Autonomous Virtual Mobile Node Shlomi Dolev Seth Gilbert Elad Schiller Alex Shvartsman Jennifer Welch.

Slides:



Advertisements
Similar presentations
Computer Network Topologies
Advertisements

An Adaptive Compulsory Protocol for Basic Communication in Ad-hoc Mobile Networks Ioannis Chatzigiannakis Sotiris Nikoletseas April 2002.
Energy-Efficient Computing for Wildlife Tracking: Design Tradeoffs and Early Experiences with ZebraNet Presented by Eric Arnaud Makita
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
Garbage Collecting the World Bernard Lang Christian Queinnec Jose Piquer Presented by Yu-Jin Chia See also: pp text.
1 An Approach to Real-Time Support in Ad Hoc Wireless Networks Mark Gleeson Distributed Systems Group Dept.
Secret Swarm Unit Reactive k-Secret Sharing INDOCRYPT 2007 Shlomi Dolev 1, Limor Lahiani 1, Moti Yung 2 Department of Computer Science 1 Ben-Gurion University,
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith and Louise E. Moser Presented by Aki Happonen.
Self Stabilizing Distributed File System Shlomi Dolev and Ronen I. Kat Department of Computer Science, Ben-Gurion University Research Sponsored by IBM.
Brent Dingle Marco A. Morales Texas A&M University, Spring 2002
© nCode 2000 Title of Presentation goes here - go to Master Slide to edit - Slide 1 Reliable Communication for Highly Mobile Agents ECE 7995: Term Paper.
Connectivity-Aware Routing (CAR) in Vehicular Ad Hoc Networks Δημόκας Νικόλαος Data Engineering Laboratory, Aristotle University of Thessaloniki.
Performance Comparison of Existing Leader Election Algorithms for Dynamic Networks Mobile Ad Hoc (Dynamic) Networks: Collection of potentially mobile computing.
Adaptive Topology Discovery in Hybrid Wireless Networks
Di Wu 03/03/2011 Geographic Routing in Clustered Multi-layer Vehicular Ad Hoc Networks for Load Balancing Purposes.
Self Stabilization Classical Results and Beyond… Elad Schiller CTI (Grece)
A Distance Routing Effect Algorithm for Mobility (DREAM)* Stefano Basagni Irnrich Chlamtac Violet R. Syrotiuk Barry A. Woodward.
Autonomous Virtual Mobile Nodes Shlomi Dolev Seth Gilbert Elad Schiller Alex Shvartsman Jennifer Welch.
Election Algorithms and Distributed Processing Section 6.5.
L EADER E LECTION Advanced Operating Systems (CSC 8320) Fall 2011 Shagun Kariwala.
Vinay Kumar Madhadi 09/23/2009 CSC Outline  Part 1 : Leader Election?  Part 2 : Different Design Topologies Algorithms Used-Bully, Ring, Invitation.
Ch4: Distributed Systems Architectures. Typically, system with several interconnected computers that do not share clock or memory. Motivation: tie together.
LOCALIZATION in Sensor Networking Hamid Karimi. Wireless sensor networks Wireless sensor node  power supply  sensors  embedded processor  wireless.
NETWORK TOPOLOGIES There are three basic configurations used to connect computers they are the  Bus  Ring  Star.
Gathering Data in Wireless Sensor Networks Madhu K. Jayaprakash.
On-Demand Traffic-Embedded Clock Synchronization for Wireless Sensor Networks Sang Hoon Lee.
Andreas Larsson, Philippas Tsigas SIROCCO Self-stabilizing (k,r)-Clustering in Clock Rate-limited Systems.
Distributed Computation in MANets Robot swarm developed by James Rice University.
Evgueni (Eugene) Khokhlov1 A Mobility-Centric Data Dissemination Algorithm for Vehicular Networks (MDDV) Evgueni (Eugene) Khokhlov.
Tonghong Li, Yuanzhen Li, and Jianxin Liao Department of Computer Science Technical University of Madrid, Spain Beijing University of Posts & Telecommunications.
Computer Science 1 CSC 774 Advanced Network Security Distributed detection of node replication attacks in sensor networks (By Bryan Parno, Adrian Perrig,
How Small Labels create Big Improvements April Chan-Myung Kim
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
1 Deterministic Collision-Free Communication Despite Continuous Motion ALGOSENSORS 2009 Saira Viqar Jennifer L. Welch Parasol Lab, Department of CS&E TEXAS.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
1 Data Naming in Vehicle-to-Vehicle Communications HU Yao Goto Lab
Communication Support for Location- Centric Collaborative Signal Processing in Sensor Networks Parmesh Ramanathan University of Wisconsin, Madison Acknowledgements:K.-C.
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
K-Anycast Routing Schemes for Mobile Ad Hoc Networks 指導老師 : 黃鈴玲 教授 學生 : 李京釜.
Copyright © George Coulouris, Jean Dollimore, Tim Kindberg This material is made available for private study and for direct.
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 7: Naming & Addressing Holger Karl.
EEC 688/788 Secure and Dependable Computing Lecture 10 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
SOCIAL HOUSEKEEPING THROUGH INTERCOMMUNICATING APPLIANCES AND SHARED RECIPES MERGING IN A PERVASIVE WEB-SERVICES INFRASTRUCTURE WP8 – Tests Ghent CREW.
1 Nancy Lynch Massachusetts Institute of Technology, CSAIL Workshop on Critical Research Areas in Aerospace Software MIT August 9, 2005 Virtual Node Layers.
Mobility Models for Wireless Ad Hoc Network Research EECS 600 Advanced Network Research, Spring 2005 Instructor: Shudong Jin March 28, 2005.
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
Building Dependable Distributed Systems, Copyright Wenbing Zhao
Distributed Computing Systems CSCI 4780/6780. Scalability ConceptExample Centralized servicesA single server for all users Centralized dataA single on-line.
Chapter 14 : Modeling Mobility Andreas Berl. 2 Motivation  Wireless network simulations often involve movements of entities  Examples  Users are roaming.
Chapter 7: Consistency & Replication IV - REPLICATION MANAGEMENT By Jyothsna Natarajan Instructor: Prof. Yanqing Zhang Course: Advanced Operating Systems.
The Sybil attack “One can have, some claim, as many electronic persons as one has time and energy to create.” – Judith S. Donath.
Energy-Efficient Signal Processing and Communication Algorithms for Scalable Distributed Fusion.
Relying on Safe Distance to Achieve Strong Partitionable Group Membership in Ad Hoc Networks Authors: Q. Huang, C. Julien, G. Roman Presented By: Jeff.
1. This section looks at non-standard options for denoting the senders/receivers of messages Traditional (fixed, wireless, ad hoc): Denote individual.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
On Detecting Termination in Cognitive Radio Networks Shantanu Sharma 1 and Awadhesh Kumar Singh 2 1 Ben-Gurion University of the Negev, Israel 2 National.
Presented by: Chaitanya K. Sambhara Paper by: Rahul Gupta and Samir R. Das - Univ of Cincinnati SUNY Stony Brook.
EEC 688/788 Secure and Dependable Computing Lecture 10 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Delay-Tolerant Networks (DTNs)
Distributed Vehicle Routing Approximation
Wireless Sensor Network Architectures
Net 435: Wireless sensor network (WSN)
Outline Announcements Fault Tolerance.
EEC 688/788 Secure and Dependable Computing
EEC 688/788 Secure and Dependable Computing
EEC 688/788 Secure and Dependable Computing
EEC 688/788 Secure and Dependable Computing
Presentation transcript:

Autonomous Virtual Mobile Node Shlomi Dolev Seth Gilbert Elad Schiller Alex Shvartsman Jennifer Welch

Challenges Locality Nodes only send messages to nearby nodes Global coordination is expensive Locality Unreliable nodes Mobile nodes fail, go to sleep, and get turned off.

Challenges Locality Unreliable nodes Irregular motion Nodes travel wherever they want to go Locality Unreliable nodes Mobile nodes fail, go to sleep, and get turned off.

Challenges Locality Unreliable nodes Irregular motion Nodes travel wherever they want to go

Opportunities Broadcast Wireless broadcast is a powerful primitive. Allows a node to reach all nearby nodes, Ensure they receive the same messages.

Opportunities Broadcast Time & Geography Nodes are physical entities –physical time & location Use GPS and/or algorithms for synchronization / location

Autonomous Virtual Mobile Node Automaton New programming abstraction A virtual general-purpose computing entity.

Autonomous Virtual Mobile Node Automaton New programming abstraction Distinct location at any time Implemented by “real’’ mobile nodes that happens to be near.

Autonomous Virtual Mobile Node Automaton New programming abstraction Distinct location at any time Communicates with: other virtual nodes, and “real” mobile nodes.

Autonomous Virtual Mobile Node Automaton Reliability Fault recovery The group emulation enhances robustness: some may fail, or move out of range. Automaton Reliability Fault recovery Self-stabilization Tolerate any starting state: maybe several (undesired) copies, or none at all. Automaton Reliability Autonomous On-line movement decision: –current state, and –sensor/environment input. Example 1 If north-east area appears deserted go south-west

Autonomous Virtual Mobile Node Automaton Reliability Autonomous On-line movement decision: –current state, and –sensor/environment input. Example 2 Hitchhike with the traffic, or Go in the opposite direction

Application Domain Vehicular networks Traffic control and safety –E.g., ad hoc traffic light

Application Domain Vehicular networks Traffic control and safety –E.g., ad hoc traffic light

Application Domain Vehicular networks RFID tags Very small, cheap and wireless tagging network. Limited power supply. –Photoelectric gate Use flash light to activate the net The AVMN follows the light E.g., count the number of items find an expired item Use microwave instead of light.

Application Domain Vehicular networks RFID tags Swarm computing Multiple virtual nodes –Hierarchically originated –Performing different task Collaborating or competing

Implementation Exactly 1 instance Three different schemes 1.Virtual Stationary Automaton alive messages to known location of a stationary node (VSA) VSA keeps track of the AVMN No message for too long create a new AVMN VSA eliminates duplicates

Implementation Exactly 1 instance Three different schemes 1.Virtual Stationary Automaton 2.Send alive messages Send alive messages in a random walk fashion. If a real node doesn’t receive an alive message for too long generates a formation token carries ids and traverses in a random walk fashion If tokens collide: merge ids’ lists If containing more than (N+1)/2 creates a new AVMN

Implementation Exactly 1 instance Three different schemes 1.Virtual Stationary Automaton 2.Send alive messages 3.Nodes alive messages Real nodes periodically send stay alive messages random walk to AVMN in order to survive AVMN must collect at least (N + 1)/2 messages.

Implementation Exactly 1 instance Self-stabilization Every emulating real node –Keeps a replica of the AVMN –Ensures identical replica Buffer input events waiting to be applied to the state. At a fixed interval, sends replica to all. Predetermined function resolves conflicts.