30.07.2015 Views

Actas JP2011 - Universidad de La Laguna

Actas JP2011 - Universidad de La Laguna

Actas JP2011 - Universidad de La Laguna

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Actas</strong> XXII Jornadas <strong>de</strong> Paralelismo (<strong>JP2011</strong>) , <strong>La</strong> <strong>La</strong>guna, Tenerife, 7-9 septiembre 2011C.4 SummaryFollowing this analysis, the quality of olsrd v.0.5.6and v.0.6.0 do not really differ in presence of the consi<strong>de</strong>redfaults, and they could be used indistinctlybut when the network is perturbed by flooding attacksor consumption is the main concerns of theevaluator, where v.0.6.0 reacts better. Otherwise,olsrd v.0.4.10 is the best candidate to meet the requirementsestablished for this case study.V. ConclusionsTraditional analysis of results performed duringthe resilience benchmarking of components and systemscan be feasible for those cases where a reducedset of measures is consi<strong>de</strong>red. However, as far asthe amount of measures increases, the analysis complexityrises as well. This is an important issue thatcan compromise the analysis thoroughness, <strong>de</strong>spitethe rest of the benchmark process has been correctlycarried out.This paper <strong>de</strong>scribes a practical approach to systematisethe analysis of resilience benchmarkingwith a well-known technique in the domain of softwareengineering: the Logic Score of Preferences(LSP). Conversely to other measures-aggregationtechniques, LSP plays an active role during thebenchmark <strong>de</strong>finition. It addresses how to a<strong>de</strong>quatelyselect and gather the types of measures torepresent the system, thus assisting the benchmarkuser to minimise errors during the results interpretation.In this line of reasoning, the case study selectedto illustrate the applicability of this technique hasbeen been focused on the promising domain of adhoc networks, allowing the rea<strong>de</strong>r to un<strong>de</strong>rstand thatthe steps <strong>de</strong>scribed in the paper can be <strong>de</strong>signed tofit different applications. The LSP technique resultsa very useful approach to overcome the problem ofmeasures scalability and eases a more concise visionof the system. Nevertheless, regarding previous results,the application of this technique requires thea<strong>de</strong>quate <strong>de</strong>finition of the quality thresholds (X minand X max ) for each criterion functions, the weight(w i ) assigned to each score within the same aggregationblock, and the operator type (o i ) in charge of themeasures aggregation. All these aspects highly <strong>de</strong>pendon the applicative context the ad hoc networksis conceived to be <strong>de</strong>ployed.Consi<strong>de</strong>ring the points previously <strong>de</strong>tailed is a firststep towards the characterisation of the wi<strong>de</strong> amountof applicative domains ad hoc networks are presentin, such as Wireless/Un<strong>de</strong>rground and SubaquaticSensor Networks, Wireless Mesh Networks and Mobileand Vehicular Ad hoc Networks, among others.We argue that this type of approaches can be usefulnot only to quantify the impact of faults with respectto the actual application context (where componentsand systems are planned to be <strong>de</strong>ployed),but for the comparison and selection of those targetswhich best fit the system requirements. In the futurework, we ambition to provi<strong>de</strong> evaluators differenttemplates with precomputed parameters that theycould customise for their particular <strong>de</strong>ployments tosemi-automate the application of LSP for the quantitativebenchmarking of ad hoc routing protocols.AcknowledgementsThis work has been fun<strong>de</strong>d by the Spanish Ministryof Science and Innovation through the SEMSE-CAP Project (TIN-2009-13825).References[1] Karama Kanoun and Lisa Spainhower, DependabilityBenchmarking for Computer Systems, Wiley and IEEEComputer Society Press, 2008.[2] Hung-Chin Jang, Yao-Nan Lien, and Tzu-Chieh Tsai,“Rescue information system for earthquake disastersbased on manet emergency communication platform,” inInternational Conference on Wireless Communicationsand Mobile Computing (IWCMC), 2009, pp. 623–627.[3] P. Serrano et al., “A CARMEN mesh experience: <strong>de</strong>ploymentand results,” in 10th IEEE WoWMoM, 2009,pp. 1–8.[4] Jesus Friginal, David <strong>de</strong> Andres, Juan-Carlos Ruiz, andPedro Gil, “On selecting representative faultloads togui<strong>de</strong> the evaluation of ad hoc networks,” in Fifth<strong>La</strong>tin American Symposium on Dependable Computing(LADC), 2011.[5] J.J. Dujmovic and R. Elnicki, A DMS Cost/Benefit DecisionMo<strong>de</strong>l: Mathematical Mo<strong>de</strong>ls for Data ManagementSystem Evaluation, Comparison, and Selection, NationalBureau of Standards, Washington D.C., No. GCR 82-374.NTIS No. PB 82-170150, 1982.[6] M. F. Morris, “Kiviat graphs: conventions and figures ofmerit.,” ACM/Sigmetrics Performance Evaluation Review,vol. 3, no. 3, pp. 2–8, 1974.[7] David <strong>de</strong> Andres, “Using <strong>de</strong>pendability, performance,area and energy consumption experimental measures tobenchmark ip cores,” in Forth <strong>La</strong>tin American Symposiumon Dependable Computing (LADC), 2009.[8] Giulio Concas, Michele Marchesi, Sandro Pinna, andNicola Serra, “Power-laws in a large object-oriented softwaresystem,” IEEE Trans. Softw. Eng., vol. 33, pp.687–708, October 2007.[9] Yazeed A. Al-Sbou, Reza Saatchi, Samir Al-Khayatt,Rebecca Strachan, Moussa Ayyash, and MohammadSaraireh, “A novel quality of service assessment of multimediatraffic over wireless ad hoc networks,” in Proceedingsof the 2008 The Second International Conferenceon Next Generation Mobile Applications, Services, andTechnologies, 2008, pp. 479–484.[10] I. F. Akyildiz and others, “Wireless mesh networks: asurvey,” IEEE Radio Communications, vol. 43, pp. S23–S30, 2005.[11] “Hillsdale WMN,” Online: http://dashboard.openmesh.com/overview2.php?id=Hillsdale,2010.[12] David Andrés, Jesús Friginal, Juan-Carlos Ruiz, andPedro Gil, “An attack injection approach to evaluatethe robustness of ad hoc networks,” in IEEE PacificRim International Symposium on Dependable Computing(PRDC), 2009, pp. 228–233.[13] Jasmeet Chhabra et al., “Real-world experiences withan interactive ad hoc sensor network,” in Proceedings ofthe 2002 International Conference on Parallel ProcessingWorkshops, 2002, pp. 143–151.[14] Weiquan Lu, Winston K. G. Seah, Edwin W. C. Peh,and Yu Ge, “Communications support for disaster recoveryoperations using hybrid mobile ad-hoc networks,”in Proceedings of the 32nd IEEE Conference on LocalComputer Networks, 2007, pp. 763–770.<strong>JP2011</strong>-378

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!