Robust Systems. Faults at James Reserve Faults on a volcano in Ecuador [WLJ + 06]

Slides:



Advertisements
Similar presentations
Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Advertisements

1 Integrity Service Excellence Complex Information Systems 19 Mar 13 Robert J. Bonneau, Ph.D. AFOSR/RTC.
Switching Technology presented by Hussain Ahmad BA-Abdullah. Fawaz abdullah AL-Amri. prof : Adel Ali.
Harbor: Software based Memory Protection for Sensor Nodes Ram Kumar, Akhilesh Singhania, Eddie Kohler and Mani Srivastava Introduction: Memory protection.
Writing Programs that Work Nupur Kothari University of Southern California Roy Shea University of California, Los Angeles.
Directed Diffusion for Wireless Sensor Networking
Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
Network Coding Testbed Using Software-Defined Radio Abstract In current generation networks, network nodes operate by replicating and forwarding the packets.
Impact of Radio Irregularity on Wireless Sensor Networks
8/22/20061 Maintaining a Linked Network Chain Utilizing Decentralized Mobility Control AIAA GNC Conference & Exhibit Aug. 21, 2006 Cory Dixon and Eric.
Taming the Underlying Challenges of Reliable Multihop Routing in Sensor Networks.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
Chapter 19 Binding Protocol Addresses (ARP) Chapter 20 IP Datagrams and Datagram Forwarding.
Kumar R., Singhania A., Castner A., Kohler E Proceedings of Design Automation Conference Pages: June /7/13.
Wireless Sensor Networks Smart Environments: Technologies, Protocols, and Applications ed. D.J. Cook and S.K. Das, John Wiley, New York, B.Devi
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha Presented by Ray Lam Oct 23, 2004.
COMPUTER NETWORKS.
1 Energy Efficient Communication in Wireless Sensor Networks Yingyue Xu 8/14/2015.
Formatting and Baseband Modulation
Formal checkings in networks James Hongyi Zeng with Peyman Kazemian, George Varghese, Nick McKeown.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Distributed Control of FACTS Devices Using a Transportation Model Bruce McMillin Computer Science Mariesa Crow Electrical and Computer Engineering University.
Sidewinder A Predictive Data Forwarding Protocol for Mobile Wireless Sensor Networks Matt Keally 1, Gang Zhou 1, Guoliang Xing 2 1 College of William and.
DESIGN & IMPLEMENTATION OF SMALL SCALE WIRELESS SENSOR NETWORK
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
A Survey of Dynamic Techniques for Detecting Device Driver Errors Olatunji Ruwase LBA Reading Group 18 th May 2010.
SenseIT: Networking 1 Sensor.com WINS NG Networks Networking Research Review SenseIT PI Meeting October 7-8, 1999 Marina Del Rey Presented to Dr. Sri Kumar.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
1 Exploiting Heterogeneity for Routing in Wireless Sensor Networks CENS Seminar Series 6 October 2006 Thanos Stathopoulos CENS Systems Lab
Software Based Memory Protection For Sensor Nodes Ram Kumar, Eddie Kohler, Mani Srivastava CENS Technical Seminar Series.
Simon Han – Ram Kumar Rengaswamy – Roy Shea – Mani Srivastava – Eddie Kohler –
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
SENSOR NETWORKS BY Umesh Shah Mayuresh Patil G P Reddy GUIDES Prof U.B.Desai Prof S.N.Merchant.
Application Block Diagram III. SOFTWARE PLATFORM Figure above shows a network protocol stack for a computer that connects to an Ethernet network and.
Communication Paradigm for Sensor Networks Sensor Networks Sensor Networks Directed Diffusion Directed Diffusion SPIN SPIN Ishan Banerjee
REED: Robust, Efficient Filtering and Event Detection in Sensor Networks Daniel Abadi, Samuel Madden, Wolfgang Lindner MIT United States VLDB 2005.
1 REED: Robust, Efficient Filtering and Event Detection in Sensor Networks Daniel Abadi, Samuel Madden, Wolfgang Lindner MIT United States VLDB 2005.
Chapter 7 - Packets, Frames and Error Detection 1. Concepts of Packets 2. Motivation for Packet Switching 3. Framing 4. Frame Formats 5. Transmission Errors.
Cache Coherence Protocols 1 Cache Coherence Protocols in Shared Memory Multiprocessors Mehmet Şenvar.
Wireless Sensor Networks Nov 1, 2006 Jeon Bokgyun
Chapter 9 Hardware Addressing and Frame Type Identification 1.Delivering and sending packets 2.Hardware addressing: specifying a destination 3. Broadcasting.
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
1 Computer Communication & Networks Lecture 21 Network Layer: Delivery, Forwarding, Routing Waleed.
A Dynamic Operating System for Sensor Nodes Chih-Chieh Han, Ram Kumar, Roy Shea, Eddie Kohler, Mani, Srivastava, MobiSys ‘05 Oct., 2009 발표자 : 김영선, 윤상열.
DISTIN: Distributed Inference and Optimization in WSNs A Message-Passing Perspective SCOM Team
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
FUNDAMENTALS OF NETWORKING
Efficient software-based fault isolation Robert Wahbe, Steven Lucco, Thomas Anderson & Susan Graham Presented by: Stelian Coros.
A Binary Agent Technology for COTS Software Integrity Anant Agarwal Richard Schooler InCert Software.
Mote Clusters Thanos Stathopoulos CENS Systems Lab Joint work with Ben Greenstein, Lewis Girod, Mohammad Rahimi, Tom Schoellhammer, Ning Xu, Richard Guy.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Advanced control strategies. CONTROL SYSTEMS The process parameters which are measured using probes described in the previous sections may be controlled.
- A Maximum Likelihood Approach Vinod Kumar Ramachandran ID:
1 Ad-hoc Transport Layer Protocol (ATCP) EECS 4215.
Wireless Sensor Networks: A Survey I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci.
PROJECT DOMAIN : NETWORK SECURITY Project Members : M.Ananda Vadivelan & E.Kalaivanan Department of Computer Science.
9/30/2016 Distributed System Exploration Mirabilis Design Inc.
Introduction to Discrete-Time Control Systems fall
Whirlwind Tour Of Lectures So Far
IOS Network Model 2nd semester
Final Review CS144 Review Session 9 June 4, 2008 Derrick Isaacson
Greedy Distributed Spanning tree routing (gdstr)
REED : Robust, Efficient Filtering and Event Detection
Presentation transcript:

Robust Systems

Faults at James Reserve

Faults on a volcano in Ecuador [WLJ + 06]

Data faults in Bangladesh

Calibration

Motivation Summary Sensing Channel Transducer Network Analog Processing ADC Digital H/W + Software Phenomenon User Noise Interference Obstructions Adversaries Noise Calibration Faults Noise Calibration Faults Quantization Error Faults Bugs Adversaries Packet Loss Adversaries Smart Sensors Stable gain; Auto zero-offset correction; Transducer interference compensation; Compensation for temperature, package strain etc.; Integrated trimming for end-of- line calibration; Outstanding calibration stability Well Studied Image courtesy Mani Srivastava Hard Problems

Summary People pay for robustness in other systems –Higher quality hardware –Technicians to monitor the data –Wired infrastructure In sensor networks when we pay, we pay for scale The burden on software has increased Robustness in sensor networks requires research and engineering

CentRoute Designed for robustness –Minimizes routing inconsistencies, including loops –Minimizes memory (state) requirements on motes –Increases routing stability –Can scale to dense networks Routing table, neighbor table, local decisions Distributed decision making on very limited RAM hardware Distributed Mote RoutingCentralized Mote Routing All routing decisions & state at microserver Bypasses mote hardware limitations through global view at microserver Additional functionality –Bidirectional unicast routing (to and from the sink) –Global view of the entire mote network at each sink Work by Thanos Stathopoulos

Memory Protection LIGHTHOUSE Develop simple and intuitive memory model – Each block of memory is under the control of exactly one program at any time – Controlling program is responsible for either tracking, freeing, or transferring ownership of the data Found significant memory management errors in both kernel and user SOS code using new analysis tool Accomplishes analysis via basic data-flow analysis on source code SANDBOX Create multiple protection domains within single address space CPUs – Restrict write accesses of a domain to memory it owns – Restrict control flow in and out of a domain Designed for small memory CPUs – No static partitioning of address space – Compact memory map tracks ownership and layout Enforced by inline run-time checks – All write accesses are checked – All control flow operations are checked Checks introduced through binary re-write – Binary verified at every node – Verifier independent of re-writer – Correctness of scheme depends only upon correctness of verifier Work by Ram Kumar and Roy Shea

Tenet Show counter on LEDs Sense and send data back to the sink... with time-stamp and sequence number Get memory status for node 10 If temperature is above 50, send temperature, node ID and next routing hop WaitCountLightsSendSampleSendCountStampTimeSendSample MemStatsSendAddressNEQ(10)DeleteIf SampleLT(50)DeleteATaskIfAddressNexthopSend Paek, Greenstein et al.

Environment Sensors Mote Batteries Radio Network Final Destination Sensorboard Sympathy & Confidence Data Generation PathData Delivery Path BothUser Actions Remediate Action-Refinement Probes + Database Refine & Adapt BothHardware Rules identify locations data could be corrupted Data Flow Rules identify locations data could be lost Diagnose BothTrack end-to-end data quality Track end-to-end data quantity Detect ConfidenceData IntegritySympathy Nithya Ramanathan

Fault Detection Contextual or multiscale information Another modality on the same node Nodes of Same Altitude or Depth Proximate Nodes Measurements at same time previous day Recent Measurements Exploit sensor data by finding correlations between different variables Recognize a fault when sensor data breaks its strongest correlations Variable space is too high dimensional Signal processing techniques may provide an efficient correlation model