SlideShare a Scribd company logo
1 of 58
1
Dr. Noman Islam
https://sites.google.com/a/nu.edu.pk/noman-islam/
http://facebook.com/sir.noman.islam
Data Management in MANET
1
2
Introduction
 We are living in the era of computing where data has
become a critical and most valuable asset
 The progression of technology and the emergence of
mobile and ad hoc networking have further enabled
the creation and consumption of information on move
 Mobile Ad Network (MANET) is defined as a network
erected among a number of self organized mobile
nodes, on the fly
 These nodes interact and exchange data with each
other in P2P style to solve complex user problems
3
Introduction – contd…
3
 Several useful applications are thus possible
 However, to truly realize these applications requires
the need for addressing an array of new issues and
challenges related to management of data
Mobile Ad hoc Network Vs Conventional Networks4
Mobile, resource
limited, unreliable and
heterogeneous nodes
Low capacity,
asymmetric and
instable links
Dynamic,
infrastructure-less and
data intensive
environment
5
Introduction – contd…
5
 Unlike conventional client-server computing, the
P2P communication generates massive volume of
data
 Despite the immense need, there has been
shortage of a comprehensive data management
framework for MANET
6
Introduction – contd…
6
 Hence, this work presents ALADIN. The framework
utilizes:
 Inter-layer communication across layers of protocol stack
to curtail network dynamism
 i.e. Coordination, interaction and joint operation of protocols
across different layers
 Fractional views of semantic information to ensure
scalability
 Maintaining ontology documents as needed
 Correlation among data items to optimize various data
management operations
 There are inherent associations among data items that can
be computed based on usage log
7
Research Objectives
7
To propose a comprehensive framework for MANET that
addresses key issues of data management by utilizing:
1. Cross-layer communication
2. Multi-level ontologies
3. Inherent relationship among data
This work doesn’t provide:
Detailed discussions and evaluations of other issues of data
management (replication, security management etc.). But it
does sketch solutions for these issues
8
Problem Area
8
9
1. Introduction to Data Management
2. Data Management Issues
3. Data Management Frameworks
Background and Literature Review
10
What is Data Management?
 We can define data management as:
“a set of actions performed on the data considering the end
user’s preferences and requirements”
 Based on the literature review, we can identify following
major steps/issues in data management (Perich, Joshi et al.
2006):
 Data representation
 Data discovery
 Cache Management
 Query Processing and Optimization
 Data Replication
 Naming
 Transaction Management
11
Data Management Issues
 Data Representation - the mechanism to describe
the data such that it can be identified, discovered
and accessed by any local or remote consumer
 Challenges
 Heterogeneity
 Proprietary data formats, Semantic differences
 Absence of universal schema
 Unbounded/open nature, Resource limitations, Size of schema
 Solution
 On-demand discovery and maintenance of fractional
schema
12
Data Management Issues (contd…)
12
 Data Discovery - the actions performed for locating the
owner of data considering the preferences specified by
the consumer
 Challenges
 Lack of dedicated directory servers
 Spatiotemporal variations
 Frequent disconnections
 Solution
 Directory-less approaches
 Cross-layer operation
 Exploit data correlations to store potentially useful data in
advance
13
Data Management Issues (contd…)
13
 Cache Management – To locally save a data item for
future use after it has been discovered
 Challenges
 Lack of prior information about nature of data. Locality of
reference proposed for conventional systems will not work
 Frequent disconnections
 Frequent state changes
 Solution
 Exploit data correlations to compute relationships among data
items
 Cross-layer operations i.e. utilizing network events for managing
consistency of data
A summary of existing solutions for data management issues
16
Data Management frameworks for
Mobile Ad hoc Network
 Alfanao et al. (2012) – a method for managing operations and data in
MANET
 CDMAN (Martin and Demeure 2008) – a framework for improved data
sharing by structured, segmented data
 DRIVE (Zhong, Xu et al. 2008) – a system for opportunistic information
sharing in vehicular networks
 Ad-hoc InfoWare (Sanderson, Skjelsvik et al. 2007) – a framework for
knowledge management in rescue scenarios
 AmbientDB (Fontijn and Boncz 2004) – a relational database abstraction
over ad hoc networks of heterogeneous peers
 MoGATU (Perich, Joshi et al. 2006) – a P2P data management framework
based on cross-layer operations, context management etc.
 CHaMeLeoN (Shahram Ghandeharizadeh 2006) – a framework to
facilitate exchange of text and continuous media over ad hoc networks
Summary of Data Management frameworks for MANET
18
Gap Analysis
18
1. There has been shortage of a comprehensive data
management framework
2. Most of the solutions ruminated on a subset of issues
of data management. Key issues of data management
are:
 Data Representation
 Data Discovery
 Cache management
3. None of the solutions exploit correlation and multi-
level ontology for data management
4. Only few solutions are based on cross-layer
communication
19
1. Introduction
2. Design Principles
3. Block Diagram
4. Description
Proposed Framework
19
20
ALADIN
 In this work an Association Rules Based Network
Layer Data and Information Management System
(ALADIN) for MANET has been proposed
 It comprises of components for:
1. Network layer, correlation based data discovery
2. Multi-level, ontology based data
representation
3. Correlation-based cache replacement and
cross-layer consistency management
21
Framework’s Design Principles
21
 ALADIN rests on following three points:
1. Exploits Correlation Information
 There are some inherent associations/correlation among data
items, as has been verified (Appendix 1)
 Two data items are correlated if they have been used together for
reasonable number of times. Correlated data items are anticipated
to be used together in future
 Correlation can be exploited for:
 Associative advertisements – proactively advertise data to neighbors.
Neighbors will store these advertisements
 Piggybacking of information – piggyback correlated information with
current data request
 Priority based cache replacement – keep those data items in cache
that are correlated with current request
22
Framework’s Design Principles
(contd…)22
2. Exploits cross-layer operations
 Network layer data discovery – data items and routes are
discovered simultaneously
 Cache Consistency Management – exploiting network
layer events for reactively manage data states
3. Multi-level data representation
 On-demand discovery and maintenance of semantic
information – use two level ontology. Keep the core
ontology at nodes. Extended ontologies can be
discovered when needed
Proposed Data Management Framework
24
Description
 Logging Component
 Maintains the fractional history of data requests in the
form of sessions
 Association Rules Mining Component
 Calculates the correlation among data items by running FP-
Growth algorithm (Han, J et al. 2004) on the log database
 FP-Growth is a tree-based data mining algorithm to
compute frequently used itemsets
 The output of FP-Growth algorithm is the set of frequent
itemsets representing what data requests have been
mostly consumed together in past
25
Data Discovery Component
 Discovery component is responsible for discovery of data
items from other nodes on the network
 It comprises of two subcomponents:
 A proactive discovery component that periodically advertises its
data and route via SADV messages
 A reactive discovery component to discover the desired
information based on the delivery mechanism of any reactive
routing protocols
 The proposed discovery component discovers a data item
and corresponding routes to provider simultaneously
 This leads to reduced latency of the overall discovery
process
26
Proactive Component
 Periodically advertises data items at regular intervals to neighbors
 Listener component at neighbors can accumulate the received
advertisements
 Advertisement (SADV) includes details about the data items along
with corresponding routes to access these data items
 The advertiser can operate in two modes:
 Correlated Mode
 Advertise the catalog entries that are correlated to each other
 Correlation is determined based on the itemsets generated by the mining
component
 Non-Correlated Mode
 Advertise the catalog entries in round robin style
Proactive Discovery Component
28
Reactive Component
 Reactive component performs on-demand discovery of any
requested data item
 ALADIN presents two discovery algorithms based on following
reactive routing algorithms:
 AODV based Discovery
 DSR based Discovery
 Source node prepares a discovery request (SREQ) and sends to
adjacent nodes
 Intermediate nodes propagates the request until it is answered by
the destination node
 In case of AODV, a temporary reverse route is used
 In case of DSR, the traversed hop is appended with the original request
 A SREP is then generated. SREP is sent back through the same
route used for propagation of SREQ
Discovery Request
Discovery Response
AODV based Reactive Discovery
30
Using Correlation Patterns to Improve
Discovery Process
 The correlation computed by mining component can be
exploited to prophesize about likely future requests and
answers of these guessed requests can be piggybacked/
attached with current request
 While generating a discovery response, the replying node
appends the details of data items related to request with
current response
Using correlation patterns for piggybacking31
32
Data Representation
 MANET suffers from issues of heterogeneity due to its open
nature
 Ontology can be used by nodes to reach to a common
agreement of the domain terminologies
 However, the use of a global ontology is not viable due to:
 Limited resources
 Nodes of varied origins
33
Data Representation (contd…)
33
 ALADIN recommends
maintaining two-level
ontology:
 Core Ontology
 Available at every node
 Ext Ontology
 Fetched as needed from the
network by invoking the discovery
component
 A General Purpose Software
Ontology for Ad hoc and
Vehicular Applications has
been proposed
ALADIN Multi-level ontology management approach
Multilevel approach to maintain ontology
An example of Multilevel Ontology
Core ontology contains
generalized concepts for any
ad hoc and vehicular
applications
Ext ontology extends Core
Ontology and contains
concepts for specialized
applications
36
Cache Management
 It contains sub-components for:
 Cache replacement
 Exploits the correlation patterns generated by the mining
component to place a newly arrived data item in to the
cache
 Victim slot is thus picked from those data items that are
not related to current request
 Consistency management
 Exploits the routing layer to determine the topological
changes in the network.
 These topological changes are used to maintain
consistency of cached data
37
Cache Replacement
 C = {c1, c2, c3 …} denotes the cache, ρ denotes the
correlation function. Cache Items related to d i.e. Rd
can be expressed as:
 Residual Set Sd i.e. data items not related to d can be
written as:
 The victim slot is thus picked from those data items
that are not related to d i.e.
Proposed cache replacement algorithm38
39
Consistency Manager
39
 The robustness of network layer can be used to ensure
the consistency of items maintained in data catalog
 ALADIN proposes the consistency management based
on the existing routing protocols (AODV and DSR etc.)
 In case of a link failure, the node (who senses the
failure) attempts to perform local route maintenance
 The upstream nodes are then notified depending upon
the status of local maintenance. A failure in local repair
leads to invalidation of routes and data table
 The upstream nodes notify their upstream nodes
42
1. Experimental Setup
2. Data sets
3. Demonstration
Implementation Details
42
43
Network Simulation
 All the experiments were conducted on JIST/SWANS Simulator
 The ontology has been developed in OWL language using Protégé
 JENA Toolkit has been employed for ontology processing tasks
44
Mobility Models
44
P1
P2
P3
P4
P5
Random Way Point
Street Random Waypoint Mobility (Straw)
•A node chooses a random point
•The node moves towards the point with a
uniform but random speed
•Pauses for a constant time
•Repeats the whole process again
•Node moves according to streets
•Streets are defined by real maps of US cities
•Mobility is also restricted based on vehicular
congestion and other traffic control mechanisms
To model the movement patterns of mobile nodes during simulation, mobility models are used
45
Datasets
 Three types of datasets have been used for generating
sessions.
 Random Dataset. Picks a data item randomly and
floats on the network
 Generating Correlated Data Sessions
 The YouTube Dataset: A dataset generated based on
YouTube video requests by users in a campus (Zink, M. et
al. 2008)
 The Correlated Data Generator(CDG) Dataset: A simulated
dataset generated based on a random correlation matrix
Demonstration of ALADIN’S Simulation49
50
1. Discovery Component
2. Data Representation Component
3. Caching Component
RESULTS AND DISCUSSIONS50
51
Analysis of Discovery Component
51
 A series of experiments were conducted to analyze the impact of individual sub-
components on latency and hit ratio
 Latency is the time difference when a discovery request is floated and the time
when a response is received
 Hit Ratio is the ratio of discovery request locally satisfied to the total discovery
request issued by a node
 Summary of the results are:
 Next slides compare ALADIN with MoGATU
Latency Analysis of Discovery Component52
Hit Ratio Analysis of Discovery Component53
54
1. Discovery Component
2. Data Representation Component
3. Caching Component
RESULTS AND DISCUSSIONS
54
Scalability of Data Representation Component55
Growth of ontology size
during simulation is linear
Latency Analysis of Data Representation Component56
57
1. Discovery Component
2. Data Representation Component
3. Caching Component
RESULTS AND DISCUSSIONS
57
Hit Ratio of Cache Replacement58
Hit Ratio of Consistency Manager59
60
Research Contributions
60
 We present a scalable, network layer, association rules based data
and information management framework for MANET
 This research substantiates that:
 the use of a multi-level schema gives rise to improvement in scalability
of data management operations
 a network layer discovery approach leads to improvement in latency
and robustness of data management operations
 the correlation patterns present in the request sessions can be
exploited in predictive fashion to ameliorate the discovery and caching
process
 It is the first work(for MANET) exploring the use of :
 data correlations
 multi-level data representation
61
Future Work
61
 Improvement in discovery component
 Proactive Component
 Smart broadcasting based on available battery, network congestion
 Reactive Component
 Implementation for other reactive routing protocols like TORA, ABR, OLSR etc.
 Association Rules Mining are inefficient in terms of memory consumption
 New approximate algorithms can be devised
 Caching Component
 Based on proposed correlation technique, extensions of other caching
algorithms (MFU, Profile Driven caching)
 Log database
 Can it be used for transaction management, query optimization etc.?
 Further work/evaluation of replication, query optimization and security
62
References
62
Alfano, R. and A. Manzalini (2012). Method and System for Data Managment in Communication
Networks. U. Patents. US, Telcom Italia S.p.a., Milan (IT). US 8,165,130 B2.
Arias-Torres, D. and J. A. García-Macias (2004). Service Discovery in Mobile Ad-hoc Networks by
Extending the AODV Protocol. 2nd Mobile Computing Workshop(ENC' 04. 2004), Mexico.
Bharadvaj, H., A. Joshi and S. Auephanwiriyakyl (1998). An Active Transcoding Proxy to
SupportMobile Web Access. IEEE Symposium on Reliable Distributed Systems, Dana Point,
California.
Chand, N., R. C. Joshi and M. Misra (2007). "Cooperative caching in mobile ad hoc networks
based on data utility." Mobile Information Systems 3(1): 19-37.
Chen, H., F. Perich, T. Finin and A. Joshi (2004). SOUPA: Standard ontology for ubiquitous and
pervasive applications. The First Annual International Conference on Mobile and Ubiquitous
Systems: Networking and Services (MOBIQUITOUS 2004), Boston, Massachusetts, USA
Fatima, N. S. and P. S. A. Khader (2012). "Efficient Data Accessibility using TTL Based Caching
Strategy in Manet." European Journal of Scientific Research 69(1): 21-32.
Fontijn, W. and P. Boncz (2004). AmbientDB: P2P Data Management Middleware for Ambient
Intelligence. Pervasive Computing and Communications Workshops, 2004, Orlando, Florida,
USA.
63
References (contd…)
63
Gryazin, E. A. (2006). Service Discovery in Bluetooth. Helsinki, Finland, Group for Robotics and Virtual Reality.
Department of Computer Science. Helsinki University of Technology: 1-4.
Guttman, E., C. Perkins, J. Veizades and M. Day (1999). Service location protocol, version 2, RFC 2608, June
1999.
Han, J., J. Pei, Y. Yin and R. Mao (2004). "Mining Frequent Patterns without Candidate Generation: A Frequent-
Pattern Tree Approach." Data Mining and Knowledge Discovery 8: 53-87.
Hara, T. (2001). Effective replica allocation in ad hoc networks for improving data accessibility. Twentieth
Annual Joint Conference of the IEEE Computer and Communications Societies, Anchorage, Alaska, United
States.
Hara, T., N. Murakami and S. Nishio (2004). "Replica allocation for correlated data items in ad hoc sensor
networks." ACM Sigmod Record 33(1): 38-43.
Jayapal, C. and S. Vembu (2011). "Adaptive Service Discovery Protocol for Mobile Ad Hoc Networks." European
Journal of Scientific Research 49(1): 6-17.
Karlsson, J. (2012). Routing Security in Mobile Ad-hoc Networks. Informing Science and Information
Technology Education, Montreal, Canada.
Martin, L. and I. Demeure (2008). Using structured and segmented data for improving data sharing on
MANETs. 8th international conference on New technologies in distributed systems, Lyon, France.
Perich, F., S. Avancha, D. Chakraborty, A. Joshi and Y. Yesha (2002). Profile Driven Data Management for
Pervasive Environments. 13th International Conference on Database and Expert Systems Applications
(DEXA 2002), Aix-en-Provence, France.
64
References (contd…)
64
Perich, F., S. Avancha, A. Joshi, Y. Yesha and K. Joshi (2001). Query routing and processing in mobile ad-hoc
environments. Baltimore County, University of Maryland: 1-17.
Perich, F., A. Joshi and R. Chirkova (2006). Data Management for Mobile Ad-Hoc Networks. Enabling
Technologies for Wireless E-Business. 1: 132-176.
Sanderson, N. C., K. S. Skjelsvik, O. V. Drugan, M. Pužar, V. Goebel, E. Munthe-Kaas and T. Plagemann (2007).
Developing Mobile Middleware-An Analysis of Rescue and Emergency Operations, Department of
Informatics, University of Oslo.
Shahram Ghandeharizadeh, A. H., Bhaskar Krishnamachari, François Bar, Todd Richmond (2006). Data
Management Techniques for Continuous Media In Ad-Hoc Networks of Wireless Devices. Collection of
Encyclopedia of Multimedia: 136-140.
Taneja, S. and A. Kush (2012). "Intrusion Detection Protocol for Adhoc Networks." Network and Complex
Systems 2(2): 22-29.
Xiong, W. A. and B. Tang (2011). "A Secure and Highly Efficient Key Management Scheme for MANET."
Advances on Information Sciences and Service Sciences 3(2): 12-22.
Yang, B. and A. R. Hurson (2007). "Semantic-Aware and QoS-Aware Image Caching in Ad Hoc Networks." IEEE
Transactions on Knowledge and Data Engineering 19(12): 1694-1707.
Zhong, T., B. Xu and O. Wolfson (2008). Disseminating real-time traffic information in vehicular ad-hoc
networks. Intelligent Vehicles Symposium, Eindhoven, Netherland.
Zink, M., K. Suh, Y. Gu and J. Kurose (2008). Watch global, cache local: YouTube network traffic at a campus
network-measurements and implications. 15th SPIE/ACM Multimedia Computing and Networking
(MMCN’08), Santa Clara.

More Related Content

What's hot

Dataset description: DCAT and other vocabularies
Dataset description: DCAT and other vocabulariesDataset description: DCAT and other vocabularies
Dataset description: DCAT and other vocabulariesValeria Pesce
 
Urm concept for sharing information inside of communities
Urm concept for sharing information inside of communitiesUrm concept for sharing information inside of communities
Urm concept for sharing information inside of communitiesKarel Charvat
 
Temporal database, Multimedia database, Access control, Flow control
Temporal database, Multimedia database, Access  control, Flow controlTemporal database, Multimedia database, Access  control, Flow control
Temporal database, Multimedia database, Access control, Flow controlPooja Dixit
 
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...acijjournal
 
Data mining Algorithm’s Variant Analysis
Data mining Algorithm’s Variant AnalysisData mining Algorithm’s Variant Analysis
Data mining Algorithm’s Variant AnalysisIOSR Journals
 
FAIR Data in Trustworthy Data Repositories Webinar - 12-13 December 2016| www...
FAIR Data in Trustworthy Data Repositories Webinar - 12-13 December 2016| www...FAIR Data in Trustworthy Data Repositories Webinar - 12-13 December 2016| www...
FAIR Data in Trustworthy Data Repositories Webinar - 12-13 December 2016| www...EUDAT
 
Introduction to eudat and its services
Introduction to eudat and its servicesIntroduction to eudat and its services
Introduction to eudat and its servicesEUDAT
 
eROSA Stakeholder WS1: Data discovery through federated dataset catalogues
eROSA Stakeholder WS1: Data discovery through federated dataset catalogueseROSA Stakeholder WS1: Data discovery through federated dataset catalogues
eROSA Stakeholder WS1: Data discovery through federated dataset cataloguese-ROSA
 
Shipping Knowledge Graph Management Capabilities to Data Providers and Consumers
Shipping Knowledge Graph Management Capabilities to Data Providers and ConsumersShipping Knowledge Graph Management Capabilities to Data Providers and Consumers
Shipping Knowledge Graph Management Capabilities to Data Providers and ConsumersOmar Al-Safi
 
How to describe a dataset. Interoperability issues
How to describe a dataset. Interoperability issuesHow to describe a dataset. Interoperability issues
How to describe a dataset. Interoperability issuesValeria Pesce
 
A Review on Resource Discovery Strategies in Grid Computing
A Review on Resource Discovery Strategies in Grid ComputingA Review on Resource Discovery Strategies in Grid Computing
A Review on Resource Discovery Strategies in Grid Computingiosrjce
 
DataONE Education Module 07: Metadata
DataONE Education Module 07: MetadataDataONE Education Module 07: Metadata
DataONE Education Module 07: MetadataDataONE
 
A Survey On Ontology Agent Based Distributed Data Mining
A Survey On Ontology Agent Based Distributed Data MiningA Survey On Ontology Agent Based Distributed Data Mining
A Survey On Ontology Agent Based Distributed Data MiningEditor IJMTER
 
Big Data Mining - Classification, Techniques and Issues
Big Data Mining - Classification, Techniques and IssuesBig Data Mining - Classification, Techniques and Issues
Big Data Mining - Classification, Techniques and IssuesKaran Deep Singh
 

What's hot (18)

Dataset description: DCAT and other vocabularies
Dataset description: DCAT and other vocabulariesDataset description: DCAT and other vocabularies
Dataset description: DCAT and other vocabularies
 
Urm concept for sharing information inside of communities
Urm concept for sharing information inside of communitiesUrm concept for sharing information inside of communities
Urm concept for sharing information inside of communities
 
Open data quality
Open data qualityOpen data quality
Open data quality
 
Temporal database, Multimedia database, Access control, Flow control
Temporal database, Multimedia database, Access  control, Flow controlTemporal database, Multimedia database, Access  control, Flow control
Temporal database, Multimedia database, Access control, Flow control
 
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...
 
Data mining Algorithm’s Variant Analysis
Data mining Algorithm’s Variant AnalysisData mining Algorithm’s Variant Analysis
Data mining Algorithm’s Variant Analysis
 
FAIR Data in Trustworthy Data Repositories Webinar - 12-13 December 2016| www...
FAIR Data in Trustworthy Data Repositories Webinar - 12-13 December 2016| www...FAIR Data in Trustworthy Data Repositories Webinar - 12-13 December 2016| www...
FAIR Data in Trustworthy Data Repositories Webinar - 12-13 December 2016| www...
 
Introduction to eudat and its services
Introduction to eudat and its servicesIntroduction to eudat and its services
Introduction to eudat and its services
 
eROSA Stakeholder WS1: Data discovery through federated dataset catalogues
eROSA Stakeholder WS1: Data discovery through federated dataset catalogueseROSA Stakeholder WS1: Data discovery through federated dataset catalogues
eROSA Stakeholder WS1: Data discovery through federated dataset catalogues
 
Shipping Knowledge Graph Management Capabilities to Data Providers and Consumers
Shipping Knowledge Graph Management Capabilities to Data Providers and ConsumersShipping Knowledge Graph Management Capabilities to Data Providers and Consumers
Shipping Knowledge Graph Management Capabilities to Data Providers and Consumers
 
How to describe a dataset. Interoperability issues
How to describe a dataset. Interoperability issuesHow to describe a dataset. Interoperability issues
How to describe a dataset. Interoperability issues
 
A Review on Resource Discovery Strategies in Grid Computing
A Review on Resource Discovery Strategies in Grid ComputingA Review on Resource Discovery Strategies in Grid Computing
A Review on Resource Discovery Strategies in Grid Computing
 
Primary secondarydata
Primary secondarydataPrimary secondarydata
Primary secondarydata
 
Datamining
DataminingDatamining
Datamining
 
DataONE Education Module 07: Metadata
DataONE Education Module 07: MetadataDataONE Education Module 07: Metadata
DataONE Education Module 07: Metadata
 
A Survey On Ontology Agent Based Distributed Data Mining
A Survey On Ontology Agent Based Distributed Data MiningA Survey On Ontology Agent Based Distributed Data Mining
A Survey On Ontology Agent Based Distributed Data Mining
 
Introduction abstract
Introduction abstractIntroduction abstract
Introduction abstract
 
Big Data Mining - Classification, Techniques and Issues
Big Data Mining - Classification, Techniques and IssuesBig Data Mining - Classification, Techniques and Issues
Big Data Mining - Classification, Techniques and Issues
 

Similar to Data management presentation

Cross Domain Data Fusion
Cross Domain Data FusionCross Domain Data Fusion
Cross Domain Data FusionIRJET Journal
 
Managing Multidimensional Historical
Managing Multidimensional HistoricalManaging Multidimensional Historical
Managing Multidimensional HistoricalArul Suju
 
Complete dbms notes
Complete dbms notesComplete dbms notes
Complete dbms notesTanya Makkar
 
Data Base Management Systems
Data Base Management SystemsData Base Management Systems
Data Base Management SystemsRaj vardhan
 
ODRS: Optimal Data Replication Scheme for Time Efficiency In MANETs
ODRS: Optimal Data Replication Scheme for Time Efficiency In  MANETsODRS: Optimal Data Replication Scheme for Time Efficiency In  MANETs
ODRS: Optimal Data Replication Scheme for Time Efficiency In MANETsIOSR Journals
 
Generating Linked Data in Real-time from Sensor Data Streams
Generating Linked Data in Real-time from Sensor Data StreamsGenerating Linked Data in Real-time from Sensor Data Streams
Generating Linked Data in Real-time from Sensor Data StreamsNikolaos Konstantinou
 
MC0088 Internal Assignment (SMU)
MC0088 Internal Assignment (SMU)MC0088 Internal Assignment (SMU)
MC0088 Internal Assignment (SMU)Krishan Pareek
 
Big data analytics, survey r.nabati
Big data analytics, survey r.nabatiBig data analytics, survey r.nabati
Big data analytics, survey r.nabatinabati
 
Database Management system
Database Management systemDatabase Management system
Database Management systemVijay Thorat
 
Agent based frameworks for distributed association rule mining an analysis
Agent based frameworks for distributed association rule mining  an analysis  Agent based frameworks for distributed association rule mining  an analysis
Agent based frameworks for distributed association rule mining an analysis ijfcstjournal
 
DATA MINING FRAMEWORK TO ANALYZE ROAD ACCIDENT DATA
DATA MINING FRAMEWORK TO ANALYZE ROAD ACCIDENT DATADATA MINING FRAMEWORK TO ANALYZE ROAD ACCIDENT DATA
DATA MINING FRAMEWORK TO ANALYZE ROAD ACCIDENT DATAAishwarya Saseendran
 
Mis chapter 4 database management - copy
Mis chapter 4   database management - copyMis chapter 4   database management - copy
Mis chapter 4 database management - copyAjay Khot
 
An effective search on web log from most popular downloaded content
An effective search on web log from most popular downloaded contentAn effective search on web log from most popular downloaded content
An effective search on web log from most popular downloaded contentijdpsjournal
 
Bridging the gap between the semantic web and big data: answering SPARQL que...
Bridging the gap between the semantic web and big data:  answering SPARQL que...Bridging the gap between the semantic web and big data:  answering SPARQL que...
Bridging the gap between the semantic web and big data: answering SPARQL que...IJECEIAES
 
Database Management System ( Dbms )
Database Management System ( Dbms )Database Management System ( Dbms )
Database Management System ( Dbms )Kimberly Brooks
 
Database Systems
Database SystemsDatabase Systems
Database SystemsUsman Tariq
 

Similar to Data management presentation (20)

Cross Domain Data Fusion
Cross Domain Data FusionCross Domain Data Fusion
Cross Domain Data Fusion
 
Data Domain-Driven Design
Data Domain-Driven DesignData Domain-Driven Design
Data Domain-Driven Design
 
Managing Multidimensional Historical
Managing Multidimensional HistoricalManaging Multidimensional Historical
Managing Multidimensional Historical
 
Complete dbms notes
Complete dbms notesComplete dbms notes
Complete dbms notes
 
Data Base Management Systems
Data Base Management SystemsData Base Management Systems
Data Base Management Systems
 
ODRS: Optimal Data Replication Scheme for Time Efficiency In MANETs
ODRS: Optimal Data Replication Scheme for Time Efficiency In  MANETsODRS: Optimal Data Replication Scheme for Time Efficiency In  MANETs
ODRS: Optimal Data Replication Scheme for Time Efficiency In MANETs
 
Generating Linked Data in Real-time from Sensor Data Streams
Generating Linked Data in Real-time from Sensor Data StreamsGenerating Linked Data in Real-time from Sensor Data Streams
Generating Linked Data in Real-time from Sensor Data Streams
 
MC0088 Internal Assignment (SMU)
MC0088 Internal Assignment (SMU)MC0088 Internal Assignment (SMU)
MC0088 Internal Assignment (SMU)
 
RDBMS to NoSQL. An overview.
RDBMS to NoSQL. An overview.RDBMS to NoSQL. An overview.
RDBMS to NoSQL. An overview.
 
Big data analytics, survey r.nabati
Big data analytics, survey r.nabatiBig data analytics, survey r.nabati
Big data analytics, survey r.nabati
 
P2P Cache Resolution System for MANET
P2P Cache Resolution System for MANETP2P Cache Resolution System for MANET
P2P Cache Resolution System for MANET
 
Database Management system
Database Management systemDatabase Management system
Database Management system
 
Agent based frameworks for distributed association rule mining an analysis
Agent based frameworks for distributed association rule mining  an analysis  Agent based frameworks for distributed association rule mining  an analysis
Agent based frameworks for distributed association rule mining an analysis
 
DATA MINING FRAMEWORK TO ANALYZE ROAD ACCIDENT DATA
DATA MINING FRAMEWORK TO ANALYZE ROAD ACCIDENT DATADATA MINING FRAMEWORK TO ANALYZE ROAD ACCIDENT DATA
DATA MINING FRAMEWORK TO ANALYZE ROAD ACCIDENT DATA
 
Mis chapter 4 database management - copy
Mis chapter 4   database management - copyMis chapter 4   database management - copy
Mis chapter 4 database management - copy
 
An effective search on web log from most popular downloaded content
An effective search on web log from most popular downloaded contentAn effective search on web log from most popular downloaded content
An effective search on web log from most popular downloaded content
 
Database system Handbook.docx
Database system Handbook.docxDatabase system Handbook.docx
Database system Handbook.docx
 
Bridging the gap between the semantic web and big data: answering SPARQL que...
Bridging the gap between the semantic web and big data:  answering SPARQL que...Bridging the gap between the semantic web and big data:  answering SPARQL que...
Bridging the gap between the semantic web and big data: answering SPARQL que...
 
Database Management System ( Dbms )
Database Management System ( Dbms )Database Management System ( Dbms )
Database Management System ( Dbms )
 
Database Systems
Database SystemsDatabase Systems
Database Systems
 

Recently uploaded

ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 

Recently uploaded (20)

Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 

Data management presentation

  • 2. 2 Introduction  We are living in the era of computing where data has become a critical and most valuable asset  The progression of technology and the emergence of mobile and ad hoc networking have further enabled the creation and consumption of information on move  Mobile Ad Network (MANET) is defined as a network erected among a number of self organized mobile nodes, on the fly  These nodes interact and exchange data with each other in P2P style to solve complex user problems
  • 3. 3 Introduction – contd… 3  Several useful applications are thus possible  However, to truly realize these applications requires the need for addressing an array of new issues and challenges related to management of data
  • 4. Mobile Ad hoc Network Vs Conventional Networks4 Mobile, resource limited, unreliable and heterogeneous nodes Low capacity, asymmetric and instable links Dynamic, infrastructure-less and data intensive environment
  • 5. 5 Introduction – contd… 5  Unlike conventional client-server computing, the P2P communication generates massive volume of data  Despite the immense need, there has been shortage of a comprehensive data management framework for MANET
  • 6. 6 Introduction – contd… 6  Hence, this work presents ALADIN. The framework utilizes:  Inter-layer communication across layers of protocol stack to curtail network dynamism  i.e. Coordination, interaction and joint operation of protocols across different layers  Fractional views of semantic information to ensure scalability  Maintaining ontology documents as needed  Correlation among data items to optimize various data management operations  There are inherent associations among data items that can be computed based on usage log
  • 7. 7 Research Objectives 7 To propose a comprehensive framework for MANET that addresses key issues of data management by utilizing: 1. Cross-layer communication 2. Multi-level ontologies 3. Inherent relationship among data This work doesn’t provide: Detailed discussions and evaluations of other issues of data management (replication, security management etc.). But it does sketch solutions for these issues
  • 9. 9 1. Introduction to Data Management 2. Data Management Issues 3. Data Management Frameworks Background and Literature Review
  • 10. 10 What is Data Management?  We can define data management as: “a set of actions performed on the data considering the end user’s preferences and requirements”  Based on the literature review, we can identify following major steps/issues in data management (Perich, Joshi et al. 2006):  Data representation  Data discovery  Cache Management  Query Processing and Optimization  Data Replication  Naming  Transaction Management
  • 11. 11 Data Management Issues  Data Representation - the mechanism to describe the data such that it can be identified, discovered and accessed by any local or remote consumer  Challenges  Heterogeneity  Proprietary data formats, Semantic differences  Absence of universal schema  Unbounded/open nature, Resource limitations, Size of schema  Solution  On-demand discovery and maintenance of fractional schema
  • 12. 12 Data Management Issues (contd…) 12  Data Discovery - the actions performed for locating the owner of data considering the preferences specified by the consumer  Challenges  Lack of dedicated directory servers  Spatiotemporal variations  Frequent disconnections  Solution  Directory-less approaches  Cross-layer operation  Exploit data correlations to store potentially useful data in advance
  • 13. 13 Data Management Issues (contd…) 13  Cache Management – To locally save a data item for future use after it has been discovered  Challenges  Lack of prior information about nature of data. Locality of reference proposed for conventional systems will not work  Frequent disconnections  Frequent state changes  Solution  Exploit data correlations to compute relationships among data items  Cross-layer operations i.e. utilizing network events for managing consistency of data
  • 14. A summary of existing solutions for data management issues
  • 15. 16 Data Management frameworks for Mobile Ad hoc Network  Alfanao et al. (2012) – a method for managing operations and data in MANET  CDMAN (Martin and Demeure 2008) – a framework for improved data sharing by structured, segmented data  DRIVE (Zhong, Xu et al. 2008) – a system for opportunistic information sharing in vehicular networks  Ad-hoc InfoWare (Sanderson, Skjelsvik et al. 2007) – a framework for knowledge management in rescue scenarios  AmbientDB (Fontijn and Boncz 2004) – a relational database abstraction over ad hoc networks of heterogeneous peers  MoGATU (Perich, Joshi et al. 2006) – a P2P data management framework based on cross-layer operations, context management etc.  CHaMeLeoN (Shahram Ghandeharizadeh 2006) – a framework to facilitate exchange of text and continuous media over ad hoc networks
  • 16. Summary of Data Management frameworks for MANET
  • 17. 18 Gap Analysis 18 1. There has been shortage of a comprehensive data management framework 2. Most of the solutions ruminated on a subset of issues of data management. Key issues of data management are:  Data Representation  Data Discovery  Cache management 3. None of the solutions exploit correlation and multi- level ontology for data management 4. Only few solutions are based on cross-layer communication
  • 18. 19 1. Introduction 2. Design Principles 3. Block Diagram 4. Description Proposed Framework 19
  • 19. 20 ALADIN  In this work an Association Rules Based Network Layer Data and Information Management System (ALADIN) for MANET has been proposed  It comprises of components for: 1. Network layer, correlation based data discovery 2. Multi-level, ontology based data representation 3. Correlation-based cache replacement and cross-layer consistency management
  • 20. 21 Framework’s Design Principles 21  ALADIN rests on following three points: 1. Exploits Correlation Information  There are some inherent associations/correlation among data items, as has been verified (Appendix 1)  Two data items are correlated if they have been used together for reasonable number of times. Correlated data items are anticipated to be used together in future  Correlation can be exploited for:  Associative advertisements – proactively advertise data to neighbors. Neighbors will store these advertisements  Piggybacking of information – piggyback correlated information with current data request  Priority based cache replacement – keep those data items in cache that are correlated with current request
  • 21. 22 Framework’s Design Principles (contd…)22 2. Exploits cross-layer operations  Network layer data discovery – data items and routes are discovered simultaneously  Cache Consistency Management – exploiting network layer events for reactively manage data states 3. Multi-level data representation  On-demand discovery and maintenance of semantic information – use two level ontology. Keep the core ontology at nodes. Extended ontologies can be discovered when needed
  • 23. 24 Description  Logging Component  Maintains the fractional history of data requests in the form of sessions  Association Rules Mining Component  Calculates the correlation among data items by running FP- Growth algorithm (Han, J et al. 2004) on the log database  FP-Growth is a tree-based data mining algorithm to compute frequently used itemsets  The output of FP-Growth algorithm is the set of frequent itemsets representing what data requests have been mostly consumed together in past
  • 24. 25 Data Discovery Component  Discovery component is responsible for discovery of data items from other nodes on the network  It comprises of two subcomponents:  A proactive discovery component that periodically advertises its data and route via SADV messages  A reactive discovery component to discover the desired information based on the delivery mechanism of any reactive routing protocols  The proposed discovery component discovers a data item and corresponding routes to provider simultaneously  This leads to reduced latency of the overall discovery process
  • 25. 26 Proactive Component  Periodically advertises data items at regular intervals to neighbors  Listener component at neighbors can accumulate the received advertisements  Advertisement (SADV) includes details about the data items along with corresponding routes to access these data items  The advertiser can operate in two modes:  Correlated Mode  Advertise the catalog entries that are correlated to each other  Correlation is determined based on the itemsets generated by the mining component  Non-Correlated Mode  Advertise the catalog entries in round robin style
  • 27. 28 Reactive Component  Reactive component performs on-demand discovery of any requested data item  ALADIN presents two discovery algorithms based on following reactive routing algorithms:  AODV based Discovery  DSR based Discovery  Source node prepares a discovery request (SREQ) and sends to adjacent nodes  Intermediate nodes propagates the request until it is answered by the destination node  In case of AODV, a temporary reverse route is used  In case of DSR, the traversed hop is appended with the original request  A SREP is then generated. SREP is sent back through the same route used for propagation of SREQ
  • 28. Discovery Request Discovery Response AODV based Reactive Discovery
  • 29. 30 Using Correlation Patterns to Improve Discovery Process  The correlation computed by mining component can be exploited to prophesize about likely future requests and answers of these guessed requests can be piggybacked/ attached with current request  While generating a discovery response, the replying node appends the details of data items related to request with current response
  • 30. Using correlation patterns for piggybacking31
  • 31. 32 Data Representation  MANET suffers from issues of heterogeneity due to its open nature  Ontology can be used by nodes to reach to a common agreement of the domain terminologies  However, the use of a global ontology is not viable due to:  Limited resources  Nodes of varied origins
  • 32. 33 Data Representation (contd…) 33  ALADIN recommends maintaining two-level ontology:  Core Ontology  Available at every node  Ext Ontology  Fetched as needed from the network by invoking the discovery component  A General Purpose Software Ontology for Ad hoc and Vehicular Applications has been proposed ALADIN Multi-level ontology management approach
  • 33. Multilevel approach to maintain ontology
  • 34. An example of Multilevel Ontology Core ontology contains generalized concepts for any ad hoc and vehicular applications Ext ontology extends Core Ontology and contains concepts for specialized applications
  • 35. 36 Cache Management  It contains sub-components for:  Cache replacement  Exploits the correlation patterns generated by the mining component to place a newly arrived data item in to the cache  Victim slot is thus picked from those data items that are not related to current request  Consistency management  Exploits the routing layer to determine the topological changes in the network.  These topological changes are used to maintain consistency of cached data
  • 36. 37 Cache Replacement  C = {c1, c2, c3 …} denotes the cache, ρ denotes the correlation function. Cache Items related to d i.e. Rd can be expressed as:  Residual Set Sd i.e. data items not related to d can be written as:  The victim slot is thus picked from those data items that are not related to d i.e.
  • 38. 39 Consistency Manager 39  The robustness of network layer can be used to ensure the consistency of items maintained in data catalog  ALADIN proposes the consistency management based on the existing routing protocols (AODV and DSR etc.)  In case of a link failure, the node (who senses the failure) attempts to perform local route maintenance  The upstream nodes are then notified depending upon the status of local maintenance. A failure in local repair leads to invalidation of routes and data table  The upstream nodes notify their upstream nodes
  • 39. 42 1. Experimental Setup 2. Data sets 3. Demonstration Implementation Details 42
  • 40. 43 Network Simulation  All the experiments were conducted on JIST/SWANS Simulator  The ontology has been developed in OWL language using Protégé  JENA Toolkit has been employed for ontology processing tasks
  • 41. 44 Mobility Models 44 P1 P2 P3 P4 P5 Random Way Point Street Random Waypoint Mobility (Straw) •A node chooses a random point •The node moves towards the point with a uniform but random speed •Pauses for a constant time •Repeats the whole process again •Node moves according to streets •Streets are defined by real maps of US cities •Mobility is also restricted based on vehicular congestion and other traffic control mechanisms To model the movement patterns of mobile nodes during simulation, mobility models are used
  • 42. 45 Datasets  Three types of datasets have been used for generating sessions.  Random Dataset. Picks a data item randomly and floats on the network  Generating Correlated Data Sessions  The YouTube Dataset: A dataset generated based on YouTube video requests by users in a campus (Zink, M. et al. 2008)  The Correlated Data Generator(CDG) Dataset: A simulated dataset generated based on a random correlation matrix
  • 44. 50 1. Discovery Component 2. Data Representation Component 3. Caching Component RESULTS AND DISCUSSIONS50
  • 45. 51 Analysis of Discovery Component 51  A series of experiments were conducted to analyze the impact of individual sub- components on latency and hit ratio  Latency is the time difference when a discovery request is floated and the time when a response is received  Hit Ratio is the ratio of discovery request locally satisfied to the total discovery request issued by a node  Summary of the results are:  Next slides compare ALADIN with MoGATU
  • 46. Latency Analysis of Discovery Component52
  • 47. Hit Ratio Analysis of Discovery Component53
  • 48. 54 1. Discovery Component 2. Data Representation Component 3. Caching Component RESULTS AND DISCUSSIONS 54
  • 49. Scalability of Data Representation Component55 Growth of ontology size during simulation is linear
  • 50. Latency Analysis of Data Representation Component56
  • 51. 57 1. Discovery Component 2. Data Representation Component 3. Caching Component RESULTS AND DISCUSSIONS 57
  • 52. Hit Ratio of Cache Replacement58
  • 53. Hit Ratio of Consistency Manager59
  • 54. 60 Research Contributions 60  We present a scalable, network layer, association rules based data and information management framework for MANET  This research substantiates that:  the use of a multi-level schema gives rise to improvement in scalability of data management operations  a network layer discovery approach leads to improvement in latency and robustness of data management operations  the correlation patterns present in the request sessions can be exploited in predictive fashion to ameliorate the discovery and caching process  It is the first work(for MANET) exploring the use of :  data correlations  multi-level data representation
  • 55. 61 Future Work 61  Improvement in discovery component  Proactive Component  Smart broadcasting based on available battery, network congestion  Reactive Component  Implementation for other reactive routing protocols like TORA, ABR, OLSR etc.  Association Rules Mining are inefficient in terms of memory consumption  New approximate algorithms can be devised  Caching Component  Based on proposed correlation technique, extensions of other caching algorithms (MFU, Profile Driven caching)  Log database  Can it be used for transaction management, query optimization etc.?  Further work/evaluation of replication, query optimization and security
  • 56. 62 References 62 Alfano, R. and A. Manzalini (2012). Method and System for Data Managment in Communication Networks. U. Patents. US, Telcom Italia S.p.a., Milan (IT). US 8,165,130 B2. Arias-Torres, D. and J. A. García-Macias (2004). Service Discovery in Mobile Ad-hoc Networks by Extending the AODV Protocol. 2nd Mobile Computing Workshop(ENC' 04. 2004), Mexico. Bharadvaj, H., A. Joshi and S. Auephanwiriyakyl (1998). An Active Transcoding Proxy to SupportMobile Web Access. IEEE Symposium on Reliable Distributed Systems, Dana Point, California. Chand, N., R. C. Joshi and M. Misra (2007). "Cooperative caching in mobile ad hoc networks based on data utility." Mobile Information Systems 3(1): 19-37. Chen, H., F. Perich, T. Finin and A. Joshi (2004). SOUPA: Standard ontology for ubiquitous and pervasive applications. The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MOBIQUITOUS 2004), Boston, Massachusetts, USA Fatima, N. S. and P. S. A. Khader (2012). "Efficient Data Accessibility using TTL Based Caching Strategy in Manet." European Journal of Scientific Research 69(1): 21-32. Fontijn, W. and P. Boncz (2004). AmbientDB: P2P Data Management Middleware for Ambient Intelligence. Pervasive Computing and Communications Workshops, 2004, Orlando, Florida, USA.
  • 57. 63 References (contd…) 63 Gryazin, E. A. (2006). Service Discovery in Bluetooth. Helsinki, Finland, Group for Robotics and Virtual Reality. Department of Computer Science. Helsinki University of Technology: 1-4. Guttman, E., C. Perkins, J. Veizades and M. Day (1999). Service location protocol, version 2, RFC 2608, June 1999. Han, J., J. Pei, Y. Yin and R. Mao (2004). "Mining Frequent Patterns without Candidate Generation: A Frequent- Pattern Tree Approach." Data Mining and Knowledge Discovery 8: 53-87. Hara, T. (2001). Effective replica allocation in ad hoc networks for improving data accessibility. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies, Anchorage, Alaska, United States. Hara, T., N. Murakami and S. Nishio (2004). "Replica allocation for correlated data items in ad hoc sensor networks." ACM Sigmod Record 33(1): 38-43. Jayapal, C. and S. Vembu (2011). "Adaptive Service Discovery Protocol for Mobile Ad Hoc Networks." European Journal of Scientific Research 49(1): 6-17. Karlsson, J. (2012). Routing Security in Mobile Ad-hoc Networks. Informing Science and Information Technology Education, Montreal, Canada. Martin, L. and I. Demeure (2008). Using structured and segmented data for improving data sharing on MANETs. 8th international conference on New technologies in distributed systems, Lyon, France. Perich, F., S. Avancha, D. Chakraborty, A. Joshi and Y. Yesha (2002). Profile Driven Data Management for Pervasive Environments. 13th International Conference on Database and Expert Systems Applications (DEXA 2002), Aix-en-Provence, France.
  • 58. 64 References (contd…) 64 Perich, F., S. Avancha, A. Joshi, Y. Yesha and K. Joshi (2001). Query routing and processing in mobile ad-hoc environments. Baltimore County, University of Maryland: 1-17. Perich, F., A. Joshi and R. Chirkova (2006). Data Management for Mobile Ad-Hoc Networks. Enabling Technologies for Wireless E-Business. 1: 132-176. Sanderson, N. C., K. S. Skjelsvik, O. V. Drugan, M. Pužar, V. Goebel, E. Munthe-Kaas and T. Plagemann (2007). Developing Mobile Middleware-An Analysis of Rescue and Emergency Operations, Department of Informatics, University of Oslo. Shahram Ghandeharizadeh, A. H., Bhaskar Krishnamachari, François Bar, Todd Richmond (2006). Data Management Techniques for Continuous Media In Ad-Hoc Networks of Wireless Devices. Collection of Encyclopedia of Multimedia: 136-140. Taneja, S. and A. Kush (2012). "Intrusion Detection Protocol for Adhoc Networks." Network and Complex Systems 2(2): 22-29. Xiong, W. A. and B. Tang (2011). "A Secure and Highly Efficient Key Management Scheme for MANET." Advances on Information Sciences and Service Sciences 3(2): 12-22. Yang, B. and A. R. Hurson (2007). "Semantic-Aware and QoS-Aware Image Caching in Ad Hoc Networks." IEEE Transactions on Knowledge and Data Engineering 19(12): 1694-1707. Zhong, T., B. Xu and O. Wolfson (2008). Disseminating real-time traffic information in vehicular ad-hoc networks. Intelligent Vehicles Symposium, Eindhoven, Netherland. Zink, M., K. Suh, Y. Gu and J. Kurose (2008). Watch global, cache local: YouTube network traffic at a campus network-measurements and implications. 15th SPIE/ACM Multimedia Computing and Networking (MMCN’08), Santa Clara.

Editor's Notes

  1. Consistency management work?