Copyright © 2006, UCD Dublin Systems Research Group School of Computer Science and Informatics UCD Dublin, Belfield, Dublin 4, Ireland

Slides:



Advertisements
Similar presentations
Ranveer Chandra Ramasubramanian Venugopalan Ken Birman
Advertisements

University of Southampton Electronics and Computer Science M-grid: Using Ubiquitous Web Technologies to create a Computational Grid Robert John Walters.
X stream Project proposal. Project goals: Students Students: Academic Supervisor Academic Supervisor: Advisors: Developing and Implementing a large scale.
Sensor network Routing protocol A study on LEACH protocol and how to improve it.
Adaptive Protocols for Information Dissermination in Wireless Sensor Networks Authors : Joanna Kulik, Wendi Rabiner, Hari Balakrishnan Speaker.
An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Network
Highly-Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks Computer Science Department, UCLA International Computer Science Institute,
Gossip Algorithms and Implementing a Cluster/Grid Information service MsSys Course Amar Lior and Barak Amnon.
Reliable Group Communication Quanzeng You & Haoliang Wang.
Faculty of Electrical Engineering, Technion Drum Gal Badishi Exposing and Eliminating Vulnerabilities to Denial of Service Attacks in Secure Gossip-Based.
Adapting Asynchronous Messaging Middleware to Ad Hoc Networking Mirco Musolesi Cecilia Mascolo Stephen Hailes Dept. of Computer Science University College.
A PASS Scheme in Clouding Computing - Protecting Data Privacy by Authentication and Secret Sharing Jyh-haw Yeh Dept. of Computer Science Boise State University.
Vivaldi Coordinate Service Justin Ma, Patrick Verkaik, Michael Vrable Department of Computer Science And Engineering UCSD CSE222A, Winter 2005.
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
Faculty of Electrical Engineering, Technion FuDiCo II G. Badishi & I. Keidar Towards Survivability of Application-Level Multicast Gal Badishi, Idit Keidar,
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
Faculty of Electrical Engineering, Technion May 2004 Gal Badishi Exposing and Eliminating Vulnerabilities to Denial of Service Attacks in Secure Gossip-Based.
Dissemination protocols for large sensor networks Fan Ye, Haiyun Luo, Songwu Lu and Lixia Zhang Department of Computer Science UCLA Chien Kang Wu.
Faculty of Electrical Engineering, Technion DSN 2004 Gal Badishi Exposing and Eliminating Vulnerabilities to Denial of Service Attacks in Secure Gossip-Based.
CS 599 Intelligent Embedded Systems1 Adaptive Protocols for Information Dissemination in Wireless Sensor Networks W.R.Heinzelman, J.kulik, H.Balakrishnan.
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
1 PLuSH – Mesh Tree Fast and Robust Wide-Area Remote Execution Mikhail Afanasyev ‧ Jose Garcia ‧ Brian Lum.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Faculty of Electrical Engineering, Technion DSN 2004 Gal Badishi Exposing and Eliminating Vulnerabilities to Denial of Service Attacks in Secure Gossip-Based.
SiS Technical Training Development Track Day 10. Agenda  Introduction to Integration Broker  How to Expose and Consume WebServices.
Measuring Network Performance of Multi-Core Multi-Cluster (MCMCA) Norhazlina Hamid Supervisor: R J Walters and G B Wills PUBLIC.
Multicast Communication Multicast is the delivery of a message to a group of receivers simultaneously in a single transmission from the source – The source.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Computer System Lifecycle Chapter 1. Introduction Computer System users, administrators, and designers are all interested in performance evaluation. Whether.
Communication (II) Chapter 4
Vikramaditya. What is a Sensor Network?  Sensor networks mainly constitute of inexpensive sensors densely deployed for data collection from the field.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Gil EinzigerRoy Friedman Computer Science Department Technion.
Overcast: Reliable Multicasting with an Overlay Network CS294 Paul Burstein 9/15/2003.
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
Can Cloud Computing be Used for Planning? An Initial Study Authors: Qiang Lu*, You Xu†, Ruoyun Huang†, Yixin Chen† and Guoliang Chen* from *University.
PERVASIVE COMPUTING MIDDLEWARE BY SCHIELE, HANDTE, AND BECKER A Presentation by Nancy Shah.
Distributed Virtual Environments Introduction. Outline What are they? DVEs vs. Analytic Simulations DIS –Design principles Example.
Trust Propagation using Cellular Automata for UbiComp 28 th May 2004 —————— Dr. David Llewellyn-Jones, Prof. Madjid Merabti, Dr. Qi Shi, Dr. Bob Askwith.
University of Stuttgart Institute of Parallel and Distributed Systems (IPVS) Breitwiesenstraße D Stuttgart An Epidemic Model for Information.
Presentation slides prepared by Ramakrishnan.V LMS: A Router Assisted Scheme for Reliable Multicast Christos Papadopoulos, University of Southern California.
1 SmartGossip: An Adaptive Broadcast Service for Wireless Sensor Networks Presented By Thomas H. Hand Duke University Adapted from: “ SmartGossip: An Adaptive.
Prof. Mort AnvariStrayer University at Arlington, VAAugust Exposing and Eliminating Vulnerabilities to Denial of Service Attacks in Secure Gossip-Based.
Networked Games Objectives – –Understand the types of human interaction that a network game may provide and how this influences game play. –Understand.
ICS362 – Distributed Systems Dr. Ken Cosh Week 2.
Stefanos Antaris A Socio-Aware Decentralized Topology Construction Protocol Stefanos Antaris *, Despina Stasi *, Mikael Högqvist † George Pallis *, Marios.
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks Tijs van Dam, Koen Langendoen In ACM SenSys /1/2005 Hong-Shi Wang.
The Globus eXtensible Input/Output System (XIO): A protocol independent IO system for the Grid Bill Allcock, John Bresnahan, Raj Kettimuthu and Joe Link.
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
Global Clock Synchronization in Sensor Networks Qun Li, Member, IEEE, and Daniela Rus, Member, IEEE IEEE Transactions on Computers 2006 Chien-Ku Lai.
An overlay for latency gradated multicasting Anwitaman Datta SCE, NTU Singapore Ion Stoica, Mike Franklin EECS, UC Berkeley
Toward Resilient Security in Wireless Sensor Networks Rob Polak Feb CSE 535.
TRUST Self-Organizing Systems Emin G ü n Sirer, Cornell University.
MIT Lincoln Laboratory Dynamic Declarative Networking Exploiting Declarative Knowledge To Enable Energy Efficient Collaborative Sensing Daniel J. Van Hook.
Wireless Access and Networking Technology (WANT) Lab. An Efficient Data Aggregation Approach for Large Scale Wireless Sensor Networks Globecom 2010 Lutful.
Accelerating Peer-to-Peer Networks for Video Streaming
Data Collection and Dissemination
Giannis F. Marias, Vassileios Tsetsos,
Gossip-based Data Dissemination
Cloud Data Anonymization Using Hadoop Map-Reduce Framework With Qos Evaluation and Behaviour analysis PROJECT GUIDE: Ms.S.Subbulakshmi TEAM MEMBERS: A.Mahalakshmi( ).
Algorithms for Big Data Delivery over the Internet of Things
湖南大学-信息科学与工程学院-计算机与科学系
Providing Secure Storage on the Internet
Strayer University at Arlington, VA
Data Collection and Dissemination
Cyber Physical Systems
Investigating Mac Power Consumption in Wireless Sensor Network
ContinuStreaming: Achieving High Playback Continuity of Gossip-based Peer-to-Peer Streaming IPDPS 2008 LI Zhenhua Dept. Computer, Nanjing University.
Presentation transcript:

Copyright © 2006, UCD Dublin Systems Research Group School of Computer Science and Informatics UCD Dublin, Belfield, Dublin 4, Ireland UCD Systems Research Group Like reality, but different… Scalable Information Dissemination for Pervasive Systems Graham Williamson Implementation and Evaluation

Scalable Information Dissemination for Pervasive Systems: Implementation and Evaluation 2 Introduction Middleware for pervasive systems Requirements  Easy for the application developer  Robust, resilient, scalable, self-organising…  Sensor information must be disseminated We propose “gossiping” for information dissemination  But is this a good solution?

Scalable Information Dissemination for Pervasive Systems: Implementation and Evaluation 3 Construct

Scalable Information Dissemination for Pervasive Systems: Implementation and Evaluation 4 Gossiping “Epidemic: An outbreak of a contagious disease that spreads rapidly and widely” (Dictionary.com) Gossiping is an epidemic algorithm:  Information spreads from a source through local interactions  People passing a disease ↔ Processes passing a message

Scalable Information Dissemination for Pervasive Systems: Implementation and Evaluation 5 Gossiping

Scalable Information Dissemination for Pervasive Systems: Implementation and Evaluation 6 Gossiping Key Points  Gossiping occurs in rounds  Rounds are not synchronised  Neighbours are chosen randomly  # of neighbours is called fanout Results in emergent behaviour -redundancy built in -purely local interactions  more scalable

Scalable Information Dissemination for Pervasive Systems: Implementation and Evaluation 7 Implementation

Scalable Information Dissemination for Pervasive Systems: Implementation and Evaluation 8 Implementation Protocols have two parts: 1. Sending process initiates gossips 2. Listening process waits for gossips Also, consider multiple messages:  Cannot infinitely buffer all messages  Gossip active message digests  Listener requests resends of missing messages

Scalable Information Dissemination for Pervasive Systems: Implementation and Evaluation 9 Implementation repeat forever { sleep ( T ); age_messages(); digest  message_history_summary(); repeat fanout times { peer  random_peer(); send ( digest, peer ); } Sending Process:

Scalable Information Dissemination for Pervasive Systems: Implementation and Evaluation 10 Implementation repeat forever { digest  wait_for_incoming_gossip(); my_digest  message_history_summary(); compare ( digest, my_digest ) { pull messages from sender and/or push messages to sender } Listening Process:

Scalable Information Dissemination for Pervasive Systems: Implementation and Evaluation 11 Evaluation – methodology We want to: Examine behaviour Facilitate comparisons Improve protocols Ultimately: Investigate the suitability of gossiping for this domain.

Scalable Information Dissemination for Pervasive Systems: Implementation and Evaluation 12 Evaluation – platforms Simulation with OmNet++  Modular and easy to work with Emulation using PlanetLab  Access to over 700 nodes  Fast, reliable network provides a baseline for other measurements

Scalable Information Dissemination for Pervasive Systems: Implementation and Evaluation 13 Evaluation – parameters Changing a parameter can have multiple effects  Reduce network load by increasing T?  Increase reliability by increasing fanout? An optimisation problem  Adaptive techniques for adjusting parameters at runtime

Scalable Information Dissemination for Pervasive Systems: Implementation and Evaluation 14 Evaluation – measurements What defines a good (or bad) gossiping protocol?  Low latency is good  But at what cost?  Data redundancy, good or bad? …Trade-offs

Scalable Information Dissemination for Pervasive Systems: Implementation and Evaluation 15 Evaluation – the vision Key Question Why do I have to write multiple implementations of the same algorithm???  Time consuming, error-prone… Ideal Solution  A single implementation for simulation, emulation, and deployment

Scalable Information Dissemination for Pervasive Systems: Implementation and Evaluation 16 Where are we now? Progress Initial identification of parameters and measurements Implementation in our middleware, Construct -see Next steps Finish installation of PlanetLab nodes Perform the evaluation

Scalable Information Dissemination for Pervasive Systems: Implementation and Evaluation 17 Questions?

Scalable Information Dissemination for Pervasive Systems: Implementation and Evaluation 18 Security & Privacy Two main approaches:  Encryption of personal data such that it can only be read by trusted, privileged, parties  Not so appropriate for resource limited devices  Selective dissemination that ensures personal information is only gossiped with a trusted group of peers  Critical nodes *must* handle information regardless of trust

Scalable Information Dissemination for Pervasive Systems: Implementation and Evaluation 19 Parameters (detail)

Scalable Information Dissemination for Pervasive Systems: Implementation and Evaluation 20 Measurements (detail)