A State-based Programming Model and System for Wireless Sensor Networks Reporter : Zhi-Yuan Yang 2010/5/24.

Slides:



Advertisements
Similar presentations
RDFTL: An Event-Condition- Action Language for RDF George Papamarkos Alexandra Poulovassilis Peter T. Wood School of Computer Science and Information Systems.
Advertisements

Implementing declarative overlays Boom Thau Loo Tyson Condie Joseph M. Hellerstein Petros Maniatis Timothy Roscoe Ion Stoica.
Seminar On “ OMNET++ Network Simulator” Presented By: Saurav K Bengani Guided By: Guided By: Dr. Andrew yang Dr. Andrew yang.
WebRatio BPM: a Tool for Design and Deployment of Business Processes on the Web Stefano Butti, Marco Brambilla, Piero Fraternali Web Models Srl, Italy.
1 Introduction to SOA. 2 The Service-Oriented Enterprise eXtensible Markup Language (XML) Web services XML-based technologies for messaging, service description,
Page 1 Building Reliable Component-based Systems Chapter 16 - Component based embedded systems Chapter 16 Component based embedded systems.
1 © Wolfgang Pelz UML3 UML 3 Notations describe how to use reusable software. Package Component Deployment Node.
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
An Application-led Approach for Security-related Research in Ubicomp Philip Robinson TecO, Karlsruhe University 11 May 2005.
A brief look at CORBA. What is CORBA Common Object Request Broker Architecture developed by OMG Combine benefits of OO and distributed computing Distributed.
Program and deploy your SN in minutes  Program: Single System Image  “Write Once, Run… Wherever”  Each program runs on an SN “slice” i.e., a Virtual.
WebRatio BPM: a Tool for Design and Deployment of Business Processes on the Web Stefano Butti, Marco Brambilla, Piero Fraternali Web Models Srl, Italy.
Distributed Collaborations Using Network Mobile Agents Anand Tripathi, Tanvir Ahmed, Vineet Kakani and Shremattie Jaman Department of computer science.
1 Joint work with Antonio Bucchiarone (Fondazione Bruno Kessler - IRST, Trento) and Fabrizio Montesi (University of Bologna/INRIA, Bologna) A Framework.
DISTRIBUTED PROCESS IMPLEMENTAION BHAVIN KANSARA.
Copyright © 2012, QoS-aware Network Operating System for Software Defined Networking with Generalized OpenFlows Kwangtae Jeong, Jinwook Kim.
Community Manager A Dynamic Collaboration Solution on Heterogeneous Environment Hyeonsook Kim  2006 CUS. All rights reserved.
Katanosh Morovat.   This concept is a formal approach for identifying the rules that encapsulate the structure, constraint, and control of the operation.
Database Design - Lecture 1
Interpreting the data: Parallel analysis with Sawzall LIN Wenbin 25 Mar 2014.
An approach to Intelligent Information Fusion in Sensor Saturated Urban Environments Charalampos Doulaverakis Centre for Research and Technology Hellas.
Agent-based Device Management in RFID Middleware Author : Zehao Liu, Fagui Liu, Kai Lin Reporter :郭瓊雯.
SIGNALING. To establish a telephone call, a series of signaling messages must be exchanged. There are two basic types of signal exchanges: (1) between.
Lyon, June 26th 2006 ICPS'06: IEEE International Conference on Pervasive Services 2006 Routing and Localization Services in Self-Organizing Wireless Ad-Hoc.
SOS EGEE ‘06 GGF Security Auditing Service: Draft Architecture Brian Tierney Dan Gunter Lawrence Berkeley National Laboratory Marty Humphrey University.
Software Design Patterns for Information Visualization 薛乃榮 Q NCBCI LAB.
Software Agents: An Overview by Hyacinth S. Nwana and Designing Behaviors for Information Agents by Keith Decker, Anandeep Pannu, Katia Sycara and Mike.
Evaluation of a Publish/Subscribe System for Collaboration and Mobile Working Collaborative Advertising over Internet with Agents Independent Study: Wireless.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Through the development of advanced middleware, Grid computing has evolved to a mature technology in which scientists and researchers can leverage to gain.
BFTCloud: A Byzantine Fault Tolerance Framework for Voluntary-Resource Cloud Computing Yilei Zhang, Zibin Zheng, and Michael R. Lyu
RELATIONAL FAULT TOLERANT INTERFACE TO HETEROGENEOUS DISTRIBUTED DATABASES Prof. Osama Abulnaja Afraa Khalifah
Model-Driven Analysis Frameworks for Embedded Systems George Edwards USC Center for Systems and Software Engineering
PERVASIVE COMPUTING MIDDLEWARE BY SCHIELE, HANDTE, AND BECKER A Presentation by Nancy Shah.
IntroductionRelated work 2 Contents Publish/Subscribe middleware Conclusion and Future works.
1 Vigil : Enforcing Security in Ubiquitous Environments Authors : Lalana Kagal, Jeffrey Undercoffer, Anupam Joshi, Tim Finin Presented by : Amit Choudhri.
Distributed Monitoring and Aggregation in Wireless Sensor Networks INFOCOM 2010 Changlei Liu and Guohong Cao Speaker: Wun-Cheng Li.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 1 Wireless Sensor Network Wireless Sensor Network Based.
Open Service Gateway Initiative (OSGi) Reporter : 林學灝 侯承育 1.
Project Overview Graduate Selection Process Project Goal Automate the Selection Process.
Workshop on Future Learning Landscapes: Towards the Convergence of Pervasive and Contextual computing, Global Social Media and Semantic Web in Technology.
An Ontological Framework for Web Service Processes By Claus Pahl and Ronan Barrett.
CASS – Middleware for Mobile Context-Aware Applications Patrick Fahy Siobhan Clarke Trinity College Dublin, Ireland Summarized by Babar Tareen,
Modeling Component-based Software Systems with UML 2.0 George T. Edwards Jaiganesh Balasubramanian Arvind S. Krishna Vanderbilt University Nashville, TN.
Cerberus: A Context-Aware Security Scheme for Smart Spaces presented by L.X.Hung u-Security Research Group The First IEEE International Conference.
A Mechanized Model for CAN Protocols Context and objectives Our mechanized model Results Conclusions and Future Works Francesco Bongiovanni and Ludovic.
07/09/04 Johan Muskens ( TU/e Computer Science, System Architecture and Networking.
Yuhui Chen; Romanovsky, A.; IT Professional Volume 10, Issue 3, May-June 2008 Page(s): Digital Object Identifier /MITP Improving.
Distribution and components. 2 What is the problem? Enterprise computing is Large scale & complex: It supports large scale and complex organisations Spanning.
Vehicular Cloud Networking: Architecture and Design Principles
SQL Based Knowledge Representation And Knowledge Editor UMAIR ABDULLAH AFTAB AHMED MOHAMMAD JAMIL SAWAR (Presented by Lei Jiang)
Architecture View Models A model is a complete, simplified description of a system from a particular perspective or viewpoint. There is no single view.
A Dynamic Operating System for Sensor Nodes Chih-Chieh Han, Ram Kumar, Roy Shea, Eddie Kohler, Mani, Srivastava, MobiSys ‘05 Oct., 2009 발표자 : 김영선, 윤상열.
Approaching Fine-grain Access Control for Distributed Biomedical Databases within Virtual Environments Onur Kalyoncu, Yi Pan, Matthias Assel High Performance.
Service Brokering Yu-sik Park. Index Introduction Brokering system Ontology Services retrieval using ontology Example.
Web Service-Based Remote Monitoring System for Smart Home Space Sheng Cai Joshua Ferguson Xinhui Hu Wei Wu Project for CSE535 Mobile Computing.
What’s Ahead for Embedded Software? (Wed) Gilsoo Kim
1 An infrastructure for context-awareness based on first order logic 송지수 ISI LAB.
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
Reliable Web Service Execution and Deployment in Dynamic Environments * Markus Keidl, Stefan Seltzsam, and Alfons Kemper Universität Passau Passau,
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Context-Aware Middleware for Resource Management in the Wireless Internet US Lab 신현정.
Sensors Journal, IEEE, Issue Date: May 2013,
Presented by: Saurav Kumar Bengani
Distribution and components
Model-Driven Analysis Frameworks for Embedded Systems
Architecture Description Languages
Design Yaodong Bi.
COMPONENT – BASED SOFTWARE ENGINEERING MODULE 2 – SECOND SEMESTER MKHIZE, BSC HONS COMPUTER SCIENCES, DIP IT, ICDL.
Presentation transcript:

A State-based Programming Model and System for Wireless Sensor Networks Reporter : Zhi-Yuan Yang 2010/5/24

Outline Introduction State Model The State-Based Programming System –Application Language –Network Model –Compiler –Middleware Conclusion

Introduction(1/2) Sensor networks are one building block towards the realization of pervasive computing applications. How can we write, deploy and maintain an application for thousands or tens of thousands of sensor nodes efficiently? Programming and re-programming each node individually would be too time consuming, costly and error prone.

Introduction(2/2) Macroprogramming has emerged as one promising approach. Instead of focusing on each individual node independently, the network is programmed as one unit. In this paper, we introduce the design and implementation of RuleCaster, a novel macroprogramming framework for wireless sensor networks.

State Model(1/5) Each region is in one or several discrete states. The union of all these states at time t defines the network state at time t.

State Model(2/5) We can denote a basic state of region r at time t as ∈ S, where S is a discrete set of possible states.

State Model(3/5) : a basic state of region r at time t. : union of all basic states of region r at time t. : union of all region states at time t. : transition of a basic state.

State Model(4/5) A rule is a boolean function consisting of disjunctions and conjunctions of boolean conditions. : condition, where i is the ID of the condition. : the time when the condition evaluates to true (or false). : the region where the condition evaluates to true (or false). The successful evaluation of a specific rule is restricted to a pre-defined time interval.

State Model(5/5) Nodes have to collaborate to determine the state. An action is triggered by a valid state.

The State-Based Programming System RuleCaster treats the network as one distributed computer. In RuleCaster, applications are defined in RCAL (RuleCaster Application Language).

Application Language An RCAL application definition consists of several ruleblocks. Each ruleblock specifies a state transition or an action.

Application Language /* Ruleblock 1*/ SPACE(kitchen),TIME(1s){ STATE stoveOnHazard :- stoveOn(), notMonitored(). notMonitored() :- pressure(X), X<50.} /* Ruleblock 2*/ SPACE(door),STATE(kitchen:stoveOnHazard){ STATE hazard :- leaving(). } /* Ruleblock 3*/ SPACE(door),STATE(door:hazard) { ACTION alarm(10). }

Network Model The network model is used by the compiler to make decisions where network states are managed within the network. Each node in the network provides a description of its properties and services.

Compiler The application programmer does not have to specify where a network state is manipulated and stored. The goal is to allow the compiler to dynamically assign tasks based on the requirements of the application. This separation of different concerns makes RuleCaster more flexible.

Middleware The middleware provides the interface to the servicebased architecture of the system. Interpreter module is responsible for the interpretation of the tasks.

Middleware It uses the Local Service if a condition of a transition rule has to be evaluated locally. The runtime system also accepts service requests from other nodes through the Remote Query module. The Remote Query module collaborates with the Local Service module for this purpose. New tasks generated by the compiler are sent to the Configurator module. It decodes the tasks and forwards them to the Interpreter module. Finally, the Interface module announces properties and available services to the discovery mechanism used to generate the network model.

Conclusion RuleCaster does not focus on individual nodes; instead, the network is programmed as a single unit. We have to give the nodes enough knowledge. Major changes of the infrastructure can be accommodated.

Thank you for your listening.