69,508 research outputs found

    Towards Stabilization of Distributed Systems under Denial-of-Service

    Full text link
    In this paper, we consider networked distributed systems in the presence of Denial-of-Service (DoS) attacks, namely attacks that prevent transmissions over the communication network. First, we consider a simple and typical scenario where communication sequence is purely Round-robin and we explicitly calculate a bound of attack frequency and duration, under which the interconnected large-scale system is asymptotically stable. Second, trading-off system resilience and communication load, we design a hybrid transmission strategy consisting of Zeno-free distributed event-triggered control and Round-robin. We show that with lower communication loads, the hybrid communication strategy enables the systems to have the same resilience as in pure Round-robin

    Anticipating and Coordinating Voltage Control for Interconnected Power Systems

    Get PDF
    This paper deals with the application of an anticipating and coordinating feedback control scheme in order to mitigate the long-term voltage instability of multi-area power systems. Each local area is uniquely controlled by a control agent (CA) selecting control values based on model predictive control (MPC) and is possibly operated by an independent transmission system operator (TSO). Each MPC-based CA only knows a detailed local hybrid system model of its own area, employing reduced-order quasi steady-state (QSS) hybrid models of its neighboring areas and even simpler PV models for remote areas, to anticipate (and then optimize) the future behavior of its own area. Moreover, the neighboring CAs agree on communicating their planned future control input sequence in order to coordinate their own control actions. The feasibility of the proposed method for real-time applications is explained, and some practical implementation issues are also discussed. The performance of the method, using time-domain simulation of the Nordic32 test system, is compared with the uncoordinated decentralized MPC (no information exchange among CAs), demonstrating the improved behavior achieved by combining anticipation and coordination. The robustness of the control scheme against modeling uncertainties is also illustrated

    Diverse perceptions of smart spaces

    No full text
    This is the era of smart technology and of ‘smart’ as a meme, so we have run three workshops to examine the ‘smart’ meme and the exploitation of smart environments. The literature relating to smart spaces focuses primarily on technologies and their capabilities. Our three workshops demonstrated that we require a stronger user focus if we are advantageously to exploit spaces ascribed as smart: we examined the concept of smartness from a variety of perspectives, in collaboration with a broad range of contributors. We have prepared this monograph mainly to report on the third workshop, held at Bournemouth University in April 2012, but do also consider the lessons learned from all three. We conclude with a roadmap for a fourth (and final) workshop, which is intended to emphasise the overarching importance of the humans using the spac

    Resilient Distributed Energy Management for Systems of Interconnected Microgrids

    Get PDF
    In this paper, distributed energy management of interconnected microgrids, which is stated as a dynamic economic dispatch problem, is studied. Since the distributed approach requires cooperation of all local controllers, when some of them do not comply with the distributed algorithm that is applied to the system, the performance of the system might be compromised. Specifically, it is considered that adversarial agents (microgrids with their controllers) might implement control inputs that are different than the ones obtained from the distributed algorithm. By performing such behavior, these agents might have better performance at the expense of deteriorating the performance of the regular agents. This paper proposes a methodology to deal with this type of adversarial agents such that we can still guarantee that the regular agents can still obtain feasible, though suboptimal, control inputs in the presence of adversarial behaviors. The methodology consists of two steps: (i) the robustification of the underlying optimization problem and (ii) the identification of adversarial agents, which uses hypothesis testing with Bayesian inference and requires to solve a local mixed-integer optimization problem. Furthermore, the proposed methodology also prevents the regular agents to be affected by the adversaries once the adversarial agents are identified. In addition, we also provide a sub-optimality certificate of the proposed methodology.Comment: 8 pages, Conference on Decision and Control (CDC) 201

    Fault tolerant hypercube computer system architecture

    Get PDF
    A fault-tolerant multiprocessor computer system of the hypercube type comprising a hierarchy of computers of like kind which can be functionally substituted for one another as necessary is disclosed. Communication between the working nodes is via one communications network while communications between the working nodes and watch dog nodes and load balancing nodes higher in the structure is via another communications network separate from the first. A typical branch of the hierarchy reporting to a master node or host computer comprises, a plurality of first computing nodes; a first network of message conducting paths for interconnecting the first computing nodes as a hypercube. The first network provides a path for message transfer between the first computing nodes; a first watch dog node; and a second network of message connecting paths for connecting the first computing nodes to the first watch dog node independent from the first network, the second network provides an independent path for test message and reconfiguration affecting transfers between the first computing nodes and the first switch watch dog node. There is additionally, a plurality of second computing nodes; a third network of message conducting paths for interconnecting the second computing nodes as a hypercube. The third network provides a path for message transfer between the second computing nodes; a fourth network of message conducting paths for connecting the second computing nodes to the first watch dog node independent from the third network. The fourth network provides an independent path for test message and reconfiguration affecting transfers between the second computing nodes and the first watch dog node; and a first multiplexer disposed between the first watch dog node and the second and fourth networks for allowing the first watch dog node to selectively communicate with individual ones of the computing nodes through the second and fourth networks; as well as, a second watch dog node operably connected to the first multiplexer whereby the second watch dog node can selectively communicate with individual ones of the computing nodes through the second and fourth networks. The branch is completed by a first load balancing node; and a second multiplexer connected between the first load balancing node and the first and second watch dog nodes, allowing the first load balancing node to selectively communicate with the first and second watch dog nodes

    DISCO: Distributed Multi-domain SDN Controllers

    Full text link
    Modern multi-domain networks now span over datacenter networks, enterprise networks, customer sites and mobile entities. Such networks are critical and, thus, must be resilient, scalable and easily extensible. The emergence of Software-Defined Networking (SDN) protocols, which enables to decouple the data plane from the control plane and dynamically program the network, opens up new ways to architect such networks. In this paper, we propose DISCO, an open and extensible DIstributed SDN COntrol plane able to cope with the distributed and heterogeneous nature of modern overlay networks and wide area networks. DISCO controllers manage their own network domain and communicate with each others to provide end-to-end network services. This communication is based on a unique lightweight and highly manageable control channel used by agents to self-adaptively share aggregated network-wide information. We implemented DISCO on top of the Floodlight OpenFlow controller and the AMQP protocol. We demonstrated how DISCO's control plane dynamically adapts to heterogeneous network topologies while being resilient enough to survive to disruptions and attacks and providing classic functionalities such as end-point migration and network-wide traffic engineering. The experimentation results we present are organized around three use cases: inter-domain topology disruption, end-to-end priority service request and virtual machine migration

    Distributed computing system with dual independent communications paths between computers and employing split tokens

    Get PDF
    This is a distributed computing system providing flexible fault tolerance; ease of software design and concurrency specification; and dynamic balance of the loads. The system comprises a plurality of computers each having a first input/output interface and a second input/output interface for interfacing to communications networks each second input/output interface including a bypass for bypassing the associated computer. A global communications network interconnects the first input/output interfaces for providing each computer the ability to broadcast messages simultaneously to the remainder of the computers. A meshwork communications network interconnects the second input/output interfaces providing each computer with the ability to establish a communications link with another of the computers bypassing the remainder of computers. Each computer is controlled by a resident copy of a common operating system. Communications between respective ones of computers is by means of split tokens each having a moving first portion which is sent from computer to computer and a resident second portion which is disposed in the memory of at least one of computer and wherein the location of the second portion is part of the first portion. The split tokens represent both functions to be executed by the computers and data to be employed in the execution of the functions. The first input/output interfaces each include logic for detecting a collision between messages and for terminating the broadcasting of a message whereby collisions between messages are detected and avoided
    • …
    corecore