請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/6295
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 許永真(Jane Yung-Jen Hsu) | |
dc.contributor.author | Penn Su | en |
dc.contributor.author | 蘇適 | zh_TW |
dc.date.accessioned | 2021-05-16T16:25:18Z | - |
dc.date.available | 2013-06-21 | |
dc.date.available | 2021-05-16T16:25:18Z | - |
dc.date.copyright | 2013-06-21 | |
dc.date.issued | 2013 | |
dc.date.submitted | 2013-05-19 | |
dc.identifier.citation | [1] G. Barrenetxea, F. Ingelrest, G. Schaefer, and M. Vetterli, “The hitchhiker’s guide to successful wireless sensor network deployments,” in Proceedings of the 6th ACM conference on Embedded network sensor systems (SenSys ’08), vol. D, pp. 43–56, ACM Press, 2008.
[2] J. Polastre, R. Szewczyk, A. Mainwaring, D. Culler, and J. Anderson, “Analysis of wireless sensor networks for habitat monitoring,” in Wireless Sensor Networks (C. S. Raghavendra, K. M. Sivalingam, and T. Znati, eds.), pp. 399–423, Kluwer Academic Publishers, 2004. [3] A. Arora, P. Dutta, S. Bapat, V. Kulathumani, H. Zhang, V. Naik, V. Mittal, H. Cao, M. Demirbas, M. Gouda, Y. Choi, T. Herman, S. Kulkarni, U. Arumugam, M. Nesterenko, A. Vora, and M. Miyashita, “A line in the sand: A wireless sen- sor network for target detection, classification, and tracking,” Computer Networks, vol. 46, pp. 605–634, Jan. 2004. [4] J. Tateson, C. Roadknight, A. Gonzalez, T. Khan, S. Fitz, I. Henning, N. Boyd, C. Vincent, and I. Marshall, “Real World Issues in Deploying a Wireless Sensor Network for Oceanography,” in Unpublished paper presented at Workshop on Real- World Wireless Sensor Networks (REALWSN ’05), 2005. 51 [5] P. Padhy, K. Martinez, A. Riddoch, H. L. . R. Ong, and J. K. Hart, “Glacial Environ- ment Monitoring using Sensor Networks,” in Real-World Wireless Sensor Networks, pp. 10–14, 2005. [6] I. Stoianov, L. Nachman, S. Madden, and T. Tokmouline, “PIPENET: A Wireless Sensor Network for Pipeline Monitoring,” in Proceedings of the 6th international conference on Information processing in sensor networks (IPSN ’07), pp. 264–273, ACM, 2007. [7] G. Tolle, J. Polastre, R. Szewczyk, D. Culler, N. Turner, K. Tu, S. Burgess, T. Daw- son, P. Buonadonna, D. Gay, and W. Hong, “A macroscope in the redwoods,” in Proceedings of the 3rd international conference on Embedded networked sensor systems (Sensys ’05), pp. 51–63, ACM, Jan. 2005. [8] G. Werner-Allen, K. Lorincz, J. Johnson, J. Lees, and M. Welsh, “Fidelity and yield in a volcano monitoring sensor network,” in Proceedings of the 7th symposium on Operating systems design and implementation (OSDI ’06), pp. 381–396, USENIX Association, Jan. 2006. [9] X. Koutsoukos, M. Kushwaha, I. Amundson, S. Neema, and J. Sztipanovits, “OA- SiS: A Service-Oriented Architecture for Ambient-Aware Sensor Networks,” in Composition of Embedded Systems. Scientific and Industrial Issues, pp. 125–149, Springer Berlin Heidelberg, 2007. [10] D. Hughes, K. Thoelen, J. Maerien, N. Matthys, W. Horre, J. Del Cid, C. Huygens, S. Michiels, and W. Joosen, “LooCI: The Loosely-coupled Component Infrastruc- ture,” in 11th IEEE International Symposium on Network Computing and Applica- tions (NCA 2012), pp. 236–243, IEEE, Aug. 2012. 52 [11] N. Reijers, K.-j. Lin, Y.-c. Wang, C.-s. Shih, and J. Y. Hsu, “Design of an Intelligent Middleware for Flexible Sensor Configuration in M2M Systems,” in Presented at 2nd International conference on sensor networks (SENSORNETS 2013), 2013. [12] S.Ratnasamy,B.Karp,L.Yin,F.Yu,D.Estrin,R.Govindan,andS.Shenker,“GHT: A Geographic Hash Table for Data-Centric Storage,” in Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications (WSNA ’02), vol. 5, pp. 78–87, ACM, 2002. [13] K. Piotrowski, P. Langendoerfer, and S. Peter, “tinyDSM: A highly reliable cooper- ative data storage for Wireless Sensor Networks,” in 2009 International Symposium on Collaborative Technologies and Systems, pp. 225–232, Ieee, 2009. [14] J. Neumann, N. Hoeller, C. Reinke, and V. Linnemann, “Redundancy Infrastructure for Service-Oriented Wireless Sensor Networks,” in 9th IEEE International Sym- posium on Network Computing and Applications (NCA 2010), pp. 269–274, IEEE Computer Society, July 2010. [15] S. Shepard, RFID: radio frequency identification. McGraw-Hill New York, 2005. [16] L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: A survey,” Computer Networks, vol. 54, no. 15, pp. 2787–2805, 2010. [17] C. Associati, “The Evolution of Internet of Things,” pp. 1–4, 2011. [18] CISCO, “How the Internet of Things Will Change Everything.” http://youtu. be/mf7HxU0ZR_Q. [19] O. Malik, “Internet of things will have 24 billion devices by 2020,” 2011. 53 [20] W. Randomly, “Supercomputers Vs Mobile Phones.” http://www. walkingrandomly.com/?p=2684, 2010. [21] Y.-K. Chen, “Challenges and opportunities of internet of things,” in Design Automa- tion Conference (ASP-DAC), 2012 17th Asia and South Pacific, pp. 383–388, 2012. [22] C. Beckmann, S. Consolvo, and A. Lamarca, “Some assembly required: Support- ing end-user sensor installation in domestic ubiquitous computing environments,” in UbiComp 2004, pp. 107–124, Springer-Verlag, 2004. [23] A. Bharathidasan, V. An, and S. Ponduru, “Sensor Networks: An Overview,” tech. rep., Department of Computer Science, University of California, Davis, 2002. [24] R. Marin-Perianu, H. Scholten, and P. Havinga, “Prototyping Service Discovery and Usage in Wireless Sensor Networks,” pp. 841–850, IEEE Computer Society, 2007. [25] Z.-W. Alliance, “ZwaveStart.” http://www.z-wave.com/modules/ZwaveStart/. [26] P. Su, N. Reigers, and S. Zhou, “NanoKong.” http://github.com/ wukong-m2m/NanoKong, 2012. [27] T. Harbaum, “The NanoVM: Java for the AVR.” http://www.harbaum.org/ till/nanovm/index.shtml, 2006. [28] “Brick Light Sensor.” http://arduino-info.wikispaces.com/Brick-LightSensor, 2013. | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/6295 | - |
dc.description.abstract | 對於具有 '部署一次,永遠運行' 概念的物聯網而言,容錯移轉是這類分散式服務導向網路的必備條件。當設備更換時或系統出狀況時,必須利用資源再規畫去達成容錯移轉的機制。系統在運作時,異質性的或多工性的設備之間若不僅是端對端的訊息傳輸時,不管是設備或是訊息的複製都是昂貴且累贅。特別是當設備某種服務故障時,可由另外一個有能力提供相同服務的同級設備接替其服務,而不一定要由相同設備取代。利用長帶來記錄一連串複製的服務訊息,每一個同級設備都保存一致的長帶記錄。結合常用於失敗偵測的心跳協定,系統由異常回復的機制可以藉由操控分析分散狀態的長帶來達成。使用Arduino mega 2560相容設備所做的實驗結果顯示,我們已經能夠使小型網路系統故障復原,較大的網路實驗則正在進行中。未來研究方向包括確認網路的可擴展性,網路磁碟分割 處理以及解決同步故障的問題。 | zh_TW |
dc.description.abstract | Failover for service-oriented distributed networks is a prerequisite
to enabling Internet-of-Things (IoT) in the sense of “deploy-once, run forever.” Resource reconfiguration is required to achieve failover mechanisms upon replacement of devices or failure of services. It can be particularly challenging when services in applications have more than end-to-end transmissions between devices that are heterogeneous or versatile, for which duplications can be costly and redundant. Specifically, a device with a failed service shall be taken over by another service peer, instead of a device counterpart to recover application as a whole. Strip is introduced to store a list of duplicated services, and, each service peer maintains a consistent view of strips. In combination with the heartbeat protocol which was widely applied for failure detection, recovery from failure can be achieved by manipulating strips in a distributed manner. Experiments using Arduino Mega 2560 compatible devices show that our approach is capable of failover in small networks, whereas experiments in larger networks are underway. Future research directions include addressing the scalability issue, network partitions and tackling simultaneous failures. | en |
dc.description.provenance | Made available in DSpace on 2021-05-16T16:25:18Z (GMT). No. of bitstreams: 1 ntu-102-R99922157-1.pdf: 5440170 bytes, checksum: fe36809669617ebed1c644af33a8ad6d (MD5) Previous issue date: 2013 | en |
dc.description.tableofcontents | Acknowledgments i
中文摘要 iii Abstract v 1 INTRODUCTION 1 1.1 Goals .................................... 3 1.2 Challenges.................................. 3 1.3 Related Work ................................ 4 1.4 Thesis Organization............................. 5 2 BACKGROUND 7 2.1 Internet-of-Things.............................. 7 2.1.1 What is Internet-of-Things..................... 7 2.1.2 The Evolution of Internet-of-Things................ 8 2.1.3 Potential Applications ....................... 8 2.1.4 Challenges ............................. 10 2.2 Wireless Sensor Networks ......................... 10 2.2.1 What is Wireless Sensor Networks................. 10 2.2.2 Benefits of Decentralized Architecture. . . . . . . . . . . . . . . 11 2.2.3 Challenges ............................. 12 2.2.3.1 Service-Oriented Architecture for Wireless Sensor Network........................... 12 2.3 WuKong: The intelligent middleware for M2M applications . . . . . . . 12 2.3.1 Goal................................. 12 2.3.2 Flow Base Programming...................... 13 2.3.3 Sensor Profile Framework ..................... 15 2.3.3.1 Property Propagation .................. 16 2.3.4 Compilation and Mapping ..................... 16 2.3.5 System Progression Framework .................. 17 3 SYSTEM DESIGN 19 3.1 User Preference for Fault Tolerance .................... 19 3.2 Deploying Application with Fault Tolerance . . . . . . . . . . . . . . . . 20 3.3 Strip..................................... 22 3.4 Reconfigurable Redundancy Architecture ................. 23 3.4.1 Decentralized Failure Detection .................. 23 3.4.2 Failure Recovery .......................... 24 3.4.2.1 Consistent view of strips................. 24 3.4.2.2 Reconfiguration ..................... 26 3.5 Complexity Analysis ............................ 27 4 EVALUATION & RESULTS 35 4.1 Application ................................. 35 4.2 Policy.................................... 36 4.3 Heartbeat Protocol Arrangement ...................... 37 4.4 Hardware Platform ............................. 38 4.5 Experimental Setup............................. 38 4.6 Mapping Results .............................. 39 4.7 Results.................................... 40 5 CONCLUSION 47 5.1 Discussion.................................. 47 5.2 FutureWork................................. 47 Bibliography......................................51 | |
dc.language.iso | en | |
dc.title | 智能M2M系統的容錯研究 | zh_TW |
dc.title | Research on Fault Tolerance for Intelligent M2M Systems | en |
dc.type | Thesis | |
dc.date.schoolyear | 101-2 | |
dc.description.degree | 碩士 | |
dc.contributor.coadvisor | 林桂傑(Kwei-Jay Lin) | |
dc.contributor.oralexamcommittee | 施吉昇(Chi-Sheng Shih),陳彥光 | |
dc.subject.keyword | M2M,容錯系統, | zh_TW |
dc.subject.keyword | M2M,Fault tolerance, | en |
dc.relation.page | 54 | |
dc.rights.note | 同意授權(全球公開) | |
dc.date.accepted | 2013-05-20 | |
dc.contributor.author-college | 電機資訊學院 | zh_TW |
dc.contributor.author-dept | 資訊工程學研究所 | zh_TW |
顯示於系所單位: | 資訊工程學系 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-102-1.pdf | 5.31 MB | Adobe PDF | 檢視/開啟 |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。