SlideShare a Scribd company logo
1 of 21
Opportunistic Persistent Data Storage
Author: Weerasooriya W.A.A.C.P.
Index Number: 11002192 Supervisor: Dr. Ranasinghe D.N.
September 03, 2015 Weerasooriya W.A.A.C.P. 11002192
Outline
• Motivation
• Research Problem
• From Proposal defense
• Design & Architecture
• Our Contribution
• Related Work
• To-Do
September 03, 2015 Weerasooriya W.A.A.C.P. 11002192
• Opportunistic Networks are type of Mobile Ad-
hoc Networks(MANET).
• Message delays are accepted.
• There are a lot of routing protocol mechanisms
that have been designed for ON
• Synthetic traces are widely used to evaluate
ON E.g. : ONE simulator
Motivation
There are a lot of papers which describes virtual
data storages over distributed systems. We can find
several storage protocol implementations for
MANET as well. But…..
According to the best of our knowledge there is not any
storage mechanism which uses
opportunistic properties
September 03, 2015 Weerasooriya W.A.A.C.P. 11002192
Motivation
Read
ReadWrite
Write
Opportunistic Storage
September 03, 2015 Weerasooriya W.A.A.C.P. 11002192
Outline
• Motivation
• Research Problem
• From Proposal defense
• Design & Architecture
• Our Contribution
• Related Work
• To-Do
September 03, 2015 Weerasooriya W.A.A.C.P. 11002192
Modeling a persistent data storage on
opportunistic networks making maximum
use of opportunistic properties
Research Goal
September 03, 2015 Weerasooriya W.A.A.C.P. 11002192
Research Questions
Q1: What is the best way to capture Social network
properties in ON?
Q2: What is the best persistent storage mechanism for
MANET that can be adjusted to use with opportunistic
properties of nodes?
September 03, 2015 Weerasooriya W.A.A.C.P. 11002192
Scope
• Synthetic traces- limitations( no. of subjects, simulations area/time)
Assumptions: It’s better to see the problem in the easiest way and deriving
a solution. Then we can go more deeper in to the problem, removing
assumptions one by one.
1. No peer failures
2. Number of nodes are fixed
3. One Writer- Many Readers
4. No reading while writing
5. Write globally- Read locally
6. Security etc.
September 03, 2015 Weerasooriya W.A.A.C.P. 11002192
Outline
• Motivation
• Research Problem
• From Proposal defense
• Design & Architecture
• Our Contribution
• Related Work
• To-Do
September 03, 2015 Weerasooriya W.A.A.C.P. 11002192
From Proposal Defense
•BitTorrent Protocol: In the very early phase of
our problem we only consider single variables.
After successful evaluation of this system we
try to focus on stream data.
September 03, 2015 Weerasooriya W.A.A.C.P. 11002192
Outline
• Motivation
• Research Problem
• From Proposal defense
• Design & Architecture
• Our Contribution
• Related Work
• To-Do
September 03, 2015 Weerasooriya W.A.A.C.P. 11002192
Design & Architecture
September 03, 2015 Weerasooriya W.A.A.C.P. 11002192
Virtual Storage
Routing+ON
properties-1
MAC-1
PHYSICAL
1
Storage-
1
Routing+ON
properties-2
MAC-2
PHYSICAL
2
Storage-
2
Routing+ON
properties-4
MAC-4
PHYSICAL
4
Storage-
4
Routing+ON
properties-3
MAC-3
PHYSICAL
3
Storage-
3
Node 1 Node 4Node 3Node 2
ONE Simulator
September 03, 2015 Weerasooriya W.A.A.C.P. 11002192
Outline
• Motivation
• Research Problem
• From Proposal defense
• Design & Architecture
• Our Contribution
• Related Work
• To-Do
September 03, 2015 Weerasooriya W.A.A.C.P. 11002192
Our Contribution
September 03, 2015 Weerasooriya W.A.A.C.P. 11002192
Virtual
Storage
Routing+ON
properties
MAC
PHYSICAL
Storage
Storage
Virtual
Storage
Routing+ON
properties
MAC
PHYSICAL Storage
SCORP
dLIFE
Data dissemination
Replica management
Outline
• Motivation
• Research Problem
• From Proposal defense
• Design & Architecture
• Our Contribution
• Related Work
• To-Do
September 03, 2015 Weerasooriya W.A.A.C.P. 11002192
Related Work- Our Path
September 03, 2015 Weerasooriya W.A.A.C.P. 11002192
Opportunistic
Persistent Data
Storage
Quorum based
Pub/sub
Social network properties
Routing for MANET
Mobility models
Content dissemination
Outline
• Motivation
• Research Problem
• From Proposal defense
• Design & Architecture
• Our Contribution
• Related Work
• To-Do
September 03, 2015 Weerasooriya W.A.A.C.P. 11002192
To-Do List: Implementation
• Implementation of the Routing protocol which uses Opportunistic
properties.
• Implementation of the Virtual Storage
• Our task should be carried out towards stream data also
September 03, 2015 Weerasooriya W.A.A.C.P. 11002192
To-Do list: Evaluation
• Evaluate the success rate: latest copy percentage
• Time to get the latest copy
• Energy consumption
• We have to evaluate our model using a routing protocol which does
not use opportunistic properties.
• At the same time have to evaluate using a mobility model which
does not exhibit opportunistic behavior: Random way point
September 03, 2015 Weerasooriya W.A.A.C.P. 11002192
September 03, 2015 Weerasooriya W.A.A.C.P. 11002192
Thank you!
Your review will be golden!

More Related Content

Viewers also liked

13. Индия и Япония
13. Индия и Япония13. Индия и Япония
13. Индия и ЯпонияAnastasiyaF
 
Keluarga Berencana
Keluarga BerencanaKeluarga Berencana
Keluarga Berencanahapidlohsani
 
Random 150526183441-lva1-app6891
Random 150526183441-lva1-app6891Random 150526183441-lva1-app6891
Random 150526183441-lva1-app6891Nour Elbader
 
Top 8 engineering staff resume samples
Top 8 engineering staff resume samplesTop 8 engineering staff resume samples
Top 8 engineering staff resume samplesguadiolamed
 
Perintah-perintah MS-DOS
Perintah-perintah MS-DOSPerintah-perintah MS-DOS
Perintah-perintah MS-DOSsfhsjd
 
The Top Attractions in Denver
The Top Attractions in DenverThe Top Attractions in Denver
The Top Attractions in Denver49ThingstoDo
 

Viewers also liked (8)

13. Индия и Япония
13. Индия и Япония13. Индия и Япония
13. Индия и Япония
 
Keluarga Berencana
Keluarga BerencanaKeluarga Berencana
Keluarga Berencana
 
Random 150526183441-lva1-app6891
Random 150526183441-lva1-app6891Random 150526183441-lva1-app6891
Random 150526183441-lva1-app6891
 
Biologia esme
Biologia esmeBiologia esme
Biologia esme
 
Top 8 engineering staff resume samples
Top 8 engineering staff resume samplesTop 8 engineering staff resume samples
Top 8 engineering staff resume samples
 
Vod(1)
Vod(1)Vod(1)
Vod(1)
 
Perintah-perintah MS-DOS
Perintah-perintah MS-DOSPerintah-perintah MS-DOS
Perintah-perintah MS-DOS
 
The Top Attractions in Denver
The Top Attractions in DenverThe Top Attractions in Denver
The Top Attractions in Denver
 

Similar to Opportunistic Persistent Data Storage- Interim Presentation

Opportunistic persistent data storage
Opportunistic persistent data storage Opportunistic persistent data storage
Opportunistic persistent data storage Luke Weerasooriya
 
Bio-IT & Cloud Sobriety: 2013 Beyond The Genome Meeting
Bio-IT & Cloud Sobriety: 2013 Beyond The Genome MeetingBio-IT & Cloud Sobriety: 2013 Beyond The Genome Meeting
Bio-IT & Cloud Sobriety: 2013 Beyond The Genome MeetingChris Dagdigian
 
vJUG24 2016 "Seven (More) Deadly Sins of Microservice"
vJUG24 2016 "Seven (More) Deadly Sins of Microservice"vJUG24 2016 "Seven (More) Deadly Sins of Microservice"
vJUG24 2016 "Seven (More) Deadly Sins of Microservice"Daniel Bryant
 
NTXISSACSC3 - HELP! My Vulnerability Management Program is Failing! by Kevin ...
NTXISSACSC3 - HELP! My Vulnerability Management Program is Failing! by Kevin ...NTXISSACSC3 - HELP! My Vulnerability Management Program is Failing! by Kevin ...
NTXISSACSC3 - HELP! My Vulnerability Management Program is Failing! by Kevin ...North Texas Chapter of the ISSA
 
Using AWS WAF and Lambda for Automatic Protection
Using AWS WAF and Lambda for Automatic ProtectionUsing AWS WAF and Lambda for Automatic Protection
Using AWS WAF and Lambda for Automatic ProtectionAmazon Web Services
 
Design and Implementation of Distributed Mobility Management Entity on OpenStack
Design and Implementation of Distributed Mobility Management Entity on OpenStackDesign and Implementation of Distributed Mobility Management Entity on OpenStack
Design and Implementation of Distributed Mobility Management Entity on OpenStackGopika Premsankar
 
Data kitchen 7 agile steps - big data fest 9-18-2015
Data kitchen   7 agile steps - big data fest 9-18-2015Data kitchen   7 agile steps - big data fest 9-18-2015
Data kitchen 7 agile steps - big data fest 9-18-2015DataKitchen
 
Asi Lifshitz, VP R&D, Vtool
Asi Lifshitz, VP R&D, VtoolAsi Lifshitz, VP R&D, Vtool
Asi Lifshitz, VP R&D, Vtoolchiportal
 
351315535-Module-1-Intro-to-Data-Science-pptx.pptx
351315535-Module-1-Intro-to-Data-Science-pptx.pptx351315535-Module-1-Intro-to-Data-Science-pptx.pptx
351315535-Module-1-Intro-to-Data-Science-pptx.pptxXanGwaps
 
Security and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewSecurity and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewragibhasan
 
Aws training in bangalore
Aws training in bangalore Aws training in bangalore
Aws training in bangalore apponix123
 
Asynchronous micro-services and the unified log
Asynchronous micro-services and the unified logAsynchronous micro-services and the unified log
Asynchronous micro-services and the unified logAlexander Dean
 
Cloud Computing Security From Single To Multicloud
Cloud Computing Security From Single To MulticloudCloud Computing Security From Single To Multicloud
Cloud Computing Security From Single To MulticloudSandip Karale
 
ASTQB washington-sept-2015
ASTQB washington-sept-2015ASTQB washington-sept-2015
ASTQB washington-sept-2015Dan Boutin
 
(SEC313) Security & Compliance at the Petabyte Scale
(SEC313) Security & Compliance at the Petabyte Scale(SEC313) Security & Compliance at the Petabyte Scale
(SEC313) Security & Compliance at the Petabyte ScaleAmazon Web Services
 
What is Datamining? Which algorithms can be used for Datamining?
What is Datamining? Which algorithms can be used for Datamining?What is Datamining? Which algorithms can be used for Datamining?
What is Datamining? Which algorithms can be used for Datamining?Seval Çapraz
 
Think Big - How to Design a Big Data Information Architecture
Think Big - How to Design a Big Data Information ArchitectureThink Big - How to Design a Big Data Information Architecture
Think Big - How to Design a Big Data Information ArchitectureInside Analysis
 
Using Archivemedia to preserve research data
Using Archivemedia to preserve research dataUsing Archivemedia to preserve research data
Using Archivemedia to preserve research dataARDC
 

Similar to Opportunistic Persistent Data Storage- Interim Presentation (20)

Opportunistic persistent data storage
Opportunistic persistent data storage Opportunistic persistent data storage
Opportunistic persistent data storage
 
Bio-IT & Cloud Sobriety: 2013 Beyond The Genome Meeting
Bio-IT & Cloud Sobriety: 2013 Beyond The Genome MeetingBio-IT & Cloud Sobriety: 2013 Beyond The Genome Meeting
Bio-IT & Cloud Sobriety: 2013 Beyond The Genome Meeting
 
vJUG24 2016 "Seven (More) Deadly Sins of Microservice"
vJUG24 2016 "Seven (More) Deadly Sins of Microservice"vJUG24 2016 "Seven (More) Deadly Sins of Microservice"
vJUG24 2016 "Seven (More) Deadly Sins of Microservice"
 
NTXISSACSC3 - HELP! My Vulnerability Management Program is Failing! by Kevin ...
NTXISSACSC3 - HELP! My Vulnerability Management Program is Failing! by Kevin ...NTXISSACSC3 - HELP! My Vulnerability Management Program is Failing! by Kevin ...
NTXISSACSC3 - HELP! My Vulnerability Management Program is Failing! by Kevin ...
 
Using AWS WAF and Lambda for Automatic Protection
Using AWS WAF and Lambda for Automatic ProtectionUsing AWS WAF and Lambda for Automatic Protection
Using AWS WAF and Lambda for Automatic Protection
 
Linkedin
LinkedinLinkedin
Linkedin
 
Design and Implementation of Distributed Mobility Management Entity on OpenStack
Design and Implementation of Distributed Mobility Management Entity on OpenStackDesign and Implementation of Distributed Mobility Management Entity on OpenStack
Design and Implementation of Distributed Mobility Management Entity on OpenStack
 
Data kitchen 7 agile steps - big data fest 9-18-2015
Data kitchen   7 agile steps - big data fest 9-18-2015Data kitchen   7 agile steps - big data fest 9-18-2015
Data kitchen 7 agile steps - big data fest 9-18-2015
 
Asi Lifshitz, VP R&D, Vtool
Asi Lifshitz, VP R&D, VtoolAsi Lifshitz, VP R&D, Vtool
Asi Lifshitz, VP R&D, Vtool
 
351315535-Module-1-Intro-to-Data-Science-pptx.pptx
351315535-Module-1-Intro-to-Data-Science-pptx.pptx351315535-Module-1-Intro-to-Data-Science-pptx.pptx
351315535-Module-1-Intro-to-Data-Science-pptx.pptx
 
Security and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewSecurity and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level view
 
AWS Cloud Technology And Future of Faster Modern Architecture
AWS Cloud Technology And Future of Faster Modern ArchitectureAWS Cloud Technology And Future of Faster Modern Architecture
AWS Cloud Technology And Future of Faster Modern Architecture
 
Aws training in bangalore
Aws training in bangalore Aws training in bangalore
Aws training in bangalore
 
Asynchronous micro-services and the unified log
Asynchronous micro-services and the unified logAsynchronous micro-services and the unified log
Asynchronous micro-services and the unified log
 
Cloud Computing Security From Single To Multicloud
Cloud Computing Security From Single To MulticloudCloud Computing Security From Single To Multicloud
Cloud Computing Security From Single To Multicloud
 
ASTQB washington-sept-2015
ASTQB washington-sept-2015ASTQB washington-sept-2015
ASTQB washington-sept-2015
 
(SEC313) Security & Compliance at the Petabyte Scale
(SEC313) Security & Compliance at the Petabyte Scale(SEC313) Security & Compliance at the Petabyte Scale
(SEC313) Security & Compliance at the Petabyte Scale
 
What is Datamining? Which algorithms can be used for Datamining?
What is Datamining? Which algorithms can be used for Datamining?What is Datamining? Which algorithms can be used for Datamining?
What is Datamining? Which algorithms can be used for Datamining?
 
Think Big - How to Design a Big Data Information Architecture
Think Big - How to Design a Big Data Information ArchitectureThink Big - How to Design a Big Data Information Architecture
Think Big - How to Design a Big Data Information Architecture
 
Using Archivemedia to preserve research data
Using Archivemedia to preserve research dataUsing Archivemedia to preserve research data
Using Archivemedia to preserve research data
 

Recently uploaded

Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 

Recently uploaded (20)

Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 

Opportunistic Persistent Data Storage- Interim Presentation

  • 1. Opportunistic Persistent Data Storage Author: Weerasooriya W.A.A.C.P. Index Number: 11002192 Supervisor: Dr. Ranasinghe D.N. September 03, 2015 Weerasooriya W.A.A.C.P. 11002192
  • 2. Outline • Motivation • Research Problem • From Proposal defense • Design & Architecture • Our Contribution • Related Work • To-Do September 03, 2015 Weerasooriya W.A.A.C.P. 11002192
  • 3. • Opportunistic Networks are type of Mobile Ad- hoc Networks(MANET). • Message delays are accepted. • There are a lot of routing protocol mechanisms that have been designed for ON • Synthetic traces are widely used to evaluate ON E.g. : ONE simulator Motivation There are a lot of papers which describes virtual data storages over distributed systems. We can find several storage protocol implementations for MANET as well. But….. According to the best of our knowledge there is not any storage mechanism which uses opportunistic properties September 03, 2015 Weerasooriya W.A.A.C.P. 11002192
  • 5. Outline • Motivation • Research Problem • From Proposal defense • Design & Architecture • Our Contribution • Related Work • To-Do September 03, 2015 Weerasooriya W.A.A.C.P. 11002192
  • 6. Modeling a persistent data storage on opportunistic networks making maximum use of opportunistic properties Research Goal September 03, 2015 Weerasooriya W.A.A.C.P. 11002192
  • 7. Research Questions Q1: What is the best way to capture Social network properties in ON? Q2: What is the best persistent storage mechanism for MANET that can be adjusted to use with opportunistic properties of nodes? September 03, 2015 Weerasooriya W.A.A.C.P. 11002192
  • 8. Scope • Synthetic traces- limitations( no. of subjects, simulations area/time) Assumptions: It’s better to see the problem in the easiest way and deriving a solution. Then we can go more deeper in to the problem, removing assumptions one by one. 1. No peer failures 2. Number of nodes are fixed 3. One Writer- Many Readers 4. No reading while writing 5. Write globally- Read locally 6. Security etc. September 03, 2015 Weerasooriya W.A.A.C.P. 11002192
  • 9. Outline • Motivation • Research Problem • From Proposal defense • Design & Architecture • Our Contribution • Related Work • To-Do September 03, 2015 Weerasooriya W.A.A.C.P. 11002192
  • 10. From Proposal Defense •BitTorrent Protocol: In the very early phase of our problem we only consider single variables. After successful evaluation of this system we try to focus on stream data. September 03, 2015 Weerasooriya W.A.A.C.P. 11002192
  • 11. Outline • Motivation • Research Problem • From Proposal defense • Design & Architecture • Our Contribution • Related Work • To-Do September 03, 2015 Weerasooriya W.A.A.C.P. 11002192
  • 12. Design & Architecture September 03, 2015 Weerasooriya W.A.A.C.P. 11002192 Virtual Storage Routing+ON properties-1 MAC-1 PHYSICAL 1 Storage- 1 Routing+ON properties-2 MAC-2 PHYSICAL 2 Storage- 2 Routing+ON properties-4 MAC-4 PHYSICAL 4 Storage- 4 Routing+ON properties-3 MAC-3 PHYSICAL 3 Storage- 3 Node 1 Node 4Node 3Node 2
  • 13. ONE Simulator September 03, 2015 Weerasooriya W.A.A.C.P. 11002192
  • 14. Outline • Motivation • Research Problem • From Proposal defense • Design & Architecture • Our Contribution • Related Work • To-Do September 03, 2015 Weerasooriya W.A.A.C.P. 11002192
  • 15. Our Contribution September 03, 2015 Weerasooriya W.A.A.C.P. 11002192 Virtual Storage Routing+ON properties MAC PHYSICAL Storage Storage Virtual Storage Routing+ON properties MAC PHYSICAL Storage SCORP dLIFE Data dissemination Replica management
  • 16. Outline • Motivation • Research Problem • From Proposal defense • Design & Architecture • Our Contribution • Related Work • To-Do September 03, 2015 Weerasooriya W.A.A.C.P. 11002192
  • 17. Related Work- Our Path September 03, 2015 Weerasooriya W.A.A.C.P. 11002192 Opportunistic Persistent Data Storage Quorum based Pub/sub Social network properties Routing for MANET Mobility models Content dissemination
  • 18. Outline • Motivation • Research Problem • From Proposal defense • Design & Architecture • Our Contribution • Related Work • To-Do September 03, 2015 Weerasooriya W.A.A.C.P. 11002192
  • 19. To-Do List: Implementation • Implementation of the Routing protocol which uses Opportunistic properties. • Implementation of the Virtual Storage • Our task should be carried out towards stream data also September 03, 2015 Weerasooriya W.A.A.C.P. 11002192
  • 20. To-Do list: Evaluation • Evaluate the success rate: latest copy percentage • Time to get the latest copy • Energy consumption • We have to evaluate our model using a routing protocol which does not use opportunistic properties. • At the same time have to evaluate using a mobility model which does not exhibit opportunistic behavior: Random way point September 03, 2015 Weerasooriya W.A.A.C.P. 11002192
  • 21. September 03, 2015 Weerasooriya W.A.A.C.P. 11002192 Thank you! Your review will be golden!