratory, the U.S. Government, the U.K. Ministry of Defense or the U.K. Government.
Page 2
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 2 Invited talk at KAIST, 4/30/2007
CreditsCollaborators
V. Pappas, A. Tantawi, A. Beygelzemer (IBM)
S. Seshan (CMU)
P. Lio, J. Crowcroft (Cambridge)
M. Gerla (UCLA)
A. Swami (ARL), T. McCutcheon (DSTL)
Slide credits
A. Tantawi, V. Pappas (IBM)
U. Lee, M. Gerla (UCLA)
Page 3
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 3 Invited talk at KAIST, 4/30/2007
What is ITA?
International Technology Alliance for Network and Information Sciences
Large scale long-term research program supported by US ARL and UK MOD
10 years, 24 institutions in US and UK
Four main technical areas (TAs)
network theory, security of a system of systems, sensor information processing, and coalition planning
Page 4
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 4 Invited talk at KAIST, 4/30/2007
The ITA Vision
A US/UK Alliance conducting an open collaborative research focused on network science by:
Creating an international collaborative research culture– Academia, Industry, Government in US and UK
– Innovative multidisciplinary approaches
Developing ground-breaking fundamental sciences– Making an impact on coalition military effectiveness
– Develop understanding the fundamentals of military networks – not just computer networks, but also logical and social networks
Jointly address major research challenges– Networking & Security & Sensor Processing & Decision making
Page 5
5
U.S.Gov.
Industry
Academia
U.K.Gov.
INDUSTRY9. BBNT Solutions LLC
10.The Boeing Corporation
11.Honeywell Aerospace Electronic Systems
12. IBM Research
13.Klein Associates
ACADEMIA1. Carnegie Mellon University
2. City University of New York
3. Columbia University
4. Pennsylvania State University
5. Rensselaer Polytechnic Institute
6. University of California Los Angeles
7. University of Maryland
8. University of Massachusetts
INDUSTRY 8. IBM UK
9. LogicalCMG
10.Roke Manor Research Ltd.
11.Systems Engineering& Assessment Ltd.
ACADEMIA1. Cranfield University, Royal Military
College of Science, Shrivenham
2. Imperial College, London
3. Royal Holloway University of London
4. University of Aberdeen
5. University of Cambridge
6. University of Southampton
7. University of York
7
10
6
42
853
1
9
1312
11
123
4
5
6
7
8 91011
Team Overview
Page 6
6
International Technology Alliance in International Technology Alliance in Network and Information SciencesNetwork and Information Sciences
Collaborative Alliance Managers/Consortium Managers Jay Gowens (ARL) Jack Lemon (MoD) Dinesh Verma (IBM) Dave Watson (IBM-UK)
International Technology Alliance in International Technology Alliance in Network and Information SciencesNetwork and Information Sciences
Collaborative Alliance Managers/Consortium Managers Jay Gowens (ARL) Jack Lemon (MoD) Dinesh Verma (IBM) Dave Watson (IBM-UK)
Security Across a Security Across a System-of-SystemsSystem-of-Systems
Trevor Benjamin (Dstl)Trevor Benjamin (Dstl)Greg Cirincione (ARL)Greg Cirincione (ARL)
John McDermid (York U)John McDermid (York U)Dakshi Agrawal (IBM)Dakshi Agrawal (IBM)
Security Across a Security Across a System-of-SystemsSystem-of-Systems
Trevor Benjamin (Dstl)Trevor Benjamin (Dstl)Greg Cirincione (ARL)Greg Cirincione (ARL)
John McDermid (York U)John McDermid (York U)Dakshi Agrawal (IBM)Dakshi Agrawal (IBM)
Network TheoryNetwork Theory
Ananthram Swami (ARL)Ananthram Swami (ARL)Tom McCutcheon (Dstl)Tom McCutcheon (Dstl)Don Towsley (U Mass)Don Towsley (U Mass)Kang-Won Lee (IBM)Kang-Won Lee (IBM)
Network TheoryNetwork Theory
Ananthram Swami (ARL)Ananthram Swami (ARL)Tom McCutcheon (Dstl)Tom McCutcheon (Dstl)Don Towsley (U Mass)Don Towsley (U Mass)Kang-Won Lee (IBM)Kang-Won Lee (IBM)
Sensor Information Sensor Information ProcessingProcessing
Tien Pham (ARL)Tien Pham (ARL)Gavin Pearson (Dstl)Gavin Pearson (Dstl)
Thomas La Porta (PSU)Thomas La Porta (PSU)Vic Thomas (Honeywell)Vic Thomas (Honeywell)
Sensor Information Sensor Information ProcessingProcessing
Tien Pham (ARL)Tien Pham (ARL)Gavin Pearson (Dstl)Gavin Pearson (Dstl)
Thomas La Porta (PSU)Thomas La Porta (PSU)Vic Thomas (Honeywell)Vic Thomas (Honeywell)
Distributed Coalition Distributed Coalition PlanningPlanning
Jitu Patel (Dstl)Jitu Patel (Dstl)Mike Strub (ARL)Mike Strub (ARL)
Nigel Shadbolt (SHamp)Nigel Shadbolt (SHamp)Graham Bent (IBM)Graham Bent (IBM)
Distributed Coalition Distributed Coalition PlanningPlanning
Jitu Patel (Dstl)Jitu Patel (Dstl)Mike Strub (ARL)Mike Strub (ARL)
Nigel Shadbolt (SHamp)Nigel Shadbolt (SHamp)Graham Bent (IBM)Graham Bent (IBM)
Page 7
7
International Technology Alliance in International Technology Alliance in Network and Information SciencesNetwork and Information Sciences
Collaborative Alliance Managers/Consortium Managers Jay Gowens (ARL) Jack Lemon (MoD) Dinesh Verma (IBM) Dave Watson (IBM-UK)
International Technology Alliance in International Technology Alliance in Network and Information SciencesNetwork and Information Sciences
Collaborative Alliance Managers/Consortium Managers Jay Gowens (ARL) Jack Lemon (MoD) Dinesh Verma (IBM) Dave Watson (IBM-UK)
Security Across a Security Across a System-of-SystemsSystem-of-Systems
Trevor Benjamin (Dstl)Trevor Benjamin (Dstl)Greg Cirincione (ARL)Greg Cirincione (ARL)
John McDermid (York U)John McDermid (York U)Dakshi Agrawal (IBM)Dakshi Agrawal (IBM)
Security Across a Security Across a System-of-SystemsSystem-of-Systems
Trevor Benjamin (Dstl)Trevor Benjamin (Dstl)Greg Cirincione (ARL)Greg Cirincione (ARL)
John McDermid (York U)John McDermid (York U)Dakshi Agrawal (IBM)Dakshi Agrawal (IBM)
Network TheoryNetwork Theory
Ananthram Swami (ARL)Ananthram Swami (ARL)Tom McCutcheon (Dstl)Tom McCutcheon (Dstl)Don Towsley (U Mass)Don Towsley (U Mass)Kang-Won Lee (IBM)Kang-Won Lee (IBM)
Network TheoryNetwork Theory
Ananthram Swami (ARL)Ananthram Swami (ARL)Tom McCutcheon (Dstl)Tom McCutcheon (Dstl)Don Towsley (U Mass)Don Towsley (U Mass)Kang-Won Lee (IBM)Kang-Won Lee (IBM)
Sensor Information Sensor Information ProcessingProcessing
Tien Pham (ARL)Tien Pham (ARL)Gavin Pearson (Dstl)Gavin Pearson (Dstl)
Thomas La Porta (PSU)Thomas La Porta (PSU)Vic Thomas (Honeywell)Vic Thomas (Honeywell)
Sensor Information Sensor Information ProcessingProcessing
Tien Pham (ARL)Tien Pham (ARL)Gavin Pearson (Dstl)Gavin Pearson (Dstl)
Thomas La Porta (PSU)Thomas La Porta (PSU)Vic Thomas (Honeywell)Vic Thomas (Honeywell)
Distributed Coalition Distributed Coalition PlanningPlanning
Jitu Patel (Dstl)Jitu Patel (Dstl)Mike Strub (ARL)Mike Strub (ARL)
Nigel Shadbolt (SHamp)Nigel Shadbolt (SHamp)Graham Bent (IBM)Graham Bent (IBM)
Distributed Coalition Distributed Coalition PlanningPlanning
Jitu Patel (Dstl)Jitu Patel (Dstl)Mike Strub (ARL)Mike Strub (ARL)
Nigel Shadbolt (SHamp)Nigel Shadbolt (SHamp)Graham Bent (IBM)Graham Bent (IBM)
Policy Based Security Management
Calo, IBMCalo, IBM
Policy Based Security Management
Calo, IBMCalo, IBM
Energy Efficient Security
Architectures and Infrastructures
Paterson, Royal Paterson, Royal HollowayHolloway
Energy Efficient Security
Architectures and Infrastructures
Paterson, Royal Paterson, Royal HollowayHolloway
Trust and Risk Management in
Dynamic Coalition Environments
McDermid, YorkMcDermid, York
Trust and Risk Management in
Dynamic Coalition Environments
McDermid, YorkMcDermid, York
Theoretical Foundations for
Analysis/Design of Wireless and Sensor
Networks
Towsley, U MassTowsley, U Mass
Theoretical Foundations for
Analysis/Design of Wireless and Sensor
Networks
Towsley, U MassTowsley, U Mass
Interoperability of Wireless Networks
and Systems
Lee, IBMLee, IBMHancock, RMRHancock, RMR
Interoperability of Wireless Networks
and Systems
Lee, IBMLee, IBMHancock, RMRHancock, RMR
Biologically-Inspired Self-Organization in
Networks
Lio, CambridgeLio, CambridgePappas, IBMPappas, IBM
Biologically-Inspired Self-Organization in
Networks
Lio, CambridgeLio, CambridgePappas, IBMPappas, IBM
Quality of Information of Sensor Data
Bisdikian, IBMBisdikian, IBM
Quality of Information of Sensor Data
Bisdikian, IBMBisdikian, IBM
Task-Oriented Deployment of Sensor Data
Infrastructures
La Porta, Penn StateLa Porta, Penn State
Task-Oriented Deployment of Sensor Data
Infrastructures
La Porta, Penn StateLa Porta, Penn State
Complexity Management of
Sensor Data Infrastructures
Szymanski, RPISzymanski, RPI
Complexity Management of
Sensor Data Infrastructures
Szymanski, RPISzymanski, RPI
Mission Adaptive Collaborations
Poltrock, BoeingPoltrock, Boeing
Mission Adaptive Collaborations
Poltrock, BoeingPoltrock, Boeing
Command Process Transformation and
Analysis
Sieck, Klein AssocSieck, Klein Assoc
Command Process Transformation and
Analysis
Sieck, Klein AssocSieck, Klein Assoc
Shared Situational Awareness and the
Semantic Battlespace Infosphere
Shadbolt, SouthhamptonShadbolt, SouthhamptonWagget, IBMWagget, IBM
Shared Situational Awareness and the
Semantic Battlespace Infosphere
Shadbolt, SouthhamptonShadbolt, SouthhamptonWagget, IBMWagget, IBM
Page 8
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 8 Invited talk at KAIST, 4/30/2007
Network Theory (Towsley U. Mass, Lee IBM) Fundamental underpinnings for adaptive networking
to support complex system-of-systems
P1 Theoretical foundations for design of wireless and sensor networks (Towsley, U. Mass)
P2 Interoperability of wireless networks and systems (Lee IBM-US/Hancock, RMR)
P3 Biologically-inspired self-organization in networks (Lio Cambridge/Pappas IBM-US)
Strategies for delivering traffic in duty-cycling networks Power reduction by cooperative transmission
Page 9
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 9 Invited talk at KAIST, 4/30/2007
Biologically-inspired Networking
Why do computer scientists (who work in wireless networking) look for biological inspirations?
At high level, there is a parallel between the two, e.g.
Topology and spatial characteristics
Dynamics and mobility vs. ants or insects foraging
Data diffusion vs. disease spreading
Robust design vs. self healing systems
Page 10
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 10 Invited talk at KAIST, 4/30/2007
Holy Grail
Develop simple algorithms that uses only local knowledge, which result in desirable global properties
Some network algorithms are like that (not necessarily biological)
TCP congestion control [Jacobson88]
Randomized duty cycling [Godfrey04]
Coloring-based resource allocation [Ko05]
Time synchronization of nodes [Degesys07]
Page 11
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 11 Invited talk at KAIST, 4/30/2007
However,
Wireless networks are not graphs
They are even different from conventional networks
Physical characteristics
Medium access (resource sharing)
Routing
Dynamics and mobility
There is no single kind of wireless networks
Cellular, MANET, wireless mesh, sensors, aquatic, etc.
Page 12
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 12 Invited talk at KAIST, 4/30/2007
Issues at Various Layers
Physical layer
Antenna technologies – directional, MIMO, cooperative
Power control – also an issue at MAC, network layers
MAC layer in wireless
Hidden terminal problem, exposed terminal problem
Fairness in MAC
Network layer
Myriads of ad hoc routing protocols
– Proactive, reactive, geographical, hierarchical, hybrid
Multicasting and broadcasting issues
Store-and-forward
Page 13
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 13 Invited talk at KAIST, 4/30/2007
Bio-inspiration is Not Bio-emulation
X
O
Page 14
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 14 Invited talk at KAIST, 4/30/2007
Topic of Today: Two Ongoing Research Activities
MANET/sensor net topology control
IBM / CMU
Urban sensing and data diffusion
IBM / UCLA / Cambridge
Page 15
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 15 Invited talk at KAIST, 4/30/2007
MANET Topology Control
Problem Definition
How to configure low-level device parameters in order to achieve a network structure with a set of desirable characteristics?
Characteristics
Connectivity
Network capacity
Energy consumption
Path latency
Robustness/Resilience
Page 16
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 16 Invited talk at KAIST, 4/30/2007
Configurable Parameters
Transmission power
Carrier sense threshold
MAC, packet transmission
Radio channel allocation
Multiple channel / multiple interface
Antenna characteristics:
Multiple-input multiple-output (MIMO)
Directional, onmi-directional
Page 17
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 17 Invited talk at KAIST, 4/30/2007
Example: Transmission Power
Page 18
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 18 Invited talk at KAIST, 4/30/2007
Topology Properties Pictures from CBTC paper (ToN 05)
Densely Connected Sparsely Connected
Small Hop-Count
High Power Consumption
Robust to Node Failures
Transmission Interference
Large Hop-Count
Low Power Consumption
Prone to Node Failures
Low Interference
What makes a good topology ?
Small Hop-Count
Low Power Consumption
Robust to Node Failures
Low Interference
Page 19
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 19 Invited talk at KAIST, 4/30/2007
Good Topology: Application-Driven
Application-driven topology control:
Application-specific metrics
Placement of services
Compatibility matrix
Dense
Sparse
Real-TimeMessaging Dense Sparse Long Short
Application-Type Traffic-Matrix Mission-DurationTopology
Page 20
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 20 Invited talk at KAIST, 4/30/2007
How to Build Good Topologies (1)
Can we get insights from wired networks?
How about biological insights – neural networks, galleries of insect colony?
[Li04]
Preferential Attachment HOT Model
Page 21
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 21 Invited talk at KAIST, 4/30/2007
How to Build Good Topologies (2)
What do we need to consider in MANET topology?MANET: spatial constrains
Technological Constrains: shared medium, energy consumption
Node Mobility
Time Scale
As a result:Internet: scale-free
MANET: RGG? Clustered?
Page 22
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 22 Invited talk at KAIST, 4/30/2007
How to Build Good Topologies (3)
Current Approaches:Minimize transmission power
– NP-hard problem (for 2D and up)
Minimize interference with channel allocation– NP-hard problem
Minimize energy stretch of a path– Relative Neighbor Graphs, Gabriel Graph, Yao Graph
Page 23
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 23 Invited talk at KAIST, 4/30/2007
Duty Cycling in Wireless Networks
Power saving longevity of mission lifetime
Impacts the performance
Sensor coverage
Connectivity
Routing delay
Mathematical modeling to provide insights for management
How to control the fraction of active nodes
Localized duty cycling decision predictable global behavior
Page 24
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 24 Invited talk at KAIST, 4/30/2007
Related Work
SPAN (Chen01)
Makes local randomized decision to join a forwarding backbone based on the estimate how much it will benefit the neighbors
GAF (Xu01)
Sets up a virtual grid based on location information, and only one node in a grid becomes active
STEM (Schurgers02)
Nodes awaken sleeping neighbors when they need to forward data using beacons on a dedicated signaling channel
NAPS
Local randomized algorithm based on number of neighbors with an aim to achieve global connectivity
Page 25
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 25 Invited talk at KAIST, 4/30/2007
Modeling Duty Cycling Networks
Consider two states: active, sleeping
Each node makes local decision based on:
Its own probability to become active
States of immediate neighbors: pulling or pushing
We are interested in the steady state
Model as a spatial process
Page 26
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 26 Invited talk at KAIST, 4/30/2007
Modeling Duty Cycling Networks – Spatial Process
n = (n1;n2;¢¢¢;nJ )
J sites
nj attribute (state) of site j 2 f1;2;¢¢¢;J g , nj 2 N j
S state space, S = N1 £ N2 £ ¢¢¢£ N J
¼probability distribution ¼: S ! (0;1) andP
n2S ¼(n) = 1
n is called a random ¯eld
Page 27
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 27 Invited talk at KAIST, 4/30/2007
Connectivity Model
G connectivity graph of sites (J ;E )
G ¡ j set of sites in G other than j
gj set of neighbors of site j
n is a Markov ¯eld if P (nj j nG¡ j ) = P (nj j ngj), j 2 f1;2;¢¢¢;J g
Page 28
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 28 Invited talk at KAIST, 4/30/2007
Probability Distribution – Product Form
For Markov ¯eld n, ¼has theproduct form
¼(n) = B ¦ C 2C µC (nC ); n 2 C
where
C µ G is a simplex (a set of fully connected edges)
C set of simplices of G
µC (nC ) a function of nC , C 2 C
Page 29
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 29 Invited talk at KAIST, 4/30/2007
Geometric Reversible Spatial Process
Suppose that N j = f1;2;¢¢¢;Ng
q(n;Tmj n) = ¸(nj ;m) Á(nj )r Ã(m)r 0
where
Tmj n = (n1;n2;¢¢¢;nj ¡ 1;m;nj +1;¢¢¢;nJ ) an operator which changes the at-
tributeof site j to m
¸(nj ;m) intrinsic tendency of a site to change from nj to m
r(r0) number of sites neighboring j with attributes nj (m)
Á(nj )(Ã(m)) extrinsic tendency of a site to change from nj (to m)
Page 30
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 30 Invited talk at KAIST, 4/30/2007
Geometric Reversible Spatial Process
Theequilibrium distribution is
¼(n) = B ¦ Nn=1 ®(n)M (n)
·Ã(n)Á(n)
¸R(n)
where
M (n) number of sites with attributen
R(n) number of edges with both end sites havig attributen
and ®(n) is thenonzero solution to
®(n) ¸(n;m) = ®(m) ¸(m;n)
Page 31
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 31 Invited talk at KAIST, 4/30/2007
Example: Simple Duty Cycling
N = f0;1g¸(1;0) = ¸¸(0;1) = ¹®= ¹ =̧Á(0) = Á(1) = 1Ã(0) = ¡Ã(1) = ¢
Then,
¼(n) = B ®M (1) ¡ R (0) ¢ R (1)
Threeparameters: ®, ¡ , and ¢
// 0: sleeping, 1: active
Page 32
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 32 Invited talk at KAIST, 4/30/2007
Analytical Result – 1k Node, 10k Edge RG
Page 33
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 33 Invited talk at KAIST, 4/30/2007
Impact of Self – Increasing α
Page 34
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 34 Invited talk at KAIST, 4/30/2007
Impact of Self – Full Spectrum
Page 35
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 35 Invited talk at KAIST, 4/30/2007
Impact of Ψ(0) – Increasing γ
Page 36
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 36 Invited talk at KAIST, 4/30/2007
Impact of Ψ(0) – Full Spectrum
Page 37
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 37 Invited talk at KAIST, 4/30/2007
Impact of Ψ(1) – Full Spectrum
Page 38
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 38 Invited talk at KAIST, 4/30/2007
Impact of Both Ψ(0) and Ψ(1)
Page 39
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 39 Invited talk at KAIST, 4/30/2007
Controlling Node Activities
Page 40
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 40 Invited talk at KAIST, 4/30/2007
Connectivity Graphs
C
G
F E
D
B
A
H
sample graphlinear graph
3 5421
Page 41
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 41 Invited talk at KAIST, 4/30/2007
State Pattern
time
Site
sN
(1)
Connectivity Graph Linearlambda 1
mu 1gamma 1
delta 1
N(1)
0
50
100
150
200
0 1 2 3 4 5
Fre
qu
ency
N(1)
Mean 2.404Standard Error 0.050026Median 2Mode 2Standard Deviation 1.118609Sample Variance 1.251287Kurtosis -0.395192Skewness 0.000384Range 5Minimum 0Maximum 5Sum 1202Count 500
Page 42
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 42 Invited talk at KAIST, 4/30/2007
State Pattern
time
Site
sN
(1)
Connectivity Graph Linearlambda 1
mu 1gamma 2
delta 2
N(1)
Mean 2.4Standard Error 0.057677Median 2Mode 2Standard Deviation 1.2897Sample Variance 1.663327Kurtosis -0.62028Skewness 0.11818Range 5Minimum 0Maximum 5Sum 1200Count 500
N(1)
0
50
100
150
200
0 1 2 3 4 5
Fre
qu
ency
Page 43
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 43 Invited talk at KAIST, 4/30/2007
State Pattern
time
Site
sN
(1)
Connectivity Graph Linearlambda 1
mu 1gamma 0.5
delta 0.5
N(1)
050
100
150200250
0 1 2 3 4 5
Fre
qu
ency
N(1)
Mean 2.4Standard Error 0.041707Median 2Mode 2Standard Deviation 0.932598Sample Variance 0.869739Kurtosis -0.055193Skewness 0.01786Range 5Minimum 0Maximum 5Sum 1200Count 500
Page 44
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 44 Invited talk at KAIST, 4/30/2007
Two Ongoing Research Activities
MANET/sensor net topology control
IBM / CMU
Urban sensing and data diffusion
IBM / UCLA / Cambridge
Page 45
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 45 Invited talk at KAIST, 4/30/2007
Epidemic Style Data Diffusion in Vehicular Sensor Networks (VSNs)
VSN-enabled vehic le
Inter-vehic lecommunications
Vehic le-to-roadsidecommunications
Roadside base station
Video Chem.
Sensors
Storage
Systems
Proc.
Page 46
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 46 Invited talk at KAIST, 4/30/2007
Vehicular Sensor Applications Smart-mob-approach for proactive urban monitoring using
VSNSmart mobs: people with shared interests and goals persuasively and seamlessly cooperate using wireless mobile devices
EnvironmentTraffic congestion monitoring
Urban pollution monitoring
Civic and Homeland securityForensic data for accidents or crime sites
Terrorist alerts
Page 47
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 47 Invited talk at KAIST, 4/30/2007
Accident Scenario: Storage and Retrieval
Designated cars: Continuously collect images on the street (store data locally)
Process the data and detect an event
Classify the event as Meta-data (Type, Option, Location, Vehicle ID)
Post it on distributed index
Police (agents) retrieve data from designated cars
CRASH
- Sensing - Processing
Crash Summary Reporting
Summary Harvesting
Page 48
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 48 Invited talk at KAIST, 4/30/2007
How to Retrieve the Data?
Upload to nearest AP (Cartel project, MIT)
Epidemic diffusion (our approach)
Mobile nodes periodically broadcast meta-data of events to their neighbors
A mobile agent (e.g. the police) queries nodes and harvests events
Data dropped when stale and/or geographically irrelevant
Page 49
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 49 Invited talk at KAIST, 4/30/2007
General Problem
Three phases of urban sensing & harvesting
Meta-data Dissemination
Meta-data Harvesting
Data Access
Bio inspirations:
Pheromone trails (ants foraging)
Chemotaxes (bacterial foraging)
– Motion patterns (called taxes) that the bacteria generates in prescreens of chemical attractants and repellants (nutrition gradient) (e.g., E. Coli)
Page 50
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 50 Invited talk at KAIST, 4/30/2007
Communications of Ants
Decoupling of foraging and recruitmentPheromone trail: route to food
Dance and physical contract: recruitment of additional foragers
Types of pheromone trailsNon-volatile, volatile, short-lived repellent
Sound, physical contacts (time-space constraints)Antenna, vibration, displays, dances, waggling, jerking
•Pharaoh’s ants, Monomorium pharaonis, form branching networks of pheromone trails. There the network has been formed on a smoked glass surface to aid visualization
(Image courtesy of Duncan Jackson)
•Pharaoh’s ants, Monomorium pharaonis, form branching networks of pheromone trails. There the network has been formed on a smoked glass surface to aid visualization
(Image courtesy of Duncan Jackson)
Page 51
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 51 Invited talk at KAIST, 4/30/2007
Meta-data Dissemination
Meta-data creation
Format: (Location and timestamp, data type, variable size info)
Optional local processing, e.g. Recognizing license plates + vehicle type
Dissemination
Periodically broadcast to neighbors
Can be encrypted for security/privacy issues
Prioritization
Temporal, spatial
Page 52
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 52 Invited talk at KAIST, 4/30/2007
Meta-data Harvesting
Gradient-based foragingVehicle density in urban grids is non-uniform
– More vehicles, more information: Agents are attracted via this info gradient
Need to avoid local maxima
Reinforcement learningLearn the mobility patterns over time Data-mining results can provide “feedback” to the foraging algorithm
Multiple agentsHarvesting area should be divided to minimize interferenceFor example, based on contact history (as repellents)
Page 53
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 53 Invited talk at KAIST, 4/30/2007
Data Access
Collection by agents
Similar to LER with actual mobility
Factors: physical speed of agents; coordinated swarming of agents
Collection by networks
Multi-hop pulling via Last Encounter Routing (LER)
Page 54
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 54 Invited talk at KAIST, 4/30/2007
Evaluation
Simulation Setup
NS-2 simulator
802.11: 11Mbps, 250m tx range
Average speed: 10 m/s
Mobility Models
– Random waypoint (RWP)
– Real-track model (RT) :
• Group mobility model
• merge and split at intersections
• Westwood map
Page 55
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 55 Invited talk at KAIST, 4/30/2007
Meta-data Harvesting Delay with RWP
Higher mobility decreases harvesting delay
Time (seconds)
# of
Har
vest
ed S
umm
arie
s V=25m/s
V=5m/s
Page 56
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 56 Invited talk at KAIST, 4/30/2007
Harvesting Results with Real Track
Restricted mobility results in larger delay
Time (seconds)
# of
Har
vest
ed S
umm
arie
s V=25m/s
V=5m/s
Page 57
IBM T J Watson Research Center
© 2007 IBM CorporationSlide 57 Invited talk at KAIST, 4/30/2007
To sum up
ITA opportunity
International collaborative research on interesting topics
More understanding is required
Biology/physics camp vs. computer networks
– BIOWIRE workshop (Cambridge, UK)
– Network-based modeling, simulation vs. Analysis based on ODE
Mobility model
Questions?