SlideShare a Scribd company logo
1 of 59
The Cougar Approach to
In-Network Query Processing
in Sensor Networks
Presented By:
Supervised By:

Dilini A. Muthumala
Dr. Jeevani Goonetillake
Authors
Yong Yao
• Software Engineer at Google
• Ph.D., Computer Science
Cornell University (2000 – 2007)

• Research Interests
– Databases
– Sensor Networks
– Distributed Systems
Johannes Gehrke
• University Professor
Department of Computer Science
Cornell University

• Research Interests
–Scalability in Computer Games and Simulations
–Data Privacy
–Data Mining
Motivation
• “Database Abstraction Layer” for Sensor
Networks
• Most popular sensor data management
middleware
• Introduces Database Abstraction Layer Concept
• Cited by 1185 (source: Google Scholar)
No. of citations

Year
Presentation Outline
• Introduction
• Database Abstraction Layer
• Architecture
• Research Problems
• Conclusion
Introduction
Wireless Sensor Network (WSN)
Limitations
• Communication
• Power Consumption
• Computation
• Uncertainty in Sensor Readings
WSN Applications
• Smart Buildings, Smart Homes
WSN Applications
• Wild Life Monitoring
WSN Applications
• Monitoring Vineyards
Future of WSN
Is Johannes
in his
office?

Internet
Future of WSN
Humidity

Temperature

Light
Motivation
1) Declarative queries are suited for WSN
interaction
SELECT Temp
FROM sensors

Complex Network
Motivation
2) Increasing network lifetime is the major
goal of any WSN application

WSN
Data Repository for
offline analysis
Database Abstraction Layer
Database Abstraction Layer
SELECT Temp, Humid,
NodeID
FROM sensors
SAMPLE PERIOD 5s

Base
Station

Node ID

Temperature

Humidity

1

127

44

2

119

47

3

120

45

4

123

40

5

120

46

WSN
Database Abstraction Layer
• Local computations are much cheaper
than communication
– Pushing partial computations out into the
network
Database Abstraction Layer
• Retrieves data only upon user demand
• No offline data storage

• Energy Efficient
Architecture
Architecture - Overview

Query Proxy Layer
Query Optimizer
Query Proxy Layer

Application Layer
Query Proxy Layer
Routing Layer
Other Layers
Query Optimizer
• Generates “Query Processing Plans”
• Refers to
– Catalog Information
– Query Specification

• Specifies
– Data Flow between sensors
– Computation Plan

• Finally, plan is disseminated to all sensors
Example
User Query
“Notify when
the average temperature
exceeds 35 °C”

WSN
Query Optimizer
“Notify when
the average temperature
exceeds 35 °C”

Query
Optimizer

Query Plan
Query Plan

Query Plan (QP)

• Designates the Leader node
– Where average value will be finalized
Leader Node
Query Plan

Query Plan (QP)

• Two computation plans
i. Leader Node
ii. Non-Leader Nodes
QP for Non-Leader Node

Non-Leader Node
QP for Non-Leader Node
In-network
Aggregation

Network
Interface

Sensor
Scan
QP for Non-Leader Node
In-network
Aggregation

1
Network
Interface

Sensor
Scan
Temperature = 38
°C
QP for Non-Leader Node
In-network
Aggregation

2
Network
Interface

Sensor
Scan
Temperature = 38
°C
QP for Non-Leader Node
In-network
Aggregation

Network
Interface

Sensor
Scan
QP for Non-Leader Node
In-network
Aggregation

2
Network
Interface
AVG Temperature
= 35 °C
Contributor Count = 1
AVG Temperature
= 36 °C
Contributor Count = 1

Sensor
Scan

Temperature = 38
°C
QP for Non-Leader Node
In-network
Aggregation

Network
Interface
AVG Temperature
= 35 °C
Contributor Count = 1
AVG Temperature
= 36 °C
Contributor Count = 1

Sensor
Scan

Temperature = 38
°C
In-Network Aggregation
AVG Temperature
= 35 °C
Contributor Count = 1

AVG Temperature
= 36 °C
Contributor Count = 1

Total Temperature
No of Contributors
AVG Temperature

Temperature = 38
°C

= 35*1 + 36*1 + 38
= 109
=3
= 109 / 3
= 36.33

AVG Temperature
36.33 °C
Contributor Count = 3

=
QP for Non-Leader Node
Towards the Leader

AVG Temperature
In-network
36.33 °C Aggregation
Contributor Count = 3

Network
Interface

=

Sensor
Scan
QP for Leader Node
Leader Node
QP for Leader Node
Towards the Leader
Select
AVG > threshold
Average Value
Aggregate
Operator (AVG)
Partially aggregated
results
Network
Interface
QP for Leader Node
Towards the Leader
Select
AVG > threshold
Average Value
Aggregate
Operator (AVG)

Network
Interface

Partially aggregated
results
1
QP for Leader Node
Leader Node
AVG Temperature
39 °C
Contributor Count = 2

=

AVG Temperature
36.33 °C
Contributor Count = 3

=
QP for Leader Node
Towards the Leader
Select
AVG > threshold
Average Value
Aggregate
Operator (AVG)
Partially aggregated
results
AVG Temperature
39 °C
Contributor Count = 2

=

Network
Interface

AVG Temperature
36.33 °C
Contributor Count = 3

=
Aggregate Operator
AVG Temperature
39 °C
Contributor Count = 2

=

AVG Temperature
36.33 °C
Contributor Count = 3

Total Temperature

= 39*2 + 36.33*3
= 186.99
No of Contributors = 5
AVG Temperature = 186.99 / 5
= 37.40
AVG Temperature
37.40 °C

=

=
QP for Leader Node
Towards the Leader
Select
AVG > threshold
Average Value
AVG Temperature
37.40 °C

=

Aggregate
Operator (AVG)
Partially aggregated
results
Network
Interface
QP for Leader Node
Towards the Leader
AVG Temperature
37.40 °C

=

Select
AVG > threshold

“Notify when
Threshold = 35 °C
the average temperature
exceeds 35 °C”

Average Value
Aggregate
Operator (AVG)
Partially aggregated
results
Network
Interface
User Query Result

ALERT!
Temperature exceeds 35 °C

WSN
Research Problems
1. Aggregation
• Most popular computation and
communication pattern
• Two important issues
– Leader Selection
– Data Delivery
Leader Selection
Requirements for the policy
i. Dynamically-maintained Leader
ii. Physically advantageous location
Leader Selection
Requirements for the policy
i. Dynamically-maintained Leader
ii. Physically advantageous location
Data Delivery
“How should the data be delivered from
source nodes to the leader?”
– Send all data to leader?
– Should intermediate nodes participate?
2. Query Language
“What types of queries should be
supported?”
3. Query Optimization
• Cost of query plan has changed
• Energy should be the focus
• Reactive to changes in catalog information
– Changes in topology
– Power level at sensor nodes
4. Catalog Management
• Maintained at the server
• Provides Meta Data about the network
• Question: What is the best way to main
the catalog?
5. Multi-Query Optimization
• Occurs when the WSN is shared
• Users may pose similar queries
• Share common data among the users
Conclusion
• Interacting with a WSN is made easy
• Database Abstraction layer provides
– Friendly Interface
– Efficient scheme to reduce energy consumption

• Research problems need to be carefully
addressed
My Views on the Paper
• Presents a concept
• Easy-to-understand
• Flow of the paper sometimes confuse the
reader
Q&A

More Related Content

What's hot

Adhoc wireless networks and its issues
Adhoc wireless networks and its issuesAdhoc wireless networks and its issues
Adhoc wireless networks and its issuesMenaga Selvaraj
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksrajatmal4
 
Sensor node hardware and network architecture
Sensor node hardware and network architectureSensor node hardware and network architecture
Sensor node hardware and network architectureVidhi603146
 
Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Vivek Maurya
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSNMahbubur Rahman
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)rajivagarwal23dei
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...ArunChokkalingam
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networksVishnu Kudumula
 
Infrastructure Establishment
Infrastructure EstablishmentInfrastructure Establishment
Infrastructure Establishmentjuno susi
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-pptSwathi Ch
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its applicationRoma Vyas
 
Schedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsSchedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsDarwin Nesakumar
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsnDeepaDasarathan
 
Network Mnagement for WSN
Network Mnagement for WSNNetwork Mnagement for WSN
Network Mnagement for WSN@zenafaris91
 
Mac protocols
Mac protocolsMac protocols
Mac protocolsjuno susi
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor NetworkGanesh Khadsan
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksKhushbooGupta145
 

What's hot (20)

Adhoc wireless networks and its issues
Adhoc wireless networks and its issuesAdhoc wireless networks and its issues
Adhoc wireless networks and its issues
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Sensor node hardware and network architecture
Sensor node hardware and network architectureSensor node hardware and network architecture
Sensor node hardware and network architecture
 
Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
TinyOS
TinyOSTinyOS
TinyOS
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
 
Infrastructure Establishment
Infrastructure EstablishmentInfrastructure Establishment
Infrastructure Establishment
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-ppt
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its application
 
Schedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsSchedule and Contention based MAC protocols
Schedule and Contention based MAC protocols
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
 
Network Mnagement for WSN
Network Mnagement for WSNNetwork Mnagement for WSN
Network Mnagement for WSN
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor Networks
 

Similar to The Cougar Approach to In-Network Query Processing in Sensor Networks

LEGaTO: Low-Energy Heterogeneous Computing Use of AI in the project
LEGaTO: Low-Energy Heterogeneous Computing Use of AI in the projectLEGaTO: Low-Energy Heterogeneous Computing Use of AI in the project
LEGaTO: Low-Energy Heterogeneous Computing Use of AI in the projectLEGATO project
 
adaptive_ecg_cdr_edittedforpublic.pptx
adaptive_ecg_cdr_edittedforpublic.pptxadaptive_ecg_cdr_edittedforpublic.pptx
adaptive_ecg_cdr_edittedforpublic.pptxssuser6f1a8e1
 
A Framework for Probabilistic Building Energy Modeling
A Framework for Probabilistic Building Energy ModelingA Framework for Probabilistic Building Energy Modeling
A Framework for Probabilistic Building Energy ModelingLukas Lundström
 
Intelligent Placement of Datacenter for Internet Services
Intelligent Placement of Datacenter for Internet Services Intelligent Placement of Datacenter for Internet Services
Intelligent Placement of Datacenter for Internet Services Arinto Murdopo
 
Small Embedded Data Center Pilot Program Webinar
Small Embedded Data Center Pilot Program WebinarSmall Embedded Data Center Pilot Program Webinar
Small Embedded Data Center Pilot Program WebinarLester Shen
 
Asynchronous design with Spring and RTI: 1M events per second
Asynchronous design with Spring and RTI: 1M events per secondAsynchronous design with Spring and RTI: 1M events per second
Asynchronous design with Spring and RTI: 1M events per secondStuart (Pid) Williams
 
Distributed Checkpointing on an Enterprise Desktop Grid
Distributed Checkpointing on an Enterprise Desktop GridDistributed Checkpointing on an Enterprise Desktop Grid
Distributed Checkpointing on an Enterprise Desktop Gridbrent.wilson
 
Kickstart your Kafka with Faker Data | Francesco Tisiot, Aiven.io
Kickstart your Kafka with Faker Data | Francesco Tisiot, Aiven.ioKickstart your Kafka with Faker Data | Francesco Tisiot, Aiven.io
Kickstart your Kafka with Faker Data | Francesco Tisiot, Aiven.ioHostedbyConfluent
 
대용량 데이터 분석을 위한 병렬 Clustering 알고리즘 최적화
대용량 데이터 분석을 위한 병렬 Clustering 알고리즘 최적화대용량 데이터 분석을 위한 병렬 Clustering 알고리즘 최적화
대용량 데이터 분석을 위한 병렬 Clustering 알고리즘 최적화NAVER Engineering
 
Architectural Optimizations for High Performance and Energy Efficient Smith-W...
Architectural Optimizations for High Performance and Energy Efficient Smith-W...Architectural Optimizations for High Performance and Energy Efficient Smith-W...
Architectural Optimizations for High Performance and Energy Efficient Smith-W...NECST Lab @ Politecnico di Milano
 
Sensor Organism project presentation
Sensor Organism project presentationSensor Organism project presentation
Sensor Organism project presentationNaums Mogers
 
Big Data Visualization
Big Data VisualizationBig Data Visualization
Big Data Visualizationbigdataviz_bay
 
Kitchen Occupation Project Presentation
Kitchen Occupation Project PresentationKitchen Occupation Project Presentation
Kitchen Occupation Project PresentationMattiasTiger
 
Automated Discovery of Performance Regressions in Enterprise Applications
Automated Discovery of Performance Regressions in Enterprise ApplicationsAutomated Discovery of Performance Regressions in Enterprise Applications
Automated Discovery of Performance Regressions in Enterprise ApplicationsSAIL_QU
 

Similar to The Cougar Approach to In-Network Query Processing in Sensor Networks (20)

FPGA-enhanced Bioinformatics @ NECST
FPGA-enhanced Bioinformatics @ NECSTFPGA-enhanced Bioinformatics @ NECST
FPGA-enhanced Bioinformatics @ NECST
 
LEGaTO: Low-Energy Heterogeneous Computing Use of AI in the project
LEGaTO: Low-Energy Heterogeneous Computing Use of AI in the projectLEGaTO: Low-Energy Heterogeneous Computing Use of AI in the project
LEGaTO: Low-Energy Heterogeneous Computing Use of AI in the project
 
adaptive_ecg_cdr_edittedforpublic.pptx
adaptive_ecg_cdr_edittedforpublic.pptxadaptive_ecg_cdr_edittedforpublic.pptx
adaptive_ecg_cdr_edittedforpublic.pptx
 
A Framework for Probabilistic Building Energy Modeling
A Framework for Probabilistic Building Energy ModelingA Framework for Probabilistic Building Energy Modeling
A Framework for Probabilistic Building Energy Modeling
 
Intelligent Placement of Datacenter for Internet Services
Intelligent Placement of Datacenter for Internet Services Intelligent Placement of Datacenter for Internet Services
Intelligent Placement of Datacenter for Internet Services
 
Small Embedded Data Center Pilot
Small Embedded Data Center PilotSmall Embedded Data Center Pilot
Small Embedded Data Center Pilot
 
Small Embedded Data Center Pilot Program Webinar
Small Embedded Data Center Pilot Program WebinarSmall Embedded Data Center Pilot Program Webinar
Small Embedded Data Center Pilot Program Webinar
 
Thesis
ThesisThesis
Thesis
 
Asynchronous design with Spring and RTI: 1M events per second
Asynchronous design with Spring and RTI: 1M events per secondAsynchronous design with Spring and RTI: 1M events per second
Asynchronous design with Spring and RTI: 1M events per second
 
Research Issues on WSN
Research Issues on WSNResearch Issues on WSN
Research Issues on WSN
 
Distributed Checkpointing on an Enterprise Desktop Grid
Distributed Checkpointing on an Enterprise Desktop GridDistributed Checkpointing on an Enterprise Desktop Grid
Distributed Checkpointing on an Enterprise Desktop Grid
 
rerngvit_phd_seminar
rerngvit_phd_seminarrerngvit_phd_seminar
rerngvit_phd_seminar
 
Kickstart your Kafka with Faker Data | Francesco Tisiot, Aiven.io
Kickstart your Kafka with Faker Data | Francesco Tisiot, Aiven.ioKickstart your Kafka with Faker Data | Francesco Tisiot, Aiven.io
Kickstart your Kafka with Faker Data | Francesco Tisiot, Aiven.io
 
대용량 데이터 분석을 위한 병렬 Clustering 알고리즘 최적화
대용량 데이터 분석을 위한 병렬 Clustering 알고리즘 최적화대용량 데이터 분석을 위한 병렬 Clustering 알고리즘 최적화
대용량 데이터 분석을 위한 병렬 Clustering 알고리즘 최적화
 
Energy Efficiency in Data Centers
Energy Efficiency in Data CentersEnergy Efficiency in Data Centers
Energy Efficiency in Data Centers
 
Architectural Optimizations for High Performance and Energy Efficient Smith-W...
Architectural Optimizations for High Performance and Energy Efficient Smith-W...Architectural Optimizations for High Performance and Energy Efficient Smith-W...
Architectural Optimizations for High Performance and Energy Efficient Smith-W...
 
Sensor Organism project presentation
Sensor Organism project presentationSensor Organism project presentation
Sensor Organism project presentation
 
Big Data Visualization
Big Data VisualizationBig Data Visualization
Big Data Visualization
 
Kitchen Occupation Project Presentation
Kitchen Occupation Project PresentationKitchen Occupation Project Presentation
Kitchen Occupation Project Presentation
 
Automated Discovery of Performance Regressions in Enterprise Applications
Automated Discovery of Performance Regressions in Enterprise ApplicationsAutomated Discovery of Performance Regressions in Enterprise Applications
Automated Discovery of Performance Regressions in Enterprise Applications
 

Recently uploaded

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

The Cougar Approach to In-Network Query Processing in Sensor Networks

Editor's Notes

  1. I think all of you are aware of the concept “Database Abstraction Layer for Sensor Networks”. As you can see in the citation-count vs. year graph, it has being most cited in 2008 Having this motivation in mind, let’s move on.
  2. Linking: Besides these limitations, WSNs are successfully used in a wide variety of application domains.
  3. At the time of writing this paper, the authors have percieved the future of
  4. Seeing this future, the authors identified two facts that motivated them to come up with the Database Approach for WSNs.
  5. The first reason is As the popularity of the WSNs grow, they may be used by technically expert users as well as non-expert users. To cater such a diversified user group, it would be useful if a middleware can provide an abstract view of the WSN that hides the underlying messy details of the WSN. By giving users a declarative query interface, they can issue queries without even knowing how the data is generated in the sensor network, how they are processed, and how the answers are computed.
  6. Link to the next slide  Motivated by these facts and as a solution to these issues, the Database Abstraction Layer for WSNs was introduced.
  7. The Database Abstraction Layer allows the users to issue SQL-like queries to retrieve data from the WSN. This Layer hides all the complex and messy details of the underlying WSN by giving users a feeling like they are using a traditional database management system. Further,
  8. The architecture of the Database Abstraction Layer spans over two main regions: Gateway node WSN Note that here the gateway node is excluded from the WSN and it is considered as an external entity.
  9. Query Optimizer generates “Query Processing Plans” upon receiving a query from a user.
  10. The query plan for a non-leader node has 3 components:
  11. The query plan for a non-leader node has 3 components:
  12. The query plan for a non-leader node has 3 components:
  13. The query plan for a non-leader node has 3 components:
  14. The query plan for a non-leader node has 3 components:
  15. The query plan for a non-leader node has 3 components:
  16. The query plan for a non-leader node has 3 components:
  17. The query plan for a non-leader node has 3 components:
  18. The resulting aggregate value from the Aggregate Operator step will be passed to the next step: Selection
  19. The resulting aggregate value from the Aggregate Operator step will be passed to the next step: Selection
  20. Most popular computation and communication pattern for WSN This is the same operation that we considered in the example. To support aggregation we have to address two research problems: Leader Selection Data Delivery
  21. With the introduction of such a layer, However consequent to that several research problems have arrived that need to be addressed to achieve the fullest potential of a DB Layer.