1,111 research outputs found
Consensus and collision detectors in wireless ad hoc networks
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2006.Includes bibliographical references (p. 76-80).In this study, we consider the fault-tolerant consensus problem in wireless ad hoc networks with crashprone nodes. Specifically, we develop lower bounds and matching upper bounds for this problem in single-hop wireless networks, where all nodes are located within broadcast range of each other. In a novel break from existing work, we introduce a highly unpredictable communication model in which each node may lose an arbitrary subset of the messages sent by its neighbors during each round. We argue that this model better matches behavior observed in empirical studies of these networks. To cope with this communication unreliability we augment nodes with receiver-side collision detectors and present a new classification of these detectors in terms of accuracy and completeness. This classification is motivated by practical realities and allows us to determine, roughly speaking, how much collision detection capability is enough to solve the consensus problem efficiently in this setting. We consider ten different combinations of completeness and accuracy properties in total, determining for each whether consensus is solvable, and, if it is, a lower bound on the number of rounds required.(cont.) Furthermore, we distinguish anonymous and non-anonymous protocols-where "anonymous" implies that devices do not have unique identifiers-determining what effect (if any) this extra information has on the complexity of the problem. In all relevant cases, we provide matching upper bounds. Our contention is that the introduction of (possibly weak) receiver-side collision detection is an important approach to reliably solving problems in unreliable networks. Our results, derived in a realistic network model, provide important feedback to ad hoc network practitioners regarding what hardware (and low-layer software) collision detection capability is sufficient to facilitate the construction of reliable and fault-tolerant agreement protocols for use in real-world deployments.by Calvin Newport.S.M
Byzantine fault-tolerant agreement protocols for wireless Ad hoc networks
Tese de doutoramento, Informática (Ciências da Computação), Universidade de Lisboa, Faculdade de Ciências, 2010.The thesis investigates the problem of fault- and intrusion-tolerant consensus
in resource-constrained wireless ad hoc networks. This is a fundamental
problem in distributed computing because it abstracts the need
to coordinate activities among various nodes. It has been shown to be a
building block for several other important distributed computing problems
like state-machine replication and atomic broadcast.
The thesis begins by making a thorough performance assessment of existing
intrusion-tolerant consensus protocols, which shows that the performance
bottlenecks of current solutions are in part related to their system
modeling assumptions. Based on these results, the communication failure
model is identified as a model that simultaneously captures the reality
of wireless ad hoc networks and allows the design of efficient protocols.
Unfortunately, the model is subject to an impossibility result stating that
there is no deterministic algorithm that allows n nodes to reach agreement
if more than n2 omission transmission failures can occur in a communication
step. This result is valid even under strict timing assumptions (i.e.,
a synchronous system).
The thesis applies randomization techniques in increasingly weaker variants
of this model, until an efficient intrusion-tolerant consensus protocol
is achieved. The first variant simplifies the problem by restricting the
number of nodes that may be at the source of a transmission failure at
each communication step. An algorithm is designed that tolerates f dynamic
nodes at the source of faulty transmissions in a system with a total
of n 3f + 1 nodes.
The second variant imposes no restrictions on the pattern of transmission
failures. The proposed algorithm effectively circumvents the Santoro-
Widmayer impossibility result for the first time. It allows k out of n nodes
to decide despite dn
2 e(nk)+k2 omission failures per communication
step. This algorithm also has the interesting property of guaranteeing
safety during arbitrary periods of unrestricted message loss.
The final variant shares the same properties of the previous one, but relaxes
the model in the sense that the system is asynchronous and that a
static subset of nodes may be malicious. The obtained algorithm, called
Turquois, admits f < n
3 malicious nodes, and ensures progress in communication
steps where dnf
2 e(n k f) + k 2. The algorithm is
subject to a comparative performance evaluation against other intrusiontolerant
protocols. The results show that, as the system scales, Turquois
outperforms the other protocols by more than an order of magnitude.Esta tese investiga o problema do consenso tolerante a faltas acidentais
e maliciosas em redes ad hoc sem fios. Trata-se de um problema fundamental
que captura a essência da coordenação em actividades envolvendo
vários nós de um sistema, sendo um bloco construtor de outros importantes
problemas dos sistemas distribuídos como a replicação de máquina
de estados ou a difusão atómica.
A tese começa por efectuar uma avaliação de desempenho a protocolos
tolerantes a intrusões já existentes na literatura. Os resultados mostram
que as limitações de desempenho das soluções existentes estão em parte
relacionadas com o seu modelo de sistema. Baseado nestes resultados, é
identificado o modelo de falhas de comunicação como um modelo que simultaneamente
permite capturar o ambiente das redes ad hoc sem fios e
projectar protocolos eficientes. Todavia, o modelo é restrito por um resultado
de impossibilidade que afirma não existir algoritmo algum que permita
a n nós chegaram a acordo num sistema que admita mais do que n2
transmissões omissas num dado passo de comunicação. Este resultado é
válido mesmo sob fortes hipóteses temporais (i.e., em sistemas síncronos)
A tese aplica técnicas de aleatoriedade em variantes progressivamente
mais fracas do modelo até ser alcançado um protocolo eficiente e tolerante
a intrusões. A primeira variante do modelo, de forma a simplificar
o problema, restringe o número de nós que estão na origem de transmissões
faltosas. É apresentado um algoritmo que tolera f nós dinâmicos na
origem de transmissões faltosas em sistemas com um total de n 3f + 1
nós.
A segunda variante do modelo não impõe quaisquer restrições no padrão
de transmissões faltosas. É apresentado um algoritmo que contorna efectivamente
o resultado de impossibilidade Santoro-Widmayer pela primeira
vez e que permite a k de n nós efectuarem progresso nos passos de comunicação
em que o número de transmissões omissas seja dn
2 e(n
k) + k 2. O algoritmo possui ainda a interessante propriedade de tolerar
períodos arbitrários em que o número de transmissões omissas seja
superior a .
A última variante do modelo partilha das mesmas características da variante
anterior, mas com pressupostos mais fracos sobre o sistema. Em particular,
assume-se que o sistema é assíncrono e que um subconjunto estático
dos nós pode ser malicioso. O algoritmo apresentado, denominado
Turquois, admite f < n
3 nós maliciosos e assegura progresso nos passos
de comunicação em que dnf
2 e(n k f) + k 2. O algoritmo é
sujeito a uma análise de desempenho comparativa com outros protocolos
na literatura. Os resultados demonstram que, à medida que o número de
nós no sistema aumenta, o desempenho do protocolo Turquois ultrapassa
os restantes em mais do que uma ordem de magnitude.FC
Optimistic fair transaction processing in mobile ad-hoc networks
Mobile ad-hoc networks (MANETs) are unstable. Link errors, which are
considered as an exception in fixed-wired networks must be assumed to be the
default case in MANETs. Hence designing fault tolerant systems efficiently
offering transactional guarantees in these unstable environments is
considerably more complex. The efficient support for such guarantees is
essential for business applications, e.g. for the exchange of electronic
goods. This class of applications demands for transactional properties such as
money and goods atomicity. Within this technical report we present an
architecture, which allows for fair and atomic transaction processing in
MANETs, together with an associated application that enables exchange of
electronic tokens
Modeling radio networks
We describe a modeling framework and collection of foundational
composition results for the study of probabilistic distributed
algorithms in synchronous radio networks. Though the radio setting has
been studied extensively by the distributed algorithms community, their
results rely on informal descriptions of the channel behavior and therefore
lack easy comparability and are prone to error caused by definition subtleties.
Our framework rectifies these issues by providing: (1) a method
to precisely describe a radio channel as a probabilistic automaton; (2) a
mathematical notion of implementing one channel using another channel,
allowing for direct comparisons of channel strengths and a natural
decomposition of problems into implementing a more powerful channel
and solving the problem on the powerful channel; (3) a mathematical
definition of a problem and solving a problem; (4) a pair of composition
results that simplify the tasks of proving properties about channel
implementation algorithms and combining problems with channel implementations.
Our goal is to produce a model streamlined for the needs of
the radio network algorithms community
Design and performance study of algorithms for consensus in sparse, mobile ad-hoc networks
PhD ThesisMobile Ad-hoc Networks (MANETs) are self-organizing wireless networks that consist
of mobile wireless devices (nodes). These networks operate without the aid
of any form of supporting infrastructure, and thus need the participating nodes to
co-operate by forwarding each other’s messages. MANETs can be deployed when
urgent temporary communications are required or when installing network infrastructure
is considered too costly or too slow, for example in environments such as
battlefields, crisis management or space exploration.
Consensus is central to several applications including collaborative ones which a
MANET can facilitate for mobile users. This thesis solves the consensus problem in
a sparse MANET in which a node can at times have no other node in its wireless
range and useful end-to-end connectivity between nodes can just be a temporary
feature that emerges at arbitrary intervals of time for any given node pair.
Efficient one-to-many dissemination, essential for consensus, now becomes a challenge:
enough number of destinations cannot deliver a multicast unless nodes retain
the multicast message for exercising opportunistic forwarding. Seeking to keep storage
and bandwidth costs low, we propose two protocols. An eventually relinquishing
(}RC) protocol that does not store messages for long is used for attempting at consensus,
and an eventually quiescent (}QC) one that stops forwarding messages
after a while is used for concluding consensus. Use of }RC protocol poses additional
challenges for consensus, when the fraction, f
n, of nodes that can crash is:
1
4 f
n < 1
2 .
Consensus latency and packet overhead are measured through simulation indicating
that they are not too high to be feasible in MANETs. They both decrease
considerably even for a modest increase in network density.Damascus University
The eventual clusterer oracle and its application to consensus in MANETs
2007-2008 > Academic research: refereed > Refereed conference paperVersion of RecordPublishe
- …