Autonomous Virtual Mobile Nodes Shlomi Dolev Seth Gilbert Elad Schiller Alex Shvartsman Jennifer Welch.

Slides:



Advertisements
Similar presentations
Computer Network Topologies
Advertisements

Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
An Adaptive Compulsory Protocol for Basic Communication in Ad-hoc Mobile Networks Ioannis Chatzigiannakis Sotiris Nikoletseas April 2002.
Connectivity-Aware Routing (CAR) in Vehicular Ad Hoc Networks Valery Naumov & Thomas R. Gross ETH Zurich, Switzerland IEEE INFOCOM 2007.
Impossibility of Distributed Consensus with One Faulty Process
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Energy-Efficient Computing for Wildlife Tracking: Design Tradeoffs and Early Experiences with ZebraNet Presented by Eric Arnaud Makita
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
Garbage Collecting the World Bernard Lang Christian Queinnec Jose Piquer Presented by Yu-Jin Chia See also: pp text.
1 An Approach to Real-Time Support in Ad Hoc Wireless Networks Mark Gleeson Distributed Systems Group Dept.
1 Routing Techniques in Wireless Sensor networks: A Survey.
A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment School of Electronics Engineering and Computer Science, PKU, Beijing, China.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
CS 582 / CMPE 481 Distributed Systems
Mesh Networks A.k.a “ad-hoc”. Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology- each.
Brent Dingle Marco A. Morales Texas A&M University, Spring 2002
© nCode 2000 Title of Presentation goes here - go to Master Slide to edit - Slide 1 Reliable Communication for Highly Mobile Agents ECE 7995: Term Paper.
Autonomous Virtual Mobile Node Shlomi Dolev Seth Gilbert Elad Schiller Alex Shvartsman Jennifer Welch.
Adaptive Topology Discovery in Hybrid Wireless Networks
Self Stabilization Classical Results and Beyond… Elad Schiller CTI (Grece)
A Distance Routing Effect Algorithm for Mobility (DREAM)* Stefano Basagni Irnrich Chlamtac Violet R. Syrotiuk Barry A. Woodward.
Election Algorithms and Distributed Processing Section 6.5.
Tal Saiag & Anna Itin May 2013
LOCALIZATION in Sensor Networking Hamid Karimi. Wireless sensor networks Wireless sensor node  power supply  sensors  embedded processor  wireless.
Gathering Data in Wireless Sensor Networks Madhu K. Jayaprakash.
04/18/2005Yan Huang - CSCI5330 Database Implementation – Distributed Database Systems Distributed Database Systems.
Leader Election Algorithms for Mobile Ad Hoc Networks Presented by: Joseph Gunawan.
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
Andreas Larsson, Philippas Tsigas SIROCCO Self-stabilizing (k,r)-Clustering in Clock Rate-limited Systems.
Distributed Computation in MANets Robot swarm developed by James Rice University.
Tracking with Unreliable Node Sequences Ziguo Zhong, Ting Zhu, Dan Wang and Tian He Computer Science and Engineering, University of Minnesota Infocom 2009.
Crowd Management System A presentation by Abhinav Golas Mohit Rajani Nilay Vaish Pulkit Gambhir.
SELMA: A middleware platform for self- organizing distributed applications in mobile multi-hop ad-hoc networks Daniel Görgen, Hannes Frey, Johannes K.
Computer Science 1 CSC 774 Advanced Network Security Distributed detection of node replication attacks in sensor networks (By Bryan Parno, Adrian Perrig,
How Small Labels create Big Improvements April Chan-Myung Kim
Connectivity-Aware Routing (CAR) in Vehicular Ad Hoc Networks Valery Naumov & Thomas R. Gross ETH Zurich, Switzerland IEEE INFOCOM 2007.
1 Deterministic Collision-Free Communication Despite Continuous Motion ALGOSENSORS 2009 Saira Viqar Jennifer L. Welch Parasol Lab, Department of CS&E TEXAS.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
1 Data Naming in Vehicle-to-Vehicle Communications HU Yao Goto Lab
A Membership Management Protocol for Mobile P2P Networks Mohamed Karim SBAI, Emna SALHI, Chadi BARAKAT.
K-Anycast Routing Schemes for Mobile Ad Hoc Networks 指導老師 : 黃鈴玲 教授 學生 : 李京釜.
EEC 688/788 Secure and Dependable Computing Lecture 10 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
SOCIAL HOUSEKEEPING THROUGH INTERCOMMUNICATING APPLIANCES AND SHARED RECIPES MERGING IN A PERVASIVE WEB-SERVICES INFRASTRUCTURE WP8 – Tests Ghent CREW.
1 Nancy Lynch Massachusetts Institute of Technology, CSAIL Workshop on Critical Research Areas in Aerospace Software MIT August 9, 2005 Virtual Node Layers.
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
Building Dependable Distributed Systems, Copyright Wenbing Zhao
Chapter 7: Consistency & Replication IV - REPLICATION MANAGEMENT By Jyothsna Natarajan Instructor: Prof. Yanqing Zhang Course: Advanced Operating Systems.
Self-stabilizing energy-efficient multicast for MANETs.
The Sybil attack “One can have, some claim, as many electronic persons as one has time and energy to create.” – Judith S. Donath.
Reliable Communication in the Presence of Failures Kenneth P. Birman and Thomas A. Joseph Presented by Gloria Chang.
Energy-Efficient Signal Processing and Communication Algorithms for Scalable Distributed Fusion.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
Ben Miller.   A distributed algorithm is a type of parallel algorithm  They are designed to run on multiple interconnected processors  Separate parts.
Relying on Safe Distance to Achieve Strong Partitionable Group Membership in Ad Hoc Networks Authors: Q. Huang, C. Julien, G. Roman Presented By: Jeff.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
On Detecting Termination in Cognitive Radio Networks Shantanu Sharma 1 and Awadhesh Kumar Singh 2 1 Ben-Gurion University of the Negev, Israel 2 National.
Presented by: Chaitanya K. Sambhara Paper by: Rahul Gupta and Samir R. Das - Univ of Cincinnati SUNY Stony Brook.
EEC 688/788 Secure and Dependable Computing Lecture 10 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Delay-Tolerant Networks (DTNs)
Distributed Vehicle Routing Approximation
Wireless Sensor Network Architectures
Net 435: Wireless sensor network (WSN)
Chapter 7: Consistency & Replication IV - REPLICATION MANAGEMENT -Sumanth Kandagatla Instructor: Prof. Yanqing Zhang Advanced Operating Systems (CSC 8320)
Outline Announcements Fault Tolerance.
EEC 688/788 Secure and Dependable Computing
EEC 688/788 Secure and Dependable Computing
EEC 688/788 Secure and Dependable Computing
Presentation transcript:

Autonomous Virtual Mobile Nodes Shlomi Dolev Seth Gilbert Elad Schiller Alex Shvartsman Jennifer Welch

Challenges Locality Nodes only send messages to nearby nodes Global coordination is expensive Locality Unreliable nodes Mobile nodes fail, go to sleep, and get turned off.

Challenges Locality Unreliable nodes Irregular motion Nodes travel wherever they want to go Locality Unreliable nodes Mobile nodes fail, go to sleep, and get turned off.

Opportunities Broadcast Wireless broadcast is a powerful primitive. Allows a node to reach all nearby nodes, Ensure they receive the same messages.

Opportunities Broadcast Time & Geography Nodes are physical entities –physical time & location Use GPS and/or algorithms for synchronization / location

Related work Existing protocols Flooding Distributed structure –E.g., TORA [PC97] Compulsory movement of nodes – [HP99, CNS01]

Related work Existing protocols Random walk Random walk of a single agent Coping with chaos by chaos

Related work Existing protocols Random walk Virtual nodes Geo-Quorums [DGL03] Virtual Stationary Automata –[DGL05] Virtual Mobile Node [DGL04]

Autonomous Virtual Mobile Node Automaton New programming abstraction A virtual general-purpose computing entity.

Autonomous Virtual Mobile Node Automaton New programming abstraction Distinct location at any time Implemented by “real’’ mobile nodes that happens to be near.

Autonomous Virtual Mobile Node Automaton New programming abstraction Distinct location at any time Communicates with: other virtual nodes, and “real” mobile nodes.

Autonomous Virtual Mobile Node Automaton Reliability Fault recovery The group emulation enhances robustness: some may fail, or move out of range. Automaton Reliability Fault recovery Self-stabilization Tolerate any starting state: maybe several (undesired) copies, or none at all. Automaton Reliability Autonomous On-line movement decision: –current state, and –sensor/environment input. Example 1 If north-east area appears deserted go south-west

Autonomous Virtual Mobile Node Automaton Reliability Autonomous On-line movement decision: –current state, and –sensor/environment input. Example 2 Hitchhike with the traffic, or Go in the opposite direction

Application Domain Vehicular networks Traffic control and safety –E.g., ad hoc traffic light

Application Domain Vehicular networks Traffic control and safety –E.g., ad hoc traffic light

Application Domain Vehicular networks RFID tags Very small, cheap and wireless tagging network. Limited power supply. –Photoelectric gate Use flash light to activate the net The AVMN follows the light E.g., count the number of items find an expired item Use microwave instead of light.

Application Domain Vehicular networks RFID tags Swarm computing Multiple virtual nodes –Hierarchically originated –Performing different task Collaborating or competing

Implementation Exactly 1 instance Three different schemes 1.Virtual Stationary Automaton alive messages to known location of a stationary node (VSA) VSA keeps track of the AVMN No message for too long create a new AVMN VSA eliminates duplicates

Implementation Exactly 1 instance Three different schemes 1.Virtual Stationary Automaton 2.Send alive messages Send alive messages in a random walk fashion. If a real node doesn’t receive an alive message for too long generates a formation token carries ids and traverses in a random walk fashion If tokens collide: merge ids’ lists If containing more than (N+1)/2 creates a new AVMN

Implementation Exactly 1 instance Three different schemes 1.Virtual Stationary Automaton 2.Send alive messages 3.Nodes alive messages Real nodes periodically send stay alive messages random walk to AVMN in order to survive AVMN must collect at least (N + 1)/2 messages.

Implementation Exactly 1 instance Self-stabilization Every emulating real node –Keeps a replica of the AVMN –Ensures identical replica Buffer input events waiting to be applied to the state. At a fixed interval, sends replica to all. Predetermined function resolves conflicts.

Implementation Exactly 1 instance Self-stabilization Mobility Where and when to move? –Can be decided by current state –Ensure the right order of events –Ensure nodes´ proper join/leave x1x1 x2x2 x3x3 move to x 2 on t 2 move to x 3 on t 3 Esure that: Old nodes remain participants Enough nodes near the new location can receive notification And, mobile nodes can join

Discussion Described how to implement a single AVMN – Can implement multiple AVMNs using the same techniques. There are a number of ways to optimize – Use min amount of power to reach everyone. – Use nodes that are closer to the new AVMN centrum. – If possible, take advantage of nodes movement.

Thank you Your attention is appreciated