Title: Robust Systems
1Robust Systems
2Faults at James Reserve
3Faults on a volcano in Ecuador WLJ06
4Data faults in Bangladesh
5Calibration
6Motivation Summary
Hard Problems
7Summary
- People pay for robustness in other systems
- Higher quality hardware
- Technicians to monitor the data
- Wired infrastructure
- In sensor networks when we pay, we pay for scale
- The burden on software has increased
- Robustness in sensor networks requires research
and engineering
8CentRoute
Distributed Mote Routing
Centralized Mote Routing
All routing decisions state at microserver
Routing table, neighbor table, local decisions
Bypasses mote hardware limitations through global
view at microserver
Distributed decision making on very limited RAM
hardware
- Designed for robustness
- Minimizes routing inconsistencies, including
loops - Minimizes memory (state) requirements on motes
- Increases routing stability
- Can scale to dense networks
- Additional functionality
- Bidirectional unicast routing (to and from the
sink) - Global view of the entire mote network at each
sink
Work by Thanos Stathopoulos
9Memory Protection
- LIGHTHOUSE
- Develop simple and intuitive memory model
- Each block of memory is under the control of
exactly one program at any time - Controlling program is responsible for either
tracking, freeing, or transferring ownership of
the data - Found significant memory management errors in
both kernel and user SOS code using new analysis
tool - Accomplishes analysis via basic data-flow
analysis on source code
- SANDBOX
- Create multiple protection domains within single
address space CPUs - Restrict write accesses of a domain to memory it
owns - Restrict control flow in and out of a domain
- Designed for small memory CPUs
- No static partitioning of address space
- Compact memory map tracks ownership and layout
- Enforced by inline run-time checks
- All write accesses are checked
- All control flow operations are checked
- Checks introduced through binary re-write
- Binary verified at every node
- Verifier independent of re-writer
- Correctness of scheme depends only upon
correctness of verifier
Work by Ram Kumar and Roy Shea
10Tenet
- Show counter on LEDs
- Sense and send data back to the sink
- ... with time-stamp and sequence number
- Get memory status for node 10
- If temperature is above 50, send temperature,
node ID and next routing hop
MemStats
Send
Address
NEQ(10)
DeleteIf
Paek, Greenstein et al.
11Sympathy Confidence
Radio
Sensorboard
Nithya Ramanathan
Network
Environment
Mote
Final Destination
Batteries
Sensors
Data Generation Path
Data Delivery Path
12Fault Detection
- Exploit sensor data by finding correlations
between different variables - Recognize a fault when sensor data breaks its
strongest correlations - Variable space is too high dimensional
- Signal processing techniques may provide an
efficient correlation model
Recent Measurements
Measurements at same time previous day
Proximate Nodes
Nodes of Same Altitude or Depth
Another modality on the same node
Contextual or multiscale information