SlideShare a Scribd company logo
1 of 17
Download to read offline
1
Khorramshahr: A Scalable Peer to
Peer Architecture for Port Warehouse
Management System
2
01
03
02
Introduction
Problem Statement
Preliminaries of The Used Filters
04
06
05
The Architecture of Khorramshahr
Performance Evaluation
Conclustion
Outline
3
Internet of Things in
Smart Industry
Management of
products in huge
warehouse
Stock checking is
a time consuming
task and requires
considerable
effort
Product moves
from one
warehouse to
another
Port the key
gateway to
industrial products
Introduction
4
Innovations
Khorramshahr uses a peer to peer (P2P) architectural style
which makes it scalable in the number of transactions,
number of warehouses and the geographical distribution.
The double chord approach on both distributed hash tables
(product types and product information) is used, to facilitate
users from inside or outside of the port to access the
required information from different warehouses.
A distributed discovery service is designed to support access
to the product catalogs, stock and property checking.
Memory efficient data structures such as Bloom filter and
Quotient filter are utilized to reduce the response time and
memory usage. Chord based DHT is implemented with
both of the filters and the performances are analyzed
To increase the efficiency of the system in looking up
product types in object name server (ONS) which is usually
in variant, a client server architectural style with replicated
data repository is used. Therefore, Khorramshahr is a hybrid
architecture, which uses both P2P and client server
styles in different sections.
5
 Radio Frequency Identification (RFID)
 RFID Reader
Physical Components
Soft ware Components
 Middleware
 EPC Information Service (EPCIS)
 Object Name Service (ONS)
 Discovery Service (DS)
EPC Global Architecture
6
Problem Statement
W = {w1;w2; …; wm} w= warehouse (1)
T= {t1; t2; …; tn} T= good types (2)
G = {g1; g2; …; gx} G= goods (3)
Wti = {tij |t j ∈ T} (4)
C={c1, c2,…ck,…., cp} C= companies (5)
∩k=1 p Cwk = ∅ (7)
f (gj) = wi
G W (8)
Cwk = {wi |wi ∈ W} (6)
7
Dynamic Bloom Filter
Quotient Filter
Preliminaries of the used filters
1413121110987654321
00000000000000
Bloom filter A: a vector of bits initially all set to 0s
01011010010010
Programming phase: insert each element xi in S into the A, A[Hj(xi)]=1
x1 x2 x3
01011010010010
Querying phase: if all A[Hj(y)]=1 return Yes
with false positive probability, otherwise return No
y1 y2
y1 is definitely not a
member of S
y2 is a member of S
(false positive)
8
The Architecture of Khorramshahr
9
Physical Layer
Interface Layer
Application Layer
The Architecture of Khorramshahr
Product Serial No.
(16bit)
Product Type
(16bit)
Warehouse Prefix
(16bit)
The assigned ID format for each product in the port
EPC ID
(up to 111 bit)
Assigned ID
(48 bit)
The format of product ID in Khorramshahr architecture
10
The deployment view of the Khorramshahr
architecture
11
Handling Incoming
Shipments
Tracking a Stocked
Product
Handling Outgoing
Shipments
Stock List
The Architecture of Khorramshahr
Behavioral Model
12
Performance Evaluation
Simulation Tools OMNET++
Version 4.1
OverSim
( release 20101103)
ValueParameter
18000(s)Simulation Time (Global)
No churnNum Replica churn Type (Global)
10 MbpsEthernet Channel Data Rate (Global)
10(ms)Ethernet Channel Delay (Global)
[10000-50000]Num Get Request
60sTest Interval
300Test TTL
10(s)Failure Latency
[25-250]Number of Terminal
13
0.879
0.875 0.877 0.877
0.882
0.889
0.885 0.886
0.89 0.892
0.864
0.86 0.862
0.867 0.869
0.856
0.861
0.855 0.855
0.851
10000 20000 30000 40000 50000
Get Latency
Number of Request
Terminal 50
ODSA Base DHT Bloom Quotient
0.83
0.84
0.85
0.86
0.87
0.88
0.89
0.9
10000 20000 30000 40000 50000
Performance Comparison & Scalability
14
0.85
0.9
0.95
1
1.05
1.1
1.15
1.2
10000 20000 30000 40000 50000
Get Latency
Number of requests
Terminal 250
Base
Bloom
Quotient
ODSA
1.09
1.13
1.15 1.15
1.17
0.991 0.995 0.997 0.997
0.992
0.978
0.983 0.985 0.987 0.984
1.03
1.06
1.07 1.07
1.09
0.85
0.9
0.95
1
1.05
1.1
1.15
1.2
10000 20000 30000 40000 50000
Performance comparison & scalability
15
0
50
100
150
200
250
300
50 100 150 200 250
Required memory
Size (KB)
Number of Terminals
Memory efficiency
Base
Bloom
Quotient
ODSA
50.2
100.5
145
194.4
249.8
35.4
71.8
125
168.3
218.2
42.9
83.4
134.6
178.2
229.2
50.3
100.6
145
194
249
0
50
100
150
200
250
300
50 100 150 200 250
Memory Efficiency
16
0
0.002
0.004
0.006
0.008
0.01
0.012
0.014
0.016
10000 20000 30000 40000 50000
False positive
Rate(%)
Number of requests
False Positive Rate
Bloom
Quotient
0.015
0.012
0.011
0.012
0.011
0.0011 0.0011
0.0015 0.0017
0.0011
0
0.002
0.004
0.006
0.008
0.01
0.012
0.014
0.016
10000 20000 30000 40000 50000
False Positive Rate
17
Conclusion
• New architecture warehouse management
• Architecture uses a hybrid of P2P and client server paradigms
• The architecture is scalable in terms of the number of requests
and the number of warehouses
• To boost the lookup procedure two different filters( Bloom and
Quotient filters)

More Related Content

Viewers also liked

Federated Cloud Computing - The OpenNebula Experience v1.0s
Federated Cloud Computing  - The OpenNebula Experience v1.0sFederated Cloud Computing  - The OpenNebula Experience v1.0s
Federated Cloud Computing - The OpenNebula Experience v1.0sIgnacio M. Llorente
 
IEEE CCNC 2011: Kalman Graffi - LifeSocial.KOM: A Secure and P2P-based Soluti...
IEEE CCNC 2011: Kalman Graffi - LifeSocial.KOM: A Secure and P2P-based Soluti...IEEE CCNC 2011: Kalman Graffi - LifeSocial.KOM: A Secure and P2P-based Soluti...
IEEE CCNC 2011: Kalman Graffi - LifeSocial.KOM: A Secure and P2P-based Soluti...Kalman Graffi
 
Performance evaluation methods for P2P overlays
Performance evaluation methods for P2P overlaysPerformance evaluation methods for P2P overlays
Performance evaluation methods for P2P overlaysKnut-Helge Vik
 
Tutorial 3 getting started with omnet
Tutorial 3   getting started with omnetTutorial 3   getting started with omnet
Tutorial 3 getting started with omnetMohd Batati
 
The Modern Data Architecture for Predictive Analytics with Hortonworks and Re...
The Modern Data Architecture for Predictive Analytics with Hortonworks and Re...The Modern Data Architecture for Predictive Analytics with Hortonworks and Re...
The Modern Data Architecture for Predictive Analytics with Hortonworks and Re...Revolution Analytics
 
Pernyataan masalah
Pernyataan masalahPernyataan masalah
Pernyataan masalahwmkfirdaus
 
Lambda architecture @ Indix
Lambda architecture @ IndixLambda architecture @ Indix
Lambda architecture @ IndixRajesh Muppalla
 
Problem Solving and Decision Making
Problem Solving and Decision MakingProblem Solving and Decision Making
Problem Solving and Decision MakingIbrahim M. Morsy
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networkingicanhasfay
 
Seminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaSeminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaPrashant Gupta
 
Structured Approach to Solution Architecture
Structured Approach to Solution ArchitectureStructured Approach to Solution Architecture
Structured Approach to Solution ArchitectureAlan McSweeney
 
Managing warehouse operations. How to manage and run warehouse operations by ...
Managing warehouse operations. How to manage and run warehouse operations by ...Managing warehouse operations. How to manage and run warehouse operations by ...
Managing warehouse operations. How to manage and run warehouse operations by ...Omar Youssef
 

Viewers also liked (14)

Federated Cloud Computing - The OpenNebula Experience v1.0s
Federated Cloud Computing  - The OpenNebula Experience v1.0sFederated Cloud Computing  - The OpenNebula Experience v1.0s
Federated Cloud Computing - The OpenNebula Experience v1.0s
 
IEEE CCNC 2011: Kalman Graffi - LifeSocial.KOM: A Secure and P2P-based Soluti...
IEEE CCNC 2011: Kalman Graffi - LifeSocial.KOM: A Secure and P2P-based Soluti...IEEE CCNC 2011: Kalman Graffi - LifeSocial.KOM: A Secure and P2P-based Soluti...
IEEE CCNC 2011: Kalman Graffi - LifeSocial.KOM: A Secure and P2P-based Soluti...
 
Introduction P2p
Introduction P2pIntroduction P2p
Introduction P2p
 
Performance evaluation methods for P2P overlays
Performance evaluation methods for P2P overlaysPerformance evaluation methods for P2P overlays
Performance evaluation methods for P2P overlays
 
Tutorial 3 getting started with omnet
Tutorial 3   getting started with omnetTutorial 3   getting started with omnet
Tutorial 3 getting started with omnet
 
The Modern Data Architecture for Predictive Analytics with Hortonworks and Re...
The Modern Data Architecture for Predictive Analytics with Hortonworks and Re...The Modern Data Architecture for Predictive Analytics with Hortonworks and Re...
The Modern Data Architecture for Predictive Analytics with Hortonworks and Re...
 
Pernyataan masalah
Pernyataan masalahPernyataan masalah
Pernyataan masalah
 
Lambda architecture @ Indix
Lambda architecture @ IndixLambda architecture @ Indix
Lambda architecture @ Indix
 
Problem Solving and Decision Making
Problem Solving and Decision MakingProblem Solving and Decision Making
Problem Solving and Decision Making
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
 
Seminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaSeminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant Gupta
 
Structured Approach to Solution Architecture
Structured Approach to Solution ArchitectureStructured Approach to Solution Architecture
Structured Approach to Solution Architecture
 
How to write a statement problem
How to write a statement problemHow to write a statement problem
How to write a statement problem
 
Managing warehouse operations. How to manage and run warehouse operations by ...
Managing warehouse operations. How to manage and run warehouse operations by ...Managing warehouse operations. How to manage and run warehouse operations by ...
Managing warehouse operations. How to manage and run warehouse operations by ...
 

More from Maynooth University

Distributed coordination protocol for event data exchange in IoT monitoring a...
Distributed coordination protocol for event data exchange in IoT monitoring a...Distributed coordination protocol for event data exchange in IoT monitoring a...
Distributed coordination protocol for event data exchange in IoT monitoring a...Maynooth University
 
Tennis stroke detection using inertial data of a smartwatchtion
Tennis stroke detection using inertial data of a smartwatchtionTennis stroke detection using inertial data of a smartwatchtion
Tennis stroke detection using inertial data of a smartwatchtionMaynooth University
 
Evidential fine-grained event localization using Twitter
Evidential fine-grained event localization using TwitterEvidential fine-grained event localization using Twitter
Evidential fine-grained event localization using TwitterMaynooth University
 
A two-dimensional self-coordination mechanism of agents in a minority game
A two-dimensional self-coordination mechanism of agents in a minority gameA two-dimensional self-coordination mechanism of agents in a minority game
A two-dimensional self-coordination mechanism of agents in a minority gameMaynooth University
 
PAMS: A new position-aware multi-sensor dataset for human activity recognitio...
PAMS: A new position-aware multi-sensor dataset for human activity recognitio...PAMS: A new position-aware multi-sensor dataset for human activity recognitio...
PAMS: A new position-aware multi-sensor dataset for human activity recognitio...Maynooth University
 
Delaunay based two-phase algorithm for connected cover in WSNs
Delaunay based two-phase algorithm for connected cover in WSNsDelaunay based two-phase algorithm for connected cover in WSNs
Delaunay based two-phase algorithm for connected cover in WSNsMaynooth University
 
NoSQL Data Architecture Patterns
NoSQL Data ArchitecturePatternsNoSQL Data ArchitecturePatterns
NoSQL Data Architecture PatternsMaynooth University
 
Chapter1: NoSQL: It’s about making intelligent choices
Chapter1: NoSQL: It’s about making intelligent choicesChapter1: NoSQL: It’s about making intelligent choices
Chapter1: NoSQL: It’s about making intelligent choicesMaynooth University
 

More from Maynooth University (9)

Distributed coordination protocol for event data exchange in IoT monitoring a...
Distributed coordination protocol for event data exchange in IoT monitoring a...Distributed coordination protocol for event data exchange in IoT monitoring a...
Distributed coordination protocol for event data exchange in IoT monitoring a...
 
Tennis stroke detection using inertial data of a smartwatchtion
Tennis stroke detection using inertial data of a smartwatchtionTennis stroke detection using inertial data of a smartwatchtion
Tennis stroke detection using inertial data of a smartwatchtion
 
Evidential fine-grained event localization using Twitter
Evidential fine-grained event localization using TwitterEvidential fine-grained event localization using Twitter
Evidential fine-grained event localization using Twitter
 
A two-dimensional self-coordination mechanism of agents in a minority game
A two-dimensional self-coordination mechanism of agents in a minority gameA two-dimensional self-coordination mechanism of agents in a minority game
A two-dimensional self-coordination mechanism of agents in a minority game
 
PAMS: A new position-aware multi-sensor dataset for human activity recognitio...
PAMS: A new position-aware multi-sensor dataset for human activity recognitio...PAMS: A new position-aware multi-sensor dataset for human activity recognitio...
PAMS: A new position-aware multi-sensor dataset for human activity recognitio...
 
Delaunay based two-phase algorithm for connected cover in WSNs
Delaunay based two-phase algorithm for connected cover in WSNsDelaunay based two-phase algorithm for connected cover in WSNs
Delaunay based two-phase algorithm for connected cover in WSNs
 
NoSQL Data Architecture Patterns
NoSQL Data ArchitecturePatternsNoSQL Data ArchitecturePatterns
NoSQL Data Architecture Patterns
 
NoSQL Consepts
NoSQL ConseptsNoSQL Consepts
NoSQL Consepts
 
Chapter1: NoSQL: It’s about making intelligent choices
Chapter1: NoSQL: It’s about making intelligent choicesChapter1: NoSQL: It’s about making intelligent choices
Chapter1: NoSQL: It’s about making intelligent choices
 

Recently uploaded

CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfBalamuruganV28
 
ADM100 Running Book for sap basis domain study
ADM100 Running Book for sap basis domain studyADM100 Running Book for sap basis domain study
ADM100 Running Book for sap basis domain studydhruvamdhruvil123
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxStephen Sitton
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionSneha Padhiar
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewsandhya757531
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labsamber724300
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Romil Mishra
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Coursebim.edu.pl
 
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...gerogepatton
 
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxTriangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxRomil Mishra
 
Guardians of E-Commerce: Harnessing NLP and Machine Learning Approaches for A...
Guardians of E-Commerce: Harnessing NLP and Machine Learning Approaches for A...Guardians of E-Commerce: Harnessing NLP and Machine Learning Approaches for A...
Guardians of E-Commerce: Harnessing NLP and Machine Learning Approaches for A...IJAEMSJORNAL
 
Theory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfTheory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfShreyas Pandit
 
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxCurve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxRomil Mishra
 
AntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptxAntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptxLina Kadam
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organizationchnrketan
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.elesangwon
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communicationpanditadesh123
 
The Satellite applications in telecommunication
The Satellite applications in telecommunicationThe Satellite applications in telecommunication
The Satellite applications in telecommunicationnovrain7111
 

Recently uploaded (20)

CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdf
 
ADM100 Running Book for sap basis domain study
ADM100 Running Book for sap basis domain studyADM100 Running Book for sap basis domain study
ADM100 Running Book for sap basis domain study
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptx
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based question
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overview
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labs
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Course
 
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...
 
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxTriangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
 
Guardians of E-Commerce: Harnessing NLP and Machine Learning Approaches for A...
Guardians of E-Commerce: Harnessing NLP and Machine Learning Approaches for A...Guardians of E-Commerce: Harnessing NLP and Machine Learning Approaches for A...
Guardians of E-Commerce: Harnessing NLP and Machine Learning Approaches for A...
 
Theory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfTheory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdf
 
Designing pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptxDesigning pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptx
 
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxCurve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
 
AntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptxAntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptx
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organization
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 
ASME-B31.4-2019-estandar para diseño de ductos
ASME-B31.4-2019-estandar para diseño de ductosASME-B31.4-2019-estandar para diseño de ductos
ASME-B31.4-2019-estandar para diseño de ductos
 
The Satellite applications in telecommunication
The Satellite applications in telecommunicationThe Satellite applications in telecommunication
The Satellite applications in telecommunication
 

Khorramshahr: A Scalable Peer to Peer Architecture for Port Warehouse Management System

  • 1. 1 Khorramshahr: A Scalable Peer to Peer Architecture for Port Warehouse Management System
  • 2. 2 01 03 02 Introduction Problem Statement Preliminaries of The Used Filters 04 06 05 The Architecture of Khorramshahr Performance Evaluation Conclustion Outline
  • 3. 3 Internet of Things in Smart Industry Management of products in huge warehouse Stock checking is a time consuming task and requires considerable effort Product moves from one warehouse to another Port the key gateway to industrial products Introduction
  • 4. 4 Innovations Khorramshahr uses a peer to peer (P2P) architectural style which makes it scalable in the number of transactions, number of warehouses and the geographical distribution. The double chord approach on both distributed hash tables (product types and product information) is used, to facilitate users from inside or outside of the port to access the required information from different warehouses. A distributed discovery service is designed to support access to the product catalogs, stock and property checking. Memory efficient data structures such as Bloom filter and Quotient filter are utilized to reduce the response time and memory usage. Chord based DHT is implemented with both of the filters and the performances are analyzed To increase the efficiency of the system in looking up product types in object name server (ONS) which is usually in variant, a client server architectural style with replicated data repository is used. Therefore, Khorramshahr is a hybrid architecture, which uses both P2P and client server styles in different sections.
  • 5. 5  Radio Frequency Identification (RFID)  RFID Reader Physical Components Soft ware Components  Middleware  EPC Information Service (EPCIS)  Object Name Service (ONS)  Discovery Service (DS) EPC Global Architecture
  • 6. 6 Problem Statement W = {w1;w2; …; wm} w= warehouse (1) T= {t1; t2; …; tn} T= good types (2) G = {g1; g2; …; gx} G= goods (3) Wti = {tij |t j ∈ T} (4) C={c1, c2,…ck,…., cp} C= companies (5) ∩k=1 p Cwk = ∅ (7) f (gj) = wi G W (8) Cwk = {wi |wi ∈ W} (6)
  • 7. 7 Dynamic Bloom Filter Quotient Filter Preliminaries of the used filters 1413121110987654321 00000000000000 Bloom filter A: a vector of bits initially all set to 0s 01011010010010 Programming phase: insert each element xi in S into the A, A[Hj(xi)]=1 x1 x2 x3 01011010010010 Querying phase: if all A[Hj(y)]=1 return Yes with false positive probability, otherwise return No y1 y2 y1 is definitely not a member of S y2 is a member of S (false positive)
  • 8. 8 The Architecture of Khorramshahr
  • 9. 9 Physical Layer Interface Layer Application Layer The Architecture of Khorramshahr Product Serial No. (16bit) Product Type (16bit) Warehouse Prefix (16bit) The assigned ID format for each product in the port EPC ID (up to 111 bit) Assigned ID (48 bit) The format of product ID in Khorramshahr architecture
  • 10. 10 The deployment view of the Khorramshahr architecture
  • 11. 11 Handling Incoming Shipments Tracking a Stocked Product Handling Outgoing Shipments Stock List The Architecture of Khorramshahr Behavioral Model
  • 12. 12 Performance Evaluation Simulation Tools OMNET++ Version 4.1 OverSim ( release 20101103) ValueParameter 18000(s)Simulation Time (Global) No churnNum Replica churn Type (Global) 10 MbpsEthernet Channel Data Rate (Global) 10(ms)Ethernet Channel Delay (Global) [10000-50000]Num Get Request 60sTest Interval 300Test TTL 10(s)Failure Latency [25-250]Number of Terminal
  • 13. 13 0.879 0.875 0.877 0.877 0.882 0.889 0.885 0.886 0.89 0.892 0.864 0.86 0.862 0.867 0.869 0.856 0.861 0.855 0.855 0.851 10000 20000 30000 40000 50000 Get Latency Number of Request Terminal 50 ODSA Base DHT Bloom Quotient 0.83 0.84 0.85 0.86 0.87 0.88 0.89 0.9 10000 20000 30000 40000 50000 Performance Comparison & Scalability
  • 14. 14 0.85 0.9 0.95 1 1.05 1.1 1.15 1.2 10000 20000 30000 40000 50000 Get Latency Number of requests Terminal 250 Base Bloom Quotient ODSA 1.09 1.13 1.15 1.15 1.17 0.991 0.995 0.997 0.997 0.992 0.978 0.983 0.985 0.987 0.984 1.03 1.06 1.07 1.07 1.09 0.85 0.9 0.95 1 1.05 1.1 1.15 1.2 10000 20000 30000 40000 50000 Performance comparison & scalability
  • 15. 15 0 50 100 150 200 250 300 50 100 150 200 250 Required memory Size (KB) Number of Terminals Memory efficiency Base Bloom Quotient ODSA 50.2 100.5 145 194.4 249.8 35.4 71.8 125 168.3 218.2 42.9 83.4 134.6 178.2 229.2 50.3 100.6 145 194 249 0 50 100 150 200 250 300 50 100 150 200 250 Memory Efficiency
  • 16. 16 0 0.002 0.004 0.006 0.008 0.01 0.012 0.014 0.016 10000 20000 30000 40000 50000 False positive Rate(%) Number of requests False Positive Rate Bloom Quotient 0.015 0.012 0.011 0.012 0.011 0.0011 0.0011 0.0015 0.0017 0.0011 0 0.002 0.004 0.006 0.008 0.01 0.012 0.014 0.016 10000 20000 30000 40000 50000 False Positive Rate
  • 17. 17 Conclusion • New architecture warehouse management • Architecture uses a hybrid of P2P and client server paradigms • The architecture is scalable in terms of the number of requests and the number of warehouses • To boost the lookup procedure two different filters( Bloom and Quotient filters)