Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
On Data Management in Pervasive Computing Environments written by Filip Perich, Anupam Joshi, Timothy Finin, and Yelena Yesha Published in IEEE Transactions on Knowledge and Data Engineering Vol. 16 No. 5 May 2004 Summerized By Sungchan Park @ IDS Lab. 2008-11-12 Overview The authors propose A data management framework For data-intensive, pervasive computing environments – Ad-hoc network environments – (Context-aware)Proactive caching Center for E-Business Technology Copyright 2008 by CEBT IDS Lab. Seminar - 2 Challenge in Pervasive Computing Infrastrucure-based wireless network is not suitable for dataintensive pervasive computing May lead to congestion in the wireless network and a bottleneck on the yellow page hardware Congestion! Center for E-Business Technology Copyright 2008 by CEBT IDS Lab. Seminar - 3 Challenge in Pervasive Computing, cont. Thus, decentralized scheme(Ad hoc network) is required. However, it is highly dynamic – Unstable, continuously changing… So we need new data management method addressing the dynamicity! Center for E-Business Technology Copyright 2008 by CEBT IDS Lab. Seminar - 4 Data Management Challenge in Ad hoc Network Dynamicity in Ad hoc network 1. Spatio-temporal variation of data and data source availability 2. Lack of global catalog and schema 3. No guarantee of reconnection 4. No guarantee of collaboration – Some devices can refuse collaboration Query answering is highly serendipitous! We want to avoid such a situation Each devices should gather information procatively! – predicting users’ future request. Center for E-Business Technology Copyright 2008 by CEBT IDS Lab. Seminar - 5 Motivating Scenario Scenario Bob made an appointment with Alice meeting at the mall. He input the appointment into his mobile device. He arrived the mall early so he shopped at the mall for a while. Upon Alice’s arrival, Bob asks his mobile device to suggest available restaurant in the mall. His device cached such information during the mall exploration predicting his future needs from his schedule. Center for E-Business Technology Copyright 2008 by CEBT IDS Lab. Seminar - 6 MoTAGU Data management framework for proactive caching It abstracts devices in terms of – Information Provider – Information Consumer – Information Manager: InforMa Center for E-Business Technology Copyright 2008 by CEBT IDS Lab. Seminar - 7 MoGATU: elements Information Provider Something can return data for request – Databases, … Its capability is described in DAML+OIL Registered in local InforMa – Reg=(s, p, I, t, a) s : service model p : process model(?) I : input restrictions t : lifetime of info a : willingness level of collaboration – Communicate with only local InforMa – And local InforMa advertise local providers to other devices in vicinity Center for E-Business Technology Copyright 2008 by CEBT IDS Lab. Seminar - 8 MoGATU: elements, cont. Information Consumer Something can query and update data Not advertised Send query to local InforMa Information Manager Maintain inforamtion – Local elements – Peer in vicinity – ID of devices Types of information they can provide Cache Advertise local information provider Center for E-Business Technology Copyright 2008 by CEBT IDS Lab. Seminar - 9 MoGATU: Big Picture I have A! I (may)need A! And I know you have one! O.K. Here are some A! : Device : Information Provider : Information Consumer : InforMa Center for E-Business Technology Copyright 2008 by CEBT IDS Lab. Seminar - 10 MoGATU: Query Processing Annotated query Query = (s, i) – – s : service model Requested data type DAML+OIL i : input value Requested value Center for E-Business Technology Copyright 2008 by CEBT IDS Lab. Seminar - 11 MoTAGU: Proactive Caching Creating standing queries for caching Using user profile Using current context InforMa contains simple rules to create queries – Ex. “when user is driving in a car with low on gas, query to search gas station” Cache replacement predicting needs Preallocate some portion cache space for (maybe required) types of data. Using utility functions specified in user profiles to score cache. – Not time stamp based like LRU Center for E-Business Technology Copyright 2008 by CEBT IDS Lab. Seminar - 12 MoTaGU: Routing Routing Modifies AODV alg. Best-effort basis – Attempts to rebuild disconnected routes, but do not guarantee message delivery Center for E-Business Technology Copyright 2008 by CEBT IDS Lab. Seminar - 13 Performance Experiments #1 Center for E-Business Technology Copyright 2008 by CEBT IDS Lab. Seminar - 14 Performance Experiments #2 Center for E-Business Technology Copyright 2008 by CEBT IDS Lab. Seminar - 15 Performance Experiments #3 Cost on Reasoning For 30 KB cache, 5ms per query after 100 runs – 4.56s for communication 27ms at faster device Reasoning is not dominant factor Center for E-Business Technology Copyright 2008 by CEBT IDS Lab. Seminar - 16 Interesting Points Another usage of context Using context for low level operation. Give logical explanation on “Why we should use ad hoc network for pervasive computing?” Center for E-Business Technology Copyright 2008 by CEBT IDS Lab. Seminar - 17 But I have some question… Q1: Is reasoning really not a big problem? “find resturant” from “appointment” is quite high level intelligence! Will this framework really work well on not made-up environment? Q2: Query for caching may lead to redundant communications, and power can be consumed more because of this approach. This point is not discussed properly. And machine intelligence is not perfect! With incorrect decisions, it is just a waste of power and network resources. Center for E-Business Technology Copyright 2008 by CEBT IDS Lab. Seminar - 18 Question Continues… Q3: Context awaring with info in single device is severly limited. Can it really aware context at useful level? Issuing additional query for building cache must not be allowed! “location” and “time” may be enough for useful service. Q4: The authors’ argument that “we cannot build data-intensive pervasive computing” looks quite logical. But is it really true? If this is true, mobile service can not use information on large database on TCP/IP network. it limits capabilities of pervasive computing severly. and devices not in vicinity also can make usefule collaboration! It needs more discrete study on this issue. Center for E-Business Technology Copyright 2008 by CEBT IDS Lab. Seminar - 19