SlideShare a Scribd company logo
1 of 14
Distributed coordination protocol for event
data exchange in IoT monitoring applications
Presented by:
Behnam Khazael
Author with Affiliation:
Dr. Hadi Tabatabaee Malazi
Overview
Introduction
Problem statement
Related work
Proposed distributed coordination protocol
Evaluation
Conclusion
2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT)
2/14
Introduction
• Internet of Things (IoT) in monitoring applications
• IoT applications such as waste management, fire monitoring, and traffic monitoring.
• In-place monitoring devices need to capture events as soon as they happen.
• Broker-less publish/subscribe architecture in designing the Internet of things (IoT) monitoring applications.
2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT)
3/14
Problem Statement
• Designing a distributed coordination protocol for event data exchange in IoT
monitoring applications is a challenging task:
• Low computation capacity IoT devices.
• IoT devices mostly operating with batteries.
• Most of the energy of IoT devices is consumed on packet transmission.
• Keeping each node in the network updated needs to exchange a high number of control
messages.
2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT)
4/14
Previous Work:
• Esposito et al.* proposed solution.
• The researchers considered a broker-less publish/subscribe architecture.
• To minimize the communication overhead, message beaconing was utilized to disseminate messages in the
network.
• Issue is the blind re-beaconing
2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT)
* “Event-based sensor data exchange and fusion in the Internet of Things environments”, Journal of Parallel and Distributed Computing, vol. 118, pp. 328–343, 2018. 5/14
Proposed Distributed coordination protocol
• Routing Table structure in each node:
• The topic of the interest
• Publishers' list
• Subscribers’ list
• Received list
• Packet structure:
• Header
• Source Address
• Destination Address (Broadcast)  Beaconing
• Message-ID
• Receivers list
• Message Type (advertisement, subscribe, publish, update, leave)
• Body
• Topic
• Data
2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT)
Our proposed coordination protocol built on top of Esposito et al. proposed solution.
6/14
Proposed Distributed coordination protocol
(Cont.)
Decision support algorithm
2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT)
1
2
<header>
…
<receivers><item>1</item> <item>2</item></receivers>
…
</header>
1
3
4
5
6
7
8
9
Topic Subscribers Publishers
temp 2, 3, 4 0
Is it necessary to send the packet?
Algorithm to support.
-> list of subscribers
-> receiver list
 3, 4
 Yes set the packet. (beaconing)
7/14
Proposed Distributed coordination protocol
(Cont.)
How the algorithm help to reduce
unwanted publish messages?
2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT)
1
2
3
4
5
6
7
8
9
1
2
3
4
5
6
7
8
9
1
2
3
4
5
6
7
8
9
1
2
3
4
5
6
7
8
9
8/14
2
3 4
1
Evaluation
• Cooja simulator utilized to evaluates the proposed solution vs. Esposito et al. approach.
• Cooja Simulator is a network simulator specifically designed for Wireless Sensor Networks.
• Motes simulated by extending java classes of Cooja motes.
2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT)
9/14
Evaluation (Cont.)
• Configuration Parameters considered as follow:
• Working space with 100 units height and 100 unites widths considered for the evaluation.
• Transition range of each mote set to 30 unites.
• Number of nodes for each evaluations ranges from 25 to 125 (publishers and subscribers).
• 1000 events generated during 10 minutes of simulation.
2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT)
10/14
Evaluation (Cont.)
Energy consumption comparison (up to 33% ) Network traffic comparison(on average 28% )
2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT)
11/14
Evaluation (Cont.)
Registration delay comparison (on average 19% ) Packet delivery delay comparison(on average 10% )
2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT)
12/14
Conclusion
• We utilized headers of the packets in the dissemination of the events to improve packet dissemination in a
distributed event data exchange protocol.
• As evaluation showed that our method increased the longevity of the network.
• As evaluation showed that our method reduces the time that packets wait in the sending queue.
• Our method Imposed additional computation in the process of packets.
• In future works, we focus on extending this approach to bring in-network processing to determine complex events
in a distributed manner.
2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT)
13/14
Questions?
Thank you for your attention!
14/14

More Related Content

What's hot

3.pillars of embedded io t and physical devices
3.pillars of embedded io t and physical devices3.pillars of embedded io t and physical devices
3.pillars of embedded io t and physical devicesRaghavendra Maggavi
 
SmartSociety – A Platform for Collaborative People-Machine Computation
SmartSociety – A Platform for Collaborative People-Machine ComputationSmartSociety – A Platform for Collaborative People-Machine Computation
SmartSociety – A Platform for Collaborative People-Machine ComputationHong-Linh Truong
 
Ppt 3 - IOT logic design
Ppt   3 - IOT logic designPpt   3 - IOT logic design
Ppt 3 - IOT logic designudhayakumarc1
 
IoT Analytics from Edge to Cloud - using IBM Informix
IoT Analytics from Edge to Cloud - using IBM InformixIoT Analytics from Edge to Cloud - using IBM Informix
IoT Analytics from Edge to Cloud - using IBM InformixPradeep Muthalpuredathe
 
Digital economy presentation
Digital economy presentationDigital economy presentation
Digital economy presentationkhagendrabasnet4
 
Soldatos io t-academy-cosmote-231117-v-final
Soldatos io t-academy-cosmote-231117-v-finalSoldatos io t-academy-cosmote-231117-v-final
Soldatos io t-academy-cosmote-231117-v-finalJohn Soldatos
 
IPCA - Intelligent Protocol Content Analysis
IPCA - Intelligent Protocol Content AnalysisIPCA - Intelligent Protocol Content Analysis
IPCA - Intelligent Protocol Content AnalysisJoachim Surich
 
Industrial Pioneers Days - Machine Learning
Industrial Pioneers Days - Machine LearningIndustrial Pioneers Days - Machine Learning
Industrial Pioneers Days - Machine LearningVEDLIoT Project
 
Why Gateways are Important in Your IoT Architecture
Why Gateways are Important in Your IoT ArchitectureWhy Gateways are Important in Your IoT Architecture
Why Gateways are Important in Your IoT ArchitectureIBM Analytics
 
Edge computing and its role in architecting IoT
Edge computing and its role in architecting IoTEdge computing and its role in architecting IoT
Edge computing and its role in architecting IoTKiran Kumar Pattanaik
 
An IoT gateway centric architecture to provide novel m2m services
An IoT gateway centric architecture to provide novel m2m servicesAn IoT gateway centric architecture to provide novel m2m services
An IoT gateway centric architecture to provide novel m2m servicesSoumya Kanti Datta
 
Spatineo Webinar: Shedding Light on INSPIRE Conformity
Spatineo Webinar: Shedding Light on INSPIRE ConformitySpatineo Webinar: Shedding Light on INSPIRE Conformity
Spatineo Webinar: Shedding Light on INSPIRE ConformityIlkka Rinne
 
call for papers - International Conference on Networks & IOT (NeTIOT 2020)
call for papers - International Conference on Networks & IOT (NeTIOT 2020)call for papers - International Conference on Networks & IOT (NeTIOT 2020)
call for papers - International Conference on Networks & IOT (NeTIOT 2020)ijassn
 

What's hot (20)

3.pillars of embedded io t and physical devices
3.pillars of embedded io t and physical devices3.pillars of embedded io t and physical devices
3.pillars of embedded io t and physical devices
 
IoT heap 1
IoT heap 1IoT heap 1
IoT heap 1
 
IoT-A ARM
IoT-A ARMIoT-A ARM
IoT-A ARM
 
SmartSociety – A Platform for Collaborative People-Machine Computation
SmartSociety – A Platform for Collaborative People-Machine ComputationSmartSociety – A Platform for Collaborative People-Machine Computation
SmartSociety – A Platform for Collaborative People-Machine Computation
 
Ppt 3 - IOT logic design
Ppt   3 - IOT logic designPpt   3 - IOT logic design
Ppt 3 - IOT logic design
 
IoT Analytics from Edge to Cloud - using IBM Informix
IoT Analytics from Edge to Cloud - using IBM InformixIoT Analytics from Edge to Cloud - using IBM Informix
IoT Analytics from Edge to Cloud - using IBM Informix
 
Digital economy presentation
Digital economy presentationDigital economy presentation
Digital economy presentation
 
Lecture 17
Lecture 17Lecture 17
Lecture 17
 
Soldatos io t-academy-cosmote-231117-v-final
Soldatos io t-academy-cosmote-231117-v-finalSoldatos io t-academy-cosmote-231117-v-final
Soldatos io t-academy-cosmote-231117-v-final
 
IPCA - Intelligent Protocol Content Analysis
IPCA - Intelligent Protocol Content AnalysisIPCA - Intelligent Protocol Content Analysis
IPCA - Intelligent Protocol Content Analysis
 
Domain specific IoT
Domain specific IoTDomain specific IoT
Domain specific IoT
 
Industrial Pioneers Days - Machine Learning
Industrial Pioneers Days - Machine LearningIndustrial Pioneers Days - Machine Learning
Industrial Pioneers Days - Machine Learning
 
Why Gateways are Important in Your IoT Architecture
Why Gateways are Important in Your IoT ArchitectureWhy Gateways are Important in Your IoT Architecture
Why Gateways are Important in Your IoT Architecture
 
Lecture 15
Lecture 15Lecture 15
Lecture 15
 
Edge computing and its role in architecting IoT
Edge computing and its role in architecting IoTEdge computing and its role in architecting IoT
Edge computing and its role in architecting IoT
 
An IoT gateway centric architecture to provide novel m2m services
An IoT gateway centric architecture to provide novel m2m servicesAn IoT gateway centric architecture to provide novel m2m services
An IoT gateway centric architecture to provide novel m2m services
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
Spatineo Webinar: Shedding Light on INSPIRE Conformity
Spatineo Webinar: Shedding Light on INSPIRE ConformitySpatineo Webinar: Shedding Light on INSPIRE Conformity
Spatineo Webinar: Shedding Light on INSPIRE Conformity
 
call for papers - International Conference on Networks & IOT (NeTIOT 2020)
call for papers - International Conference on Networks & IOT (NeTIOT 2020)call for papers - International Conference on Networks & IOT (NeTIOT 2020)
call for papers - International Conference on Networks & IOT (NeTIOT 2020)
 
IoT and m2m
IoT and m2mIoT and m2m
IoT and m2m
 

Similar to Distributed coordination protocol for event data exchange in IoT monitoring applications

apidays LIVE Paris - Reconcile the European data strategy with Carbon Neutral...
apidays LIVE Paris - Reconcile the European data strategy with Carbon Neutral...apidays LIVE Paris - Reconcile the European data strategy with Carbon Neutral...
apidays LIVE Paris - Reconcile the European data strategy with Carbon Neutral...apidays
 
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...TELKOMNIKA JOURNAL
 
Survey on IoT application layer protocols
Survey on IoT application layer protocolsSurvey on IoT application layer protocols
Survey on IoT application layer protocolsnooriasukmaningtyas
 
Rahul internet of things
Rahul internet of thingsRahul internet of things
Rahul internet of thingsRahul Tathod
 
Show and Tell - Data and Digitalisation, Digital Twins.pdf
Show and Tell - Data and Digitalisation, Digital Twins.pdfShow and Tell - Data and Digitalisation, Digital Twins.pdf
Show and Tell - Data and Digitalisation, Digital Twins.pdfSIFOfgem
 
Internet of Things - Call presentations and hints from presenters
Internet of Things - Call presentations and hints from presentersInternet of Things - Call presentations and hints from presenters
Internet of Things - Call presentations and hints from presentersOpen & Agile Smart Cities
 
European Green IT Webinar 2014 - Erasmus Mundus Master PERCCOM
European Green IT Webinar 2014 - Erasmus Mundus Master PERCCOMEuropean Green IT Webinar 2014 - Erasmus Mundus Master PERCCOM
European Green IT Webinar 2014 - Erasmus Mundus Master PERCCOMGreenLabCenter
 
Jarrar: Future Internet in Horizon 2020 Calls
Jarrar: Future Internet in Horizon 2020 CallsJarrar: Future Internet in Horizon 2020 Calls
Jarrar: Future Internet in Horizon 2020 CallsMustafa Jarrar
 
Unified Communications in IoT, Evolutionary Aspects and the Role of Informati...
Unified Communications in IoT, Evolutionary Aspects and the Role of Informati...Unified Communications in IoT, Evolutionary Aspects and the Role of Informati...
Unified Communications in IoT, Evolutionary Aspects and the Role of Informati...Rute C. Sofia
 
IRJET - Energy Efficient Approach for Data Aggregation in IoT
IRJET -  	  Energy Efficient Approach for Data Aggregation in IoTIRJET -  	  Energy Efficient Approach for Data Aggregation in IoT
IRJET - Energy Efficient Approach for Data Aggregation in IoTIRJET Journal
 
GAIA and Alternative Networks
GAIA and Alternative NetworksGAIA and Alternative Networks
GAIA and Alternative NetworksJose Saldana
 
Janet Network R&D Innovation - HEAnet / Juniper Innovation Day
Janet Network R&D Innovation - HEAnet / Juniper Innovation DayJanet Network R&D Innovation - HEAnet / Juniper Innovation Day
Janet Network R&D Innovation - HEAnet / Juniper Innovation DayMartin Hamilton
 
Classroom Shared Whiteboard System using Multicast Protocol
Classroom Shared Whiteboard System using Multicast ProtocolClassroom Shared Whiteboard System using Multicast Protocol
Classroom Shared Whiteboard System using Multicast Protocolijtsrd
 
ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...
ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...
ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...ijma
 
Cyber Infrastructure for Research & Education in Canada. What is Canada's vis...
Cyber Infrastructure for Research & Education in Canada. What is Canada's vis...Cyber Infrastructure for Research & Education in Canada. What is Canada's vis...
Cyber Infrastructure for Research & Education in Canada. What is Canada's vis...CANARIE Inc.
 
INTERPRETER – Local flexibility solutions leveraged by RD&I projects as syste...
INTERPRETER – Local flexibility solutions leveraged by RD&I projects as syste...INTERPRETER – Local flexibility solutions leveraged by RD&I projects as syste...
INTERPRETER – Local flexibility solutions leveraged by RD&I projects as syste...Leonardo ENERGY
 
Flexibility needs at system level and how RD&I projects are leveraging these ...
Flexibility needs at system level and how RD&I projects are leveraging these ...Flexibility needs at system level and how RD&I projects are leveraging these ...
Flexibility needs at system level and how RD&I projects are leveraging these ...Leonardo ENERGY
 
Fin fest 2014 - Internet of Things and APIs
Fin fest 2014 - Internet of Things and APIsFin fest 2014 - Internet of Things and APIs
Fin fest 2014 - Internet of Things and APIsRobert Greiner
 

Similar to Distributed coordination protocol for event data exchange in IoT monitoring applications (20)

apidays LIVE Paris - Reconcile the European data strategy with Carbon Neutral...
apidays LIVE Paris - Reconcile the European data strategy with Carbon Neutral...apidays LIVE Paris - Reconcile the European data strategy with Carbon Neutral...
apidays LIVE Paris - Reconcile the European data strategy with Carbon Neutral...
 
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
 
Survey on IoT application layer protocols
Survey on IoT application layer protocolsSurvey on IoT application layer protocols
Survey on IoT application layer protocols
 
Rahul internet of things
Rahul internet of thingsRahul internet of things
Rahul internet of things
 
IoT Lab @COPELABS
IoT Lab @COPELABSIoT Lab @COPELABS
IoT Lab @COPELABS
 
Show and Tell - Data and Digitalisation, Digital Twins.pdf
Show and Tell - Data and Digitalisation, Digital Twins.pdfShow and Tell - Data and Digitalisation, Digital Twins.pdf
Show and Tell - Data and Digitalisation, Digital Twins.pdf
 
Internet of Things - Call presentations and hints from presenters
Internet of Things - Call presentations and hints from presentersInternet of Things - Call presentations and hints from presenters
Internet of Things - Call presentations and hints from presenters
 
European Green IT Webinar 2014 - Erasmus Mundus Master PERCCOM
European Green IT Webinar 2014 - Erasmus Mundus Master PERCCOMEuropean Green IT Webinar 2014 - Erasmus Mundus Master PERCCOM
European Green IT Webinar 2014 - Erasmus Mundus Master PERCCOM
 
Jarrar: Future Internet in Horizon 2020 Calls
Jarrar: Future Internet in Horizon 2020 CallsJarrar: Future Internet in Horizon 2020 Calls
Jarrar: Future Internet in Horizon 2020 Calls
 
Unified Communications in IoT, Evolutionary Aspects and the Role of Informati...
Unified Communications in IoT, Evolutionary Aspects and the Role of Informati...Unified Communications in IoT, Evolutionary Aspects and the Role of Informati...
Unified Communications in IoT, Evolutionary Aspects and the Role of Informati...
 
IRJET - Energy Efficient Approach for Data Aggregation in IoT
IRJET -  	  Energy Efficient Approach for Data Aggregation in IoTIRJET -  	  Energy Efficient Approach for Data Aggregation in IoT
IRJET - Energy Efficient Approach for Data Aggregation in IoT
 
GAIA and Alternative Networks
GAIA and Alternative NetworksGAIA and Alternative Networks
GAIA and Alternative Networks
 
Janet Network R&D Innovation - HEAnet / Juniper Innovation Day
Janet Network R&D Innovation - HEAnet / Juniper Innovation DayJanet Network R&D Innovation - HEAnet / Juniper Innovation Day
Janet Network R&D Innovation - HEAnet / Juniper Innovation Day
 
Classroom Shared Whiteboard System using Multicast Protocol
Classroom Shared Whiteboard System using Multicast ProtocolClassroom Shared Whiteboard System using Multicast Protocol
Classroom Shared Whiteboard System using Multicast Protocol
 
SDI to IP 2110 Transition Part 1
SDI to IP 2110 Transition Part 1SDI to IP 2110 Transition Part 1
SDI to IP 2110 Transition Part 1
 
ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...
ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...
ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...
 
Cyber Infrastructure for Research & Education in Canada. What is Canada's vis...
Cyber Infrastructure for Research & Education in Canada. What is Canada's vis...Cyber Infrastructure for Research & Education in Canada. What is Canada's vis...
Cyber Infrastructure for Research & Education in Canada. What is Canada's vis...
 
INTERPRETER – Local flexibility solutions leveraged by RD&I projects as syste...
INTERPRETER – Local flexibility solutions leveraged by RD&I projects as syste...INTERPRETER – Local flexibility solutions leveraged by RD&I projects as syste...
INTERPRETER – Local flexibility solutions leveraged by RD&I projects as syste...
 
Flexibility needs at system level and how RD&I projects are leveraging these ...
Flexibility needs at system level and how RD&I projects are leveraging these ...Flexibility needs at system level and how RD&I projects are leveraging these ...
Flexibility needs at system level and how RD&I projects are leveraging these ...
 
Fin fest 2014 - Internet of Things and APIs
Fin fest 2014 - Internet of Things and APIsFin fest 2014 - Internet of Things and APIs
Fin fest 2014 - Internet of Things and APIs
 

More from Maynooth University

Evidential fine-grained event localization using Twitter
Evidential fine-grained event localization using TwitterEvidential fine-grained event localization using Twitter
Evidential fine-grained event localization using TwitterMaynooth University
 
A two-dimensional self-coordination mechanism of agents in a minority game
A two-dimensional self-coordination mechanism of agents in a minority gameA two-dimensional self-coordination mechanism of agents in a minority game
A two-dimensional self-coordination mechanism of agents in a minority gameMaynooth University
 
PAMS: A new position-aware multi-sensor dataset for human activity recognitio...
PAMS: A new position-aware multi-sensor dataset for human activity recognitio...PAMS: A new position-aware multi-sensor dataset for human activity recognitio...
PAMS: A new position-aware multi-sensor dataset for human activity recognitio...Maynooth University
 
Delaunay based two-phase algorithm for connected cover in WSNs
Delaunay based two-phase algorithm for connected cover in WSNsDelaunay based two-phase algorithm for connected cover in WSNs
Delaunay based two-phase algorithm for connected cover in WSNsMaynooth University
 
Quality of Claim Metrics in Social Sensing Systems: A case study on IranDeal
Quality of Claim Metrics in Social Sensing Systems: A case study on IranDealQuality of Claim Metrics in Social Sensing Systems: A case study on IranDeal
Quality of Claim Metrics in Social Sensing Systems: A case study on IranDealMaynooth University
 
NoSQL Data Architecture Patterns
NoSQL Data ArchitecturePatternsNoSQL Data ArchitecturePatterns
NoSQL Data Architecture PatternsMaynooth University
 
Chapter1: NoSQL: It’s about making intelligent choices
Chapter1: NoSQL: It’s about making intelligent choicesChapter1: NoSQL: It’s about making intelligent choices
Chapter1: NoSQL: It’s about making intelligent choicesMaynooth University
 

More from Maynooth University (8)

Evidential fine-grained event localization using Twitter
Evidential fine-grained event localization using TwitterEvidential fine-grained event localization using Twitter
Evidential fine-grained event localization using Twitter
 
A two-dimensional self-coordination mechanism of agents in a minority game
A two-dimensional self-coordination mechanism of agents in a minority gameA two-dimensional self-coordination mechanism of agents in a minority game
A two-dimensional self-coordination mechanism of agents in a minority game
 
PAMS: A new position-aware multi-sensor dataset for human activity recognitio...
PAMS: A new position-aware multi-sensor dataset for human activity recognitio...PAMS: A new position-aware multi-sensor dataset for human activity recognitio...
PAMS: A new position-aware multi-sensor dataset for human activity recognitio...
 
Delaunay based two-phase algorithm for connected cover in WSNs
Delaunay based two-phase algorithm for connected cover in WSNsDelaunay based two-phase algorithm for connected cover in WSNs
Delaunay based two-phase algorithm for connected cover in WSNs
 
Quality of Claim Metrics in Social Sensing Systems: A case study on IranDeal
Quality of Claim Metrics in Social Sensing Systems: A case study on IranDealQuality of Claim Metrics in Social Sensing Systems: A case study on IranDeal
Quality of Claim Metrics in Social Sensing Systems: A case study on IranDeal
 
NoSQL Data Architecture Patterns
NoSQL Data ArchitecturePatternsNoSQL Data ArchitecturePatterns
NoSQL Data Architecture Patterns
 
NoSQL Consepts
NoSQL ConseptsNoSQL Consepts
NoSQL Consepts
 
Chapter1: NoSQL: It’s about making intelligent choices
Chapter1: NoSQL: It’s about making intelligent choicesChapter1: NoSQL: It’s about making intelligent choices
Chapter1: NoSQL: It’s about making intelligent choices
 

Recently uploaded

Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 

Recently uploaded (20)

Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 

Distributed coordination protocol for event data exchange in IoT monitoring applications

  • 1. Distributed coordination protocol for event data exchange in IoT monitoring applications Presented by: Behnam Khazael Author with Affiliation: Dr. Hadi Tabatabaee Malazi
  • 2. Overview Introduction Problem statement Related work Proposed distributed coordination protocol Evaluation Conclusion 2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT) 2/14
  • 3. Introduction • Internet of Things (IoT) in monitoring applications • IoT applications such as waste management, fire monitoring, and traffic monitoring. • In-place monitoring devices need to capture events as soon as they happen. • Broker-less publish/subscribe architecture in designing the Internet of things (IoT) monitoring applications. 2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT) 3/14
  • 4. Problem Statement • Designing a distributed coordination protocol for event data exchange in IoT monitoring applications is a challenging task: • Low computation capacity IoT devices. • IoT devices mostly operating with batteries. • Most of the energy of IoT devices is consumed on packet transmission. • Keeping each node in the network updated needs to exchange a high number of control messages. 2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT) 4/14
  • 5. Previous Work: • Esposito et al.* proposed solution. • The researchers considered a broker-less publish/subscribe architecture. • To minimize the communication overhead, message beaconing was utilized to disseminate messages in the network. • Issue is the blind re-beaconing 2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT) * “Event-based sensor data exchange and fusion in the Internet of Things environments”, Journal of Parallel and Distributed Computing, vol. 118, pp. 328–343, 2018. 5/14
  • 6. Proposed Distributed coordination protocol • Routing Table structure in each node: • The topic of the interest • Publishers' list • Subscribers’ list • Received list • Packet structure: • Header • Source Address • Destination Address (Broadcast)  Beaconing • Message-ID • Receivers list • Message Type (advertisement, subscribe, publish, update, leave) • Body • Topic • Data 2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT) Our proposed coordination protocol built on top of Esposito et al. proposed solution. 6/14
  • 7. Proposed Distributed coordination protocol (Cont.) Decision support algorithm 2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT) 1 2 <header> … <receivers><item>1</item> <item>2</item></receivers> … </header> 1 3 4 5 6 7 8 9 Topic Subscribers Publishers temp 2, 3, 4 0 Is it necessary to send the packet? Algorithm to support. -> list of subscribers -> receiver list  3, 4  Yes set the packet. (beaconing) 7/14
  • 8. Proposed Distributed coordination protocol (Cont.) How the algorithm help to reduce unwanted publish messages? 2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT) 1 2 3 4 5 6 7 8 9 1 2 3 4 5 6 7 8 9 1 2 3 4 5 6 7 8 9 1 2 3 4 5 6 7 8 9 8/14 2 3 4 1
  • 9. Evaluation • Cooja simulator utilized to evaluates the proposed solution vs. Esposito et al. approach. • Cooja Simulator is a network simulator specifically designed for Wireless Sensor Networks. • Motes simulated by extending java classes of Cooja motes. 2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT) 9/14
  • 10. Evaluation (Cont.) • Configuration Parameters considered as follow: • Working space with 100 units height and 100 unites widths considered for the evaluation. • Transition range of each mote set to 30 unites. • Number of nodes for each evaluations ranges from 25 to 125 (publishers and subscribers). • 1000 events generated during 10 minutes of simulation. 2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT) 10/14
  • 11. Evaluation (Cont.) Energy consumption comparison (up to 33% ) Network traffic comparison(on average 28% ) 2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT) 11/14
  • 12. Evaluation (Cont.) Registration delay comparison (on average 19% ) Packet delivery delay comparison(on average 10% ) 2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT) 12/14
  • 13. Conclusion • We utilized headers of the packets in the dissemination of the events to improve packet dissemination in a distributed event data exchange protocol. • As evaluation showed that our method increased the longevity of the network. • As evaluation showed that our method reduces the time that packets wait in the sending queue. • Our method Imposed additional computation in the process of packets. • In future works, we focus on extending this approach to bring in-network processing to determine complex events in a distributed manner. 2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT) 13/14
  • 14. Questions? Thank you for your attention! 14/14

Editor's Notes

  1. In the name of God. Hello everyone. My name is Behnam Khazael, I’m a Ph.D. student at Shahid Beheshti University, under the supervision of Dr. Tabatabaee, my research interest includes complex event processing and middleware architectures for monitoring applications in smart cities. This research, with the title of “Distributed coordination protocol for event data exchange in IoT monitoring applications” is about an extended distributed coordination protocol that improved a number of metrics in event data dissemination for monitoring applications in smart cities.  
  2. Here is an overview of topics that we are going to address in this presentation. At first, in the Introduction section, we will introduce the environment of our research and explain solutions and applications. We will introduce the problem with the challenges that we are going to address, in the problem statement section. In the related work section, we elaborate in more detail on the current solution and its main drawback. We introduce our method and algorithm in the proposed distributed coordination protocol section. In the evaluations section, we will show the results of our experiments. And finally, in the conclusion section, we spot the goals that we achieved.
  3. 1- One of the major category of the Internet of Things (IoT) are monitoring applications. 2-1- For instance, in a smart city, a huge number of IoT devices are employed for various applications such as waste management, fire monitoring, and traffic monitoring. 2-2- Fire monitoring applications are a common applications that needs to continuously receive new data from sensors that deployed in the environment. 3- To establish the connection between consumers of sensors data and sensor nodes the publish-subscribe architectural styles utilized in designing the Internet of things (IoT) monitoring applications.
  4. 0- The IoT systems innately need to exchange data among connected devices to reach their objectives such as detecting a complex event, like fire. 0- Broker-less publish/subscribe architecture is one the most solutions utilized to exchange data among connected devices. 0- Designing a distributed coordination protocol for broker-less publish/subscribe systems is a challenging task as: 1- The IoT devices in these systems have low computation capacity and they are mostly operating with batteries which replacing them is not easy. 2- Most of the energy of IoT devices is consumed on packet transmission. 3- Keeping each node in the network updated regard to publishers and subscribers needs to exchange a high number of control messages. 3- thus, Designing an efficient communication protocol is challenging, message dissemination has to be done efficiently, which means that with minimum message passing the maximum information should exchange.
  5. Esposito et al. proposed a broker-less communication protocol for monitoring applications. In their solution, they considered that each node maintains a routing topic table to distribute the management of subscriptions. in order to reduce the communication overhead, they consider beaconing for message dissemination. as the middle figure shows, if we consider that node number 1 is the publisher the dissemination of packets based on beaconing would happen as follow: In iteration A which is presented in black color, by beaconing the message nodes 2 and 3 would receive the packet. At the nest iteration, the iteration “B”, which is presented in red, as only node number 3 has two other neighbors to send the packet two them, it would re-beaconing the packet. At the final iteration which is iteration C, node number 5 re-beaconing the packet to deliver it to its neighbor the node number 6. In this way, the packets disseminate in the network. Although the protocol is fully distributed but, re-beaconing the packet can drain the node energy and make the sending/receiving queue of nodes crowded. As the figure on the right side of the slide shows, consider a node with number 7 that exist as a neighbor of nodes 2, 3, and 4. now again consider the iteration B in Red. Node 3 send the packet to node 4 and 7. At this moment nodes number 2, 3, 4, 5, and 7 already received the packet, but in iteration C, as node number 4 and node number 7 does not know that the packet reaches their neighbor, they blindly re-beaconing the packet.
  6. In order to rectify blind exchange, we extended the Esposito et al. algorithm. The routing table that each node maintain includes following items: 1- topic of interest, 2- list of publishers 3- list of subscribers 4- received list which is the list of message ids that received for this topic. In the packet structure we allocate a header part to let sender of a packet introduce the nodes that it already sent this packet to them, we called this part of header as a receivers list.
  7. To utilize the receiver list of the packets, each node must run an algorithm which we are going to introduce in this slide. Consider an environment with 10 nodes as presented in this slide, to deliver the publish message to the subscriber the publisher send it to its neighbors by beaconing the packet. Node number 1 receives the packet and starts to process it. It first checks if it is interested in this topic or not, if yes it would consume the data Meanwhile, it checks its routing table and finds interested neighbors in the received topic, besides it extracts the receivers list, and along with subscribers of this topic, it evaluates to see if it is necessary to beaconing the packet or not. As neighbors number 3 and 4 did not exist in the receivers list the node re-beaconing the packet to deliver it to nodes number 3 and 4.  
  8. But how the algorithm help to eliminate unwanted beaconing? Let's continue the previous example, Nodes in black are sender nodes at each iteration. Nodes in yellow are receivers nodes at each iteration. Nodes in white are not active to receive or send a message. new packets presented in green arrows, duplicate packets presented in blue and blind messages presented in red. In iteration 1 publisher send the packet to nodes number 1 and 2 in iteration 2 nodes number 1 and 2 re-beaconing the packet and in this iteration, nodes number 3, 4, 5, and 6 receive the packet, in this iteration node number 4 receives the same packet twice as it is in the transmission range of both node number 1 and node number 2. In iteration 3, node number 3 and node number 6 won't re-beaconing the packet, although they have a neighbor in their transmission rage. As they run the algorithm and node number 4 was in the receives list thus, node number 3 stop resending the packet, same happens for node number 6 as node number 5 is already received the packet. Finally, in iteration 4, the packet is delivered to the subscriber.  
  9. Cooja simulator utilized to evaluates the proposed solution vs. Esposito et al. approach. Cooja Simulator is a network simulator specifically designed for Wireless Sensor Networks. Motes simulated by extending java classes of Cooja motes.
  10. Here are configuration parameters used for evaluations. A sample simulation space is presented in this slide.
  11. energy consumption figure on the left side of the slide Shows the average energy consumption of nodes for transmitting and receiving packets. As the figure demonstrates our proposed solution shows 19.03 % improvements to decreasing energy consumption in the network size 25 and 33.78 % better performance in the network size 125. The reason for this improvement is that in the proposed approach each node makes a decision based on the received packet signatures in the header and decides to not beacon the message again the packet already sent to its neighbors. The next metric that we measured is the network traffic which fig. Network Traffic shows on the right side of the slide the evaluation result where the Y-axis presents the number of disseminated packets in the network and the X-axis presents the network size. As the figure demonstrates our proposed solution which on average reduces up to 28.12 % the number of disseminated packets in the network under the same network sizes in comparison to the Esposito et al approach. The reason is that by applying the algorithm to identify the eligible neighbors to receive the packet we prevent re-sending duplicates packets which as a result it reduces the communication overhead to prepare a new beacon packet and in addition, reduces the network traffic.
  12. The next measurement metric that we consider in our work to compare our proposed solution with the Esposito et al. approach is the registration delay which is the time that nodes in the network announced event topic(s) that they can publish event messages regard to them or express their interests in a certain topic(s). As the fig registration delay shows on the left side of the slide our proposed solution perform 19.94 % on average better in this criteria over the Esposito et al. approach, since by processing the received packets each node tries to not occupy the radio for transmitting redundant data thus relevant and necessary packets get the chance to transmit and in this way time to deliver the registration messages reduced. The final evaluation metric that we consider in this work is the time pass from the actual event to happen until the event reaches the desired subscribers. Fig event propagation delay demonstrates the evaluation result for these criteria. As the figure shows our proposed solution performs 10.33 % better in comparison to the Esposito et al. approach and delivered the event notifications to the subscribers faster since in our approach we reduced the network traffic and because of those events in our approach will not remain in the sending queue as much as the Esposito et al. approach.
  13. By adding metadata to the header of disseminated packets we empowered nodes in this protocol to wisely decide when re-beaconing the received packet. As evaluation showed, our method saved energy in comparison to the previous method. In addition, our method reduced the delivery time, which is important for monitoring applications.
  14. In the end, thank you for your attention.