Competition: An Adaptive Protocol Stack for High-Dependability based on the Population Protocols Paradigm Dimitrios Amaxilatis

Ioannis Chatzigiannakis

Computer Engineering & Informatics Department University of Patras and Computer Technology Institute & Press (CTI)

Department of Computer, Control and Management Engineering Sapienza University of Rome and Computer Technology Institute & Press (CTI)

[email protected]

[email protected]

Categories and Subject Descriptors C.2.3 [Network Operations]: Network monitoring; C.2.4 [Distributed Systems]: Distributed applications

General Terms Population Protocols, Dependability

Keywords Adaptive Protocols, Algorithm Engineering, Low Power and Lossy Networks

1

Introduction

The last decade we witnessed a tremendous progress towards the interconnection of the digital and physical domains, giving rise to the “Internet of Things”. An outstanding activity is taking place not only in research but also in commercial areas where ICT is increasingly being embedded into the physical world. Mobile phones, smartphones, NFC, RFID, GPS, and, at a lesser scale, networked sensors, which were placed market-wise until recently as niche products, are now becoming familiar items in our everyday lives. Our homes, our cars, and the things around us are getting fully integrated with the web. The coexistence and cooperation of embedded systems with our social life is unveiling a brand new era of exciting possibilities. These new systems are characterized by two critical components: (a) dynamicity - the mobility of devices, intermittent connectivity due to lossy links, limited power are some typical factors that create very challenging system models where what was trivially solvable in a static distributed system, is now far from being trivial in this new landscape. (b) robustness - if we expect our societies to depend on future systems, it is imperative that software infrastructures (e.g., cloud of things) will have to be always on, continuously available. The need to make distributed systems more dependable is certainly not new - e.g., Lamport pioneered in

International Conference on Embedded Wireless Systems and Networks (EWSN) 2016 15–17 February, Graz, Austria © 2016 Copyright is held by the authors. Permission is granted for indexing in the ACM Digital Library ISBN: 978-0-9949886-0-7

the field since the 80s, Tanenbaum made it a crucial design element for the minix system - yet we are by far lacking simple techniques for delivering robust ICT infrastructures. In this paper we present a protocol stack that is able to adapt to the local environment and coordinate the actions of the IoT devices via simple, local interactions. Our protocol stack is able to detect sudden changes to the structure and operation of the network either due to transient failures (e.g., as a result of the lossy nature of wireless networks) or due to more permanent failures of nodes (e.g., due to limited power resources or due to external forces). Thus the system continues to operate in a set of desired states with maintained, or gracefully degraded or even improved quality of service. Our design adopts the concept of [3] for self-organization that has been widely mentioned in the scope of distributed computing and peer to peer networks. We implement our solution by following a componentbased design using the Wiselib [6]: a code library, that allows implementations to be OS-independent. We totally avoid implementing our algorithm as a monolithic, standalone piece of code. The modules can be easily integrated as sub-protocols in other problems such as energy conservation, routing, role assignment, security etc.. We conduct a thorough evaluation using an experimental testbed environment. For all cases, our results indicate that our approach adapts to the external and internal changes. Experimental evidence from real-world deployment indicates that as long as dynamic changes are limited in time and space, they do not affect the rest of the network.

2

Adaptive Protocol Stack

An important aspect of our protocol stack is the ability to detect the current topology of the network so that the operation of the devices is properly adjusted to frequent and/or significant topology changes. Beaconing is currently the most effective methodology for neighborhood discovery. With the term beaconing [1] we refer to the exchange of special messages containing information not only for the presence of the node itself but also for its view of the neighborhood. In contrast to using a network monitoring protocol based on constant periodic beacon exchanges, we chose an adaptive protocol [2] that allows each node to independently modify the beacon broadcast period based on its local perception on the consistency of the network, i.e., the changes to the local neighborhood detected by the node. The protocol uses a

291

simple rule: as long as a node does not detect any changes on its neighborhood (i.e., it is consistent) the beaconing interval period is doubled until a maximum beaconing interval period is reached. Therefore, changes to the topology of the network due to failures, interference, or malicious external actions force the nodes affected by the changes to adjust the intensity of the network monitoring process, while unaffected nodes can relax the intensity and achieve lower energy consumption while the network is relatively stable. The devices use the following indicators for examining the quality of the communication channels are (a) the LQI of the received beacons, (b) the RSSI of the received beacons, (c) the link associativity [5] (the time, in beacons, that nodes are associated, i.e., they retain a connection), (d) the node stability [5] (the average link associativity for all neighboring nodes) and (e) the reverse node stability [2] (indicating the average numbers of consecutive beacons that successfully delivered on a destination). On top of the network monitoring protocol, our protocol stack provides basic operations for propagation of messages, aggregation of values, symmetry breaking, and detection of critical events using the Population Protocols paradigm [4]. The main benefit of this paradigm is that protocol specifications have no dependence on the number of devices that take part. In other words, since no knowledge about the number of agents is required by the protocols, our protocol stack achieves high scalability for any number of IoT devices. We implement the theoretical model for distributed computation in real IoT environments based on the methodology of [7]. Considering event-driven reporting of critical events, we use the One-Way Epidemic protocol described in [7]. Devices operate in a silent monitoring state and are activated to transmit notification events when the sensor readings match specific criteria. For example, whenever a strong variation in the lighting is detected, the device produces an output ‘1’ bit that signifies that a critical event has occurred. Whenever a device discovers a nearby node (via the networking monitoring protocol) that is not aware of the event (i.e., the local bit is set to ‘0’), it transmits a short message propagating the critical event. This is the so-called State Scheduler [7] which guarantees the acceleration of the epidemic process, delivering the events with at most O (n) interactions (where n is the number of IoT devices).

3

Implementation Details

Our protocols are implemented in Wiselib [6] based on C++ and templates, but without virtual inheritance and exceptions. All implemented algorithms are platform independent as they can be compiled on a number of different IoT platforms (e.g., TelosB, iSense, ScatterWeb) and OS independent as they can be automatically used in systems implemented using C (Contiki), C++ (iSense), and nesC (TinyOS). Interestingly, our code is also compatible with Android and iOS thus they can be executed in SmartPhones and SmartWatches. Clearly, the ability to implement once and run the same code base on such a broad range of IoT devices is a huge advantage that really speeds up development. Regarding the implementation of the network monitoring sub-protocol, the beacon messages follow the ULA format:

292

the header consists of a 1Byte Message id and 2 counters for the number on neighbors and scheduler payloads contained in the message. The list of neighbors is an array of 2Byte neighbor MAC addresses in the plain implementation while for the various indicators we add after each address the respective indicator’s value as an unsigned 8bit integer. Due to hardware limitations of the IoT devices, a single beacon cannot contain an unlimited number of neighbors or piggybacked payloads of very big size. In Wiselib 802.15.4, packets are limited to 116Bytes and as a result, it may include a maximum of 37 neighbors. If we need to operate on a larger neighborhood we can use the Wiselib Fragmenting Radio and transmit beacons larger than a single message, allowing us to handle neighborhoods of up to 255 nodes which is the limit of the unsigned integer counter used for the neighbors counter in the message header. Population protocol Schedulers are implemented by piggybacking information on the state of each IoT device on the beacon messages (the “scheduler” payloads). We use the Wiselib’s callback mechanism to provide the information as additional payloads attached in each beacon. Thus each node is aware for each neighboring node along with its current state (in terms of the higher-layer population protocols).

4

Conclusions

We provide the first population-protocols-based protocol stack implementation for achieving high-dependability in real-world IoT deployments. We evaluate our adaptive protocol stack over a real-world experimental testbed and through large scale simulations. Our results indicate that our protocol stack achieves high-dependability and high-scalability while minimizing battery consumption. Our work suggests many new promising directions in applying the populationprotocols paradigm for the development IoT applications.

5

References

[1] D. Amaxilatis, I. Chatzigiannakis, S. Dolev, C. Koninis, A. Pyrgelis, and P. Spirakis. Adaptive Hierarchical Network Structures for Wireless Sensor Networks. In Int. Conference on Ad Hoc Networks, AdHocNets ’11. [2] D. Amaxilatis, G. Oikonomou, and I. Chatzigiannakis. Adaptive neighbor discovery for mobile and low power wireless sensor networks. In Proceedings of the 15th ACM International Conference on Modeling, analysis and simulation of wireless and mobile systems, pages 385–394. ACM, 2012. [3] E. Anceaume, X. Defago, M. Gradinariu, and M. Roy. Towards a theory of self-organization. 9th International Conference on Principels of Distributed Systems, OPODIS, pages 146–156, 2005. [4] D. Angluin, J. Aspnes, Z. Diamadi, M. J. Fischer, and R. Peralta. Computation in networks of passively mobile finite-state sensors. In PODC ’04: Proceedings of the twenty-third annual ACM symposium on Principles of distributed computing, pages 290–299, New York, NY, USA, 2004. ACM. [5] A. Bamis, A. Boukerche, I. Chatzigiannakis, and S. Nikoletseas. A mobility aware protocol synthesis for efficient routing in ad hoc mobile networks. Computer Networks, 52(1):130 – 154, 2008. MSWIM’06. [6] T. Baumgartner, I. Chatzigiannakis, S. P. Fekete, C. Koninis, A. Kr¨oller, and A. Pyrgelis. Wiselib: A generic algorithm library for heterogeneous sensor networks. In Proceedings of the 7th European Conference on Wireless Sensor Networks (EWSN), pages 162–177, 2010. [7] I. Chatzigiannakis, S. Dolev, S. P. Fekete, O. Michail, and P. G. Spirakis. Not all fair probabilistic schedulers are equivalent. In Principles of Distributed Systems, 13th International Conference, OPODIS 2009, Nˆımes, France, December 15-18, 2009. Proceedings, pages 33– 47, 2009.

An Adaptive Protocol Stack for High-Dependability based on ... - EWSN

In Wiselib 802.15.4, pack- ets are limited to 116Bytes and as a result, it may include a maximum of 37 neighbors. If we need to operate on a larger neighborhood we can use the Wiselib Fragmenting Radio and transmit beacons larger than a single message, allowing us to handle neighborhoods of up to 255 nodes which is ...

119KB Sizes 0 Downloads 281 Views

Recommend Documents

Protocol Stack
GUI Tools for system/protocol modeling ... storage for sample files, e.g. modulation and terrain. ▫. /gui ... Define QUALNET_HOME and add GUI and path.

AutoCast: An Adaptive Data Dissemination Protocol for ...
semination, Hovering Data Cloud, AutoNomos, AutoCast. I. INTRODUCTION. Today's ... and storage in sensor networks drive a new communication paradigm. .... assumes unlimited transmission rate, propagation speed of light, and a perfect ...

An Adaptive Updating Protocol for Reducing Moving ...
accurately, the server is allowed to probe the latest status of some ... For example, a linear model with object's location and velocity can be used to ...... we argue that the prediction is meaningful only on a close future. In summary, our STSR ...

An Improved μTESLA Protocol Based on Queuing Theory and ...
An Improved μTESLA Protocol Based on Queuing Theory and Benaloh-Leichter SSS in WSNs.pdf. An Improved μTESLA Protocol Based on Queuing Theory ...

Channel Exploration/Exploitation Based on a Thompson ... - EWSN
Systems and Networks (EWSN) 2016 ... operating system one with a learning algorithm and one as ... We programmed two Telosb nodes; one as an oracle.

ss7 protocol stack pdf
There was a problem loading more pages. ss7 protocol stack pdf. ss7 protocol stack pdf. Open. Extract. Open with. Sign In. Main menu. Displaying ss7 protocol ...

ss7 protocol stack pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. ss7 protocol ...

Stack-Based Parallel Recursion on Graphics ... - Semantic Scholar
Feb 18, 2009 - the GPU increases the programming difficulty; moreover, it is ... Language .... dimensional R-tree [2] on 4M records amount to 64MB, and the.

Stack-Based Parallel Recursion on Graphics ... - Semantic Scholar
Feb 18, 2009 - the GPU increases the programming difficulty; moreover, it is unclear how to improve ... General Terms Algorithms, Languages. Keywords Stack ...

A Weakly Coupled Adaptive Gossip Protocol for ...
autonomous policy-based management system for ALAN. The preliminary .... Fireflies flash at a predetermined point in a periodic oscillation that can be ...

EURASIP-Adaptive Transport Layer Protocol for Highly Dynamic ...
EURASIP-Adaptive Transport Layer Protocol for Highly Dynamic Environment 0.807.pdf. EURASIP-Adaptive Transport Layer Protocol for Highly Dynamic ...

Multimodal Reactive-Routing Protocol to Tolerate Failure - EWSN
Department of Computer Science. University of York. United Kingdom [email protected] ... interference as they share the same radio frequency band with other radio emitting and home devices such as portable ... tegrate the best existing features fr

Energy-Efficiency and Reliable Protocol based on Virtual ... - IJEECS
entity. Thus, sensor nodes are equipped with irreplaceable batteries in harsh environments, this makes energy a crucial feature in WSN applications. Nodes in a WSN communicate ... based on flat architecture, hierarchical and location-based. Section 3

Filtering Network Traffic Based on Protocol ... - Fulvio Risso
Let's put the two together and create a new automaton that models our filter tcp in ip* in ipv6 in ethernet startproto ethernet ip ipv6 tcp http udp dns. Q0. Q3. Q1.

Distributive Energy Efficient Adaptive Clustering Protocol for Wireless ...
Indian Institute of Technology, Kharagpur, India ... solutions to some of the conventional wireless ... routing protocol for wireless sensor networks, which uses a ...

A Security Enhanced AODV Routing Protocol Based On ...
Abstract—Ad Hoc networks are characterized by open medium, dynamic topology ... provide secure and reliable data forwarding services, nodes should priorly ...

CREST: An Opportunistic Forwarding Protocol Based ...
that CREST has a lower end-to-end delay compared to protocols ... especially when nodes are mobile, is to determine exactly ... leaders in the business division, department managers, sys- ...... Due to the page limit, we plan to present these.

Filtering Network Traffic Based on Protocol Encapsulation Rules
Fulvio Risso, Politecnico di Torino – ICNC 2013. 1/15. Filtering Network Traffic Based on. Protocol Encapsulation Rules. Fulvio Risso, Politecnico di Torino, Italy.

Energy-Efficiency and Reliable Protocol based on Virtual ... - IJEECS
(IJEECS) International Journal of Electrical, Electronics and Computer Systems. ... sensor networks. This is classified into three categories based on flat architecture, hierarchical and location-based. Section 3 and 4, describes some assumptions and

Adaptive compressed image sensing based on wavelet ...
Thus, the measurement vector y , is composed of dot-products of the digital image x with pseudo-random masks. At the core of the decoding process, that takes.

Adaptive Content Delivery Based on Contextual and ...
数多くの教員が ICT を用いたフィールド学習(ユビキタス学習)を行って. いるが、学校の支援体制や活用可能なリソースが不十分でうまくいかないこ. とが多い。 e-Learning システムは教æ

Adaptive Content Delivery Based on Contextual and ...
ubiquitous device: 1, content service; 2, transcoding service; 3, presentation ...... Information visualization is a well-established discipline (Card, Mackinlay and.

RecoMap: An Interactive and Adaptive Map-Based ... - Semantic Scholar
School of Computer Science and Informatics. Belfield, Dublin 4 .... value at every interaction, representing the degree of inter- est expressed toward the item i ...