67 research outputs found

    Distributed Data Management in Vehicular Networks Using Mobile Agents

    Get PDF
    En los últimos años, las tecnologías de la información y las comunicaciones se han incorporado al mundo de la automoción gracias a sus avances, y han permitido la creación de dispositivos cada vez más pequeños y potentes. De esta forma, los vehículos pueden ahora incorporar por un precio asequible equipos informáticos y de comunicaciones.En este escenario, los vehículos que circulan por una determinada zona (como una ciudad o una autopista) pueden comunicarse entre ellos usando dispositivos inalámbricos que les permiten intercambiar información con otros vehículos cercanos, formando así una red vehicular ad hoc, o VANET (Vehicular Ad hoc Network). En este tipo de redes, las comunicaciones se establecen con conexiones punto a punto por medio de dispositivos tipo Wi-Fi, que permiten la comunicación con otros del mismo tipo dentro de su alcance, sin que sea necesaria la existencia previa de una infraestructura de comunicaciones como ocurre con las tecnologías de telefonía móvil (como 3G/4G), que además requieren de una suscripción y el pago de una tarifa para poder usarlas.Cada vehículo puede enviar información y recibirla de diversos orígenes, como el propio vehículo (por medio de los sensores que lleva incorporados), otros vehículos que se encuentran cerca, así como de la infraestructura de tráfico presente en las carreteras (como semáforos, señales, paneles electrónicos de información, cámaras de vigilancia, etc.). Todos estas fuentes pueden transmitir datos de diversa índole, como información de interés para los conductores (por ejemplo, atascos de tráfico o accidentes en la vía), o de cualquier otro tipo, mientras sea posible digitalizarla y enviarla a través de una red.Todos esos datos pueden ser almacenados localmente en los ordenadores que llevan los vehículos a medida que son recibidos, y sería muy interesante poder sacarles partido por medio de alguna aplicación que los explotara. Por ejemplo, podrían utilizarse los vehículos como plataformas móviles de sensores que obtengan datos de los lugares por los que viajan. Otro ejemplo de aplicación sería la de ayudar a encontrar plazas de aparcamiento libres en una zona de una ciudad, usando la información que suministrarían los vehículos que dejan una plaza libre.Con este fin, en esta tesis se ha desarrollado una propuesta de la gestión de datos basada en el uso de agentes móviles para poder hacer uso de la información presente en una VANET de forma eficiente y flexible. Esta no es una tarea trivial, ya que los datos se encuentran dispersos entre los vehículos que forman la red, y dichos vehículos están constantemente moviéndose y cambiando de posición. Esto hace que las conexiones de red establecidas entre ellos sean inestables y de corta duración, ya que están constantemente creándose y destruyéndose a medida que los vehículos entran y salen del alcance de sus comunicaciones debido a sus movimientos.En un escenario tan complicado, la aproximación que proponemos permite que los datos sean localizados, y que se puedan hacer consultas sobre ellos y transmitirlos de un sitio cualquiera de la VANET a otro, usando estrategias multi-salto que se adaptan a las siempre cambiantes posiciones de los vehículos. Esto es posible gracias a la utilización de agentes móviles para el procesamiento de datos, ya que cuentan con una serie de propiedades (como su movilidad, autonomía, adaptabilidad, o inteligencia), que hace que sean una elección muy apropiada para este tipo de entorno móvil y con un elevado grado de incertidumbre.La solución propuesta ha sido extensamente evaluada y probada por medio de simulaciones, que demuestran su buen rendimiento y fiabilidad en redes vehiculares con diferentes condiciones y en diversos escenarios.<br /

    Leveraging Resources on Anonymous Mobile Edge Nodes

    Get PDF
    Smart devices have become an essential component in the life of mankind. The quick rise of smartphones, IoTs, and wearable devices enabled applications that were not possible few years ago, e.g., health monitoring and online banking. Meanwhile, smart sensing laid the infrastructure for smart homes and smart cities. The intrusive nature of smart devices granted access to huge amounts of raw data. Researchers seized the moment with complex algorithms and data models to process the data over the cloud and extract as much information as possible. However, the pace and amount of data generation, in addition to, networking protocols transmitting data to cloud servers failed short in touching more than 20% of what was generated on the edge of the network. On the other hand, smart devices carry a large set of resources, e.g., CPU, memory, and camera, that sit idle most of the time. Studies showed that for plenty of the time resources are either idle, e.g., sleeping and eating, or underutilized, e.g. inertial sensors during phone calls. These findings articulate a problem in processing large data sets, while having idle resources in the close proximity. In this dissertation, we propose harvesting underutilized edge resources then use them in processing the huge data generated, and currently wasted, through applications running at the edge of the network. We propose flipping the concept of cloud computing, instead of sending massive amounts of data for processing over the cloud, we distribute lightweight applications to process data on users\u27 smart devices. We envision this approach to enhance the network\u27s bandwidth, grant access to larger datasets, provide low latency responses, and more importantly involve up-to-date user\u27s contextual information in processing. However, such benefits come with a set of challenges: How to locate suitable resources? How to match resources with data providers? How to inform resources what to do? and When? How to orchestrate applications\u27 execution on multiple devices? and How to communicate between devices on the edge? Communication between devices at the edge has different parameters in terms of device mobility, topology, and data rate. Standard protocols, e.g., Wi-Fi or Bluetooth, were not designed for edge computing, hence, does not offer a perfect match. Edge computing requires a lightweight protocol that provides quick device discovery, decent data rate, and multicasting to devices in the proximity. Bluetooth features wide acceptance within the IoT community, however, the low data rate and unicast communication limits its use on the edge. Despite being the most suitable communication protocol for edge computing and unlike other protocols, Bluetooth has a closed source code that blocks lower layer in front of all forms of research study, enhancement, and customization. Hence, we offer an open source version of Bluetooth and then customize it for edge computing applications. In this dissertation, we propose Leveraging Resources on Anonymous Mobile Edge Nodes (LAMEN), a three-tier framework where edge devices are clustered by proximities. On having an application to execute, LAMEN clusters discover and allocate resources, share application\u27s executable with resources, and estimate incentives for each participating resource. In a cluster, a single head node, i.e., mediator, is responsible for resource discovery and allocation. Mediators orchestrate cluster resources and present them as a virtually large homogeneous resource. For example, two devices each offering either a camera or a speaker are presented outside the cluster as a single device with both camera and speaker, this can be extended to any combination of resources. Then, mediator handles applications\u27 distribution within a cluster as needed. Also, we provide a communication protocol that is customizable to the edge environment and application\u27s need. Pushing lightweight applications that end devices can execute over their locally generated data have the following benefits: First, avoid sharing user data with cloud server, which is a privacy concern for many of them; Second, introduce mediators as a local cloud controller closer to the edge; Third, hide the user\u27s identity behind mediators; and Finally, enhance bandwidth utilization by keeping raw data at the edge and transmitting processed information. Our evaluation shows an optimized resource lookup and application assignment schemes. In addition to, scalability in handling networks with large number of devices. In order to overcome the communication challenges, we provide an open source communication protocol that we customize for edge computing applications, however, it can be used beyond the scope of LAMEN. Finally, we present three applications to show how LAMEN enables various application domains on the edge of the network. In summary, we propose a framework to orchestrate underutilized resources at the edge of the network towards processing data that are generated in their proximity. Using the approaches explained later in the dissertation, we show how LAMEN enhances the performance of applications and enables a new set of applications that were not feasible

    Community Networks and Sustainability: a Survey of Perceptions, Practices, and Proposed Solutions

    Get PDF
    Community network (CN) initiatives have been around for roughly two decades, evangelizing a distinctly different paradigm for building, maintaining, and sharing network infrastructure but also defending the basic human right to Internet access. Over this time they have evolved into a mosaic of systems that vary widely with respect to their network technologies, their offered services, their organizational structure, and the way they position themselves in the overall telecommunications’ ecosystem. Common to all these highly differentiated initiatives is the sustainability challenge. We approach sustainability as a broad term with an economical, political, and cultural context. We first review the different perceptions of the term. These vary both across and within the different types of stakeholders involved in CNs and are reflected in their motivation to join such initiatives. Then, we study the diverse approaches of CN operators towards the sustainability goal. Given the rich context of the term, these range all the way from mechanisms to fund their activities, to organizational structures and social activities serving as incentives for the engagement of their members. We iterate on incentive mechanisms that have been proposed and theoretically analyzed in the literature for CNs as well as tools and processes that have been actually implemented in them. Finally, we enumerate lessons that have been learned out of these two decades of CNs’ operation and discuss additional technological and regulatory issues that are key to their longer-term sustainability

    Trustworthy Federated Learning: A Survey

    Full text link
    Federated Learning (FL) has emerged as a significant advancement in the field of Artificial Intelligence (AI), enabling collaborative model training across distributed devices while maintaining data privacy. As the importance of FL increases, addressing trustworthiness issues in its various aspects becomes crucial. In this survey, we provide an extensive overview of the current state of Trustworthy FL, exploring existing solutions and well-defined pillars relevant to Trustworthy . Despite the growth in literature on trustworthy centralized Machine Learning (ML)/Deep Learning (DL), further efforts are necessary to identify trustworthiness pillars and evaluation metrics specific to FL models, as well as to develop solutions for computing trustworthiness levels. We propose a taxonomy that encompasses three main pillars: Interpretability, Fairness, and Security & Privacy. Each pillar represents a dimension of trust, further broken down into different notions. Our survey covers trustworthiness challenges at every level in FL settings. We present a comprehensive architecture of Trustworthy FL, addressing the fundamental principles underlying the concept, and offer an in-depth analysis of trust assessment mechanisms. In conclusion, we identify key research challenges related to every aspect of Trustworthy FL and suggest future research directions. This comprehensive survey serves as a valuable resource for researchers and practitioners working on the development and implementation of Trustworthy FL systems, contributing to a more secure and reliable AI landscape.Comment: 45 Pages, 8 Figures, 9 Table
    corecore