3,563 research outputs found
Unidirectional Quorum-based Cycle Planning for Efficient Resource Utilization and Fault-Tolerance
In this paper, we propose a greedy cycle direction heuristic to improve the
generalized redundancy quorum cycle technique. When applied using
only single cycles rather than the standard paired cycles, the generalized
redundancy technique has been shown to almost halve the necessary
light-trail resources in the network. Our greedy heuristic improves this
cycle-based routing technique's fault-tolerance and dependability.
For efficiency and distributed control, it is common in distributed systems
and algorithms to group nodes into intersecting sets referred to as quorum
sets. Optimal communication quorum sets forming optical cycles based on
light-trails have been shown to flexibly and efficiently route both
point-to-point and multipoint-to-multipoint traffic requests. Commonly cycle
routing techniques will use pairs of cycles to achieve both routing and
fault-tolerance, which uses substantial resources and creates the potential for
underutilization. Instead, we use a single cycle and intentionally utilize
redundancy within the quorum cycles such that every point-to-point
communication pairs occur in at least cycles. Without the paired
cycles the direction of the quorum cycles becomes critical to the fault
tolerance performance. For this we developed a greedy cycle direction heuristic
and our single fault network simulations show a reduction of missing pairs by
greater than 30%, which translates to significant improvements in fault
coverage.Comment: Computer Communication and Networks (ICCCN), 2016 25th International
Conference on. arXiv admin note: substantial text overlap with
arXiv:1608.05172, arXiv:1608.05168, arXiv:1608.0517
Logical rings in the mutual exclusion problem of distributed memory systems
In this thesis, we investigate distributed mutual exclusion algorithms and delineate the features of a new distributed mutual exclusion algorithm. The basis of the algorithm is the logical ring structure employed in token-based mutual exclusion algorithms. Specifically, there exists dynamic properties of the logical ring that, given certain restrictions regarding message traffic flow, passively give useful information about the location of the token. Effectively, the algorithm demonstrates a type of intelligent routing that identifies useful shortcuts to in the routing of the token. The result is a reduction in the total number of messages exchanged prior to the execution of the critical section as compared to the algorithm proposed by Fu and Tzeng (7). Furthermore, the algorithm allows for an increased degree of fairness in a lightly loaded system than that allowed by Fu and Tzeng\u27s algorithm
Robust and cheating-resilient power auctioning on Resource Constrained Smart Micro-Grids
The principle of Continuous Double Auctioning (CDA) is known to provide an efficient way of matching supply and demand among distributed selfish participants with limited information. However, the literature indicates that the classic CDA algorithms developed for grid-like applications are centralised and insensitive to the processing resources capacity, which poses a hindrance for their application on resource constrained, smart micro-grids (RCSMG). A RCSMG loosely describes a micro-grid with distributed generators and demand controlled by selfish participants with limited information, power storage capacity and low literacy, communicate over an unreliable infrastructure burdened by limited bandwidth and low computational power of devices. In this thesis, we design and evaluate a CDA algorithm for power allocation in a RCSMG. Specifically, we offer the following contributions towards power auctioning on RCSMGs. First, we extend the original CDA scheme to enable decentralised auctioning. We do this by integrating a token-based, mutual-exclusion (MUTEX) distributive primitive, that ensures the CDA operates at a reasonably efficient time and message complexity of O(N) and O(logN) respectively, per critical section invocation (auction market execution). Our CDA algorithm scales better and avoids the single point of failure problem associated with centralised CDAs (which could be used to adversarially provoke a break-down of the grid marketing mechanism). In addition, the decentralised approach in our algorithm can help eliminate privacy and security concerns associated with centralised CDAs. Second, to handle CDA performance issues due to malfunctioning devices on an unreliable network (such as a lossy network), we extend our proposed CDA scheme to ensure robustness to failure. Using node redundancy, we modify the MUTEX protocol supporting our CDA algorithm to handle fail-stop and some Byzantine type faults of sites. This yields a time complexity of O(N), where N is number of cluster-head nodes; and message complexity of O((logN)+W) time, where W is the number of check-pointing messages. These results indicate that it is possible to add fault tolerance to a decentralised CDA, which guarantees continued participation in the auction while retaining reasonable performance overheads. In addition, we propose a decentralised consumption scheduling scheme that complements the auctioning scheme in guaranteeing successful power allocation within the RCSMG. Third, since grid participants are self-interested we must consider the issue of power theft that is provoked when participants cheat. We propose threat models centred on cheating attacks aimed at foiling the extended CDA scheme. More specifically, we focus on the Victim Strategy Downgrade; Collusion by Dynamic Strategy Change, Profiling with Market Prediction; and Strategy Manipulation cheating attacks, which are carried out by internal adversaries (auction participants). Internal adversaries are participants who want to get more benefits but have no interest in provoking a breakdown of the grid. However, their behaviour is dangerous because it could result in a breakdown of the grid. Fourth, to mitigate these cheating attacks, we propose an exception handling (EH) scheme, where sentinel agents use allocative efficiency and message overheads to detect and mitigate cheating forms. Sentinel agents are tasked to monitor trading agents to detect cheating and reprimand the misbehaving participant. Overall, message complexity expected in light demand is O(nLogN). The detection and resolution algorithm is expected to run in linear time complexity O(M). Overall, the main aim of our study is achieved by designing a resilient and cheating-free CDA algorithm that is scalable and performs well on resource constrained micro-grids. With the growing popularity of the CDA and its resource allocation applications, specifically to low resourced micro-grids, this thesis highlights further avenues for future research. First, we intend to extend the decentralised CDA algorithm to allow for participantsâ mobile phones to connect (reconnect) at different shared smart meters. Such mobility should guarantee the desired CDA properties, the reliability and adequate security. Secondly, we seek to develop a simulation of the decentralised CDA based on the formal proofs presented in this thesis. Such a simulation platform can be used for future studies that involve decentralised CDAs. Third, we seek to find an optimal and efficient way in which the decentralised CDA and the scheduling algorithm can be integrated and deployed in a low resourced, smart micro-grid. Such an integration is important for system developers interested in exploiting the benefits of the two schemes while maintaining system efficiency. Forth, we aim to improve on the cheating detection and mitigation mechanism by developing an intrusion tolerance protocol. Such a scheme will allow continued auctioning in the presence of cheating attacks while incurring low performance overheads for applicability in a RCSMG
CSP channels for CAN-bus connected embedded control systems
Closed loop control system typically contains multitude of sensors and actuators operated simultaneously. So they are parallel and distributed in its essence. But when mapping this parallelism to software, lot of obstacles concerning multithreading communication and synchronization issues arise. To overcome this problem, the CT kernel/library based on CSP algebra has been developed. This project (TES.5410) is about developing communication extension to the CT library to make it applicable in distributed systems. Since the library is tailored for control systems, properties and requirements of control systems are taken into special consideration. Applicability of existing middleware solutions is examined. A comparison of applicable fieldbus protocols is done in order to determine most suitable ones and CAN fieldbus is chosen to be first fieldbus used. Brief overview of CSP and existing CSP based libraries is given. Middleware architecture is proposed along with few novel ideas
Currency management system: a distributed banking service for the grid
Market based resource allocation mechanisms require mechanisms to regulate and manage the usage of traded resources. One mechanism to control this is the definition of some kind of currency. Within this context, we have implemented a first prototype of our Currency Management System, which stands for a decentralized and scalable banking service for the Grid. Basically, our system stores user accounts within a DHT and its basic operation is the transferFunds which, as its name suggests, transfers virtual currency from an account to one another
Byzantine fault-tolerant agreement protocols for wireless Ad hoc networks
Tese de doutoramento, InformĂĄtica (CiĂȘncias da Computação), Universidade de Lisboa, Faculdade de CiĂȘncias, 2010.The thesis investigates the problem of fault- and intrusion-tolerant consensus
in resource-constrained wireless ad hoc networks. This is a fundamental
problem in distributed computing because it abstracts the need
to coordinate activities among various nodes. It has been shown to be a
building block for several other important distributed computing problems
like state-machine replication and atomic broadcast.
The thesis begins by making a thorough performance assessment of existing
intrusion-tolerant consensus protocols, which shows that the performance
bottlenecks of current solutions are in part related to their system
modeling assumptions. Based on these results, the communication failure
model is identified as a model that simultaneously captures the reality
of wireless ad hoc networks and allows the design of efficient protocols.
Unfortunately, the model is subject to an impossibility result stating that
there is no deterministic algorithm that allows n nodes to reach agreement
if more than n2 omission transmission failures can occur in a communication
step. This result is valid even under strict timing assumptions (i.e.,
a synchronous system).
The thesis applies randomization techniques in increasingly weaker variants
of this model, until an efficient intrusion-tolerant consensus protocol
is achieved. The first variant simplifies the problem by restricting the
number of nodes that may be at the source of a transmission failure at
each communication step. An algorithm is designed that tolerates f dynamic
nodes at the source of faulty transmissions in a system with a total
of n 3f + 1 nodes.
The second variant imposes no restrictions on the pattern of transmission
failures. The proposed algorithm effectively circumvents the Santoro-
Widmayer impossibility result for the first time. It allows k out of n nodes
to decide despite dn
2 e(nk)+k2 omission failures per communication
step. This algorithm also has the interesting property of guaranteeing
safety during arbitrary periods of unrestricted message loss.
The final variant shares the same properties of the previous one, but relaxes
the model in the sense that the system is asynchronous and that a
static subset of nodes may be malicious. The obtained algorithm, called
Turquois, admits f < n
3 malicious nodes, and ensures progress in communication
steps where dnf
2 e(n k f) + k 2. The algorithm is
subject to a comparative performance evaluation against other intrusiontolerant
protocols. The results show that, as the system scales, Turquois
outperforms the other protocols by more than an order of magnitude.Esta tese investiga o problema do consenso tolerante a faltas acidentais
e maliciosas em redes ad hoc sem fios. Trata-se de um problema fundamental
que captura a essĂȘncia da coordenação em actividades envolvendo
vĂĄrios nĂłs de um sistema, sendo um bloco construtor de outros importantes
problemas dos sistemas distribuĂdos como a replicação de mĂĄquina
de estados ou a difusĂŁo atĂłmica.
A tese começa por efectuar uma avaliação de desempenho a protocolos
tolerantes a intrusÔes jå existentes na literatura. Os resultados mostram
que as limitaçÔes de desempenho das soluçÔes existentes estão em parte
relacionadas com o seu modelo de sistema. Baseado nestes resultados, Ă©
identificado o modelo de falhas de comunicação como um modelo que simultaneamente
permite capturar o ambiente das redes ad hoc sem fios e
projectar protocolos eficientes. Todavia, o modelo Ă© restrito por um resultado
de impossibilidade que afirma nĂŁo existir algoritmo algum que permita
a n nĂłs chegaram a acordo num sistema que admita mais do que n2
transmissÔes omissas num dado passo de comunicação. Este resultado é
vĂĄlido mesmo sob fortes hipĂłteses temporais (i.e., em sistemas sĂncronos)
A tese aplica técnicas de aleatoriedade em variantes progressivamente
mais fracas do modelo até ser alcançado um protocolo eficiente e tolerante
a intrusÔes. A primeira variante do modelo, de forma a simplificar
o problema, restringe o nĂșmero de nĂłs que estĂŁo na origem de transmissĂ”es
faltosas. Ă apresentado um algoritmo que tolera f nĂłs dinĂąmicos na
origem de transmissÔes faltosas em sistemas com um total de n 3f + 1
nĂłs.
A segunda variante do modelo não impÔe quaisquer restriçÔes no padrão
de transmissÔes faltosas. à apresentado um algoritmo que contorna efectivamente
o resultado de impossibilidade Santoro-Widmayer pela primeira
vez e que permite a k de n nós efectuarem progresso nos passos de comunicação
em que o nĂșmero de transmissĂ”es omissas seja dn
2 e(n
k) + k 2. O algoritmo possui ainda a interessante propriedade de tolerar
perĂodos arbitrĂĄrios em que o nĂșmero de transmissĂ”es omissas seja
superior a .
A Ășltima variante do modelo partilha das mesmas caracterĂsticas da variante
anterior, mas com pressupostos mais fracos sobre o sistema. Em particular,
assume-se que o sistema Ă© assĂncrono e que um subconjunto estĂĄtico
dos nĂłs pode ser malicioso. O algoritmo apresentado, denominado
Turquois, admite f < n
3 nĂłs maliciosos e assegura progresso nos passos
de comunicação em que dnf
2 e(n k f) + k 2. O algoritmo Ă©
sujeito a uma anĂĄlise de desempenho comparativa com outros protocolos
na literatura. Os resultados demonstram que, Ă medida que o nĂșmero de
nĂłs no sistema aumenta, o desempenho do protocolo Turquois ultrapassa
os restantes em mais do que uma ordem de magnitude.FC
An Optimization Based Design for Integrated Dependable Real-Time Embedded Systems
Moving from the traditional federated design paradigm, integration of mixedcriticality software components onto common computing platforms is increasingly being adopted by automotive, avionics and the control industry. This method faces new challenges such as the integration of varied functionalities (dependability, responsiveness, power consumption, etc.) under platform resource constraints and the prevention of error propagation. Based on model driven architecture and platform based designâs principles, we present a systematic mapping process for such integration adhering a transformation based design methodology. Our aim is to convert/transform initial platform independent application specifications into post integration platform specific models. In this paper, a heuristic based resource allocation approach is depicted for the consolidated mapping of safety critical and non-safety critical applications onto a common computing platform meeting particularly dependability/fault-tolerance and real-time requirements. We develop a supporting tool suite for the proposed framework, where VIATRA (VIsual Automated model TRAnsformations) is used as a transformation tool at different design steps. We validate the process and provide experimental results to show the effectiveness, performance and robustness of the approach
Cryptocurrency Constellations across the Three-Dimensional Space: Governance Decentralization, Security, and Scalability
In the post-Bitcoin era, many cryptocurrencies with a variety of goals and purposes have emerged in the digital arena. This article aims to map cryptocurrency protocols across three main defining dimensions, which are governance decentralization, security, and scalability. We theorize about the organizational and technological features that impact these three dimensions. Such features encompass roles permissiveness, validation network size, resource expenditure, and number of transactions per second. We map the different cryptocurrency constellations based on their consensus mechanisms, discussing the organizational and technological features of the various protocols applications and how they experience and play with the tradeoffs among governance decentralization, security, and scalability
- âŠ