SlideShare a Scribd company logo
Ad hoc systems management
and specification with distributed
Petri nets
Jornadas Chilenas de Computación
Lo Mejor de lo Nuestro (LMN)
JCC 2022
Juan Sebastián Sosa 🇨🇴,1 Paul Leger 🇨🇱,2 Hiroaki Fukuda 🇯🇵⚽,3 Nicolás Cardozo 🇨🇴1
1School of Engineering - Universidad de los Andes, Bogotá - Colombia
2Universidad Católica del Norte, Coquimbo - Chile
3Shibaura Institute of Technology, Tokyo - Japan
js.sosa10@uniandes.edu.co, pleger@ucn.cl, hiroaki@shibaura-it.ac.jp, n.cardozo@uniandes.edu.co
@ncardoz
2
Petri nets have been successful in modeling concurrent and
classic distributed systems.
In this work we want to use the Petri nets formalism to
specify and manage ad hoc distributed systems.
[Sosa et. al, Ad hoc systems management and speci
fi
cation with distributed Petri nets, JPDC. 2022. https://doi.org/10.1016/j.jpdc.2022.06.015]
3
Ad hoc distributed systems
device1
device2
Local Network
3
Ad hoc distributed systems
device1
device2
Local Network
message
3
Ad hoc distributed systems
device1
device2
Local Network
4
Ad hoc ping
ping1
ping2 pong1
pong2
4
Ad hoc ping
ping1
ping2 pong1
pong2
4
Ad hoc ping
ping1
ping2 pong1
pong2
4
Ad hoc ping
ping1
ping2 pong1
pong2
5
Ad hoc ping
ping1
ping2 pong1
pong2
5
Ad hoc ping
ping1
ping2 pong1
pong2
6
How to manage such systems
Manage spontaneous communication between
unknown entities
Assure resilient communication in case of transient
disconnections (resume communication, messages
are not lost)
7
Distributed ad hoc Petri nets (DaPNs)
𝒩
1
𝒩
2
Node Node
(p1, ping)
(p2, pong)
tpong
tping
ℰ = ⟨Pe ∪ P, T, f, fr⟩
7
Distributed ad hoc Petri nets (DaPNs)
Local Network
𝒩
1
𝒩
2
Node Node
(p1, ping)
(p2, pong)
tpong
tping
The connection between nodes (for discovery and communication) is done through serviceNames
remote arcs
ℰ = ⟨Pe ∪ P, T, f, fr⟩
8
Spontaneous communication
Local Network l
𝒩
2
Node
(p2, pong)
tpong
Systems in a local network are discovered and composed by means of
serviceNames connecting a transition of one net to a remote interface of the other.
8
Spontaneous communication
Local Network l
𝒩
1
𝒩
2
Node Node
(p1, ping)
(p2, pong)
tpong
tping
Systems in a local network are discovered and composed by means of
serviceNames connecting a transition of one net to a remote interface of the other.
join(N1, l)
8
Spontaneous communication
Local Network l
𝒩
1
𝒩
2
Node Node
(p1, ping)
(p2, pong)
tpong
tping
Systems in a local network are discovered and composed by means of
serviceNames connecting a transition of one net to a remote interface of the other.
remote arcs
join(N1, l)
fr : T × serviceNames → Pe ∪ {sentinel}
(tping, pong) ↦ (p, pong)
(tpong, ping) ↦ (p, ping)
8
Spontaneous communication
Local Network l
𝒩
1
𝒩
2
Node Node
(p1, ping)
(p2, pong)
tpong
tping
Systems in a local network are discovered and composed by means of
serviceNames connecting a transition of one net to a remote interface of the other.
remote arcs
join(N1, l)
fr : T × serviceNames → Pe ∪ {sentinel}
(tping, pong) ↦ (p, pong)
(tpong, ping) ↦ (p, ping)
8
Spontaneous communication
Local Network l
𝒩
2
Node
(p2, pong)
tpong
Systems in a local network are discovered and composed by means of
serviceNames connecting a transition of one net to a remote interface of the other.
join(N1, l)
leave(N1, l)
fr : T × serviceNames → Pe ∪ {sentinel}
(tping, pong) ↦ (p, pong)
(tpong, ping) ↦ (p, ping)
9
Reliable communication
Local Network
𝒩
1
𝒩
2
Node
Node
(p1, ping)
(p2, pong)
tpong
tping remote arcs
9
Reliable communication
Local Network
𝒩
1
𝒩
2
Node
Node
(p1, ping)
(p2, pong)
tpong
tping remote arcs
9
Reliable communication
Local Network
𝒩
1
Node
(p1, ping)
tping
9
Reliable communication
Local Network
𝒩
1
Node
(p1, ping)
tping
sentinel
9
Reliable communication
Local Network
𝒩
1
Node
(p1, ping)
tping
sentinel
9
Reliable communication
Local Network
𝒩
1
Node
(p1, ping)
tping
sentinel
Mailbox
9
Reliable communication
Local Network
𝒩
1
𝒩
2
Node
Node
(p1, ping)
(p2, pong)
tpong
tping remote arcs
𝒩
3
Node
(p2, pong)
tpong
Mailbox
9
Reliable communication
Local Network
𝒩
1
𝒩
2
Node
Node
(p1, ping)
(p2, pong)
tpong
tping remote arcs
𝒩
3
Node
(p2, pong)
tpong
Mailbox
10
Evaluation
1. Ensure Petri net behavior
2. Demonstrate the ability to connect to unknown nodes
3. Manage transient disconnections
All experiments are implemented in docker images and
deployed on a kubernetes cluster
11
Evaluation
Implementation in Go, following the definition of the Petri Net
Kernel (PNK) with the addition of Remote arcs and Service Nodes
Node discovery is managed using sleuth (zero congif library)
[Available at: https://github.com/FLAGlab/DistributedPetriNets]
All experiments use 3 physical nodes on a single LAN
12
Vehicular ad hoc networks
Dom
Brian
RSU 1
RSU 2
RSU 3
RSU 4
RSU 5
12
Vehicular ad hoc networks
Dom
Brian
RSU 1
RSU 2
RSU 3
RSU 4
RSU 5
12
Vehicular ad hoc networks
Dom
Brian
RSU 1
RSU 2
RSU 3
RSU 4
RSU 5
13
Vehicular ad hoc networks
RSU
c
push
V
vsadb
commit
ism
flush
ISM1
flush
ISMm
receive
send
ism
commit
sadb
13
Vehicular ad hoc networks
RSU
c
push
V
vsadb
commit
ism
flush
ISM1
flush
ISMm
receive
send
ism
commit
sadb
14
Vehicular ad hoc networks
rsu1
rsu2
rsu3
rsu4
rsu5
dom
brian
0 5 10 15 20 25 30 35 40 0 5 10 15 20 25 30 35 40
Dom’s vehicle Brian’s vehicle
15
Vehicular ad hoc networks
0 5 10 15 20 25 30 35 40
rsu1
rsu2
rsu3
rsu4
rsu5
dom
brian
0 5 10 15 20 25 30 35 40 0 5 10 15 20 25 30 35 40
0 5 10 15 20 25 30 35 40
rsu1
rsu2
rsu3
rsu4
rsu5
dom
brian
0 5 10 15 20 25 30 35 40
rsu1
rsu2
rsu3
rsu4
rsu5
dom
brian
0 5 10 15 20 25 30 35 40
rsu1
rsu2
rsu3
rsu4
rsu5
dom
brian
0 5 10 15 20 25 30 35 40
RSU 5
RSU 1
RSU 4
RSU 2 RSU 3
➡Full formalization of our approach
➡Detailed differentiation of this approach with the
state of the art
➡Full evaluation:
➡3 case studies: (1) Mutex, (2) Disaster and
Crisis Management, (3) VANETs (Vehicular Ad
hoc Networks)
16
In the paper
[Sosa et. al, Ad hoc systems management and speci
fi
cation with distributed Petri nets, JPDC. 2022. https://doi.org/10.1016/j.jpdc.2022.06.015]
Mutex Disaster Management VANETs
Petri net behavior
Structural changes
Disconnection handling
➡Evaluate Petri net verification techniques
➡Develop an incremental approach for Petri net verification
techniques as reachability
17
Conclusion and future work
[Sosa et. al, Ad hoc systems management and speci
fi
cation with distributed Petri nets, JPDC. 2022. https://doi.org/10.1016/j.jpdc.2022.06.015]
✓Effective formalization to model ad hoc distributed system
✓Manage the run-time execution of Petri nets across different nodes
✓Manage spontaneous communication with previously unknown nodes
in the network
✓Satisfy a node communication that is resilient to transient
disconnections
18
Conclusion and future work
[Sosa et. al, Ad hoc systems management and speci
fi
cation with distributed Petri nets, JPDC. 2022. https://doi.org/10.1016/j.jpdc.2022.06.015]
@FLAGlab in all media channels
Ad hoc systems management and
specification with distributed Petri
nets
✓Development and implementation of an adaptive architecture to
address the selected Challenges.
✓The Execution Guidepost provide adaptive connections.
✓Greater inclusion of IoT devices physical properties on devices
description and matching operations.
✓Weight adjustment on the matching algorithm to assign priorities on
system properties, bases on user application.
20
Conclusion and future work
[Sosa et. al, Ad hoc systems management and speci
fi
cation with distributed Petri nets, JPDC. 2022. https://doi.org/10.1016/j.jpdc.2022.06.015]
Questions

More Related Content

Similar to [JPDC,JCC@LMN22] Ad hoc systems Management and specification with distributed Petri nets

Ieek fall Conference 2013
Ieek fall Conference 2013Ieek fall Conference 2013
Ieek fall Conference 2013
toha ardi nugraha
 
Software defined network
Software defined networkSoftware defined network
Software defined network
Bogamoga1
 
Implementation of Spanning Tree Protocol using ns-3
Implementation of Spanning Tree Protocol using ns-3Implementation of Spanning Tree Protocol using ns-3
Implementation of Spanning Tree Protocol using ns-3
Naishil Shah
 
Literature Review: Convey the Data in Massive Parallel Computing
Literature Review: Convey the Data in Massive Parallel ComputingLiterature Review: Convey the Data in Massive Parallel Computing
Literature Review: Convey the Data in Massive Parallel Computing
AM Publications,India
 
RNN and its applications
RNN and its applicationsRNN and its applications
RNN and its applications
Sungjoon Choi
 
Clustering-based Analysis for Heavy-Hitter Flow Detection
Clustering-based Analysis for Heavy-Hitter Flow DetectionClustering-based Analysis for Heavy-Hitter Flow Detection
Clustering-based Analysis for Heavy-Hitter Flow Detection
APNIC
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
IEEEMEMTECHSTUDENTPROJECTS
 
MininetasSDNPlatform.pdf
MininetasSDNPlatform.pdfMininetasSDNPlatform.pdf
MininetasSDNPlatform.pdf
Fernando Velez Varela
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
Ire presentation
Ire presentationIre presentation
Ire presentation
Raj Patel
 
Understanding Large Social Networks | IRE Major Project | Team 57 | LINE
Understanding Large Social Networks | IRE Major Project | Team 57 | LINEUnderstanding Large Social Networks | IRE Major Project | Team 57 | LINE
Understanding Large Social Networks | IRE Major Project | Team 57 | LINE
Raj Patel
 
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
IRJET Journal
 
Peer-to-Peer Architecture Case Study Gnutella NetworkMate.docx
Peer-to-Peer Architecture Case Study Gnutella NetworkMate.docxPeer-to-Peer Architecture Case Study Gnutella NetworkMate.docx
Peer-to-Peer Architecture Case Study Gnutella NetworkMate.docx
herbertwilson5999
 
Ameliorate the performance using soft computing approaches in wireless networks
Ameliorate the performance using soft computing approaches  in wireless networksAmeliorate the performance using soft computing approaches  in wireless networks
Ameliorate the performance using soft computing approaches in wireless networks
IJECEIAES
 
Presentation on networking
Presentation on networking Presentation on networking
Presentation on networking
HoneyKumar34
 
SDN approach.pptx
SDN approach.pptxSDN approach.pptx
SDN approach.pptx
TrongMinhHoang1
 

Similar to [JPDC,JCC@LMN22] Ad hoc systems Management and specification with distributed Petri nets (20)

Ieek fall Conference 2013
Ieek fall Conference 2013Ieek fall Conference 2013
Ieek fall Conference 2013
 
Software defined network
Software defined networkSoftware defined network
Software defined network
 
Implementation of Spanning Tree Protocol using ns-3
Implementation of Spanning Tree Protocol using ns-3Implementation of Spanning Tree Protocol using ns-3
Implementation of Spanning Tree Protocol using ns-3
 
Literature Review: Convey the Data in Massive Parallel Computing
Literature Review: Convey the Data in Massive Parallel ComputingLiterature Review: Convey the Data in Massive Parallel Computing
Literature Review: Convey the Data in Massive Parallel Computing
 
Topology ppt
Topology pptTopology ppt
Topology ppt
 
RNN and its applications
RNN and its applicationsRNN and its applications
RNN and its applications
 
Clustering-based Analysis for Heavy-Hitter Flow Detection
Clustering-based Analysis for Heavy-Hitter Flow DetectionClustering-based Analysis for Heavy-Hitter Flow Detection
Clustering-based Analysis for Heavy-Hitter Flow Detection
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A probabilistic-misbehavior-de...
 
MininetasSDNPlatform.pdf
MininetasSDNPlatform.pdfMininetasSDNPlatform.pdf
MininetasSDNPlatform.pdf
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
 
Ire presentation
Ire presentationIre presentation
Ire presentation
 
Understanding Large Social Networks | IRE Major Project | Team 57 | LINE
Understanding Large Social Networks | IRE Major Project | Team 57 | LINEUnderstanding Large Social Networks | IRE Major Project | Team 57 | LINE
Understanding Large Social Networks | IRE Major Project | Team 57 | LINE
 
Andrea Sini Thesis
Andrea Sini ThesisAndrea Sini Thesis
Andrea Sini Thesis
 
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
 
Peer-to-Peer Architecture Case Study Gnutella NetworkMate.docx
Peer-to-Peer Architecture Case Study Gnutella NetworkMate.docxPeer-to-Peer Architecture Case Study Gnutella NetworkMate.docx
Peer-to-Peer Architecture Case Study Gnutella NetworkMate.docx
 
1757 1761
1757 17611757 1761
1757 1761
 
1757 1761
1757 17611757 1761
1757 1761
 
Ameliorate the performance using soft computing approaches in wireless networks
Ameliorate the performance using soft computing approaches  in wireless networksAmeliorate the performance using soft computing approaches  in wireless networks
Ameliorate the performance using soft computing approaches in wireless networks
 
Presentation on networking
Presentation on networking Presentation on networking
Presentation on networking
 
SDN approach.pptx
SDN approach.pptxSDN approach.pptx
SDN approach.pptx
 

More from Universidad de los Andes

An expressive and modular layer activation mechanism for Context-Oriented Pro...
An expressive and modular layer activation mechanism for Context-Oriented Pro...An expressive and modular layer activation mechanism for Context-Oriented Pro...
An expressive and modular layer activation mechanism for Context-Oriented Pro...
Universidad de los Andes
 
[FTfJP23] Points-to Analysis for Context-oriented Javascript Programs
[FTfJP23] Points-to Analysis for Context-oriented Javascript Programs[FTfJP23] Points-to Analysis for Context-oriented Javascript Programs
[FTfJP23] Points-to Analysis for Context-oriented Javascript Programs
Universidad de los Andes
 
[JIST] Programming language implementations for context-oriented self-adaptiv...
[JIST] Programming language implementations for context-oriented self-adaptiv...[JIST] Programming language implementations for context-oriented self-adaptiv...
[JIST] Programming language implementations for context-oriented self-adaptiv...
Universidad de los Andes
 
[CAIN'23] Prevalence of Code Smells in Reinforcement Learning Projects
[CAIN'23] Prevalence of Code Smells in Reinforcement Learning Projects[CAIN'23] Prevalence of Code Smells in Reinforcement Learning Projects
[CAIN'23] Prevalence of Code Smells in Reinforcement Learning Projects
Universidad de los Andes
 
[CIbSE2023] Cross-language clone detection for Mobile Apps
[CIbSE2023] Cross-language clone detection for Mobile Apps[CIbSE2023] Cross-language clone detection for Mobile Apps
[CIbSE2023] Cross-language clone detection for Mobile Apps
Universidad de los Andes
 
Keeping Up! with LaTeX
Keeping Up! with LaTeXKeeping Up! with LaTeX
Keeping Up! with LaTeX
Universidad de los Andes
 
[CCC'21] Evaluation of Work Stealing Algorithms
[CCC'21] Evaluation of Work Stealing Algorithms[CCC'21] Evaluation of Work Stealing Algorithms
[CCC'21] Evaluation of Work Stealing Algorithms
Universidad de los Andes
 
Generating Adaptations from the System Execution using Reinforcement Learning...
Generating Adaptations from the System Execution using Reinforcement Learning...Generating Adaptations from the System Execution using Reinforcement Learning...
Generating Adaptations from the System Execution using Reinforcement Learning...
Universidad de los Andes
 
Language Abstractions and Techniques for Developing Collective Adaptive Syste...
Language Abstractions and Techniques for Developing Collective Adaptive Syste...Language Abstractions and Techniques for Developing Collective Adaptive Syste...
Language Abstractions and Techniques for Developing Collective Adaptive Syste...
Universidad de los Andes
 
Does Neuron Coverage Matter for Deep Reinforcement Learning? A preliminary study
Does Neuron Coverage Matter for Deep Reinforcement Learning? A preliminary studyDoes Neuron Coverage Matter for Deep Reinforcement Learning? A preliminary study
Does Neuron Coverage Matter for Deep Reinforcement Learning? A preliminary study
Universidad de los Andes
 
Learning run-time composition of interacting adaptations
Learning run-time composition of interacting adaptationsLearning run-time composition of interacting adaptations
Learning run-time composition of interacting adaptations
Universidad de los Andes
 
Distributed context Petri nets
Distributed context Petri netsDistributed context Petri nets
Distributed context Petri nets
Universidad de los Andes
 
CQL: declarative language for context activation
CQL: declarative language for context activationCQL: declarative language for context activation
CQL: declarative language for context activation
Universidad de los Andes
 
Generating software adaptations using machine learning
Generating software adaptations using machine learningGenerating software adaptations using machine learning
Generating software adaptations using machine learning
Universidad de los Andes
 
[Bachelor_project] Asignación de exámenes finales
[Bachelor_project] Asignación de exámenes finales[Bachelor_project] Asignación de exámenes finales
[Bachelor_project] Asignación de exámenes finales
Universidad de los Andes
 
Programming language techniques for adaptive software
Programming language techniques for adaptive softwareProgramming language techniques for adaptive software
Programming language techniques for adaptive software
Universidad de los Andes
 
Peace COrP: Learning to solve conflicts between contexts
Peace COrP: Learning to solve conflicts between contextsPeace COrP: Learning to solve conflicts between contexts
Peace COrP: Learning to solve conflicts between contexts
Universidad de los Andes
 
Emergent Software Services
Emergent Software ServicesEmergent Software Services
Emergent Software Services
Universidad de los Andes
 

More from Universidad de los Andes (18)

An expressive and modular layer activation mechanism for Context-Oriented Pro...
An expressive and modular layer activation mechanism for Context-Oriented Pro...An expressive and modular layer activation mechanism for Context-Oriented Pro...
An expressive and modular layer activation mechanism for Context-Oriented Pro...
 
[FTfJP23] Points-to Analysis for Context-oriented Javascript Programs
[FTfJP23] Points-to Analysis for Context-oriented Javascript Programs[FTfJP23] Points-to Analysis for Context-oriented Javascript Programs
[FTfJP23] Points-to Analysis for Context-oriented Javascript Programs
 
[JIST] Programming language implementations for context-oriented self-adaptiv...
[JIST] Programming language implementations for context-oriented self-adaptiv...[JIST] Programming language implementations for context-oriented self-adaptiv...
[JIST] Programming language implementations for context-oriented self-adaptiv...
 
[CAIN'23] Prevalence of Code Smells in Reinforcement Learning Projects
[CAIN'23] Prevalence of Code Smells in Reinforcement Learning Projects[CAIN'23] Prevalence of Code Smells in Reinforcement Learning Projects
[CAIN'23] Prevalence of Code Smells in Reinforcement Learning Projects
 
[CIbSE2023] Cross-language clone detection for Mobile Apps
[CIbSE2023] Cross-language clone detection for Mobile Apps[CIbSE2023] Cross-language clone detection for Mobile Apps
[CIbSE2023] Cross-language clone detection for Mobile Apps
 
Keeping Up! with LaTeX
Keeping Up! with LaTeXKeeping Up! with LaTeX
Keeping Up! with LaTeX
 
[CCC'21] Evaluation of Work Stealing Algorithms
[CCC'21] Evaluation of Work Stealing Algorithms[CCC'21] Evaluation of Work Stealing Algorithms
[CCC'21] Evaluation of Work Stealing Algorithms
 
Generating Adaptations from the System Execution using Reinforcement Learning...
Generating Adaptations from the System Execution using Reinforcement Learning...Generating Adaptations from the System Execution using Reinforcement Learning...
Generating Adaptations from the System Execution using Reinforcement Learning...
 
Language Abstractions and Techniques for Developing Collective Adaptive Syste...
Language Abstractions and Techniques for Developing Collective Adaptive Syste...Language Abstractions and Techniques for Developing Collective Adaptive Syste...
Language Abstractions and Techniques for Developing Collective Adaptive Syste...
 
Does Neuron Coverage Matter for Deep Reinforcement Learning? A preliminary study
Does Neuron Coverage Matter for Deep Reinforcement Learning? A preliminary studyDoes Neuron Coverage Matter for Deep Reinforcement Learning? A preliminary study
Does Neuron Coverage Matter for Deep Reinforcement Learning? A preliminary study
 
Learning run-time composition of interacting adaptations
Learning run-time composition of interacting adaptationsLearning run-time composition of interacting adaptations
Learning run-time composition of interacting adaptations
 
Distributed context Petri nets
Distributed context Petri netsDistributed context Petri nets
Distributed context Petri nets
 
CQL: declarative language for context activation
CQL: declarative language for context activationCQL: declarative language for context activation
CQL: declarative language for context activation
 
Generating software adaptations using machine learning
Generating software adaptations using machine learningGenerating software adaptations using machine learning
Generating software adaptations using machine learning
 
[Bachelor_project] Asignación de exámenes finales
[Bachelor_project] Asignación de exámenes finales[Bachelor_project] Asignación de exámenes finales
[Bachelor_project] Asignación de exámenes finales
 
Programming language techniques for adaptive software
Programming language techniques for adaptive softwareProgramming language techniques for adaptive software
Programming language techniques for adaptive software
 
Peace COrP: Learning to solve conflicts between contexts
Peace COrP: Learning to solve conflicts between contextsPeace COrP: Learning to solve conflicts between contexts
Peace COrP: Learning to solve conflicts between contexts
 
Emergent Software Services
Emergent Software ServicesEmergent Software Services
Emergent Software Services
 

Recently uploaded

Mammalian Pineal Body Structure and Also Functions
Mammalian Pineal Body Structure and Also FunctionsMammalian Pineal Body Structure and Also Functions
Mammalian Pineal Body Structure and Also Functions
YOGESH DOGRA
 
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Sérgio Sacani
 
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
Sérgio Sacani
 
Orion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWSOrion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWS
Columbia Weather Systems
 
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
Scintica Instrumentation
 
如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样
如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样
如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样
yqqaatn0
 
Leaf Initiation, Growth and Differentiation.pdf
Leaf Initiation, Growth and Differentiation.pdfLeaf Initiation, Growth and Differentiation.pdf
Leaf Initiation, Growth and Differentiation.pdf
RenuJangid3
 
Hemostasis_importance& clinical significance.pptx
Hemostasis_importance& clinical significance.pptxHemostasis_importance& clinical significance.pptx
Hemostasis_importance& clinical significance.pptx
muralinath2
 
Chapter 12 - climate change and the energy crisis
Chapter 12 - climate change and the energy crisisChapter 12 - climate change and the energy crisis
Chapter 12 - climate change and the energy crisis
tonzsalvador2222
 
DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...
DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...
DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...
Wasswaderrick3
 
GBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram StainingGBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram Staining
Areesha Ahmad
 
Unveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdfUnveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdf
Erdal Coalmaker
 
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
Sérgio Sacani
 
GBSN - Biochemistry (Unit 5) Chemistry of Lipids
GBSN - Biochemistry (Unit 5) Chemistry of LipidsGBSN - Biochemistry (Unit 5) Chemistry of Lipids
GBSN - Biochemistry (Unit 5) Chemistry of Lipids
Areesha Ahmad
 
Deep Software Variability and Frictionless Reproducibility
Deep Software Variability and Frictionless ReproducibilityDeep Software Variability and Frictionless Reproducibility
Deep Software Variability and Frictionless Reproducibility
University of Rennes, INSA Rennes, Inria/IRISA, CNRS
 
BLOOD AND BLOOD COMPONENT- introduction to blood physiology
BLOOD AND BLOOD COMPONENT- introduction to blood physiologyBLOOD AND BLOOD COMPONENT- introduction to blood physiology
BLOOD AND BLOOD COMPONENT- introduction to blood physiology
NoelManyise1
 
NuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final versionNuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final version
pablovgd
 
extra-chromosomal-inheritance[1].pptx.pdfpdf
extra-chromosomal-inheritance[1].pptx.pdfpdfextra-chromosomal-inheritance[1].pptx.pdfpdf
extra-chromosomal-inheritance[1].pptx.pdfpdf
DiyaBiswas10
 
Nutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technologyNutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technology
Lokesh Patil
 
in vitro propagation of plants lecture note.pptx
in vitro propagation of plants lecture note.pptxin vitro propagation of plants lecture note.pptx
in vitro propagation of plants lecture note.pptx
yusufzako14
 

Recently uploaded (20)

Mammalian Pineal Body Structure and Also Functions
Mammalian Pineal Body Structure and Also FunctionsMammalian Pineal Body Structure and Also Functions
Mammalian Pineal Body Structure and Also Functions
 
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
 
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
 
Orion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWSOrion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWS
 
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...
 
如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样
如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样
如何办理(uvic毕业证书)维多利亚大学毕业证本科学位证书原版一模一样
 
Leaf Initiation, Growth and Differentiation.pdf
Leaf Initiation, Growth and Differentiation.pdfLeaf Initiation, Growth and Differentiation.pdf
Leaf Initiation, Growth and Differentiation.pdf
 
Hemostasis_importance& clinical significance.pptx
Hemostasis_importance& clinical significance.pptxHemostasis_importance& clinical significance.pptx
Hemostasis_importance& clinical significance.pptx
 
Chapter 12 - climate change and the energy crisis
Chapter 12 - climate change and the energy crisisChapter 12 - climate change and the energy crisis
Chapter 12 - climate change and the energy crisis
 
DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...
DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...
DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...
 
GBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram StainingGBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram Staining
 
Unveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdfUnveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdf
 
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
 
GBSN - Biochemistry (Unit 5) Chemistry of Lipids
GBSN - Biochemistry (Unit 5) Chemistry of LipidsGBSN - Biochemistry (Unit 5) Chemistry of Lipids
GBSN - Biochemistry (Unit 5) Chemistry of Lipids
 
Deep Software Variability and Frictionless Reproducibility
Deep Software Variability and Frictionless ReproducibilityDeep Software Variability and Frictionless Reproducibility
Deep Software Variability and Frictionless Reproducibility
 
BLOOD AND BLOOD COMPONENT- introduction to blood physiology
BLOOD AND BLOOD COMPONENT- introduction to blood physiologyBLOOD AND BLOOD COMPONENT- introduction to blood physiology
BLOOD AND BLOOD COMPONENT- introduction to blood physiology
 
NuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final versionNuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final version
 
extra-chromosomal-inheritance[1].pptx.pdfpdf
extra-chromosomal-inheritance[1].pptx.pdfpdfextra-chromosomal-inheritance[1].pptx.pdfpdf
extra-chromosomal-inheritance[1].pptx.pdfpdf
 
Nutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technologyNutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technology
 
in vitro propagation of plants lecture note.pptx
in vitro propagation of plants lecture note.pptxin vitro propagation of plants lecture note.pptx
in vitro propagation of plants lecture note.pptx
 

[JPDC,JCC@LMN22] Ad hoc systems Management and specification with distributed Petri nets

  • 1. Ad hoc systems management and specification with distributed Petri nets Jornadas Chilenas de Computación Lo Mejor de lo Nuestro (LMN) JCC 2022 Juan Sebastián Sosa 🇨🇴,1 Paul Leger 🇨🇱,2 Hiroaki Fukuda 🇯🇵⚽,3 Nicolás Cardozo 🇨🇴1 1School of Engineering - Universidad de los Andes, Bogotá - Colombia 2Universidad Católica del Norte, Coquimbo - Chile 3Shibaura Institute of Technology, Tokyo - Japan js.sosa10@uniandes.edu.co, pleger@ucn.cl, hiroaki@shibaura-it.ac.jp, n.cardozo@uniandes.edu.co @ncardoz
  • 2. 2 Petri nets have been successful in modeling concurrent and classic distributed systems. In this work we want to use the Petri nets formalism to specify and manage ad hoc distributed systems. [Sosa et. al, Ad hoc systems management and speci fi cation with distributed Petri nets, JPDC. 2022. https://doi.org/10.1016/j.jpdc.2022.06.015]
  • 3. 3 Ad hoc distributed systems device1 device2 Local Network
  • 4. 3 Ad hoc distributed systems device1 device2 Local Network message
  • 5. 3 Ad hoc distributed systems device1 device2 Local Network
  • 12. 6 How to manage such systems Manage spontaneous communication between unknown entities Assure resilient communication in case of transient disconnections (resume communication, messages are not lost)
  • 13. 7 Distributed ad hoc Petri nets (DaPNs) 𝒩 1 𝒩 2 Node Node (p1, ping) (p2, pong) tpong tping ℰ = ⟨Pe ∪ P, T, f, fr⟩
  • 14. 7 Distributed ad hoc Petri nets (DaPNs) Local Network 𝒩 1 𝒩 2 Node Node (p1, ping) (p2, pong) tpong tping The connection between nodes (for discovery and communication) is done through serviceNames remote arcs ℰ = ⟨Pe ∪ P, T, f, fr⟩
  • 15. 8 Spontaneous communication Local Network l 𝒩 2 Node (p2, pong) tpong Systems in a local network are discovered and composed by means of serviceNames connecting a transition of one net to a remote interface of the other.
  • 16. 8 Spontaneous communication Local Network l 𝒩 1 𝒩 2 Node Node (p1, ping) (p2, pong) tpong tping Systems in a local network are discovered and composed by means of serviceNames connecting a transition of one net to a remote interface of the other. join(N1, l)
  • 17. 8 Spontaneous communication Local Network l 𝒩 1 𝒩 2 Node Node (p1, ping) (p2, pong) tpong tping Systems in a local network are discovered and composed by means of serviceNames connecting a transition of one net to a remote interface of the other. remote arcs join(N1, l) fr : T × serviceNames → Pe ∪ {sentinel} (tping, pong) ↦ (p, pong) (tpong, ping) ↦ (p, ping)
  • 18. 8 Spontaneous communication Local Network l 𝒩 1 𝒩 2 Node Node (p1, ping) (p2, pong) tpong tping Systems in a local network are discovered and composed by means of serviceNames connecting a transition of one net to a remote interface of the other. remote arcs join(N1, l) fr : T × serviceNames → Pe ∪ {sentinel} (tping, pong) ↦ (p, pong) (tpong, ping) ↦ (p, ping)
  • 19. 8 Spontaneous communication Local Network l 𝒩 2 Node (p2, pong) tpong Systems in a local network are discovered and composed by means of serviceNames connecting a transition of one net to a remote interface of the other. join(N1, l) leave(N1, l) fr : T × serviceNames → Pe ∪ {sentinel} (tping, pong) ↦ (p, pong) (tpong, ping) ↦ (p, ping)
  • 26. 9 Reliable communication Local Network 𝒩 1 𝒩 2 Node Node (p1, ping) (p2, pong) tpong tping remote arcs 𝒩 3 Node (p2, pong) tpong Mailbox
  • 27. 9 Reliable communication Local Network 𝒩 1 𝒩 2 Node Node (p1, ping) (p2, pong) tpong tping remote arcs 𝒩 3 Node (p2, pong) tpong Mailbox
  • 28. 10 Evaluation 1. Ensure Petri net behavior 2. Demonstrate the ability to connect to unknown nodes 3. Manage transient disconnections
  • 29. All experiments are implemented in docker images and deployed on a kubernetes cluster 11 Evaluation Implementation in Go, following the definition of the Petri Net Kernel (PNK) with the addition of Remote arcs and Service Nodes Node discovery is managed using sleuth (zero congif library) [Available at: https://github.com/FLAGlab/DistributedPetriNets] All experiments use 3 physical nodes on a single LAN
  • 30. 12 Vehicular ad hoc networks Dom Brian RSU 1 RSU 2 RSU 3 RSU 4 RSU 5
  • 31. 12 Vehicular ad hoc networks Dom Brian RSU 1 RSU 2 RSU 3 RSU 4 RSU 5
  • 32. 12 Vehicular ad hoc networks Dom Brian RSU 1 RSU 2 RSU 3 RSU 4 RSU 5
  • 33. 13 Vehicular ad hoc networks RSU c push V vsadb commit ism flush ISM1 flush ISMm receive send ism commit sadb
  • 34. 13 Vehicular ad hoc networks RSU c push V vsadb commit ism flush ISM1 flush ISMm receive send ism commit sadb
  • 35. 14 Vehicular ad hoc networks rsu1 rsu2 rsu3 rsu4 rsu5 dom brian 0 5 10 15 20 25 30 35 40 0 5 10 15 20 25 30 35 40 Dom’s vehicle Brian’s vehicle
  • 36. 15 Vehicular ad hoc networks 0 5 10 15 20 25 30 35 40 rsu1 rsu2 rsu3 rsu4 rsu5 dom brian 0 5 10 15 20 25 30 35 40 0 5 10 15 20 25 30 35 40 0 5 10 15 20 25 30 35 40 rsu1 rsu2 rsu3 rsu4 rsu5 dom brian 0 5 10 15 20 25 30 35 40 rsu1 rsu2 rsu3 rsu4 rsu5 dom brian 0 5 10 15 20 25 30 35 40 rsu1 rsu2 rsu3 rsu4 rsu5 dom brian 0 5 10 15 20 25 30 35 40 RSU 5 RSU 1 RSU 4 RSU 2 RSU 3
  • 37. ➡Full formalization of our approach ➡Detailed differentiation of this approach with the state of the art ➡Full evaluation: ➡3 case studies: (1) Mutex, (2) Disaster and Crisis Management, (3) VANETs (Vehicular Ad hoc Networks) 16 In the paper [Sosa et. al, Ad hoc systems management and speci fi cation with distributed Petri nets, JPDC. 2022. https://doi.org/10.1016/j.jpdc.2022.06.015] Mutex Disaster Management VANETs Petri net behavior Structural changes Disconnection handling
  • 38. ➡Evaluate Petri net verification techniques ➡Develop an incremental approach for Petri net verification techniques as reachability 17 Conclusion and future work [Sosa et. al, Ad hoc systems management and speci fi cation with distributed Petri nets, JPDC. 2022. https://doi.org/10.1016/j.jpdc.2022.06.015]
  • 39. ✓Effective formalization to model ad hoc distributed system ✓Manage the run-time execution of Petri nets across different nodes ✓Manage spontaneous communication with previously unknown nodes in the network ✓Satisfy a node communication that is resilient to transient disconnections 18 Conclusion and future work [Sosa et. al, Ad hoc systems management and speci fi cation with distributed Petri nets, JPDC. 2022. https://doi.org/10.1016/j.jpdc.2022.06.015]
  • 40. @FLAGlab in all media channels Ad hoc systems management and specification with distributed Petri nets
  • 41. ✓Development and implementation of an adaptive architecture to address the selected Challenges. ✓The Execution Guidepost provide adaptive connections. ✓Greater inclusion of IoT devices physical properties on devices description and matching operations. ✓Weight adjustment on the matching algorithm to assign priorities on system properties, bases on user application. 20 Conclusion and future work [Sosa et. al, Ad hoc systems management and speci fi cation with distributed Petri nets, JPDC. 2022. https://doi.org/10.1016/j.jpdc.2022.06.015] Questions