Comparison-Based System- Level Fault Diagnosis in Ad Hoc Networks Stefano Chessa, Paolo Santi Reliable Distributed Systems, 2001. Proceedings. 20 th IEEE.

Slides:



Advertisements
Similar presentations
An Adaptive Compulsory Protocol for Basic Communication in Ad-hoc Mobile Networks Ioannis Chatzigiannakis Sotiris Nikoletseas April 2002.
Advertisements

DISTRIBUTED SYSTEMS II FAULT-TOLERANT BROADCAST Prof Philippas Tsigas Distributed Computing and Systems Research Group.
Lecture 8: Asynchronous Network Algorithms
Chapter 15 Basic Asynchronous Network Algorithms
Leader Election Let G = (V,E) define the network topology. Each process i has a variable L(i) that defines the leader.  i,j  V  i,j are non-faulty.
5/5/20151 Mobile Ad hoc Networks COE 549 Transmission Scheduling II Tarek Sheltami KFUPM CCSE COE
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
Byzantine Generals Problem: Solution using signed messages.
Byzantine Generals Problem Anthony Soo Kaim Ryan Chu Stephen Wu.
An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith and Louise E. Moser Presented by Aki Happonen.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
KUASAR An efficient and light-weight protocol for routing and data dissemination in ad hoc wireless sensor networks David Andrews Aditya Mandapaka Joe.
1-1 Topology Control. 1-2 What’s topology control?
Performance Comparison of Routing Protocols for Ad Hoc Networks PATTERN ENDIF Ferrara.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Theory of Interferences, Trade-Offs between.
IEEE OpComm 2006, Berlin, Germany 18. September 2006 A Study of On-Off Attack Models for Wireless Ad Hoc Networks L. Felipe Perrone Dept. of Computer Science.
Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer The service should be independent of the router.
Distributed systems Module 2 -Distributed algorithms Teaching unit 1 – Basic techniques Ernesto Damiani University of Bozen Lesson 4 – Consensus and reliable.
1 Review of Important Networking Concepts Introductory material. This module uses the example from the previous module to review important networking concepts:
Adaptive Topology Discovery in Hybrid Wireless Networks
Ad-hoc On-Demand Distance Vector Routing (AODV) Sirisha R. Medidi.
An Energy Efficient Leaser Election Algorithm for Mobile Ad Hoc Networks Paolo Cemim, Vinicius De Antoni Instituto de Informatica Universidade Federal.
Message Passing Systems A Formal Model. The System Topology – network (connected undirected graph) Processors (nodes) Communication channels (edges) Algorithm.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
Ad Hoc Wireless Routing COS 461: Computer Networks
Message Passing Systems A Formal Model. The System Topology – network (connected undirected graph) Processors (nodes) Communication channels (edges) Algorithm.
Timing-sync Protocol for Sensor Networks (TPSN) Presenter: Ke Gao Instructor: Yingshu Li.
A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks Research Paper By V. D. Park and M. S. Corson.
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
CIS 725 Wireless networks. Low bandwidth High error rates.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Securing Every Bit: Authenticated Broadcast in Wireless Networks Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zarko Milosevic, and Calvin Newport.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
1 A Mutual Exclusion Algorithm for Ad Hoc Mobile networks Presentation by Sanjeev Verma For COEN th Nov, 2003 J. E. Walter, J. L. Welch and N. Vaidya.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
Computer Networks (CS 132/EECS148) General Networking Example Karim El Defrawy Donald Bren School of Information and Computer Science University of California.
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Overview of computer communication and Networking Communication VS transmission Computer Network Types of networks Network Needs Standards.
Cache Management of Dynamic Source Routing for Fault Tolerance in Mobile Ad Hoc Networks.
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
On Reducing Broadcast Redundancy in Wireless Ad Hoc Network Author: Wei Lou, Student Member, IEEE, and Jie Wu, Senior Member, IEEE From IEEE transactions.
DSR: Introduction Reference: D. B. Johnson, D. A. Maltz, Y.-C. Hu, and J. G. Jetcheva, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks,”
Agenda Fail Stop Processors –Problem Definition –Implementation with reliable stable storage –Implementation without reliable stable storage Failure Detection.
K-Anycast Routing Schemes for Mobile Ad Hoc Networks 指導老師 : 黃鈴玲 教授 學生 : 李京釜.
Re-Configurable Byzantine Quorum System Lei Kong S. Arun Mustaque Ahamad Doug Blough.
Void Traversal for Guaranteed Delivery in Geometric Routing
1 Gossip-Based Ad Hoc Routing Zygmunt J. Haas, Joseph Halpern, LiLi Cornell University Presented By Charuka Silva.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 25 November 16, 2004.
Chap 15. Agreement. Problem Processes need to agree on a single bit No link failures A process can fail by crashing (no malicious behavior) Messages take.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Self-stabilizing energy-efficient multicast for MANETs.
DRAND: Distributed Randomized TDMA Scheduling for Wireless Ad-Hoc Networks Injong Rhee (with Ajit Warrier, Jeongki Min, Lisong Xu) Department of Computer.
Fault tolerance and related issues in distributed computing Shmuel Zaks GSSI - Feb
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
CIS 825 Review session. P1: Assume that processes are arranged in a ring topology. Consider the following modification of the Lamport’s mutual exclusion.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
Computer Networking Lecture 16 – Reliable Transport.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
IP tutorial - #2 Routing KAIST Dept. of CS NC Lab.
Routing design goals, challenges,
ECE 544 Protocol Design Project 2016
Internet Networking recitation #4
Byzantine-Resilient Colorless Computaton
by Saltanat Mashirova & Afshin Mahini
Road Map I. Introduction II. IP Protocols III. Transport Layer
Vinay Singh Graduate school of Software Dongseo University
Review of Important Networking Concepts
Presentation transcript:

Comparison-Based System- Level Fault Diagnosis in Ad Hoc Networks Stefano Chessa, Paolo Santi Reliable Distributed Systems, Proceedings. 20 th IEEE Symposium on, 2001

Ad-Hoc Networks Networks of mobile, untethered units communicating via radio transmitters/receivers. Also called multi-hop packet radio The communication paradigm:one-to- many Not shared

If applied to ad-hoc networks, these models do not take advantage of the shared nature of communication. Generalized Maeng and Malek (gMM) model.

The system model n mobile hosts. Communication graph G(t)=(V(t), L(t)) at time t L(t) set of logical links at time t G(t) is undirected (u,v)  L(t) if u is adjacent to v at time t

The system model (continue) N(u,t) neighbor set of u at time t Each mobile has a unique identifier There exits a link-level protocol providing the following services A MAC protocol is executed to solve contentions over logical links. The protocol provides a 1-hop reliable broadcast primitive, called 1_rb(.), to the upper level. The receiver of a message knows the identity of the sender.

The invalidation rule of the gMM model uvwComparison outcome of v and w generated by u Fault-free 0 FaultyFault-free1 Faulty1 Fault-freeFaulty 1 any x

Hard faulted Crashed or battery depletion Is unable to communicate with the rest of the system. Is unable to respond to the test request.

Soft faulted Subtle Produce random and independent results

Two models Two implementations of model under the hypothesis of fixed and time- varying topology. In both implementations we assume that faults are static

Fixed topology comparison protocol N(u,t)=N(u,t ’ )=N(u) for t<t ’  t+T out Test request generation Test request reception Test response reception Timeout reception

Test request generation At time t, unit u generates a test sequence number i, a test task T i, the expected result R u,i and sends the message m=(u,i,T i ) to N(u). Message m is called a test request (u,i) is the header of the test request Unit u sends a message to the timer

Test request reception Any unit v in N(u), upon receiving m, generates the result R v,i for T i and invokes 1_rb(m ’ ) at time t ’, with t<t ’  t+T out m ’ =(u,i,R v,i ) is called a test response (u,i) is the header of the test response

Test response reception Any unit w in N(v), upon receiving m ’ =(u,i,R v,i ), does the following: If w = u If w  u  w  N(u)  w  N(u)

Timeout reception At time t+T out the testing unit u receives the message from the timer and diagnosis as faulty all the units that did not reply to the test request.

Notations N u (v)=N(v)  N(u) N 2 (u)={z  V-N(u): |N u (z)|  2}

Theorem 1 Assume the network topology is fixed, and assume that the fault-free node u generates a test request at time t. Then at time t+T out : Unit u has correctly diagnosed that state of all the units in N(u). Any fault-free unit v in N(u) has correctly diagnosed the state of the fault-free and soft- faulted units in N u (v) Any fault-free unit z in N 2 (u) has correctly diagnosed the state of the fault-free and soft- faulted units in N u (z) if at least two units in N u (z) are fault-free.

Time-varying topology comparison protocol N(u,t)  N(u,t+T out ) Test request generation Test request reception Test response reception Timeout reception

Test request generation At time t, unit u generates a test sequence number i, a test task T i, the expected result R u,i and sends the message m=(u,i,T i ) to N(u,t). Message m is called a test request (u,i) is the header of the test request Unit u sends a message to the timer

Test request reception Any unit v in N(u,t), upon receiving m, generates the result R v,i for T i and invokes 1_rb(m ’ ) at time t ’, with t<t ’  t+T out m ’ =(u,i,R v,i ) is called a test response (u,i) is the header of the test response

Test response reception Any unit w in N(v,t ’ ), upon receiving m ’ =(u,i,R v,i ), does the following: If w = u If w  u  w  N(u,t)  w  N(u,t)

Timeout reception At time t+T out the testing unit u receives the message from the timer and diagnosis as faulty all the units that did not reply to the test request.

Theorem 2 Assume that the fault-free node u generates a test request at time t, and that the network topology can vary. Then, at time t+T out unit u has correctly diagnosed the state of all the units in

Notations

The diagnosis protocol A fault-free unit u generates a test request (u,i,T i ), sent it to N(u), and computes the expected results R u,i. Then it sends a message to the timer. Unit u waits for the responses of units in N(u) and diagnosis their state according to the comparison protocol. When u has diagnosed the state of all units in N(u), it generates a dissemination message containing its local diagnosis.

The diagnosis protocol (continue) Then, unit u waits for dissemination messages generated by other fault-free mobiles in order to complete its diagnosis. The diagnosis protocol for u terminates when the state of all the units in the system has been identified.

The diagnosis protocol (continue) The diagnosis session starts when a fault-free unit initiates its diagnosis protocol, and ends when the diagnosis protocol execution is terminated by every fault-free unit. A diagnostic message can be a test request, a test response, a timeout message or a dissemination message.

The diagnosis protocol (continue) Dissemination messages are messages generated by fault-free units to propagate the diagnosis of their neighbors throughout the network. Any fault-free unit, upon receiving a dissemination message from a neighbor v, does not propagate it until mobile v has been diagnosed as fault-free. Every fault-free unit either propagates or discards any dissemination message in time at most T out.

Lemma 1 (Dissemination correctness) Let G=(V,L) be the graph representing the system at the time of diagnosis. If G is connected and the total number of faulty mobiles in the system is at most  (G)-1, where  (G) is the connectivity of G, then the dissemination message generated by a fault-free unit is correctly received by any other fault- free unit in the system in a finite time.

Theorem 3 Let G=(V,L) be the graph representing the system at the time of diagnosis. If G is connected and the total number of faulty mobiles in the system is at most  (G)-1, then every fault-free unit correctly diagnosis the state of all the mobiles in the system in finite time.

Theorem 4 (communication complexity) Let G=(V,L) be the graph representing the system at the time of diagnosis. The communication complexity of the diagnosis protocol is O(n(n+1+d max )), where n=|V| and d max is the maximum of the node degrees.

Theorem 5 (time complexity) Let G=(V,L) be the graph representing the system at the time of diagnosis. Let T gen be an upper bound to the elapsed time between the reception of the first diagnostic message and the generation of the test request, and let T f be an upper bound to the time needed to propagate a dissemination message. The time complexity of the diagnosis protocol is O(  (T gen +T f )+T out ), where  is the diameter of G.