SlideShare a Scribd company logo
1 of 14
Distributed coordination protocol for event
data exchange in IoT monitoring applications
Presented by:
Behnam Khazael
Author with Affiliation:
Dr. Hadi Tabatabaee Malazi
Overview
Introduction
Problem statement
Related work
Proposed distributed coordination protocol
Evaluation
Conclusion
2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT)
2/14
Introduction
• Internet of Things (IoT) in monitoring applications
• IoT applications such as waste management, fire monitoring, and traffic monitoring.
• In-place monitoring devices need to capture events as soon as they happen.
• Broker-less publish/subscribe architecture in designing the Internet of things (IoT) monitoring applications.
2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT)
3/14
Problem Statement
• Designing a distributed coordination protocol for event data exchange in IoT
monitoring applications is a challenging task:
• Low computation capacity IoT devices.
• IoT devices mostly operating with batteries.
• Most of the energy of IoT devices is consumed on packet transmission.
• Keeping each node in the network updated needs to exchange a high number of control
messages.
2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT)
4/14
Previous Work:
• Esposito et al.* proposed solution.
• The researchers considered a broker-less publish/subscribe architecture.
• To minimize the communication overhead, message beaconing was utilized to disseminate messages in the
network.
• Issue is the blind re-beaconing
2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT)
* “Event-based sensor data exchange and fusion in the Internet of Things environments”, Journal of Parallel and Distributed Computing, vol. 118, pp. 328–343, 2018. 5/14
Proposed Distributed coordination protocol
• Routing Table structure in each node:
• The topic of the interest
• Publishers' list
• Subscribers’ list
• Received list
• Packet structure:
• Header
• Source Address
• Destination Address (Broadcast)  Beaconing
• Message-ID
• Receivers list
• Message Type (advertisement, subscribe, publish, update, leave)
• Body
• Topic
• Data
2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT)
Our proposed coordination protocol built on top of Esposito et al. proposed solution.
6/14
Proposed Distributed coordination protocol
(Cont.)
Decision support algorithm
2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT)
1
2
<header>
…
<receivers><item>1</item> <item>2</item></receivers>
…
</header>
1
3
4
5
6
7
8
9
Topic Subscribers Publishers
temp 2, 3, 4 0
Is it necessary to send the packet?
Algorithm to support.
-> list of subscribers
-> receiver list
 3, 4
 Yes set the packet. (beaconing)
7/14
Proposed Distributed coordination protocol
(Cont.)
How the algorithm help to reduce
unwanted publish messages?
2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT)
1
2
3
4
5
6
7
8
9
1
2
3
4
5
6
7
8
9
1
2
3
4
5
6
7
8
9
1
2
3
4
5
6
7
8
9
8/14
2
3 4
1
Evaluation
• Cooja simulator utilized to evaluates the proposed solution vs. Esposito et al. approach.
• Cooja Simulator is a network simulator specifically designed for Wireless Sensor Networks.
• Motes simulated by extending java classes of Cooja motes.
2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT)
9/14
Evaluation (Cont.)
• Configuration Parameters considered as follow:
• Working space with 100 units height and 100 unites widths considered for the evaluation.
• Transition range of each mote set to 30 unites.
• Number of nodes for each evaluations ranges from 25 to 125 (publishers and subscribers).
• 1000 events generated during 10 minutes of simulation.
2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT)
10/14
Evaluation (Cont.)
Energy consumption comparison (up to 33% ) Network traffic comparison(on average 28% )
2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT)
11/14
Evaluation (Cont.)
Registration delay comparison (on average 19% ) Packet delivery delay comparison(on average 10% )
2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT)
12/14
Conclusion
• We utilized headers of the packets in the dissemination of the events to improve packet dissemination in a
distributed event data exchange protocol.
• As evaluation showed that our method increased the longevity of the network.
• As evaluation showed that our method reduces the time that packets wait in the sending queue.
• Our method Imposed additional computation in the process of packets.
• In future works, we focus on extending this approach to bring in-network processing to determine complex events
in a distributed manner.
2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT)
13/14
Questions?
Thank you for your attention!
14/14

More Related Content

What's hot

What's hot (20)

3.pillars of embedded io t and physical devices
3.pillars of embedded io t and physical devices3.pillars of embedded io t and physical devices
3.pillars of embedded io t and physical devices
 
IoT heap 1
IoT heap 1IoT heap 1
IoT heap 1
 
IoT-A ARM
IoT-A ARMIoT-A ARM
IoT-A ARM
 
SmartSociety – A Platform for Collaborative People-Machine Computation
SmartSociety – A Platform for Collaborative People-Machine ComputationSmartSociety – A Platform for Collaborative People-Machine Computation
SmartSociety – A Platform for Collaborative People-Machine Computation
 
Ppt 3 - IOT logic design
Ppt   3 - IOT logic designPpt   3 - IOT logic design
Ppt 3 - IOT logic design
 
IoT Analytics from Edge to Cloud - using IBM Informix
IoT Analytics from Edge to Cloud - using IBM InformixIoT Analytics from Edge to Cloud - using IBM Informix
IoT Analytics from Edge to Cloud - using IBM Informix
 
Digital economy presentation
Digital economy presentationDigital economy presentation
Digital economy presentation
 
Lecture 17
Lecture 17Lecture 17
Lecture 17
 
Soldatos io t-academy-cosmote-231117-v-final
Soldatos io t-academy-cosmote-231117-v-finalSoldatos io t-academy-cosmote-231117-v-final
Soldatos io t-academy-cosmote-231117-v-final
 
IPCA - Intelligent Protocol Content Analysis
IPCA - Intelligent Protocol Content AnalysisIPCA - Intelligent Protocol Content Analysis
IPCA - Intelligent Protocol Content Analysis
 
Domain specific IoT
Domain specific IoTDomain specific IoT
Domain specific IoT
 
Industrial Pioneers Days - Machine Learning
Industrial Pioneers Days - Machine LearningIndustrial Pioneers Days - Machine Learning
Industrial Pioneers Days - Machine Learning
 
Why Gateways are Important in Your IoT Architecture
Why Gateways are Important in Your IoT ArchitectureWhy Gateways are Important in Your IoT Architecture
Why Gateways are Important in Your IoT Architecture
 
Lecture 15
Lecture 15Lecture 15
Lecture 15
 
Edge computing and its role in architecting IoT
Edge computing and its role in architecting IoTEdge computing and its role in architecting IoT
Edge computing and its role in architecting IoT
 
An IoT gateway centric architecture to provide novel m2m services
An IoT gateway centric architecture to provide novel m2m servicesAn IoT gateway centric architecture to provide novel m2m services
An IoT gateway centric architecture to provide novel m2m services
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
Spatineo Webinar: Shedding Light on INSPIRE Conformity
Spatineo Webinar: Shedding Light on INSPIRE ConformitySpatineo Webinar: Shedding Light on INSPIRE Conformity
Spatineo Webinar: Shedding Light on INSPIRE Conformity
 
call for papers - International Conference on Networks & IOT (NeTIOT 2020)
call for papers - International Conference on Networks & IOT (NeTIOT 2020)call for papers - International Conference on Networks & IOT (NeTIOT 2020)
call for papers - International Conference on Networks & IOT (NeTIOT 2020)
 
IoT and m2m
IoT and m2mIoT and m2m
IoT and m2m
 

Similar to Distributed coordination protocol for event data exchange in IoT monitoring applications

European Green IT Webinar 2014 - Erasmus Mundus Master PERCCOM
European Green IT Webinar 2014 - Erasmus Mundus Master PERCCOMEuropean Green IT Webinar 2014 - Erasmus Mundus Master PERCCOM
European Green IT Webinar 2014 - Erasmus Mundus Master PERCCOM
GreenLabCenter
 

Similar to Distributed coordination protocol for event data exchange in IoT monitoring applications (20)

apidays LIVE Paris - Reconcile the European data strategy with Carbon Neutral...
apidays LIVE Paris - Reconcile the European data strategy with Carbon Neutral...apidays LIVE Paris - Reconcile the European data strategy with Carbon Neutral...
apidays LIVE Paris - Reconcile the European data strategy with Carbon Neutral...
 
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
 
Survey on IoT application layer protocols
Survey on IoT application layer protocolsSurvey on IoT application layer protocols
Survey on IoT application layer protocols
 
Rahul internet of things
Rahul internet of thingsRahul internet of things
Rahul internet of things
 
IoT Lab @COPELABS
IoT Lab @COPELABSIoT Lab @COPELABS
IoT Lab @COPELABS
 
Show and Tell - Data and Digitalisation, Digital Twins.pdf
Show and Tell - Data and Digitalisation, Digital Twins.pdfShow and Tell - Data and Digitalisation, Digital Twins.pdf
Show and Tell - Data and Digitalisation, Digital Twins.pdf
 
Internet of Things - Call presentations and hints from presenters
Internet of Things - Call presentations and hints from presentersInternet of Things - Call presentations and hints from presenters
Internet of Things - Call presentations and hints from presenters
 
European Green IT Webinar 2014 - Erasmus Mundus Master PERCCOM
European Green IT Webinar 2014 - Erasmus Mundus Master PERCCOMEuropean Green IT Webinar 2014 - Erasmus Mundus Master PERCCOM
European Green IT Webinar 2014 - Erasmus Mundus Master PERCCOM
 
Jarrar: Future Internet in Horizon 2020 Calls
Jarrar: Future Internet in Horizon 2020 CallsJarrar: Future Internet in Horizon 2020 Calls
Jarrar: Future Internet in Horizon 2020 Calls
 
Unified Communications in IoT, Evolutionary Aspects and the Role of Informati...
Unified Communications in IoT, Evolutionary Aspects and the Role of Informati...Unified Communications in IoT, Evolutionary Aspects and the Role of Informati...
Unified Communications in IoT, Evolutionary Aspects and the Role of Informati...
 
IRJET - Energy Efficient Approach for Data Aggregation in IoT
IRJET -  	  Energy Efficient Approach for Data Aggregation in IoTIRJET -  	  Energy Efficient Approach for Data Aggregation in IoT
IRJET - Energy Efficient Approach for Data Aggregation in IoT
 
GAIA and Alternative Networks
GAIA and Alternative NetworksGAIA and Alternative Networks
GAIA and Alternative Networks
 
Janet Network R&D Innovation - HEAnet / Juniper Innovation Day
Janet Network R&D Innovation - HEAnet / Juniper Innovation DayJanet Network R&D Innovation - HEAnet / Juniper Innovation Day
Janet Network R&D Innovation - HEAnet / Juniper Innovation Day
 
Classroom Shared Whiteboard System using Multicast Protocol
Classroom Shared Whiteboard System using Multicast ProtocolClassroom Shared Whiteboard System using Multicast Protocol
Classroom Shared Whiteboard System using Multicast Protocol
 
SDI to IP 2110 Transition Part 1
SDI to IP 2110 Transition Part 1SDI to IP 2110 Transition Part 1
SDI to IP 2110 Transition Part 1
 
ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...
ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...
ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...
 
Cyber Infrastructure for Research & Education in Canada. What is Canada's vis...
Cyber Infrastructure for Research & Education in Canada. What is Canada's vis...Cyber Infrastructure for Research & Education in Canada. What is Canada's vis...
Cyber Infrastructure for Research & Education in Canada. What is Canada's vis...
 
INTERPRETER – Local flexibility solutions leveraged by RD&I projects as syste...
INTERPRETER – Local flexibility solutions leveraged by RD&I projects as syste...INTERPRETER – Local flexibility solutions leveraged by RD&I projects as syste...
INTERPRETER – Local flexibility solutions leveraged by RD&I projects as syste...
 
Flexibility needs at system level and how RD&I projects are leveraging these ...
Flexibility needs at system level and how RD&I projects are leveraging these ...Flexibility needs at system level and how RD&I projects are leveraging these ...
Flexibility needs at system level and how RD&I projects are leveraging these ...
 
Fin fest 2014 - Internet of Things and APIs
Fin fest 2014 - Internet of Things and APIsFin fest 2014 - Internet of Things and APIs
Fin fest 2014 - Internet of Things and APIs
 

More from Maynooth University

A two-dimensional self-coordination mechanism of agents in a minority game
A two-dimensional self-coordination mechanism of agents in a minority gameA two-dimensional self-coordination mechanism of agents in a minority game
A two-dimensional self-coordination mechanism of agents in a minority game
Maynooth University
 
PAMS: A new position-aware multi-sensor dataset for human activity recognitio...
PAMS: A new position-aware multi-sensor dataset for human activity recognitio...PAMS: A new position-aware multi-sensor dataset for human activity recognitio...
PAMS: A new position-aware multi-sensor dataset for human activity recognitio...
Maynooth University
 
Delaunay based two-phase algorithm for connected cover in WSNs
Delaunay based two-phase algorithm for connected cover in WSNsDelaunay based two-phase algorithm for connected cover in WSNs
Delaunay based two-phase algorithm for connected cover in WSNs
Maynooth University
 

More from Maynooth University (8)

Evidential fine-grained event localization using Twitter
Evidential fine-grained event localization using TwitterEvidential fine-grained event localization using Twitter
Evidential fine-grained event localization using Twitter
 
A two-dimensional self-coordination mechanism of agents in a minority game
A two-dimensional self-coordination mechanism of agents in a minority gameA two-dimensional self-coordination mechanism of agents in a minority game
A two-dimensional self-coordination mechanism of agents in a minority game
 
PAMS: A new position-aware multi-sensor dataset for human activity recognitio...
PAMS: A new position-aware multi-sensor dataset for human activity recognitio...PAMS: A new position-aware multi-sensor dataset for human activity recognitio...
PAMS: A new position-aware multi-sensor dataset for human activity recognitio...
 
Delaunay based two-phase algorithm for connected cover in WSNs
Delaunay based two-phase algorithm for connected cover in WSNsDelaunay based two-phase algorithm for connected cover in WSNs
Delaunay based two-phase algorithm for connected cover in WSNs
 
Quality of Claim Metrics in Social Sensing Systems: A case study on IranDeal
Quality of Claim Metrics in Social Sensing Systems: A case study on IranDealQuality of Claim Metrics in Social Sensing Systems: A case study on IranDeal
Quality of Claim Metrics in Social Sensing Systems: A case study on IranDeal
 
NoSQL Data Architecture Patterns
NoSQL Data ArchitecturePatternsNoSQL Data ArchitecturePatterns
NoSQL Data Architecture Patterns
 
NoSQL Consepts
NoSQL ConseptsNoSQL Consepts
NoSQL Consepts
 
Chapter1: NoSQL: It’s about making intelligent choices
Chapter1: NoSQL: It’s about making intelligent choicesChapter1: NoSQL: It’s about making intelligent choices
Chapter1: NoSQL: It’s about making intelligent choices
 

Recently uploaded

introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
VishalKumarJha10
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
SHRMPro HRMS Software Solutions Presentation
SHRMPro HRMS Software Solutions PresentationSHRMPro HRMS Software Solutions Presentation
SHRMPro HRMS Software Solutions Presentation
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
%in Durban+277-882-255-28 abortion pills for sale in Durban
%in Durban+277-882-255-28 abortion pills for sale in Durban%in Durban+277-882-255-28 abortion pills for sale in Durban
%in Durban+277-882-255-28 abortion pills for sale in Durban
 

Distributed coordination protocol for event data exchange in IoT monitoring applications

  • 1. Distributed coordination protocol for event data exchange in IoT monitoring applications Presented by: Behnam Khazael Author with Affiliation: Dr. Hadi Tabatabaee Malazi
  • 2. Overview Introduction Problem statement Related work Proposed distributed coordination protocol Evaluation Conclusion 2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT) 2/14
  • 3. Introduction • Internet of Things (IoT) in monitoring applications • IoT applications such as waste management, fire monitoring, and traffic monitoring. • In-place monitoring devices need to capture events as soon as they happen. • Broker-less publish/subscribe architecture in designing the Internet of things (IoT) monitoring applications. 2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT) 3/14
  • 4. Problem Statement • Designing a distributed coordination protocol for event data exchange in IoT monitoring applications is a challenging task: • Low computation capacity IoT devices. • IoT devices mostly operating with batteries. • Most of the energy of IoT devices is consumed on packet transmission. • Keeping each node in the network updated needs to exchange a high number of control messages. 2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT) 4/14
  • 5. Previous Work: • Esposito et al.* proposed solution. • The researchers considered a broker-less publish/subscribe architecture. • To minimize the communication overhead, message beaconing was utilized to disseminate messages in the network. • Issue is the blind re-beaconing 2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT) * “Event-based sensor data exchange and fusion in the Internet of Things environments”, Journal of Parallel and Distributed Computing, vol. 118, pp. 328–343, 2018. 5/14
  • 6. Proposed Distributed coordination protocol • Routing Table structure in each node: • The topic of the interest • Publishers' list • Subscribers’ list • Received list • Packet structure: • Header • Source Address • Destination Address (Broadcast)  Beaconing • Message-ID • Receivers list • Message Type (advertisement, subscribe, publish, update, leave) • Body • Topic • Data 2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT) Our proposed coordination protocol built on top of Esposito et al. proposed solution. 6/14
  • 7. Proposed Distributed coordination protocol (Cont.) Decision support algorithm 2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT) 1 2 <header> … <receivers><item>1</item> <item>2</item></receivers> … </header> 1 3 4 5 6 7 8 9 Topic Subscribers Publishers temp 2, 3, 4 0 Is it necessary to send the packet? Algorithm to support. -> list of subscribers -> receiver list  3, 4  Yes set the packet. (beaconing) 7/14
  • 8. Proposed Distributed coordination protocol (Cont.) How the algorithm help to reduce unwanted publish messages? 2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT) 1 2 3 4 5 6 7 8 9 1 2 3 4 5 6 7 8 9 1 2 3 4 5 6 7 8 9 1 2 3 4 5 6 7 8 9 8/14 2 3 4 1
  • 9. Evaluation • Cooja simulator utilized to evaluates the proposed solution vs. Esposito et al. approach. • Cooja Simulator is a network simulator specifically designed for Wireless Sensor Networks. • Motes simulated by extending java classes of Cooja motes. 2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT) 9/14
  • 10. Evaluation (Cont.) • Configuration Parameters considered as follow: • Working space with 100 units height and 100 unites widths considered for the evaluation. • Transition range of each mote set to 30 unites. • Number of nodes for each evaluations ranges from 25 to 125 (publishers and subscribers). • 1000 events generated during 10 minutes of simulation. 2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT) 10/14
  • 11. Evaluation (Cont.) Energy consumption comparison (up to 33% ) Network traffic comparison(on average 28% ) 2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT) 11/14
  • 12. Evaluation (Cont.) Registration delay comparison (on average 19% ) Packet delivery delay comparison(on average 10% ) 2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT) 12/14
  • 13. Conclusion • We utilized headers of the packets in the dissemination of the events to improve packet dissemination in a distributed event data exchange protocol. • As evaluation showed that our method increased the longevity of the network. • As evaluation showed that our method reduces the time that packets wait in the sending queue. • Our method Imposed additional computation in the process of packets. • In future works, we focus on extending this approach to bring in-network processing to determine complex events in a distributed manner. 2020 11th International (Virtual) Conference on Information and Knowledge Technology (IKT) 13/14
  • 14. Questions? Thank you for your attention! 14/14

Editor's Notes

  1. In the name of God. Hello everyone. My name is Behnam Khazael, I’m a Ph.D. student at Shahid Beheshti University, under the supervision of Dr. Tabatabaee, my research interest includes complex event processing and middleware architectures for monitoring applications in smart cities. This research, with the title of “Distributed coordination protocol for event data exchange in IoT monitoring applications” is about an extended distributed coordination protocol that improved a number of metrics in event data dissemination for monitoring applications in smart cities.  
  2. Here is an overview of topics that we are going to address in this presentation. At first, in the Introduction section, we will introduce the environment of our research and explain solutions and applications. We will introduce the problem with the challenges that we are going to address, in the problem statement section. In the related work section, we elaborate in more detail on the current solution and its main drawback. We introduce our method and algorithm in the proposed distributed coordination protocol section. In the evaluations section, we will show the results of our experiments. And finally, in the conclusion section, we spot the goals that we achieved.
  3. 1- One of the major category of the Internet of Things (IoT) are monitoring applications. 2-1- For instance, in a smart city, a huge number of IoT devices are employed for various applications such as waste management, fire monitoring, and traffic monitoring. 2-2- Fire monitoring applications are a common applications that needs to continuously receive new data from sensors that deployed in the environment. 3- To establish the connection between consumers of sensors data and sensor nodes the publish-subscribe architectural styles utilized in designing the Internet of things (IoT) monitoring applications.
  4. 0- The IoT systems innately need to exchange data among connected devices to reach their objectives such as detecting a complex event, like fire. 0- Broker-less publish/subscribe architecture is one the most solutions utilized to exchange data among connected devices. 0- Designing a distributed coordination protocol for broker-less publish/subscribe systems is a challenging task as: 1- The IoT devices in these systems have low computation capacity and they are mostly operating with batteries which replacing them is not easy. 2- Most of the energy of IoT devices is consumed on packet transmission. 3- Keeping each node in the network updated regard to publishers and subscribers needs to exchange a high number of control messages. 3- thus, Designing an efficient communication protocol is challenging, message dissemination has to be done efficiently, which means that with minimum message passing the maximum information should exchange.
  5. Esposito et al. proposed a broker-less communication protocol for monitoring applications. In their solution, they considered that each node maintains a routing topic table to distribute the management of subscriptions. in order to reduce the communication overhead, they consider beaconing for message dissemination. as the middle figure shows, if we consider that node number 1 is the publisher the dissemination of packets based on beaconing would happen as follow: In iteration A which is presented in black color, by beaconing the message nodes 2 and 3 would receive the packet. At the nest iteration, the iteration “B”, which is presented in red, as only node number 3 has two other neighbors to send the packet two them, it would re-beaconing the packet. At the final iteration which is iteration C, node number 5 re-beaconing the packet to deliver it to its neighbor the node number 6. In this way, the packets disseminate in the network. Although the protocol is fully distributed but, re-beaconing the packet can drain the node energy and make the sending/receiving queue of nodes crowded. As the figure on the right side of the slide shows, consider a node with number 7 that exist as a neighbor of nodes 2, 3, and 4. now again consider the iteration B in Red. Node 3 send the packet to node 4 and 7. At this moment nodes number 2, 3, 4, 5, and 7 already received the packet, but in iteration C, as node number 4 and node number 7 does not know that the packet reaches their neighbor, they blindly re-beaconing the packet.
  6. In order to rectify blind exchange, we extended the Esposito et al. algorithm. The routing table that each node maintain includes following items: 1- topic of interest, 2- list of publishers 3- list of subscribers 4- received list which is the list of message ids that received for this topic. In the packet structure we allocate a header part to let sender of a packet introduce the nodes that it already sent this packet to them, we called this part of header as a receivers list.
  7. To utilize the receiver list of the packets, each node must run an algorithm which we are going to introduce in this slide. Consider an environment with 10 nodes as presented in this slide, to deliver the publish message to the subscriber the publisher send it to its neighbors by beaconing the packet. Node number 1 receives the packet and starts to process it. It first checks if it is interested in this topic or not, if yes it would consume the data Meanwhile, it checks its routing table and finds interested neighbors in the received topic, besides it extracts the receivers list, and along with subscribers of this topic, it evaluates to see if it is necessary to beaconing the packet or not. As neighbors number 3 and 4 did not exist in the receivers list the node re-beaconing the packet to deliver it to nodes number 3 and 4.  
  8. But how the algorithm help to eliminate unwanted beaconing? Let's continue the previous example, Nodes in black are sender nodes at each iteration. Nodes in yellow are receivers nodes at each iteration. Nodes in white are not active to receive or send a message. new packets presented in green arrows, duplicate packets presented in blue and blind messages presented in red. In iteration 1 publisher send the packet to nodes number 1 and 2 in iteration 2 nodes number 1 and 2 re-beaconing the packet and in this iteration, nodes number 3, 4, 5, and 6 receive the packet, in this iteration node number 4 receives the same packet twice as it is in the transmission range of both node number 1 and node number 2. In iteration 3, node number 3 and node number 6 won't re-beaconing the packet, although they have a neighbor in their transmission rage. As they run the algorithm and node number 4 was in the receives list thus, node number 3 stop resending the packet, same happens for node number 6 as node number 5 is already received the packet. Finally, in iteration 4, the packet is delivered to the subscriber.  
  9. Cooja simulator utilized to evaluates the proposed solution vs. Esposito et al. approach. Cooja Simulator is a network simulator specifically designed for Wireless Sensor Networks. Motes simulated by extending java classes of Cooja motes.
  10. Here are configuration parameters used for evaluations. A sample simulation space is presented in this slide.
  11. energy consumption figure on the left side of the slide Shows the average energy consumption of nodes for transmitting and receiving packets. As the figure demonstrates our proposed solution shows 19.03 % improvements to decreasing energy consumption in the network size 25 and 33.78 % better performance in the network size 125. The reason for this improvement is that in the proposed approach each node makes a decision based on the received packet signatures in the header and decides to not beacon the message again the packet already sent to its neighbors. The next metric that we measured is the network traffic which fig. Network Traffic shows on the right side of the slide the evaluation result where the Y-axis presents the number of disseminated packets in the network and the X-axis presents the network size. As the figure demonstrates our proposed solution which on average reduces up to 28.12 % the number of disseminated packets in the network under the same network sizes in comparison to the Esposito et al approach. The reason is that by applying the algorithm to identify the eligible neighbors to receive the packet we prevent re-sending duplicates packets which as a result it reduces the communication overhead to prepare a new beacon packet and in addition, reduces the network traffic.
  12. The next measurement metric that we consider in our work to compare our proposed solution with the Esposito et al. approach is the registration delay which is the time that nodes in the network announced event topic(s) that they can publish event messages regard to them or express their interests in a certain topic(s). As the fig registration delay shows on the left side of the slide our proposed solution perform 19.94 % on average better in this criteria over the Esposito et al. approach, since by processing the received packets each node tries to not occupy the radio for transmitting redundant data thus relevant and necessary packets get the chance to transmit and in this way time to deliver the registration messages reduced. The final evaluation metric that we consider in this work is the time pass from the actual event to happen until the event reaches the desired subscribers. Fig event propagation delay demonstrates the evaluation result for these criteria. As the figure shows our proposed solution performs 10.33 % better in comparison to the Esposito et al. approach and delivered the event notifications to the subscribers faster since in our approach we reduced the network traffic and because of those events in our approach will not remain in the sending queue as much as the Esposito et al. approach.
  13. By adding metadata to the header of disseminated packets we empowered nodes in this protocol to wisely decide when re-beaconing the received packet. As evaluation showed, our method saved energy in comparison to the previous method. In addition, our method reduced the delivery time, which is important for monitoring applications.
  14. In the end, thank you for your attention.