SlideShare una empresa de Scribd logo
1 de 59
The Cougar Approach to
In-Network Query Processing
in Sensor Networks
Presented By:
Supervised By:

Dilini A. Muthumala
Dr. Jeevani Goonetillake
Authors
Yong Yao
• Software Engineer at Google
• Ph.D., Computer Science
Cornell University (2000 – 2007)

• Research Interests
– Databases
– Sensor Networks
– Distributed Systems
Johannes Gehrke
• University Professor
Department of Computer Science
Cornell University

• Research Interests
–Scalability in Computer Games and Simulations
–Data Privacy
–Data Mining
Motivation
• “Database Abstraction Layer” for Sensor
Networks
• Most popular sensor data management
middleware
• Introduces Database Abstraction Layer Concept
• Cited by 1185 (source: Google Scholar)
No. of citations

Year
Presentation Outline
• Introduction
• Database Abstraction Layer
• Architecture
• Research Problems
• Conclusion
Introduction
Wireless Sensor Network (WSN)
Limitations
• Communication
• Power Consumption
• Computation
• Uncertainty in Sensor Readings
WSN Applications
• Smart Buildings, Smart Homes
WSN Applications
• Wild Life Monitoring
WSN Applications
• Monitoring Vineyards
Future of WSN
Is Johannes
in his
office?

Internet
Future of WSN
Humidity

Temperature

Light
Motivation
1) Declarative queries are suited for WSN
interaction
SELECT Temp
FROM sensors

Complex Network
Motivation
2) Increasing network lifetime is the major
goal of any WSN application

WSN
Data Repository for
offline analysis
Database Abstraction Layer
Database Abstraction Layer
SELECT Temp, Humid,
NodeID
FROM sensors
SAMPLE PERIOD 5s

Base
Station

Node ID

Temperature

Humidity

1

127

44

2

119

47

3

120

45

4

123

40

5

120

46

WSN
Database Abstraction Layer
• Local computations are much cheaper
than communication
– Pushing partial computations out into the
network
Database Abstraction Layer
• Retrieves data only upon user demand
• No offline data storage

• Energy Efficient
Architecture
Architecture - Overview

Query Proxy Layer
Query Optimizer
Query Proxy Layer

Application Layer
Query Proxy Layer
Routing Layer
Other Layers
Query Optimizer
• Generates “Query Processing Plans”
• Refers to
– Catalog Information
– Query Specification

• Specifies
– Data Flow between sensors
– Computation Plan

• Finally, plan is disseminated to all sensors
Example
User Query
“Notify when
the average temperature
exceeds 35 °C”

WSN
Query Optimizer
“Notify when
the average temperature
exceeds 35 °C”

Query
Optimizer

Query Plan
Query Plan

Query Plan (QP)

• Designates the Leader node
– Where average value will be finalized
Leader Node
Query Plan

Query Plan (QP)

• Two computation plans
i. Leader Node
ii. Non-Leader Nodes
QP for Non-Leader Node

Non-Leader Node
QP for Non-Leader Node
In-network
Aggregation

Network
Interface

Sensor
Scan
QP for Non-Leader Node
In-network
Aggregation

1
Network
Interface

Sensor
Scan
Temperature = 38
°C
QP for Non-Leader Node
In-network
Aggregation

2
Network
Interface

Sensor
Scan
Temperature = 38
°C
QP for Non-Leader Node
In-network
Aggregation

Network
Interface

Sensor
Scan
QP for Non-Leader Node
In-network
Aggregation

2
Network
Interface
AVG Temperature
= 35 °C
Contributor Count = 1
AVG Temperature
= 36 °C
Contributor Count = 1

Sensor
Scan

Temperature = 38
°C
QP for Non-Leader Node
In-network
Aggregation

Network
Interface
AVG Temperature
= 35 °C
Contributor Count = 1
AVG Temperature
= 36 °C
Contributor Count = 1

Sensor
Scan

Temperature = 38
°C
In-Network Aggregation
AVG Temperature
= 35 °C
Contributor Count = 1

AVG Temperature
= 36 °C
Contributor Count = 1

Total Temperature
No of Contributors
AVG Temperature

Temperature = 38
°C

= 35*1 + 36*1 + 38
= 109
=3
= 109 / 3
= 36.33

AVG Temperature
36.33 °C
Contributor Count = 3

=
QP for Non-Leader Node
Towards the Leader

AVG Temperature
In-network
36.33 °C Aggregation
Contributor Count = 3

Network
Interface

=

Sensor
Scan
QP for Leader Node
Leader Node
QP for Leader Node
Towards the Leader
Select
AVG > threshold
Average Value
Aggregate
Operator (AVG)
Partially aggregated
results
Network
Interface
QP for Leader Node
Towards the Leader
Select
AVG > threshold
Average Value
Aggregate
Operator (AVG)

Network
Interface

Partially aggregated
results
1
QP for Leader Node
Leader Node
AVG Temperature
39 °C
Contributor Count = 2

=

AVG Temperature
36.33 °C
Contributor Count = 3

=
QP for Leader Node
Towards the Leader
Select
AVG > threshold
Average Value
Aggregate
Operator (AVG)
Partially aggregated
results
AVG Temperature
39 °C
Contributor Count = 2

=

Network
Interface

AVG Temperature
36.33 °C
Contributor Count = 3

=
Aggregate Operator
AVG Temperature
39 °C
Contributor Count = 2

=

AVG Temperature
36.33 °C
Contributor Count = 3

Total Temperature

= 39*2 + 36.33*3
= 186.99
No of Contributors = 5
AVG Temperature = 186.99 / 5
= 37.40
AVG Temperature
37.40 °C

=

=
QP for Leader Node
Towards the Leader
Select
AVG > threshold
Average Value
AVG Temperature
37.40 °C

=

Aggregate
Operator (AVG)
Partially aggregated
results
Network
Interface
QP for Leader Node
Towards the Leader
AVG Temperature
37.40 °C

=

Select
AVG > threshold

“Notify when
Threshold = 35 °C
the average temperature
exceeds 35 °C”

Average Value
Aggregate
Operator (AVG)
Partially aggregated
results
Network
Interface
User Query Result

ALERT!
Temperature exceeds 35 °C

WSN
Research Problems
1. Aggregation
• Most popular computation and
communication pattern
• Two important issues
– Leader Selection
– Data Delivery
Leader Selection
Requirements for the policy
i. Dynamically-maintained Leader
ii. Physically advantageous location
Leader Selection
Requirements for the policy
i. Dynamically-maintained Leader
ii. Physically advantageous location
Data Delivery
“How should the data be delivered from
source nodes to the leader?”
– Send all data to leader?
– Should intermediate nodes participate?
2. Query Language
“What types of queries should be
supported?”
3. Query Optimization
• Cost of query plan has changed
• Energy should be the focus
• Reactive to changes in catalog information
– Changes in topology
– Power level at sensor nodes
4. Catalog Management
• Maintained at the server
• Provides Meta Data about the network
• Question: What is the best way to main
the catalog?
5. Multi-Query Optimization
• Occurs when the WSN is shared
• Users may pose similar queries
• Share common data among the users
Conclusion
• Interacting with a WSN is made easy
• Database Abstraction layer provides
– Friendly Interface
– Efficient scheme to reduce energy consumption

• Research problems need to be carefully
addressed
My Views on the Paper
• Presents a concept
• Easy-to-understand
• Flow of the paper sometimes confuse the
reader
Q&A

Más contenido relacionado

La actualidad más candente

wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar pptEisha Madhwal
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSNMahbubur Rahman
 
WSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingWSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingArunChokkalingam
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkKarthik
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingHabibur Rahman
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksSayed Chhattan Shah
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsnDeepaDasarathan
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networksPiyush Mittal
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...ArunChokkalingam
 
Study of Leach Protocol- A Review
Study of Leach Protocol- A ReviewStudy of Leach Protocol- A Review
Study of Leach Protocol- A ReviewEditor IJMTER
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksMd Waresul Islam
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor NetworkGanesh Khadsan
 
Transport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networksTransport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networksRushin Shah
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)rajivagarwal23dei
 
Design Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDesign Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDushhyant Kumar
 

La actualidad más candente (20)

wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
 
Mac
MacMac
Mac
 
IS-95 Cdma
IS-95 CdmaIS-95 Cdma
IS-95 Cdma
 
WSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingWSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient Routing
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor Network
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
 
Routing protocols in ad hoc network
Routing protocols in ad hoc networkRouting protocols in ad hoc network
Routing protocols in ad hoc network
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
 
Study of Leach Protocol- A Review
Study of Leach Protocol- A ReviewStudy of Leach Protocol- A Review
Study of Leach Protocol- A Review
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networks
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
Transport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networksTransport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networks
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
 
Design Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDesign Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC Protocol
 

Destacado

Digital work in an analog world
Digital work in an analog worldDigital work in an analog world
Digital work in an analog worldDilini Prasangika
 
Surfing from the WSNs to the IoT, 27nov2014
Surfing from the WSNs to the IoT,  27nov2014Surfing from the WSNs to the IoT,  27nov2014
Surfing from the WSNs to the IoT, 27nov2014Mohamed Mostafa
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issuesMaha Saad
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksrajatmal4
 

Destacado (7)

Digital work in an analog world
Digital work in an analog worldDigital work in an analog world
Digital work in an analog world
 
Med wsn
Med wsnMed wsn
Med wsn
 
Surfing from the WSNs to the IoT, 27nov2014
Surfing from the WSNs to the IoT,  27nov2014Surfing from the WSNs to the IoT,  27nov2014
Surfing from the WSNs to the IoT, 27nov2014
 
Basic Sensors Technology
Basic Sensors TechnologyBasic Sensors Technology
Basic Sensors Technology
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 

Similar a The cougar approach to in-network query processing in sensor networks

LEGaTO: Low-Energy Heterogeneous Computing Use of AI in the project
LEGaTO: Low-Energy Heterogeneous Computing Use of AI in the projectLEGaTO: Low-Energy Heterogeneous Computing Use of AI in the project
LEGaTO: Low-Energy Heterogeneous Computing Use of AI in the projectLEGATO project
 
adaptive_ecg_cdr_edittedforpublic.pptx
adaptive_ecg_cdr_edittedforpublic.pptxadaptive_ecg_cdr_edittedforpublic.pptx
adaptive_ecg_cdr_edittedforpublic.pptxssuser6f1a8e1
 
A Framework for Probabilistic Building Energy Modeling
A Framework for Probabilistic Building Energy ModelingA Framework for Probabilistic Building Energy Modeling
A Framework for Probabilistic Building Energy ModelingLukas Lundström
 
Intelligent Placement of Datacenter for Internet Services
Intelligent Placement of Datacenter for Internet Services Intelligent Placement of Datacenter for Internet Services
Intelligent Placement of Datacenter for Internet Services Arinto Murdopo
 
Small Embedded Data Center Pilot Program Webinar
Small Embedded Data Center Pilot Program WebinarSmall Embedded Data Center Pilot Program Webinar
Small Embedded Data Center Pilot Program WebinarLester Shen
 
Asynchronous design with Spring and RTI: 1M events per second
Asynchronous design with Spring and RTI: 1M events per secondAsynchronous design with Spring and RTI: 1M events per second
Asynchronous design with Spring and RTI: 1M events per secondStuart (Pid) Williams
 
Distributed Checkpointing on an Enterprise Desktop Grid
Distributed Checkpointing on an Enterprise Desktop GridDistributed Checkpointing on an Enterprise Desktop Grid
Distributed Checkpointing on an Enterprise Desktop Gridbrent.wilson
 
Kickstart your Kafka with Faker Data | Francesco Tisiot, Aiven.io
Kickstart your Kafka with Faker Data | Francesco Tisiot, Aiven.ioKickstart your Kafka with Faker Data | Francesco Tisiot, Aiven.io
Kickstart your Kafka with Faker Data | Francesco Tisiot, Aiven.ioHostedbyConfluent
 
대용량 데이터 분석을 위한 병렬 Clustering 알고리즘 최적화
대용량 데이터 분석을 위한 병렬 Clustering 알고리즘 최적화대용량 데이터 분석을 위한 병렬 Clustering 알고리즘 최적화
대용량 데이터 분석을 위한 병렬 Clustering 알고리즘 최적화NAVER Engineering
 
Architectural Optimizations for High Performance and Energy Efficient Smith-W...
Architectural Optimizations for High Performance and Energy Efficient Smith-W...Architectural Optimizations for High Performance and Energy Efficient Smith-W...
Architectural Optimizations for High Performance and Energy Efficient Smith-W...NECST Lab @ Politecnico di Milano
 
Sensor Organism project presentation
Sensor Organism project presentationSensor Organism project presentation
Sensor Organism project presentationNaums Mogers
 
Big Data Visualization
Big Data VisualizationBig Data Visualization
Big Data Visualizationbigdataviz_bay
 
Kitchen Occupation Project Presentation
Kitchen Occupation Project PresentationKitchen Occupation Project Presentation
Kitchen Occupation Project PresentationMattiasTiger
 
Automated Discovery of Performance Regressions in Enterprise Applications
Automated Discovery of Performance Regressions in Enterprise ApplicationsAutomated Discovery of Performance Regressions in Enterprise Applications
Automated Discovery of Performance Regressions in Enterprise ApplicationsSAIL_QU
 

Similar a The cougar approach to in-network query processing in sensor networks (20)

FPGA-enhanced Bioinformatics @ NECST
FPGA-enhanced Bioinformatics @ NECSTFPGA-enhanced Bioinformatics @ NECST
FPGA-enhanced Bioinformatics @ NECST
 
LEGaTO: Low-Energy Heterogeneous Computing Use of AI in the project
LEGaTO: Low-Energy Heterogeneous Computing Use of AI in the projectLEGaTO: Low-Energy Heterogeneous Computing Use of AI in the project
LEGaTO: Low-Energy Heterogeneous Computing Use of AI in the project
 
adaptive_ecg_cdr_edittedforpublic.pptx
adaptive_ecg_cdr_edittedforpublic.pptxadaptive_ecg_cdr_edittedforpublic.pptx
adaptive_ecg_cdr_edittedforpublic.pptx
 
A Framework for Probabilistic Building Energy Modeling
A Framework for Probabilistic Building Energy ModelingA Framework for Probabilistic Building Energy Modeling
A Framework for Probabilistic Building Energy Modeling
 
Intelligent Placement of Datacenter for Internet Services
Intelligent Placement of Datacenter for Internet Services Intelligent Placement of Datacenter for Internet Services
Intelligent Placement of Datacenter for Internet Services
 
Small Embedded Data Center Pilot
Small Embedded Data Center PilotSmall Embedded Data Center Pilot
Small Embedded Data Center Pilot
 
Small Embedded Data Center Pilot Program Webinar
Small Embedded Data Center Pilot Program WebinarSmall Embedded Data Center Pilot Program Webinar
Small Embedded Data Center Pilot Program Webinar
 
Thesis
ThesisThesis
Thesis
 
Asynchronous design with Spring and RTI: 1M events per second
Asynchronous design with Spring and RTI: 1M events per secondAsynchronous design with Spring and RTI: 1M events per second
Asynchronous design with Spring and RTI: 1M events per second
 
Research Issues on WSN
Research Issues on WSNResearch Issues on WSN
Research Issues on WSN
 
Distributed Checkpointing on an Enterprise Desktop Grid
Distributed Checkpointing on an Enterprise Desktop GridDistributed Checkpointing on an Enterprise Desktop Grid
Distributed Checkpointing on an Enterprise Desktop Grid
 
rerngvit_phd_seminar
rerngvit_phd_seminarrerngvit_phd_seminar
rerngvit_phd_seminar
 
Kickstart your Kafka with Faker Data | Francesco Tisiot, Aiven.io
Kickstart your Kafka with Faker Data | Francesco Tisiot, Aiven.ioKickstart your Kafka with Faker Data | Francesco Tisiot, Aiven.io
Kickstart your Kafka with Faker Data | Francesco Tisiot, Aiven.io
 
대용량 데이터 분석을 위한 병렬 Clustering 알고리즘 최적화
대용량 데이터 분석을 위한 병렬 Clustering 알고리즘 최적화대용량 데이터 분석을 위한 병렬 Clustering 알고리즘 최적화
대용량 데이터 분석을 위한 병렬 Clustering 알고리즘 최적화
 
Energy Efficiency in Data Centers
Energy Efficiency in Data CentersEnergy Efficiency in Data Centers
Energy Efficiency in Data Centers
 
Architectural Optimizations for High Performance and Energy Efficient Smith-W...
Architectural Optimizations for High Performance and Energy Efficient Smith-W...Architectural Optimizations for High Performance and Energy Efficient Smith-W...
Architectural Optimizations for High Performance and Energy Efficient Smith-W...
 
Sensor Organism project presentation
Sensor Organism project presentationSensor Organism project presentation
Sensor Organism project presentation
 
Big Data Visualization
Big Data VisualizationBig Data Visualization
Big Data Visualization
 
Kitchen Occupation Project Presentation
Kitchen Occupation Project PresentationKitchen Occupation Project Presentation
Kitchen Occupation Project Presentation
 
Automated Discovery of Performance Regressions in Enterprise Applications
Automated Discovery of Performance Regressions in Enterprise ApplicationsAutomated Discovery of Performance Regressions in Enterprise Applications
Automated Discovery of Performance Regressions in Enterprise Applications
 

Último

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 

Último (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

The cougar approach to in-network query processing in sensor networks

Notas del editor

  1. I think all of you are aware of the concept “Database Abstraction Layer for Sensor Networks”. As you can see in the citation-count vs. year graph, it has being most cited in 2008 Having this motivation in mind, let’s move on.
  2. Linking: Besides these limitations, WSNs are successfully used in a wide variety of application domains.
  3. At the time of writing this paper, the authors have percieved the future of
  4. Seeing this future, the authors identified two facts that motivated them to come up with the Database Approach for WSNs.
  5. The first reason is As the popularity of the WSNs grow, they may be used by technically expert users as well as non-expert users. To cater such a diversified user group, it would be useful if a middleware can provide an abstract view of the WSN that hides the underlying messy details of the WSN. By giving users a declarative query interface, they can issue queries without even knowing how the data is generated in the sensor network, how they are processed, and how the answers are computed.
  6. Link to the next slide  Motivated by these facts and as a solution to these issues, the Database Abstraction Layer for WSNs was introduced.
  7. The Database Abstraction Layer allows the users to issue SQL-like queries to retrieve data from the WSN. This Layer hides all the complex and messy details of the underlying WSN by giving users a feeling like they are using a traditional database management system. Further,
  8. The architecture of the Database Abstraction Layer spans over two main regions: Gateway node WSN Note that here the gateway node is excluded from the WSN and it is considered as an external entity.
  9. Query Optimizer generates “Query Processing Plans” upon receiving a query from a user.
  10. The query plan for a non-leader node has 3 components:
  11. The query plan for a non-leader node has 3 components:
  12. The query plan for a non-leader node has 3 components:
  13. The query plan for a non-leader node has 3 components:
  14. The query plan for a non-leader node has 3 components:
  15. The query plan for a non-leader node has 3 components:
  16. The query plan for a non-leader node has 3 components:
  17. The query plan for a non-leader node has 3 components:
  18. The resulting aggregate value from the Aggregate Operator step will be passed to the next step: Selection
  19. The resulting aggregate value from the Aggregate Operator step will be passed to the next step: Selection
  20. Most popular computation and communication pattern for WSN This is the same operation that we considered in the example. To support aggregation we have to address two research problems: Leader Selection Data Delivery
  21. With the introduction of such a layer, However consequent to that several research problems have arrived that need to be addressed to achieve the fullest potential of a DB Layer.