Relying on Safe Distance to Achieve Strong Partitionable Group Membership in Ad Hoc Networks Authors: Q. Huang, C. Julien, G. Roman Presented By: Jeff.

Slides:



Advertisements
Similar presentations
Impossibility of Distributed Consensus with One Faulty Process
Advertisements

CS 542: Topics in Distributed Systems Diganta Goswami.
CS425 /CSE424/ECE428 – Distributed Systems – Fall 2011 Material derived from slides by I. Gupta, M. Harandi, J. Hou, S. Mitra, K. Nahrstedt, N. Vaidya.
Failure Detection The ping-ack failure detector in a synchronous system satisfies – A: completeness – B: accuracy – C: neither – D: both.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Minimum Energy Mobile Wireless Networks IEEE JSAC 2001/10/18.
1 Transport Protocols & TCP CSE 3213 Fall April 2015.
Transport Layer – TCP (Part2) Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
(c) Oded Shmueli Distributed Recovery, Lecture 7 (BHG, Chap.7)
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Lecture 4: Elections, Reset Anish Arora CSE 763 Notes include material from Dr. Jeff Brumfield.
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
Byzantine Generals Problem: Solution using signed messages.
Information Dissemination in Highly Dynamic Graphs Regina O’Dell Roger Wattenhofer.
1 Complexity of Network Synchronization Raeda Naamnieh.
Secure Multicast (II) Xun Kang. Content Batch Update of Key Trees Reliable Group Rekeying Tree-based Group Diffie-Hellman Recent progress in Wired and.
Secure Data Communication in Mobile Ad Hoc Networks Authors: Panagiotis Papadimitratos and Zygmunt J Haas Presented by Sarah Casey Authors: Panagiotis.
A Progressive Fault Detection and Service Recovery Mechanism in Mobile Agent Systems Wong Tsz Yeung Aug 26, 2002.
Scalable Application Layer Multicast Suman Banerjee Bobby Bhattacharjee Christopher Kommareddy ACM SIGCOMM Computer Communication Review, Proceedings of.
Non-blocking Atomic Commitment Aaron Kaminsky Presenting Chapter 6 of Distributed Systems, 2nd edition, 1993, ed. Mullender.
1 IMPROVING RESPONSIVENESS BY LOCALITY IN DISTRIBUTED VIRTUAL ENVIRONMENTS Luca Genovali, Laura Ricci, Fabrizio Baiardi Lucca Institute for Advanced Studies.
© Honglei Miao: Presentation in Ad-Hoc Network course (19) Minimal CDMA Recoding Strategies in Power-Controlled Ad-Hoc Wireless Networks Honglei.
2/23/2009CS50901 Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial Fred B. Schneider Presenter: Aly Farahat.
Synchronization in Distributed Systems. Mutual Exclusion To read or update shared data, a process should enter a critical region to ensure mutual exclusion.
Distributed Systems Fall 2009 Replication Fall 20095DV0203 Outline Group communication Fault-tolerant services –Passive and active replication Highly.
Distributed Systems 2006 Group Membership * *With material adapted from Ken Birman.
Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks Ranveer Chandra (joint work with Venugopalan Ramasubramanian and Ken Birman)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Transport Protocols Slide 1 Transport Protocols.
1 More on Distributed Coordination. 2 Who’s in charge? Let’s have an Election. Many algorithms require a coordinator. What happens when the coordinator.
Lecture 12 Synchronization. EECE 411: Design of Distributed Software Applications Summary so far … A distributed system is: a collection of independent.
Composition Model and its code. bound:=bound+1.
Error Checking continued. Network Layers in Action Each layer in the OSI Model will add header information that pertains to that specific protocol. On.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
Lab 1 Bulletin Board System Farnaz Moradi Based on slides by Andreas Larsson 2012.
M. Menelaou CCNA2 DYNAMIC ROUTING. M. Menelaou DYNAMIC ROUTING Dynamic routing protocols can help simplify the life of a network administrator Routing.
Qian Zhang Department of Computer Science HKUST Advanced Topics in Next- Generation Wireless Networks Transport Protocols in Ad hoc Networks.
1 System Models. 2 Outline Introduction Architectural models Fundamental models Guideline.
ARMADA Middleware and Communication Services T. ABDELZAHER, M. BJORKLUND, S. DAWSON, W.-C. FENG, F. JAHANIAN, S. JOHNSON, P. MARRON, A. MEHRA, T. MITTON,
University of the Western Cape Chapter 12: The Transport Layer.
SELMA: A middleware platform for self- organizing distributed applications in mobile multi-hop ad-hoc networks Daniel Görgen, Hannes Frey, Johannes K.
Lab 2 Group Communication Farnaz Moradi Based on slides by Andreas Larsson 2012.
Farnaz Moradi Based on slides by Andreas Larsson 2013.
Farnaz Moradi Based on slides by Andreas Larsson 2013.
Dealing with open groups The view of a process is its current knowledge of the membership. It is important that all processes have identical views. Inconsistent.
TOPOLOGY MANAGEMENT IN COGMESH: A CLUSTER-BASED COGNITIVE RADIO MESH NETWORK Tao Chen; Honggang Zhang; Maggio, G.M.; Chlamtac, I.; Communications, 2007.
K-Anycast Routing Schemes for Mobile Ad Hoc Networks 指導老師 : 黃鈴玲 教授 學生 : 李京釜.
November NC state university Group Communication Specifications Gregory V Chockler, Idit Keidar, Roman Vitenberg Presented by – Jyothish S Varma.
Totally Ordered Broadcast in the face of Network Partitions [Keidar and Dolev,2000] INF5360 Student Presentation 4/3-08 Miran Damjanovic
EEC 688/788 Secure and Dependable Computing Lecture 10 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
The Totem Single-Ring Ordering and Membership Protocol Y. Amir, L. E. Moser, P. M Melliar-Smith, D. A. Agarwal, P. Ciarfella.
Building Dependable Distributed Systems, Copyright Wenbing Zhao
SysRép / 2.5A. SchiperEté The consensus problem.
Reliable Communication in the Presence of Failures Kenneth P. Birman and Thomas A. Joseph Presented by Gloria Chang.
Antidio Viguria Ann Krueger A Nonblocking Quorum Consensus Protocol for Replicated Data Divyakant Agrawal and Arthur J. Bernstein Paper Presentation: Dependable.
Peter Pham and Sylvie Perreau, IEEE 2002 Mobile and Wireless Communications Network Multi-Path Routing Protocol with Load Balancing Policy in Mobile Ad.
CSE 486/586 CSE 486/586 Distributed Systems Leader Election Steve Ko Computer Sciences and Engineering University at Buffalo.
Distributed Systems Lecture 9 Leader election 1. Previous lecture Middleware RPC and RMI – Marshalling 2.
Fundamentals of Fault-Tolerant Distributed Computing In Asynchronous Environments Paper by Felix C. Gartner Graeme Coakley COEN 317 November 23, 2003.
Asstt. Professor Adeel Akram. Other Novel Routing Approaches Link reversal Aimed for highly dynamic networks Goal: to identify some path, as opposed.
EEC 688/788 Secure and Dependable Computing Lecture 10 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Reliable multicast Tolerates process crashes. The additional requirements are: Only correct processes will receive multicasts from all correct processes.
GeoTORA: A Protocol for Geocasting in Mobile Ad Hoc Networks
EEC 688/788 Secure and Dependable Computing
CSE 486/586 Distributed Systems Leader Election
EEC 688/788 Secure and Dependable Computing
EEC 688/788 Secure and Dependable Computing
Error Checking continued
CSE 486/586 Distributed Systems Leader Election
M. Mock and E. Nett and S. Schemmer
Presentation transcript:

Relying on Safe Distance to Achieve Strong Partitionable Group Membership in Ad Hoc Networks Authors: Q. Huang, C. Julien, G. Roman Presented By: Jeff Joyner

Overview Group Membership Explanation Problems in Group Membership Solutions to Group Membership Issues Safe Distance Explanation System Implementation Conclusions

Strong Group Membership “Service that establishes and maintains some kind of agreement over time among participating components about who is currently in the group, despite the presence of failures in the corresponding distributed system”

Need For Consistent Group Membership Views Any situation that requires the presence of two entities to implement a task requires a consistent membership view –Electronic witness –Intelligent transportation systems –Military battle group systems

Problems with Consistent Group Membership Views Ad Hoc Networks have high rates of disconnections among group members To maintain a consistent group membership view, there is a need to detect a future disconnection before it occurs Determining a future disconnection enables a group to merge or split in advance to maintain a consistent membership view –Safe Distance algorithm accomplishes this goal

Safe Distance Goal Provide the ability to maintain a consistent global data structure in a mobile environment where hosts join and leave the network randomly and conduct reliable transactions with other hosts in the group membership view

Safe Distance Importance All members of a group must have a common group membership view Disconnections are common in ad hoc networks Fixed networks eventually recover from a disconnection Ad hoc networks usually do not recover from a disconnection Safe Distance is necessary to detect the disconnection before it happens and maintain a consistent group membership view

Safe Distance Maximum distance between hosts that a communication task is guaranteed to complete before disconnection Two hosts agree on membership in the same group when they are at distance: r <= R – 2v * (t + t’)

Safe Distance Responsibilities Determines when two groups can be merged Determines when a group must be split to maintain the requirements for a consistent group membership view

Safe Group Definition Two members of a group are connected on a path in which all consecutive hosts are at a safe distance

Safe Distance Example

Safe Distance Equation r <= R – 2v * (t + t’) –R = Transmitter communication range –2v = Worst-case movement where two hosts are moving in opposite directions at max speed –t = Upper bound time for network latency –t’ = Time for group-level operation to complete

System Model Assumptions No host crash failures and no failures based on network congestion Underlying communication system is reliable and timely All hosts have the same communication radius All hosts know their physical location at all times No knowledge of mobility patterns Speed is bound by Vmax

Group Leader Responsibilities Maintain data map containing the current location of all hosts in the group Process to see if current group members are still within safe distance of each other Check to see if new hosts are in the region and can be safely added to the group Maintain a list of groups that are close enough to be considered for merging

Group Discovery Protocol Periodic hello messages are sent out by hosts that contain location information and a group identifier Hosts in each group use safe distance to determine possible merge candidates Discoveries are reported to the group leader Duplicate discoveries reported to the group leader are discarded

Reconfiguration Protocol Agreement is reached for which hosts and groups are participating Formal notification is sent to involved hosts Barrier synchronization performed –Flush messages in transit –Timeout delay Messages from “future” configuration must be delayed until reconfiguration is complete

Merging Process Group leader discovers another group in its vicinity through group discovery protocol Group leader initiates the merger by sending a merge-request message to the group leader of the 2 nd group 2 nd Group Leader –Accepts request => sends back ACK with configuration sequence number –Rejects request => sends back NACK, aborts merge

Merging Process(2) If ACK received, new configuration number is generated by adding 1 to the larger of the two group member’s configuration numbers Group leader sends a merge-commit to 2 nd group leader and a merge-order to its members which contains –New group membership list –New configuration number –New leader identity

Merging Process(3) After hosts receive merge-order, a flush-message is sent to all original group members to perform barrier synchronization Group members stop sending in the old configuration until all flush-messages have been received If new configuration messages are received before the host has entered the new configuration, the messages must be postponed as future messages If two groups initiate merging simultaneously, the highest group leader id becomes the initiator

Merging Example

Merging Example (2)

Partitioning Group leader determines unsafe situation exists Group leader issues split-order message to all group members which contains –New leader id –New membership list –New configuration number Host with the lowest id in each subgroup becomes the group leader for the subgroup After receiving split-order message, the host enters message flushing phase

Partitioning(2) Group members wait for all messages sent in the previous configuration before moving into the new configuration Group leader can initiate a split that will partition the group into two or more groups in order to maintain safe distance property

Partitioning Example

Implementation Java-based Integrated with LIME middleware Event model is used as a basis for listeners that are monitoring Group Member updates Beacon threads are used to send periodic “hello” messages Poller threads are used to listen for nearby “hello” messages

Implementation(2) Local state actions in system implementation –NeighborGreetings –LocationUpdate –Merge –Partition

Implementation(3) Arrival message actions in system implementation –NeighborHello –InformLeader –Merge-Request –Merge-Commit –Merge-Order –Split-Order

Safe Distance Choices Too conservative of an equation could cause the groups to be too small or useful for some applications An equation that is not conservative enough could pose danger to the correctness of the group A proper balance must be achieved to make the safe distance algorithm safe and useful

Safe Distance Improvements Include additional sensor information from each group member in the updates to the group leader Base the safe distance equation on more information such as transmission power and speed rather than just physical location Use parameter values that are more accurate rather than overestimates for the safe distance equation

Conclusions Safe Distance accomplishes the goal of detecting a future disconnection in advance Safe Distance maintains a consistent group membership view as required by mobile applications Safe Distance as proposed in this paper leaves room for future improvements to the algorithm

References Q. Huang, C. Julien, and G. Roman, “Relying on Safe Distance to Achieve Strong Partitionable Group Membership in Ad Hoc Networks”, IEEE Transactions On Mobile Computing, Vol. 3, No. 2, pp