Application of the evaluation framework to the complete scenario(preliminary version)

This deliverable has been produced in the context of WP4, whose main goal is the quantitative evaluation of the dependability solutions developed in WP2 and WP3. The objective of this deliverable is: i) to illustrate the feasibility of the evaluation framework developed in D4.1.1 (released in December 2006) and refined in D4.1.2 (due on December 2007) considering the use case scenarios developed in WP1, and ii) to evaluate architecture solutions, mechanisms and protocols developed in WP2 and WP3, analyzing their efficiency from the dependability and QoS perspective. The starting point is the recall of the holistic modeling approach, in which several evaluation methods are used for quantitative assessment of dependability and QoS indicators, including analytical stochastic modeling, simulation, and experimental measurements. Then the focus moves on the application of the individual evaluation techniques. Pointwise evaluations are performed to analyze specific HIDENETS aspects, like specific middleware components and communication-level properties, while higher-level evaluations are performed to analyze use-cases and applications. Finally, the feasibility of the holistic approach for the analysis of a complete HIDENETS scenario is illustrated through an example of an evaluation workflow integrating several tools and model transformation steps.

[1]  Mark Handley,et al.  SIP: Session Initiation Protocol , 1999, RFC.

[2]  Andrea Bondavalli,et al.  A framework for dependable QoS adaptation in probabilistic environments , 2008, SAC '08.

[3]  Andrea Bondavalli,et al.  DEEM: a tool for the dependability modeling and evaluation of multiple phased systems , 2000, Proceeding International Conference on Dependable Systems and Networks. DSN 2000.

[4]  Marwan Krunz,et al.  Disjoint multipath routing using colored trees , 2007, Comput. Networks.

[5]  Ali Movaghar,et al.  Performability modeling with stochastic activity networks , 1985 .

[6]  Margaret Martonosi,et al.  Erasure-coding based routing for opportunistic networks , 2005, WDTN '05.

[7]  Michel Banâtre,et al.  Collaborative backup for dependable mobile applications , 2004, MPAC '04.

[8]  Sung-Ju Lee,et al.  Split multipath routing with maximally disjoint paths in ad hoc networks , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).

[9]  William H. Sanders,et al.  Stochastic Activity Networks: Formal Definitions and Concepts , 2002, European Educational Forum: School on Formal Methods and Performance Analysis.

[10]  Andrea Bondavalli,et al.  QoS Analysis of a UMTS cell with different Service Classes , 2005 .

[11]  Lihao Xu,et al.  Hydra: a platform for survivable and secure data storage systems , 2005, StorageSS '05.

[12]  Michael Mitzenmacher,et al.  Digital fountains: a survey and look forward , 2004, Information Theory Workshop.

[13]  Stein Gjessing,et al.  Fast Proactive Recovery from Concurrent Failures , 2007, 2007 IEEE International Conference on Communications.

[14]  Kishor S. Trivedi,et al.  Dependability modeling of a heterogeneous VAX-cluster system using stochastic reward nets , 1992 .

[15]  Sung-Ju Lee,et al.  AODV-BR: backup routing in ad hoc networks , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).

[16]  Jack W. Tsai,et al.  A Review of Multipath Routing Protocols : From Wireless Ad Hoc to Mesh Networks , 2006 .

[17]  Andrea Bondavalli,et al.  Stochastic Dependability Analysis of System Architecture Based on UML Models , 2002, WADS.

[18]  David Powell,et al.  Security Rationale for a Cooperative Backup Service for Mobile Devices , 2007, LADC.

[19]  Tomás̆ Novosad,et al.  Radio Network Planning and Optimisation for Umts , 2006 .

[20]  Hamid Aghvami,et al.  Understanding UMTS Radio Network Modelling, Planning and Automated Optimisation: Theory and Practice , 2006 .

[21]  B. Nordstrom FINITE MARKOV CHAINS , 2005 .

[22]  David R. Cox,et al.  The Theory of Stochastic Processes , 1967, The Mathematical Gazette.

[23]  Anura P. Jayasumana,et al.  Overcoming the effects of correlation in packet delay measurements using inter-packet gaps , 2004, Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955).

[24]  Zygmunt J. Haas,et al.  Alternate path routing in mobile ad hoc networks , 2000, MILCOM 2000 Proceedings. 21st Century Military Communications. Architectures and Technologies for Information Superiority (Cat. No.00CH37155).

[25]  Chen-Nee Chuah,et al.  Failure Inferencing Based Fast Rerouting for Handling Transient Link and Node Failures , 2005, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[26]  Marco Vieira,et al.  The OLAP and data warehousing approaches for analysis and sharing of results from dependability evaluation experiments , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..

[27]  Tarik Cicic,et al.  Redundant trees for fast IP recovery , 2007, 2007 Fourth International Conference on Broadband Communications, Networks and Systems (BROADNETS '07).

[28]  Andrea Bondavalli,et al.  Dependability modeling and evaluation of multiple-phased systems using DEEM , 2004, IEEE Transactions on Reliability.

[29]  Jens Zander,et al.  Soft and safe admission control in cellular networks , 1997, TNET.

[30]  Zhensheng Zhang,et al.  Routing in intermittently connected mobile ad hoc networks and delay tolerant networks: overview and challenges , 2006, IEEE Communications Surveys & Tutorials.

[31]  Lei Huang,et al.  Adaptive resource allocation for multimedia QoS management in wireless networks , 2004, IEEE Transactions on Vehicular Technology.

[32]  Yves Deswarte,et al.  Intrusion tolerance in distributed computing systems , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[33]  William H. Sanders,et al.  Reduced base model construction methods for stochastic activity networks , 1989, Proceedings of the Third International Workshop on Petri Nets and Performance Models, PNPM89.

[34]  António Casimiro,et al.  Use case scenarios and preliminary reference model , 2007 .

[35]  Konstantina Papagiannaki,et al.  Measurement and analysis of single-hop delay on an IP backbone network , 2003, IEEE J. Sel. Areas Commun..

[36]  François Baccelli,et al.  Stochastic geometry and architecture of communication networks , 1997, Telecommun. Syst..

[37]  Andrea Bondavalli,et al.  Project full title : Highly dependable ip-based networks and services Project Acronym : HIDENETS Deliverable no . : D 3 . 3 Title of the Deliverable : Mechanisms to provide strict dependability and real-time requirements , 2008 .

[38]  Hans-Peter Schwefel,et al.  QRP01-5: Quantitative Analysis of Access Strategies to Remote Information in Network Services , 2006, IEEE Globecom 2006.

[39]  William E. Johnston,et al.  The NetLogger methodology for high performance distributed systems performance analysis , 1998, Proceedings. The Seventh International Symposium on High Performance Distributed Computing (Cat. No.98TB100244).

[40]  John Kubiatowicz,et al.  Erasure Coding Vs. Replication: A Quantitative Comparison , 2002, IPTPS.

[41]  Ludovic Courtès Cooperative Data Backup for Mobile Devices , 2007 .

[42]  M.A. Qureshi,et al.  The UltraSAN Modeling Environment , 1995, Perform. Evaluation.

[43]  D. M. Chiu,et al.  Erasure code replication revisited , 2004, Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings..

[44]  David Powell,et al.  Dependability Evaluation of Cooperative Backup Strategies for Mobile Devices , 2007, 13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007).

[45]  F. Baccelli,et al.  Markov paths on the Poisson-Delaunay graph with applications to routeing in mobile networks , 2000, Advances in Applied Probability.

[46]  David Powell,et al.  Storage Tradeoffs in a Collaborative Backup Service for Mobile Devices , 2006, 2006 Sixth European Dependable Computing Conference.

[47]  Bernhard Plattner,et al.  Multi-path Routing Protocols in Wireless Mobile Ad Hoc Networks: A Quantitative Comparison , 2006, NEW2AN.

[48]  Jean Tourrilhes Robust broadcast: improving the reliability of broadcast transmissions on CSMA/CA , 1998, Ninth IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (Cat. No.98TH8361).

[49]  Mahesh K. Marina,et al.  Ad hoc on-demand multipath distance vector routing , 2006, Wirel. Commun. Mob. Comput..

[50]  Yoshihiro Ishikawa,et al.  Capacity Design and Performance of Call Admission Control in Cellular CDMA Systems , 1997, IEEE J. Sel. Areas Commun..

[51]  Thomas Dreibholz,et al.  An Overview of Reliable Server Pooling Protocols , 2008, RFC.

[52]  Andrea Bondavalli,et al.  Automatic dependability analysis for supporting design decisions in UML , 1999, Proceedings 4th IEEE International Symposium on High-Assurance Systems Engineering.

[53]  William H. Sanders,et al.  Möbius: An Extensible Tool for Performance and Dependability Modeling , 2000, Computer Performance Evaluation / TOOLS.

[54]  Andrea Bondavalli,et al.  Hierarchical modeling and evaluation of phased-mission systems , 1999 .

[55]  Walter Willinger,et al.  Long-range dependence in variable-bit-rate video traffic , 1995, IEEE Trans. Commun..

[56]  E.V. Matthiesen,et al.  A New Selection Metric for Backup Group Creation in Inter-Vehicular Networks , 2007, 2007 16th IST Mobile and Wireless Communications Summit.

[57]  Baochun Li,et al.  MP-DSR: a QoS-aware multi-path dynamic source routing protocol for wireless ad-hoc networks , 2001, Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks.

[58]  Jehoshua Bruck,et al.  Low density MDS codes and factors of complete graphs , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).

[59]  Yan Zheng,et al.  Service discovery and name resolution architectures for on-demand MANETs , 2003, 23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings..

[60]  Diego Latella,et al.  Dependability analysis in the early phases of UML-based system design , 2001, Comput. Syst. Sci. Eng..

[61]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[62]  Fred L. Templin,et al.  Topology Dissemination Based on Reverse-Path Forwarding (TBRPF) , 2004, RFC.

[63]  José Alberto Hernández,et al.  Weibull mixture model to characterise end-to-end Internet delay at coarse time-scales , 2006 .

[64]  Stein Gjessing,et al.  Fast IP Network Recovery Using Multiple Routing Configurations , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[65]  Jens Myrup Pedersen,et al.  Report on resilient topologies and routing , 2006 .

[66]  Alia Atlas,et al.  Basic Specification for IP Fast Reroute: Loop-Free Alternates , 2008, RFC.

[67]  Frank Y. Li,et al.  Design and Implementation of Wireless OSPF for Mobile Ad Hoc Networks , 2007 .

[68]  Antonio Casimiro,et al.  Using the timely computing base for dependable QoS adaptation , 2001, Proceedings 20th IEEE Symposium on Reliable Distributed Systems.