Revised reference model

This document contains an update of the HIDENETS Reference Model, whose preliminary version was introduced in D1.1. The Reference Model contains the overall approach to development and assessment of end-to-end resilience solutions. As such, it presents a framework, which due to its abstraction level is not only restricted to the HIDENETS car-to-car and car-to-infrastructure applications and use-cases. Starting from a condensed summary of the used dependability terminology, the network architecture containing the ad hoc and infrastructure domain and the definition of the main networking elements together with the software architecture of the mobile nodes is presented. The concept of architectural hybridization and its inclusion in HIDENETS-like dependability solutions is described subsequently. A set of communication and middleware level services following the architecture hybridization concept and motivated by the dependability and resilience challenges raised by HIDENETS-like scenarios is then described. Besides architecture solutions, the reference model addresses the assessment of dependability solutions in HIDENETS-like scenarios using quantitative evaluations, realized by a combination of top-down and bottom-up modelling, as well as verification via test scenarios. In order to allow for fault prevention in the software development phase of HIDENETS-like applications, generic UML-based modelling approaches with focus on dependability related aspects are described. The HIDENETS reference model provides the framework in which the detailed solution in the HIDENETS project are being developed, while at the same time facilitating the same task for non-vehicular scenarios and applications Keyword list: Reference model, network and node architectures, middleware-level and communication-level services, dependability and performance assessment (evaluation and testing), design methodologies, etc.

[1]  John S. Sobolewski,et al.  SideCar: building programmable datacenter networks without programmable switches , 2010, Hotnets-IX.

[2]  Ieee . Wg Part 11 : Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification , 2003 .

[3]  Michael Schreckenberg,et al.  A cellular automaton model for freeway traffic , 1992 .

[4]  John Kubiatowicz,et al.  Erasure Coding Vs. Replication: A Quantitative Comparison , 2002, IPTPS.

[5]  Joseph Kee-Yin Ng,et al.  Embedded program testing in untestable mobile environment: an experience of trustworthiness approach , 2004, 11th Asia-Pacific Software Engineering Conference.

[6]  M. Omizo,et al.  Modeling , 1983, Encyclopedic Dictionary of Archaeology.

[7]  Axel Klar,et al.  Mathematical Models for Vehicular Traffic , 1995 .

[8]  Andrea Bondavalli,et al.  Markov Regenerative Stochastic Petri Nets to Model and Evaluate Phased Mission Systems Dependability , 2001, IEEE Trans. Computers.

[9]  Achim Autenrieth,et al.  Fault Tolerance and Resilience Issues in IP-Based Networks , 2000 .

[10]  Paulo Veríssimo,et al.  Travelling through wormholes: a new look at distributed systems models , 2006, SIGA.

[11]  Paulo Veríssimo,et al.  Distributed Systems for System Architects , 2001, Advances in Distributed Computing and Middleware.

[12]  Yves Deswarte,et al.  Intrusion tolerance in distributed computing systems , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[13]  John J. Barton,et al.  UBIWISE, A Simulator for Ubiquitous Computing Systems Design , 2003 .

[14]  Lester Lipsky,et al.  On the necessity of transient performance analysis in telecommunication networks , 2001 .

[15]  Xiao Chen,et al.  Multicasting techniques in mobile ad hoc networks , 2003 .

[16]  Karama Kanoun,et al.  Stepwise construction and refinement of dependability models , 2002, Proceedings International Conference on Dependable Systems and Networks.

[17]  Christine Julien,et al.  Relying on safe distance to achieve strong partitionable group membership in ad hoc networks , 2004, IEEE Transactions on Mobile Computing.

[18]  Andrea Bondavalli,et al.  Experimental evaluation of the QoS of failure detectors on wide area network , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).

[19]  Jie Wu Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks , 2005 .

[20]  Nigel Davies,et al.  Evaluating a location-based application: a hybrid test and simulation environment , 2004, IEEE Pervasive Computing.

[21]  D. M. Chiu,et al.  Erasure code replication revisited , 2004, Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings..

[22]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[23]  François Baccelli,et al.  Stochastic geometry and architecture of communication networks , 1997, Telecommun. Syst..

[24]  Yves Crouzet,et al.  Software Statistical Testing , 1995 .

[25]  AvizienisAlgirdas,et al.  Basic Concepts and Taxonomy of Dependable and Secure Computing , 2004 .

[26]  Nora Koch,et al.  UML for Global Computing , 2003, Global Computing.

[27]  Andrea Bondavalli,et al.  Stochastic Dependability Analysis of System Architecture Based on UML Models , 2002, WADS.

[28]  Sam Toueg,et al.  Unreliable failure detectors for reliable distributed systems , 1996, JACM.

[29]  Hrushikesha Mohanty,et al.  MOBICHARTS: a notation to specify mobile computing applications , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[30]  Jens Myrup Pedersen,et al.  Report on resilient topologies and routing , 2006 .

[31]  Antonio Casimiro,et al.  The Timely Computing Base Model and Architecture , 2002, IEEE Trans. Computers.

[32]  Michael Mitzenmacher,et al.  Digital fountains: a survey and look forward , 2004, Information Theory Workshop.

[33]  Lihao Xu,et al.  Hydra: a platform for survivable and secure data storage systems , 2005, StorageSS '05.

[34]  Yves Crouzet,et al.  Benchmarking the dependability of Windows and Linux using PostMark/spl trade/ workloads , 2005, 16th IEEE International Symposium on Software Reliability Engineering (ISSRE'05).

[35]  Robbert van Renesse,et al.  Scalable Wireless Ad Hoc Network Simulation , 2005, Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks.

[36]  Stephen S. Yau,et al.  Testing context-sensitive middleware-based software applications , 2004, Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004..

[37]  D. de Bruin,et al.  Design and test of a cooperative adaptive cruise control system , 2004, IEEE Intelligent Vehicles Symposium, 2004.

[38]  Peter Buchholz,et al.  A Toolbox for Functional and Quantitative Analysis of DEDS , 1998, Computer Performance Evaluation.

[39]  Tsong Yueh Chen,et al.  A metamorphic approach to integration testing of context-sensitive middleware-based applications , 2005, Fifth International Conference on Quality Software (QSIC'05).

[40]  N. Asokan,et al.  Optimistic protocols for fair exchange , 1997, CCS '97.

[41]  Carl E. Landwehr,et al.  Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.

[42]  Ivan Stojmenovic,et al.  Broadcasting and Topology Control in Wireless Ad Hoc Networks , 2005, Handbook of Algorithms for Wireless Networking and Mobile Computing.

[43]  Hrushikesha Mohanty,et al.  Specifying a Mobile Computing Infrastructure and Services , 2004, ICDCIT.

[44]  Christoph Schroth,et al.  Simulating the traffic effects of vehicle-to-vehicle messaging systems , 2005 .

[45]  Ana R. Cavalli,et al.  A validation model for the DSR protocol , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..

[46]  Hans-Peter Schwefel,et al.  QRP01-5: Quantitative Analysis of Access Strategies to Remote Information in Network Services , 2006, IEEE Globecom 2006.

[47]  Sonia Heemstra de Groot,et al.  Specification HIDENETS laboratory set-up scenario and components (Refined specification HIDENETS proof-of-concept set up): HIDENETS D6.2 , 2007 .

[48]  Hans-Peter Schwefel,et al.  Transient analysis of RED queues: A quantitative analysis of buffer-occupancy fluctuations and relevant time-scales , 2006, Perform. Evaluation.

[49]  Jehoshua Bruck,et al.  Low density MDS codes and factors of complete graphs , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).

[50]  Gianni A. Di Caro,et al.  Analysis of simulation environments for mobile ad hoc networks. , 2003 .

[51]  David Thaler,et al.  Link-local Multicast Name Resolution (LLMNR) , 2007, RFC.

[52]  Vinny Cahill,et al.  Towards group communication for mobile participants. , 2001 .

[53]  Ivan Stojmenovic Geocasting in Ad Hoc and Sensor Networks , 2005, Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks.

[54]  António Casimiro,et al.  Use case scenarios and preliminary reference model , 2007 .

[55]  Kai Nagel,et al.  Two-lane traffic rules for cellular automata: A systematic approach , 1997, cond-mat/9712196.

[56]  Eranga Perera,et al.  Survey on network mobility support , 2004, MOCO.

[57]  Jeff Ahrenholz OSPFv2 Wireless Interface Type , 2004 .

[58]  C. Viho,et al.  Modeling, verifying and testing the mobility management in the mobile IPv6 protocol , 2005, Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005..

[59]  Nicolas Rivière,et al.  Mobile Systems from a Validation Perspective: a Case Study , 2007, Sixth International Symposium on Parallel and Distributed Computing (ISPDC'07).

[60]  William H. Sanders,et al.  Model-based evaluation: from dependability to security , 2004, IEEE Transactions on Dependable and Secure Computing.

[61]  Flaviu Cristian,et al.  The Timed Asynchronous Distributed System Model , 1998, IEEE Trans. Parallel Distributed Syst..

[62]  Charles E. Perkins,et al.  IP Mobility Support for IPv4 , 2002, RFC.

[63]  Ross W. Callon,et al.  Use of OSI IS-IS for routing in TCP/IP and dual environments , 1990, RFC.

[64]  Seungjoon Lee,et al.  Cooperative peer groups in NICE , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[65]  K.K. Tam,et al.  Session Initiation Protocol , 2002, 2002 IEEE International Conference on Industrial Technology, 2002. IEEE ICIT '02..

[66]  Hermann Kopetz,et al.  Dependability: Basic Concepts and Terminology , 1992 .

[67]  Emmanuelle Anceaume,et al.  On the Formal Specification of Group Membership Services , 1994 .

[68]  Diego Latella,et al.  Dependability analysis in the early phases of UML-based system design , 2001, Comput. Syst. Sci. Eng..

[69]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[70]  John Moy,et al.  OSPF Version 2 , 1998, RFC.

[71]  H. Kopetz,et al.  Dependability: Basic Concepts and Terminology , 1992, Dependable Computing and Fault-Tolerant Systems.

[72]  Vincenzo Grassi,et al.  A UML Profile to Model Mobile Systems , 2004, UML.

[73]  Yakov Rekhter,et al.  A Border Gateway Protocol 4 (BGP-4) , 1994, RFC.

[74]  George Coulouris,et al.  A Generic Location Event Simulator , 2002, UbiComp.

[75]  F. Baccelli,et al.  Markov paths on the Poisson-Delaunay graph with applications to routeing in mobile networks , 2000, Advances in Applied Probability.

[76]  Bernadette Charron-Bost,et al.  On the impossibility of group membership , 1996, PODC '96.

[77]  A. Avizienis,et al.  Dependable computing: From concepts to design diversity , 1986, Proceedings of the IEEE.

[78]  Randall R. Stewart,et al.  Stream Control Transmission Protocol , 2000, RFC.

[79]  Amin Vahdat,et al.  Design and evaluation of a continuous consistency model for replicated services , 2000, OSDI.