A computational wireless network backplane: Performance in a distributed speaker identification application

A major challenge in the DoDpsilas next-generation network-centric information systems concerns on-demand provisioning of computation and network infrastructures at tactical network edges (e.g., deploying wireless airborne or hybrid air/ground networks). To support this vision, we present DWARF, a general distributed application execution framework for wireless ad-hoc networks which dynamically allocates computation resources and manages failures. DWARF nodes each run a separate task simultaneously, thereby achieving execution speed-up from parallel processing. Failed tasks, e.g., due to fluctuating wireless links to mobile nodes, are automatically detected and reassigned, transparent to the application. Further, tasks are executed in an order that satisfies dependencies given by task dependency graphs. To use DWARF, application programmers need only decompose their applications into tasks and define the task dependency graphs. In this paper, we describe DWARF and report its benefits in running an important existing application-speaker identification-over a 32-node wireless network which supports fault-tolerant computation. We observed two major performance gains: (1) a ten-fold speed-up in identifying speakers due to parallelizing the application, and (2) higher accuracy in speaker identification, made possible by the increased sensor diversity provided by geographically distributed nodes. While our nodes have modest computing power individually, combined under DWARF, they are able to execute speaker identification with much greater speed and with improved accuracy.

[1]  H.T. Kung,et al.  Rainbow: A wireless medium access control using network coding for multi-hop content distribution , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[2]  Rami G. Melhem,et al.  Analysis of a fault-tolerant multiprocessor scheduling algorithm , 1994, Proceedings of IEEE 24th International Symposium on Fault- Tolerant Computing.

[3]  Rachid Guerraoui,et al.  Software-Based Replication for Fault Tolerance , 1997, Computer.

[4]  Sanjay Ghemawat,et al.  MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.

[5]  Don Towsley,et al.  Network Coding Performance for Reliable Multicast , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[6]  John H. L. Hansen,et al.  A cohort - UBM approach to mitigate data sparseness for in-set/out-of-set speaker recognition , 2006, INTERSPEECH.

[7]  L. Schiavone,et al.  Joint Tactical Radio System - Connecting the GIG to the Tactical Edge , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[8]  Tracy Camp,et al.  Comparison of broadcasting techniques for mobile ad hoc networks , 2002, MobiHoc '02.

[9]  John H. L. Hansen,et al.  Discriminative In-Set/Out-of-Set Speaker Recognition , 2007, IEEE Transactions on Audio, Speech, and Language Processing.

[10]  Brett D. Fleisch,et al.  The Chubby lock service for loosely-coupled distributed systems , 2006, OSDI '06.

[11]  Jonathan G. Fiscus,et al.  Darpa Timit Acoustic-Phonetic Continuous Speech Corpus CD-ROM {TIMIT} | NIST , 1993 .