DENETS HIDENETS DENETS. Highly Dependable IP-based Networks and Services (FP6 STREP, Jan Dec 2008)

Similar documents
Design and development of a proof-of-concept platooning application using the HIDENETS architecture

PROJECT FINAL REPORT

Mobile Ad Hoc Networks: Basic Concepts and Research Issues

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Cisco SP Wi-Fi Solution Support, Optimize, Assurance, and Operate Services

NOMAD Integrated Networks for Seamless and Transparent Service Discovery

Active source routing for ad-hoc network: seamless integration of wireless environment

Subject: Adhoc Networks

Car2Car Communication Consortium C2C-CC

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

WSN Routing Protocols

Wireless Mesh Test Suite

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

OPENWAVE ENGINE / WSU - A PLATFORM FOR C2C-CC

Security in Mobile Ad-hoc Networks. Wormhole Attacks

Chapter 7 CONCLUSION

Double-Loop Receiver-Initiated MAC for Cooperative Data Dissemination via Roadside WLANs

Routing protocols in WSN

A Study on Issues Associated with Mobile Network

European Network on New Sensing Technologies for Air Pollution Control and Environmental Sustainability - EuNetAir COST Action TD1105

Mobile Computing Introduction

Infrastructure for Autonomous Mobile Robots Communication and Coordination

Wireless Ad-Hoc Networks

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET

The Open System Interconnect model

SCALABLE VEHICULAR AD-HOC NETWORKS DISTRIBUTED SOFTWARE-DEFINED NETWORKING

Secure Routing and Transmission Protocols for Ad Hoc Networks

Lecture 9. Quality of Service in ad hoc wireless networks

Huawei Railway Communication Service Solution Guide

Intelligent Transportation Systems. Wireless Access for Vehicular Environments (WAVE) Engin Karabulut Kocaeli Üniversitesi,2014

SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks

A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks

ITU-T Y Next generation network evolution phase 1 Overview

Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs

Ad Hoc Airborne Networking for Telemetry Test and Evaluation

A Literature survey on Improving AODV protocol through cross layer design in MANET

WIreless DEployable Network System. Symposium Hitachi-Eurecom November 27th 2003 Vania Conan, Thales Communications

02 - Distributed Systems

IEEE s ESS Mesh Networking

Introduction to Distributed Systems

Bayeux: An Architecture for Scalable and Fault Tolerant Wide area Data Dissemination

Overview SENTINET 3.1

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Medium Access Protocols for Cooperative Collision Avoidance in Vehicular Ad-Hoc Networks

Industrial system integration experts with combined 100+ years of experience in software development, integration and large project execution

Chapter Outline. Chapter 2 Distributed Information Systems Architecture. Distributed transactions (quick refresh) Layers of an information system

Capturing and Formalizing SAF Availability Management Framework Configuration Requirements

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

Mobile Communications. Ad-hoc and Mesh Networks

Computation of Multiple Node Disjoint Paths

Mobile self-organizing networks. Vilmos Simon BME Dept. of Networked Systems and Services

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

Hands-On Metro Ethernet Carrier Class Networks

Realizing Automated Driving Systems using Ethernet TSN and Adaptive AUTOSAR

Chapter 1 B: Exploring the Network

Middleware and Distributed Systems. System Models. Dr. Martin v. Löwis

Hybrid Communication. CODECS Workshop / May 19, 2017 Karsten Roscher, Fraunhofer ESK Enrique Onieva, Deusto

Introduction to Mobile Ad hoc Networks (MANETs)

Led by Prof. Hamid Aghvami Presented by Dr. Xiaoli Chu. UK-China Science Bridges: R&D on 4G Wireless Mobile Communications

Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism

STRAW - An integrated mobility & traffic model for vehicular ad-hoc networks

Wireless Sensor Networks (WSN)

Fundamental Issues. System Models and Networking Chapter 2,3. System Models. Architectural Model. Middleware. Bina Ramamurthy

Reliable and Efficient flooding Algorithm for Broadcasting in VANET

Protection Against DDOS Using Secure Code Propagation In The VANETs

Atacama: An Open Experimental Platform for Mixed-Criticality Networking on Top of Ethernet

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks

END-TO-END RECONFIGURABILITY II: TOWARDS SEAMLESS EXPERIENCE

Routing Protocols Wireless for Ad Hoc Wireless Networks: Classifications of Protocols and A review of Table Driven Protocols Abstract:

Media (NEM) Initiative

Airborne Telemetry Networking Scenario and Environment

Part I. Wireless Communication

Cisco CCNA (ICND1, ICND2) Bootcamp

Multi-Domain Service Optimization

Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization

Chapter Outline. Chapter 2 Distributed Information Systems Architecture. Layers of an information system. Design strategies.

60 GHz Indoor Networking Through Flexible Beams: A Link-Level Profiling Sanjib Sur, Vignesh Venkateswaran, Xinyu Zhang, Parmesh Ramanathan

Announcements. me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris

Panel 1 Service Platform and Network Infrastructure for Ubiquitous Services

Grid Computing. MCSN - N. Tonellotto - Distributed Enabling Platforms

Radio Frequency Convergence Protocol for 4G Networks

02 - Distributed Systems

Never Drop a Call With TecInfo SIP Proxy White Paper

IMPLEMENTING MOBILE AD HOC NETWORKING (MANET) OVER LEGACY TACTICAL RADIO LINKS. Presented at MILCOM 2007 October 29, 2007

EFFICIENT TRAJECTORY PROTOCOL FOR MULTICASTING IN VEHICULAR AD HOC NETWORKS

Managing the Subscriber Experience

CSMA based Medium Access Control for Wireless Sensor Network

Routing Protocols in MANETs

Messaging Overview. Introduction. Gen-Z Messaging

IEEE s Multihop MAC. Mateusz Wielgosz

ECE 650 Systems Programming & Engineering. Spring 2018

Data Center Interconnect Solution Overview

Virtualization of networks

Resiliency at Scale in the Distributed Storage Cloud

Solace JMS Broker Delivers Highest Throughput for Persistent and Non-Persistent Delivery

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

Transcription:

HI Highly Dependable IP-based Networks and Services (FP6 STREP, Jan. 2006-Dec 2008) End-to-end resilience solutions for vehicular scenarios 1

HI Partners 2

Overview The HI project: goals and challenges Resilient architecture and fault analysis Resilience mechanisms Evaluation of resilient systems Modelling, development, test of resilient solutions Test-beds for validation Dissemination and references Summary and outlook 3

HI Goals Develop and analyze end-to-end resilience solutions for scalable distributed applications and mobility aware services in ubiquitous communication scenarios car2car communication with server-based infrastructure support assuming highly dynamic, unreliable communication infrastructures Overall goal The planned HI results will clearly show that solutions for new distributed applications with critical requirements on open communication infrastructures can be designed, implemented, and evaluated Results Architectural solutions and resilience services (middleware and communication level) Tools for design and testing during application development Quantitative evaluation methodology and analysis results Experimental proof-of-concept implementations 4

HI Network Scenario Infrastructure connectivity IP-based core with heterogeneous access: Cellular, WLAN, etc. Mobility (and QoS) support Resilience through path redundancy/multi-homing Infrastructure services Resilience via cluster-based architecture and/or distributed redundancy Ad-hoc domain Resilience via communication protocols (L2-4) and HI middleware 5

HI Challenges Ad hoc domain Challenges of the C2C/C2I scenarios C2C = Car to car, C2I = Car to Infrastructure Dynamicity/mobility: changing topologies and communication characteristics Open systems with (C)OTS components Heterogeneity: different network domains [and different node capabilities] Resource limitations and strong crossinfluence between system parts + large number of nodes S1 response S2 S3 request Fault-categories Design-time and run-time faults Timing (omission, crash) and value faults Transient and persistent faults Accidential and malicious causes Detailed fault models and consequences depend on application type and technical realization request response 6 Infrastructure domain

HI Resilience Architecture Resilience extends the classical notion of fault tolerance level of adaptability, so as to be able to cope with system evolution and unanticipated conditions Resilience architecture provides functional view on HI resilience functions in compute or network nodes: helps understand functional relationships reflects relationship to SAForum (www.saforum.org) interface specification work defines target architecture for evaluation topics and for resilience design and generation serves to structure HI work items 7

HI Resilience Architecture Resilience middleware and communication services Remove burden from application developer Cost efficiency Dependability via careful specification and verification Hybrid architecture, trusted part with stricter timeliness properties Critical functions Separate (physical/virtual) communication links Video Streaming 8 Applications Complex Resilience Middleware Services Replication Mgr. Trusted Resilience Services Timely Timing Failure Detection Self-aware Clock SAF interfaces Resilience HW & Wormhole Communication Interfaces Diagnostics Mgr. Platooning Reconfiguration Mgr. Whiteboard Cooperative Data Backup Optimized Network Protocols Gateway selection & dependable Routing Topology Control & Neighbor discovery HI Interfaces Network Interface Cards (COTS) Reliable Broadcast Multi-channel/-radio Management HW

Fault Analysis Idea: Improve the layered communication model in terms of enhanced resilience by analyzing possible faults, errors and failures and their consequences. Identify relations between failures and resilience mechanisms based on a hierarchical communications model Focus on failures forwarded to the layer above (placed on the boundaries between the two layers) Session/ Application Transport TCP/UDP Network Link/MAC PLCP (bit based) Physical PMD (modulation) 9

Resilience Services: Examples Multi-channel multi-radio architecture Multi-channel MAC and Channel Assignment services Allows for communication on nearby links in parallel by reducing/eliminating interference Increases the capacity gain of Multi-Channel and allows for guaranteed connectivity IP resilient routing Provides local fast reroute for proactive link state routing Improves source-destination connectivity Reliable Broadcast Based on hop-by-hop acknowledgments Reduction of message forwarding and ACK events by local strategies based on circuit elimination avoid broadcast storm problems 10

Resilience Services: Examples cont. Always Best Connected Resilience in accessing infrastructure networks Increased reliability by redundancy (using several access points), differentiation, and by smarter access point selection Replication Manager Allows to implement replicated applications with dynamically changing state in the ad-hoc domain Automatic selection of replica nodes based on node properties and communication quality increased application availability to clients Self-aware Clock Provides clock value together with precision bounds wrt. global time Derived e.g. from properties of synchronisation protocol 11

HI wormhole approach Reconfiguration QoS Coverage Replication Diagnostics Cooperative Data Backup Freshness Timing Fault Tolerance Manager Violation Detectors Trust & Cooperation Authentication Duration Measurements R&SA Clock Car Accident Applications Complex Non-Trusted Middleware Services Simple Trusted Services SAF interfaces Resiliency HW (GPS, Ctrl, ) Trusted part Platooning Assisted Transportation HI Interfaces Optimized Network Protocols TCP UDP Network / IP Network Drivers Network Interface Cards (COTS) Non-trusted part HW 12

Wormhole communication In ad-hoc domain Dedicated interfaces and frequency channels (if available) Less dynamic topologies, e.g. via increased transmission power [requires low traffic volumes] In infrastructure connectivity Ideally also physically separated, but likely only logically in most cases Worm LAN1 Worm LAN2 Control network Payload network Worm Payload network Worm Control network Worm Worm Secure channel GPRS AP1 AP2 UMTS Mobile device Worm Worm Mobile device Payload network Control network GPS signal (position & UTC data) Ad-hoc Mobile device Worm 13

Quantitative Evaluation Holistic approach aiming at end-to-end metrics, e.g. Probability of successful execution of a series of user activities Combining different methodologies Analytic Models: Numerical solutions of Markov /Petri-Net models, queueing models, integral expressions for connectivity metrics,... Simulations Models: NS2-based network simulations, Matlab based routing and broadcasting simulations, simulative solution methods for stochastic activity networks Experimental measurements: using wireless communication as well as emulated dynamic topologies Three different evaluation types Pointwise evaluation of HI services (in isolation) Specific use-case driven analysis [details in last session] Workflow for (semi-)automatic end-to-end analysis [details in last session] 14

A Holistic Approach to Quantitative Assessment A common problem consists of a set of sub-problems Each sub-model is solved using an appropriate solution technique The solution of the common problem is obtained by exploiting the interactions among different techniques 15

Point-Wise Evaluation: Broadcast Example NS-2 simulation of distance dependent reception probability Overhead in different reliable broadcast strategies 16

Use-Case Driven Analysis: Example Resulting dependability metric 17

Main Evaluation Results Definition of methodologies for a holistic approach to the quantitative evaluation and analysis of the HI scenarios Evaluation and analysis of the HI resilient mechanisms and resilient communications mechanisms Holistic approach to evaluate the (user perceived) QoS provided by integrated HI scenarios 18

Design Methodology and Modelling Framework Application development and analysis support Meta model Meta-models UML profiles design patterns Elaboration of tool chain concepts Design Patterns Profile related model transformations and interfaces Testing framework Determination of testing levels Test selection problem Testing Oracle Application specification Node architecture UML model Code Generation Functional testing Non-functional analysis 19

Modelling of Resilient Applications Determining design context Elaboration of tool-chain concepts Research in related tools (Eclipse, modeltransformations) Metamodel development Elaboration of metamodel hierarchy levels Definition of metamodel class stubs Creation of UML profile stub Study of applied UML profiles (SPT, SysML, ) Standards interaction Eclipse, UML, SA Forum, Autosar 20

Semi-Automatic Evaluation Workflow User workflows Identification of wireless connections Identification of phases Topology models of networks Applicationservice dependency models Aggregated phase model Architecture based dependability model construction Identification of flocks Generation of Multiple Phased System models Probability of successful execution of a user workflow DEEM solver Multiple Phased System Egy models falka DEEM for flocks DEEM modellje modellje 21

Concepts of HI Tool Chain Meta-model: synthesis of Hidenets architecture and SA Forum application interface spec. Design patterns: facilitate the application of best practices Meta-model and design patterns serve as input for creating the domain specific editor (DSE) 22

Testing of Hidenets Resilience Applications Test challenges in mobile environments Highly dynamic scenarios Need for a rich test environment To control the delivery of messages based on location information, the communication delays (e.g. to stress the global ordering of messages), To account for sophisticated mobility models (to control the movement of nodes) Include network and context simulators Verification case study Mobile group membership protocol Specification review, modelling, and testing Main achievements Definition of a language that describes interaction scenarios in mobile settings Extensions based on UML 2.0 Sequence Diagrams Automated support to analyze and implement scenarios graph matching algorithms to extract test scenarios from test traces 23

Scenario-based Testing framework Requirements scenarios: capture key properties Test purposes: behavior covered by testing Test cases: interactions of test components and system under test, verdict assignment Test execution traces: actual, monitored traces Requirement scenarios validate (satisfaction) select Test case Implement and run Test execution trace Test purpose validate (coverage) 24

Test-Bed Based Validation Motivation and Goals Test-beds were used for validating HI results Stand-alone benefit Focus on relevant HI functionality Parallel elaboration of node architecture Reduction of validation complexity Parallel development at multiple sites 25

Four Test-Beds Resilient communication Communication enhancements in dynamic ad-hoc networks Platooning Focusing on timeliness properties and hybrid architecture solutions TORCS simulator for mobility emulation, real or emulated wireless communication Distributed Black Box Opportunistic cooperative data backup Application development Infrastructure based highavailability cluster solutions Use of development tools 26

Test-Beds and their Scope A complex resilient application developed on top of the HI solutions using model-based development methods. It involves both the infrastructure and the ad-hoc domain. Moreover, it illustrates the feasibility of using HI concepts, methods and middleware for high availability applications, like SAForum [8] A Platooning application that is used as a proof-of-concept for the ability to detect and react to timing faults, to assure safety and to handle certain malicious intrusions. A distributed black-box application with the crucial middleware functionality that provides major dependability benefits in this application setting. Resilient communication protocols for ad-hoc (car to car) networks and their impact on higher layers. 27

Test-Bed Approaches Mobility and wireless communication scaled down WLAN links and real node mobility; example: DBB test-bed emulated wireless multihop topologies Attenuator 28

Dissemination Goals Transfer of HI concepts and results to industrial and governmental organisations and academic environment through cooperation with standards groups Service Availability Forum (SAForum) Car to Car Communication Consortium broad dissemination activities dissemination pipeline, conference watchlist continuously updated review of project progress for planning use of intellectual property work with industry for transfer of HI results and know-how Papers published in major conference proceedings, and journals, presentations: see the HI web page for details 29

Open Challenges Medium-term (now 2010) Cost-effective development and runtime environments supporting dependability properties in the day-to-day IT industrial development and deployment process --> sustainable growth in the European IT industry Longer-term (2010 2013) Advancement in standardization process towards Seamless Integrated Resiliency and Security, to promote massive use of ICT for relevant business, governmental, private services 30

Relevant Web Pages www.saforum.org www.car-to-car.org http://cordis.europa.eu/ http://ec.europa.eu/information_society 31

HI Resilience Solutions - Summary Resilience services Middleware functions: service replication in ad-hoc domain, cooperative data storage, fault-detection and reconfiguration, intrusion-tolerant agreement, adaptivity Architectural differentiation, wormhole environment: self-aware clock, timing failure detection Enhanced communication protocols (L2-L4): multi-radio and multi-channel management, routing, (reliable) broadcast, cross-layer parameter adaptation, optimized infrastructure connectivity Application development support Design patterns, meta models, domain-specific editors Test specifications and verification approaches for mobile scenarios Quantitative Evaluation Analytic models (Markovian, SAN), simulations (MATLAB, ns2), experimental Point-wise evaluation of HI services Application/Use-case specific end-to-end analysis Workflow for semi-automatic dependability analysis Prototyping: Four test-beds Technical deliverables are available on the HI web-page: www.hidenets.aau.dk 32