Smart Messages: A Distributed Computing Platform for Networks of Embedded Systems

In this paper, we present the design and implementation of Smart Messages, a distributed computing platform for networks of embedded systems based on execution migration. A Smart Message (SM) is a user-defined distributed program which executes on nodes of interest, named by their properties, and uses an explicit lightweight migration to reach these nodes. During migrations, an SM carries its code and execution state, and it self-routes at each intermediate node between two nodes of interest. The nodes in the network cooperate to support the SM execution by providing a virtual machine and a sharedmemory region addressable by names (tag space). To illustrate the flexibility of SMs to program real world applications, we describe EZCab, an application for booking cabs in densely populated urban areas.We also present experimental results to quantify the performance achieved by the SM prototype.

[1]  Amin Vahdat,et al.  Active Names: flexible location and transport of wide-area resources , 1999, Proceedings DARPA Active Networks Conference and Exposition.

[2]  J. Broch,et al.  Dynamic source routing in ad hoc wireless networks , 1998 .

[3]  Paul Bowman,et al.  Hitting the distributed computing sweet spot with TSpaces , 2001, Comput. Networks.

[4]  Liviu Iftode,et al.  Scylla: a smart virtual machine for mobile embedded systems , 2000, Proceedings Third IEEE Workshop on Mobile Computing Systems and Applications.

[5]  George Cybenko,et al.  D'Agents: Security in a Multiple-Language, Mobile-Agent System , 1998, Mobile Agents and Security.

[6]  Andrew R. Cherenson,et al.  The Sprite network operating system , 1988, Computer.

[7]  David Wetherall,et al.  Active network vision and reality: lessons from a capsule-based system , 1999, OPSR.

[8]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[9]  Craig Partridge,et al.  Smart packets: applying active networks to network management , 2000, TOCS.

[10]  P. Koopman Critical embedded automotive networks , 2002, IEEE Micro.

[11]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[12]  David Wetherall,et al.  Active network vision and reality: lessions from a capsule-based system , 1999, SOSP.

[13]  Wei Hong,et al.  The design of an acquisitional query processor for sensor networks , 2003, SIGMOD '03.

[14]  Mani B. Srivastava,et al.  Design and implementation of a framework for efficient and programmable sensor networks , 2003, MobiSys '03.

[15]  Seth J. Teller,et al.  The cricket compass for context-aware mobile applications , 2001, MobiCom '01.

[16]  Deborah Estrin,et al.  Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.

[17]  Roy H. Campbell,et al.  Gaia: enabling active spaces , 2000, ACM SIGOPS European Workshop.

[18]  Robert Szewczyk,et al.  System architecture directions for networked sensors , 2000, ASPLOS IX.

[19]  Robert Grimm,et al.  Systems directions for pervasive computing , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.

[20]  Christian F. Tschudin,et al.  Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.

[21]  Anand R. Tripathi,et al.  Security in the Ajanta mobile agent system , 2001, Softw. Pract. Exp..

[22]  William J. Bolosky,et al.  Mach: A New Kernel Foundation for UNIX Development , 1986, USENIX Summer.

[23]  Liviu Iftode,et al.  Self-routing in pervasive computing environments using smart messages , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[24]  Liviu Iftode,et al.  Spatial Views: Space-Aware Programming for Networks of Embedded Systems , 2003, LCPC.

[25]  Pat Hanrahan,et al.  ICrafter: A Service Framework for Ubiquitous Computing Environments , 2001, UbiComp.

[26]  John Kubiatowicz,et al.  Probabilistic location and routing , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[27]  Ole Agesen GC Points in a Threaded Environment , 1998 .

[28]  Yong Wang,et al.  Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with ZebraNet , 2002, ASPLOS X.

[29]  Wendi B. Heinzelman,et al.  Adaptive protocols for information dissemination in wireless sensor networks , 1999, MobiCom.

[30]  Yong Chen,et al.  Using Trust for Secure Collaboration in Uncertain Environments , 2003, IEEE Pervasive Comput..

[31]  Philippe Bonnet,et al.  Querying the physical world , 2000, IEEE Wirel. Commun..

[32]  Scott Nettles,et al.  Practical programmable packets , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[33]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[34]  Liviu Iftode,et al.  Cooperative computing for distributed embedded systems , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[35]  Sang Hyuk Son,et al.  USENIX Association Proceedings of MobiSys 2003 : The First International Conference on Mobile Systems , Applications , and Services , 2003 .

[36]  Stephen F. Bush,et al.  Predicting resource demand in heterogeneous active networks , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).

[37]  Brad Karp,et al.  Greedy Perimeter Stateless Routing for Wireless Networks , 2000 .

[38]  Dejan S. Milojicic,et al.  Process migration , 1999, ACM Comput. Surv..

[39]  Anand R. Tripathi,et al.  Agent Server Architecture for the Ajanta Mobile-Agent System , 1998 .

[40]  Chieh-Yih Wan,et al.  PSFQ: a reliable transport protocol for wireless sensor networks , 2002, WSNA '02.

[41]  Deborah Estrin,et al.  Building efficient wireless sensor networks with low-level naming , 2001, SOSP.

[42]  Fritz Hohl,et al.  Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.

[43]  Nicholas Carriero,et al.  Linda in context , 1989, CACM.

[44]  Umakishore Ramachandran,et al.  D-Stampede: distributed programming system for ubiquitous computing , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[45]  Robert Tappan Morris,et al.  CarNet: a scalable ad hoc wireless network system , 2000, ACM SIGOPS European Workshop.

[46]  David R. Cheriton,et al.  An Architecture for Content Routing Support in the Internet , 2001, USITS.

[47]  Hari Balakrishnan,et al.  The design and implementation of an intentional naming system , 1999, SOSP.

[48]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[49]  Krithi Ramamritham,et al.  The Spring kernel: a new paradigm for real-time systems , 1991, IEEE Software.

[50]  George Cybenko,et al.  Mobile Agents: Motivations and State-of-the-Art Systems , 2000 .

[51]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[52]  Karsten Schwan,et al.  FARA-a framework for adaptive resource allocation in complex real-time systems , 1998, Proceedings. Fourth IEEE Real-Time Technology and Applications Symposium (Cat. No.98TB100245).