1 RealProct: Reliable Protocol Conformance Testing with Real Nodes for Wireless Sensor Networks Junjie Xiong, Edith C.-Ngai, Yangfan Zhou, Michael R. Lyu.

Slides:



Advertisements
Similar presentations
Cross-layer Design in Wireless Mesh Networks Hu Wenjie Computer Network and Protocol Testing Laboratory, Dept. of Computer Science & Technology, Tsinghua.
Advertisements

Review of Topology and Access Techniques / Switching Concepts BSAD 141 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
SOFTWARE TESTING. INTRODUCTION  Software Testing is the process of executing a program or system with the intent of finding errors.  It involves any.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
Protocol Design, Testing, and Diagnosis towards Dependable Wireless Sensor Networks XIONG, Junjie CSE, CUHK Supervisor: Michael R. Lyu, Evangeline F.Y.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
June 3, A New Multipath Routing Protocol for Ad Hoc Wireless Networks Amit Gupta and Amit Vyas.
PORT: A Price-Oriented Reliable Transport Protocol for Wireless Sensor Networks Yangfan Zhou, Michael. R. Lyu, Jiangchuan Liu † and Hui Wang The Chinese.
1 In VINI Veritas: Realistic and Controlled Network Experimentation Jennifer Rexford with Andy Bavier, Nick Feamster, Mark Huang, and Larry Peterson
Exploring Tradeoffs in Failure Detection in P2P Networks Shelley Zhuang, Ion Stoica, Randy Katz HIIT Short Course August 18-20, 2003.
Low Delay Marking for TCP in Wireless Ad Hoc Networks Choong-Soo Lee, Mingzhe Li Emmanuel Agu, Mark Claypool, Robert Kinicki Worcester Polytechnic Institute.
TCP/IP Network and Firewall. IP Packet Protocol  1 ICMP packet  6 TCP packet  17 UDP packet.
Communication Protocols III Tenth Meeting. Connections in TCP A wants to send to B. What is the packet next move? A travels through hub and bridge to.
1 A Comparison of Mechanisms for Improving TCP Performance over Wireless Links Course : CS898T Instructor : Dr.Chang - Swapna Sunkara.
Applying Dynamic Analysis to Test Corner Cases First Penka Vassileva Markova Madanlal Musuvathi.
TOSSIM: Visualizing the Real World Philip Levis, Nelson Lee, Dennis Chi and David Culler UC Berkeley NEST Retreat, January 2003.
Wireless Video Sensor Networks Vijaya S Malla Harish Reddy Kottam Kirankumar Srilanka.
Selected Data Rate Packet Loss Channel-error Loss Collision Loss Reduced Packet Probing (RPP) Multirate Adaptation For Multihop Ad Hoc Wireless Networks.
Signal Strength based Communication in Wireless Sensor Networks (Sensor Network Estimation) Imran S. Ansari EE 242 Digital Communications and Coding (Fall.
EstiNet Network Simulator & Emulator 2014/06/ 尉遲仲涵.
Redes Inalámbricas Máster Ingeniería de Computadores 2008/2009 Tema 7.- CASTADIVA PROJECT Performance Evaluation of a MANET architecture.
1 Meeyoung Cha, Sue Moon, Chong-Dae Park Aman Shaikh Placing Relay Nodes for Intra-Domain Path Diversity To appear in IEEE INFOCOM 2006.
CORE KAIST EECS Computer Engineering Research Lab A General Purpose Proxy Filtering Mechanism Applied to the Mobile Environment Bruce Zenel Jupyung Lee.
1 Enabling Large Scale Network Simulation with 100 Million Nodes using Grid Infrastructure Hiroyuki Ohsaki Graduate School of Information Sci. & Tech.
VeriFlow: Verifying Network-Wide Invariants in Real Time
Enhancing the Security of Corporate Wi-Fi Networks using DAIR PRESENTED BY SRAVANI KAMBAM 1.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
The Chinese Univ. of Hong Kong Dept. of Computer Science & Engineering POWER-SPEED A Power-Controlled Real-Time Data Transport Protocol for Wireless Sensor-Actuator.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
Multi-hop-based Monte Carlo Localization for Mobile Sensor Networks
Distributed Monitoring and Aggregation in Wireless Sensor Networks INFOCOM 2010 Changlei Liu and Guohong Cao Speaker: Wun-Cheng Li.
Networking Version2 10/27/2015Slide 1 Format Layered models of processes The seven layers OSI Model Network Requirements Network Topology.
Mobile Agent Migration Problem Yingyue Xu. Energy efficiency requirement of sensor networks Mobile agent computing paradigm Data fusion, distributed processing.
Reducing Energy Consumption in Human- centric Wireless Sensor Networks The 2012 IEEE International Conference on Systems, Man, and Cybernetics October.
Rendezvous Regions: A Scalable Architecture for Service Location and Data-Centric Storage in Large-Scale Wireless Sensor Networks Karim Seada, Ahmed Helmy.
Supervisor: Antoine Bagula Students: Mthokozisi Moyo Luis Sa Wireless Sensor Network Repairing.
A Dead-End Free Topology Maintenance Protocol for Geographic Forwarding in Wireless Sensor Networks IEEE Transactions on Computers, vol. 60, no. 11, November.
Hot Interconnects TCP-Splitter: A Reconfigurable Hardware Based TCP/IP Flow Monitor David V. Schuehler
Secure In-Network Aggregation for Wireless Sensor Networks
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
Performance Validation of Mobile IP Wireless Networks Presented by Syed Shahzad Ali Advisor Dr. Ravi Pendse.
1 Mitigate the Bottleneck of Underwater Acoustic Sensor Networks via Priority Scheduling Junjie Xiong, Michael R. Lyu, Kam-Wing Ng.
Improving TCP Performance over Wireless Networks
Xiong Junjie Node-level debugging based on finite state machine in wireless sensor networks.
Low Power, Low Delay: Opportunistic Routing meets Duty Cycling Olaf Landsiedel 1, Euhanna Ghadimi 2, Simon Duquennoy 3, Mikael Johansson 2 1 Chalmers University.
A Grid-enabled Multi-server Network Game Architecture Tianqi Wang, Cho-Li Wang, Francis C.M.Lau Department of Computer Science and Information Systems.
Troubleshooting Mesh Networks Lili Qiu Joint Work with Victor Bahl, Ananth Rao, Lidong Zhou Microsoft Research Mesh Networking Summit 2004.
An Energy-Efficient Geographic Routing with Location Errors in Wireless Sensor Networks Julien Champ and Clement Saad I-SPAN 2008, Sydney (The international.
Energy-Aware Data-Centric Routing in Microsensor Networks Azzedine Boukerche SITE, University of Ottawa, Canada Xiuzhen Cheng, Joseph Linus Dept. of Computer.
A Reliability-oriented Transmission Service in Wireless Sensor Networks Yunhuai Liu, Yanmin Zhu and Lionel Ni Computer Science and Engineering Hong Kong.
TempLab : A Testbed to Study the Impact of Temperature on Wireless Sensor Networks C.A. Boanoy, M.A. Zúñiga, J. Brownz, U. Roedigz, C. Keppitiyagama§,
Integration of Wireless Sensor Networks to the Internet of Things using a 6LoWPAN Gateway Integration of Wireless Sensor Networks to the Internet of Things.
1 Software Reliability in Wireless Sensor Networks (WSN) -Xiong Junjie
Placing Relay Nodes for Intra-Domain Path Diversity Meeyoung Cha Sue Moon Chong-Dae Park Aman Shaikh Proc. of IEEE INFOCOM 2006 Speaker 游鎮鴻.
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
USHA: A Practical Vertical Handoff Solution Ling-Jyh Chen, Tony Sun, Mario Gerla Computer Science Department, UCLA.
Cognitive Information Service Basic Principles and Implementation of A Cognitive Inter-Node Protocol Optimization Scheme Dzmitry Kliazovich Fabrizio Granelli.
Source : 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) Auther : Nacer Khalil, Mohamed.
Computer Networking A Top-Down Approach Featuring the Internet Introduction Jaypee Institute of Information Technology.
A quick intro to networking
OSI model vs. TCP/IP MODEL
Diagnosing Wireless Sensor Networks through Wireless Mobile Nodes
Surviving Holes and Barriers in Geographic Data Reporting for
SDN Based IoT-Cloud Comm.
RealProct: Reliable Protocol Conformance Testing with Real Nodes for Wireless Sensor Networks Junjie Xiong
Yiannis Andreopoulos et al. IEEE JSAC’06 November 2006
Computer Networking A Top-Down Approach Featuring the Internet
Process-to-Process Delivery: UDP, TCP
Presentation transcript:

1 RealProct: Reliable Protocol Conformance Testing with Real Nodes for Wireless Sensor Networks Junjie Xiong, Edith C.-Ngai, Yangfan Zhou, Michael R. Lyu

2 Outline Motivation RealProct Design Evaluation Conclusion

3 Motivation Current main methods to fight back the software bugs in Wireless sensor networks (WSNs): Simulation: different from real execution. Testbeds: designed for network performance evaluation rather than software bug detection. Large-scale real deployment: expensive. uses a small number of real sensor nodes to mimic large-scale WSNs and test the protocol implementation against the specification -> RealProct

4 Outline Motivation RealProct Design Evaluation Conclusion

5 Challenges Sensor node is difficult to control than a computer.  Limited CPU and inconvenient interface. How to test the protocol with various topologies and events when RealProct only employs a few real sensor nodes. Volatile wireless environment in WSNs will lead to random packet loss, and cause problems in testing.

6 RealProct Solutions to the Challenges An architecture that enables testing with real sensor nodes. Topology virtualization and event virtualization. Dynamic Test Execution.

7 Background of RealProct Protocol conformance testing (PCT) process  IUT (Implementation Under Test)

8 RealProct Architecture SUT (System Under Test) Lower Tester Upper Tester Point of Control & Observation

9 Topology Virtualization Use the tester to virtualize a 3-node topology for SUT

10 Event Virtualization Use the tester to create a packet disorder event at the SUT.

11 Reason to Use Dynamic Test Execution Suppose packet loss probability is L 0, a test case is executed n times, and it passes n 1 times and fails n 2 times. If n 1 > n 2, declare as pass, the FN (false negative) probability is If n 1 < n 2, declare as fail, the FP (false positive) probability is

12 Dynamic Test Execution To guarantee that both the FN and FP error rates are lower than a required value E, the minimum time to execute each test case is: The actual execution times are dynamic.  Repeat the test case execution until its FN and FP error rates are lower than E.

13 Outline Motivation RealProct Design Evaluation Conclusion

14 Performance Evaluation Two real TelosB sensor nodes and a PC. Contiki 2.4: μIP TCP/IP protocol. Two new bugs and previous bug repetition. Two new bugs and previous bug repetition.  Bug 1 & 2 – Connect to opened & unopened TCP ports.  Bug 3 – SYN/ACK packet loss.  Bug 4 – SYN packet duplication.

15 Performance Evaluation Bug 1 – Connect to opened TCP ports.  Test opened port 0 & 80 (within 0 to 65535).

16 Performance Evaluation Bug 1 – Client (Tester) connects to opened TCP port 0 of Server (SUT). Bug: Client expects SYN/ACK response while it receives no reply.

17 Performance Evaluation Bug 2 – Client (Tester) connects to unopened TCP port 0 of Server (SUT). Bug: Client expects RST response while it receives no reply.

18 Outline Motivation RealProct Design Evaluation Conclusion

19 Conclusion As a protocol testing tool, RealProct finds two new bugs, discovers all the previously detected bugs in the TCP/IP stack of WSNs, and validates the Rime mesh routing protocol. Propose two techniques, topology virtualization and event virtualization, for testing. Design an algorithm to tackle the inaccuracy problem caused by non-deterministic events in test execution.

20 Q & A Thank you!

21 Codes that Cause Bugs

22 Repeat Bug – SYN Packet Loss

Repeat Bug – Duplicate SYN Packet

24 Dynamic Test Execution