Context-Aware Middleware for Pervasive and Mobile Ad Hoc Environments
|
|
- Stella Carpenter
- 5 years ago
- Views:
Transcription
1 Context-Aware Middleware for Pervasive and Mobile Ad Hoc Environments Hector A. Duran-Limon Department of Computing Science, Tecnológico de Monterrey (ITESM), Campus Guadalajara, México. Gordon S. Blair, Adrian Friday, Thirunavukkarasu Sivaharan, Maomao Wu, Paul Okanda, Carl-Fredrik Sørensen Computing Department, Lancaster University, Bailrigg, Lancaster LA1 4YR, UK Abstract: Recent advances in the area of mobile ad hoc computing and pervasive computing have driven the emergence of new challenges. For example, the Intelligent Environment or Smart Environment has become one of the key research areas in the pervasive computing arena. Mobile ad hoc scenarios also include time-critical applications such as an autonomous vehicle system in which vehicles are able to operate independently and cooperate with each other to avoid collisions. In this paper, we present a context-aware middleware architecture for the support of both pervasive and mobile ad hoc environments. Keywords: mobile ad hoc networks, pervasive systems, real-time systems, middleware 1. Introduction Recent years have witnessed advances in the enabling technologies for mobile computing, such as the increasingly mature end-systems, various kinds of wireless communication protocols, and mobile networking technologies. As a result new challenges have emerged in both the pervasive and mobile ad hoc computing arenas. Regarding the former, one of the key research areas in recent years is the Intelligent Environment or Smart Environment. A personalized intelligent room, for example, can set the room temperature according to the occupier s preference, play his beloved music, and make his favourite coffee, etc. In addition, examples of mobile ad hoc applications include air traffic control systems whereby thousands of aircraft are proactively coordinated to keep them at safe distance from each other, direct them during takeoff and landing from airports, and ensure that traffic congestions are avoided. Another example is an autonomous vehicle system in which vehicles are able to operate independently and cooperate with each other to avoid collisions. This kind of systems is time-critical and needs to be provided with both timeliness assurances and adaptation mechanisms that lead the system to a safe state in case of unexpected changes introduced in the environment. This paper provides a solution to three important issues: a) support for sentience and intelligent behaviour, b) support for high mobility and pervasiveness, and c) realtime support for mobile ad hoc environments. These challenges are addressed in an integrated manner by our middleware architecture as shown below. We are not aware of any work addressing the three issues altogether. The paper is structured as follows. Section 2 introduces the main challenges of the targeted applications. Relevant related work is mentioned in section 3. Section 4 then presents the overall middleware architecture. Section 5 shows how the challenges are
2 addressed by our middleware architecture. Finally, some concluding remarks are provided in section Challenges 2.1 Challenge 1: Provide intelligent behaviour to pervasive systems In order to make pervasive computing systems intelligent, it is crucial for them to first be sentient they should be able to sense the changes in the environment and make autonomous decisions on how to react. For example, a smart room should be able to obtain the room temperature, the noise level, the light intensity, how many persons are in the room, etc. Moreover, they should also have the capability to process and analyse the sensory data to deduce high-level context and infer long-term personal preferences of the users. By utilising the contextual information and personal preferences, the pervasive computing environments can make autonomous decision according to their own control logic. This decision making process might need certain degree of intelligence, and it might also need to resolve conflicts in the pervasive computing environment. For example, if there are more than two persons in a smart room, the system should be able to decide what temperature to set to minimize the disturbance, what kind of music to play to maximize satisfaction, etc. 2.2 Challenge 2: Provide support for high mobility and pervasiveness We envisage hundreds and even thousands of autonomous entities being involved in the targeted applications. Therefore, suitable communication models are required to handle a many-to-many type of communication. The communication service should be reliable and efficient, i.e. the amount of resources used by the communication protocol should be maintained at acceptable levels. These systems should also be scalable due to the fact that the number of participants may increase considerably over time. Furthermore, the level of mobility used by the system should be considered as this can have an impact on the communication system. For instance, research has shown that communication protocols used in low mobility conditions are not optimal for high mobility scenarios [1]. In addition, mobile ad hoc networks are characterised by being highly unpredictable. Communication delays between nodes may vary unexpectedly as the number of hops to reach the destination changes. Moreover, a geographical area may unexpectedly become congested, resulting in lack of communication resources. Periods of disconnection are also likely to happen at any time due to the conditions of the geographical area. 2.3 Challenge 3: Provide QoS guarantees in mobile ad hoc environments In the current state-of-the-art in mobile ad hoc network technologies, it is not feasible to offer hard real-time guarantees for communication resources except in special cases. Such guarantees can only be offered if certain specific conditions are met such as a scenario whereby a limited number of nodes are moving in an obstaclefree area at the same speed and direction. Although, hard real-time guarantees can still be provided for local resources such as CPU, only soft real-time guarantees can be offered for communication resources in most cases whereby these resources are dynamically allocated according to deadlines. Another tough challenge arises here: how can we deal with applications demanding hard real-time guarantees when the underlying infrastructure is only capable of offering soft real-time guarantees.
3 3. Related work The Gaia project [2] developed at the University of Illinois is a distributed middleware infrastructure that provides support for ubiquitous computing. Although Gaia shares several common design goals with CORTEX, Gaia s main intended application domain is confined to fixed intelligent environments and lacks the support for real-time mobile ad hoc application scenarios. The EasyLiving project [3] from Microsoft focuses on development of architectures and technologies for intelligent environments. It identifies several research efforts required on a variety of fronts, including middleware, geometric world modelling, sensing capabilities, and service description. The middleware, called InConcert, identifies the importance of having an asynchronous communication model for the coordination of entities contained in the environment. However, this approach does not fully address the concerns of real-time mobile ad hoc environments and pervasive application scenarios. Regarding multicast in mobile ad hoc networks, previous research [1] has recognised that most existing algorithms perform inadequately when high mobility is present in the environment. The main reason for these protocols to fail is that these protocols maintain shared state in the nodes in the form of routes and adjacent information, which are rapidly outdated due to high node mobility. In contrast, our multicast protocol is based on a probabilistic flooding algorithm with damping, which does not maintain shared state in nodes. Finally, to the best of our knowledge, no previous work presents an integrated solution to the areas of autonomous intelligent behaviour, pervasive mobile systems and real-time mobile ad hoc computing. 4. Overall Middleware Architecture Central to the CORTEX architecture is the notion of a sentient object [4-6], which is defined as an entity that is able to both consume and produce events. That is, sentient objects are entities that receive events, process them and generate further events. Input events are received from either sensors or other sentient objects (local or remote). Similarly, output events are sent either to actuators or other sentient objects (local or remote). Sentient objects are autonomous entities that are able to sense their environment. Interestingly, sentient objects have a proactive role in that they are capable of making decisions and performing some actions (i.e. generate further events) based on the information sensed. Hence, sentient objects include a control logic which realises the decision-making mechanism. The environment support for the interaction of sentient objects is also conceptualised as a componentised middleware platform. In fact, the middleware is structured in terms of component frameworks (CFs) [7]. Essentially, component frameworks are collections of rules and interfaces that govern the interaction of components plugged into them [7]. In other words, a component framework is a reusable architectural design targeting a specific domain whereby desired architectural properties and invariants are enforced. The publish/subscribe CF realises the CORTEX event model [8]. The functionality of the control engine of a sentient object is provided by the context CF. Facilities for multicast in ad hoc environments
4 are then provided by the multicast CF. The QoS management CF arbitrates the allocation of resources and provides facilities for monitoring and adaptation of QoS. Lastly, the resource management CF controls the resources used by all the CFs [9]. The following section shows how the challenges outlined in section 2 are addressed by our middleware architecture. 5. Approach to Challenges 5.1 Support for Autonomous Intelligent Behaviour The autonomous intelligent behaviour is achieved by the sentient objects. A sentient object has been defined as an entity that both consumes and produces software events, and lies in some control path between at least one sensor and actuator [9]. The internal architecture of a sentient object is realised by the context CF, which consists of four components: sensory capture, context management, inference engine and the learning engine. Getting contextual information from raw sensory data is the main task of context acquisition, and the major issues in the area of sensory capture are data filtering and sensor fusion. The context management component deals with the representation of context information. The inference engine component is actually the brain of a sentient object, and it has some form of a decision-making ability and intelligence. In order to make decisions, some rules need to be applied on the current context. The learning engine component is complementary to the inference engine component, and it can dynamically plug-in different machine learning algorithms that make the system able to learn rules from previous context states and from interaction with the user. The learned rules can either be injected into the inference engine or used by the learning component itself to make decisions. 5.2 Support for High Mobility and Pervasiveness We believe the publish/subscribe or event based communication paradigm is well suited to address the issues of pervasive systems in a mobile ad hoc environment. Moreover, the publish/subscribe model is well recognised to support anonymous and asynchronous communication requirements [10-12]. Hence, many-to-many communication scenarios are well supported by the anonymous dissemination of information. In addition, asynchronous communication is ideal in systems where frequent disconnections are likely to happen thus to avoid blocking conditions. We have adopted the event model STEAM [8] as it addresses a number of core issues with regard to publish/subscribe systems in mobile ad hoc networks. Briefly, an implicit event model for ad hoc networks is defined in which there is not an event broker or mediator, instead brokering functions are implemented at both the consumer and the producer side. The issues of high mobility in ad hoc environments are tackled by our probabilistic multicast protocol. This protocol specifically targets ad hoc environments where high node mobility and a frequently changing number of group members are present. Each node decides if it should forward a flooding message according to a probability p (0,1] which is updated according to the number of duplicates that a node has received from its neighbouring nodes. This effectively minimises the number of unnecessary duplicate messages without sacrificing reliability as we have found experimentally through simulations. The second
5 mechanism, which is called damping, aims to eliminate the number of unneeded duplicates by allowing nodes to wait for a random, small time interval before they will actually forward a message. 5.3 Real-Time Support for Mobile Ad Hoc Environments In order to support QoS guarantees in mobile ad hoc environments, a high probability of meeting deadlines has to be offered. We also believe that such infrastructure has to be adaptable and flexible to deal with the highly dynamic and unpredictable nature of the environment. Resource management plays an important role in this adaptation process in terms of both resource awareness and dynamic reallocation of resources. Crucially, fail-safe mechanisms are needed to bring the application to a safe state when timing failures are detected. Therefore, QoS management support is required for monitoring QoS violations and triggering both adaptation and fail-safe procedures when required. In addition, QoS management is required to arbitrate the allocation of network resources whereby admission control tests are performed and more resources are conceded to tasks with shorter deadlines and higher criticality.. Monitoring of QoS violations and adaptation procedures are carried out by the QoS management CF. This is achieved by the use of the timely computing base (TCB) [13] which is a framework that provides crucial time-related services. More specifically, TCB supports the detection of timing failures and enforces the timely execution of fail-safe procedures and adaptation strategies. Fail-safe procedures ensure that the system is taken to a safe state when a critical failure is detected. A coverage stability facility is provided where a high probability of meeting a deadline can be defined. In the case of going below a specified value, adaptation procedures are triggered (e.g. a redistribution of network and CPU resources). Network QoS management is achieved as follows. Firstly, every node is able to listen to traffic as the dissemination of packets is carried out by using an application level multicast protocol. Secondly, available bandwidth is fairly distributed among the nodes within a transmission area. For this purpose, a fully distributed protocol is used. Thirdly, a weighted fair scheduling policy [14] is used to allocate bandwidth within a single node to multiple service classes, each one of them associated with a particular task. A task [15] is a logical unit of computation which has an amount of resources allocated. A service class (i.e., a task) can be partitioned into sub classes (i.e., subtasks). In addition, classes and subclasses have a priority value. More critical classes have a higher priority. Different policies can be defined in case of resource contention. A detailed description of the network QoS management protocol can be found in [15]. 6. Concluding remarks We have presented a middleware architecture for the support of both pervasive and mobile ad hoc computing environments. More specifically, the sentient object model has been introduced as a central concept in the CORTEX architecture. This model provides key features for allowing both context-awareness and intelligent autonomous behaviour. In addition, the middleware is constituted by a number of component frameworks. Autonomous intelligent behaviour is addressed by both the sentient CF and the context CF. In addition, mobility and pervasiveness issues are
6 tackled by the publish/subscribe CF, the multicast CF and the service discovery CF. Lastly, the issues of time criticality in mobile ad hoc environments are addressed by both the QoS management CF and the resource management CF. Details on the implementation of the system can be found in [16]. We are currently using the vehicle test bed to evaluate the middleware architecture. Ongoing work also includes the simulation of the network QoS management protocol and the experimental evaluation of the scheduling system. Reference [1] Lee, S.-J., et al. A Performance Comparison Study of Ad Hoc Wireless Multicast Protocols. in Proceedings of IEEE INFOCOM Tel Aviv, Israel. [2] Roman, M., et al., Gaia: A Middleware Infrastructure to Enable Active Spaces. IEEE Pervasive Computing, Oct-Dec: p. pp [3] Brumitt, B., et al., EasyLiving: Technologies for Intelligent environment. Handheld and Ubiquitous Computing, September. [4] CORTEX. Preliminary Definition of the CORTEX Programming Model. CORTEX Project. IST , Deliberable D2. March [5] Veríssimo, P., et al. CORTEX: Towards Supporting Autonomous and Cooperating Sentient Entities (2002). in In Proceedings of European Wireless Florence, Italy. [6] Verissimo, P. and A. Casimiro. Event-Driven Support of Real-Time Sentient Objects. in Eighth IEEE International Workshop on Object-oriented Realtime Dependable Systems (WORDS 2003) Guadalajara, Mexico. [7] Szyperski, C., Component Software: Beyond Object-Oriented Programming. 1998, Harlow, England: Addison-Wesley. [8] Meier, R. and V. Cahill. Steam: Event-based Middleware for Wireless Ad Hoc Networks. in In Proceeding of the International Workshop on Distributed Event-Based Systems (ICDSC/DEBS'02) Vienna, Austria. [9] CORTEX. Preliminary Specification of Basic Services and Protocols. CORTEX Project. IST Deliverable D5. February [10] OMG, CORBAServices: Common Object Services Specification , Object Management Group. [11] Sun, Java Distributed Event Specification. 1998, Sun Microsystems, Inc. [12] Carzaniga, A., Rosenblum, D. and Wolf, A., Design and Evaluation of a Wide-Area Event Notification Service. ACM Transactions on Computer Systems, (3): p. pp [13] Verissimo, P. and A. Casimiro, The Timely Computing Base Model and Architecture. Transaction on Computers - Special Issue on Asynchronous Real-Time Systems, (8). [14] Demers, A., S. Keshav, and S. Schenker, Analysis and simulation of a fair queueing algorithm. Journal of Internetworking Research and Experience, 1990: p. pp [15] Duran-Limon, H.A. and G.S. Blair. A Resource and QoS Management Framework for Real-Time Event Systems in Mobile Ad Hoc Environments. in In 9th IEEE International Workshop on Object-oriented Real-time Dependable Systems (WORDS 2003F) Capri Island, Italy. [16] Sivaharan, T., et al. Cooperating Sentient Vehicles for Next Generation Automobiles. in MobiSys 2004 Workshop on Applications of Mobile Embedded Systems Boston, MA, USA.
A Resource and QoS Management Framework for a Real-Time Event System in Mobile Ad Hoc Environments
A Resource and QoS Management Framework for a Real-Time Event System in Mobile Ad Hoc Environments Hector A. Duran-Limon 1, Gordon S. Blair 1, Adrian Friday 1, Thirunavukkarasu Sivaharan 2, George Samartzidis
More informationA Marriage of Web Services and Reflective Middleware to Solve the Problem of Mobile Client Interoperability
A Marriage of Web Services and Reflective Middleware to Solve the Problem of Mobile Client Interoperability Abstract Paul Grace 1, Gordon Blair 1 and Sam Samuel 2 1 Computing Department, Lancaster University,
More informationNovel Component Middleware for Building Dependable Sentient Computing Applications
Novel Component Middleware for Building Dependable Sentient Computing Applications Maomao Wu, Adrian Friday, Gordon Blair, Thirunavukkarasu Sivaharan, Paul Okanda, and Hector Duran Limon Department of
More informationSupporting Mobility using Context-Based Reasoning
Supporting Mobility using Context-Based Reasoning Aline Senart, Mélanie Bouroche, Neil O Connor, Barbara Hughes, Kulpreet Singh and Vinny Cahill Distributed Systems Group, Department of Computer Science,
More informationSTEAM: Event-Based Middleware for Wireless Ad Hoc Networks
STEAM: Event-Based Middleware for Wireless Ad Hoc Networks René Meier and Vinny Cahill Department of Computer Science, Trinity College Dublin, Ireland frene.meier, vinny.cahillg@cs.tcd.ie Abstract With
More informationADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT
ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT PhD Summary DOCTORATE OF PHILOSOPHY IN COMPUTER SCIENCE & ENGINEERING By Sandip Kumar Goyal (09-PhD-052) Under the Supervision
More informationFederating Heterogeneous Event Services
Federating Heterogeneous Event Services Conor Ryan, René Meier, and Vinny Cahill Distributed Systems Group, Department of Computer Science, Trinity College Dublin, Ireland cahryan@eircom.net, rene.meier@cs.tcd.ie,
More informationInfrastructure for Autonomous Mobile Robots Communication and Coordination
90 Work in Progress Session Infrastructure for Autonomous Mobile Robots Communication and Coordination Marcelo M. Sobral, Leandro B. Becker Dept of Automation and Systems Universidade Federal de Santa
More informationPolicy-Based Context-Management for Mobile Solutions
Policy-Based Context-Management for Mobile Solutions Caroline Funk 1,Björn Schiemann 2 1 Ludwig-Maximilians-Universität München Oettingenstraße 67, 80538 München caroline.funk@nm.ifi.lmu.de 2 Siemens AG,
More informationSubject: Adhoc Networks
ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.
More informationActive Adaptation in QoS Architecture Model
Active Adaptation in QoS Architecture Model Drago agar and Snjeana Rimac -Drlje Faculty of Electrical Engineering University of Osijek Kneza Trpimira 2b, HR-31000 Osijek, CROATIA Abstract - A new complex
More informationA Higher Level Abstraction for Mobile Computing Middleware
A Higher Level Abstraction for Mobile Computing Middleware Paul Grace 1, Gordon Blair 1 and Sam Samuel 2 1 Computing Department, Lancaster University, Lancaster, LA1 4YR, UK. {p.grace@lancaster.ac.uk,
More informationPervasive Communication: The Need for Distributed Context Adaptations
Pervasive Communication: The Need for Distributed Context Adaptations Jorge Vallejos, Brecht Desmet, Pascal Costanza, Wolfgang De Meuter Programming Technology Lab Vrije Universiteit Brussel Pleinlaan
More informationDefinition of Application Scenarios
Definition of Application Scenarios G. Biegel, G. Blair, V. Cahill, A. Casimiro, K. Cheverst, R. Cunningham, A. Fitzpatrick, A. Friday, G. Gaertner, B. Hughes, J. Kaiser, R. Meier, N. Riejers and P. Veríssimo
More informationSource Routing Algorithms for Networks with Advance Reservations
Source Routing Algorithms for Networks with Advance Reservations Lars-Olof Burchard Communication and Operating Systems Technische Universitaet Berlin ISSN 1436-9915 No. 2003-3 February, 2003 Abstract
More informationContext-Awareness and Adaptation in Distributed Event-Based Systems
Context-Awareness and Adaptation in Distributed Event-Based Systems Eduardo S. Barrenechea, Paulo S. C. Alencar, Rolando Blanco, Don Cowan David R. Cheriton School of Computer Science University of Waterloo
More informationThe Novel HWN on MANET Cellular networks using QoS & QOD
The Novel HWN on MANET Cellular networks using QoS & QOD Abstract: - Boddu Swath 1 & M.Mohanrao 2 1 M-Tech Dept. of CSE Megha Institute of Engineering & Technology for Women 2 Assistant Professor Dept.
More informationInternetworking Wireless Nodes to A Control Area Network
Internetworking Wireless Nodes to A Control Area Network A. Kutlu, H. Ekiz, M.D. Baba, E.T. Powner School of Engineering University of Sussex Brighton U.K. ABSTRACT This paper discusses the design and
More informationSUMMERY, CONCLUSIONS AND FUTURE WORK
Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six
More informationSimulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model
Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer
More informationCHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS
130 CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS 5.1 INTRODUCTION The feasibility of direct and wireless multi-hop V2V communication based on WLAN technologies, and the importance of position based
More informationChapter 2 Communication for Control in Heterogeneous Power Supply
Chapter 2 Communication for Control in Heterogeneous Power Supply The need to modernize the power grid infrastructure, and governments commitment for a cleaner environment, is driving the move towards
More informationMDD Approach for the Development of Context-Aware Applications
MDD Approach for the Development of Context-Aware Applications Dhouha Ayed, Didier Delanote, and Yolande Berbers Department of Computer Science, K.U.Leuven B-3001 Leuven, Belgium Abstract. Context-aware
More informationOverview of Challenges in VANET
Overview of Challenges in VANET Er.Gurpreet Singh Department of Computer Science, Baba Farid College, Bathinda(Punjab), India ABSTRACT VANET are becoming active area of research and development because
More informationEvent-Based Middleware for Collaborative Ad Hoc Applications
Event-Based Middleware for Collaborative Ad Hoc Applications A thesis submitted to the University of Dublin, Trinity College, in fulfilment of the requirements for the degree of Doctor of Philosophy (Computer
More informationRouting protocols in WSN
Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can
More informationA Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network
A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk
More informationA Pigeon Agents based Analytical Model to Optimize Communication in Delay Tolerant Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1029
More informationLow Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks
Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Chang Su, Lili Zheng, Xiaohai Si, Fengjun Shang Institute of Computer Science & Technology Chongqing University of Posts and
More informationPerformance Analysis of MANET Routing Protocols OLSR and AODV
VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz
More informationFrom Mobility Management to Connectivity Management
From Mobility Management to Management Jun-Zhao Sun and Jaakko Sauvola MediaTeam, Machine Vision and Media Processing Unit, Infotech Oulu P.O.Box 4500, FIN-90014 University of Oulu, Finland {Junzhao.sun,
More informationAn Architecture to Enable Remote Context Reasoning
An Architecture to Enable Remote Context Reasoning Michael Przybilski, Petteri Nurmi Helsinki Institute for Information Technology (HIIT) Basic Research Unit University of Helsinki, Department of Computer
More informationPROJECT FINAL REPORT
PROJECT FINAL REPORT Grant Agreement number: INFSO-ICT-224350 Project acronym: Project title: Funding Scheme: flexware Flexible Wireless Automation in Real-Time Environments STREP Period covered: from
More informationPower aware Multi-path Routing Protocol for MANETS
Power aware Multi-path Routing Protocol for MANETS Shruthi P Murali 1,Joby John 2 1 (ECE Dept, SNGCE, India) 2 (ECE Dept, SNGCE, India) Abstract: Mobile Adhoc Network consists of a large number of mobile
More informationAd Hoc Networks: Introduction
Ad Hoc Networks: Introduction Module A.int.1 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Ad Hoc networks: introduction A.int.1-2
More informationDeveloping Software Applications Using Middleware Infrastructure: Role Based and Coordination Component Framework Approach
Developing Software Applications Using Middleware Infrastructure: Role Based and Coordination Component Framework Approach Ninat Wanapan and Somnuk Keretho Department of Computer Engineering, Kasetsart
More informationThe Federated Event Service
The Federated Event Service Conor Ryan A dissertation submitted to the University of Dublin, in partial fulfilment of the requirements for the degree of Master of Science in Computer Science September
More informationPrimary-Context Model and Ontology: A Combined Approach for Pervasive Transportation Services
Primary-Context Model and Ontology: A Combined Approach for Pervasive Transportation Services Deirdre Lee and René Meier Distributed Systems Group, Department of Computer Science, Trinity College Dublin,
More informationSIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze
80 SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze Abstract: Ad hoc Networks are complex distributed systems that consist of wireless mobile or static nodes that
More informationA Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity
A Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity Anastassios Michail Department of Electrical Engineering and Institute for
More informationCongestion Control in Mobile Ad-Hoc Networks
Congestion Control in Mobile Ad-Hoc Networks 1 Sandeep Rana, 2 Varun Pundir, 3 Ram Sewak Singh, 4 Deepak Yadav 1, 2, 3, 4 Shanti Institute of Technology, Meerut Email: sandeepmietcs@gmail.com Email: varunpundir@hotmail.com
More informationReal-Time Coordination in Distributed Multimedia Systems
Real-Time Coordination in Distributed Multimedia Systems Theophilos A. Limniotes and George A. Papadopoulos Department of Computer Science University of Cyprus 75 Kallipoleos Str, P.O.B. 20537 CY-1678
More informationQos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks
Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks 1 Ravindra.E, 2 Pooja Agraharkar Asst Prof, Dept. of Electronics & Communication Engg, Mtech Student, Dept. of Electronics & Communication
More informationPublish/Subscribe Protocol in Wireless Sensor Networks: Improved Reliability and Timeliness
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. X, NO. X, December 201X 134 Copyright 2011 KSII Publish/Subscribe Protocol in Wireless Sensor Networks: Improved Reliability and Timeliness Ernesto
More informationReal-Time Traffic in Ad-hoc Sensor Networks
Real-Time Traffic in Ad-hoc Sensor Networks Luciano Bononi Computer Science Department University of Bologna 4127 Bologna, Italy Email: bononi@cs.unibo.it Lorenzo Donatiello Computer Science Department
More informationA Study on Issues Associated with Mobile Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
More information2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)
2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing
More informationSecurity Issues In Mobile Ad hoc Network Routing Protocols
Abstraction Security Issues In Mobile Ad hoc Network Routing Protocols Philip Huynh phuynh@uccs.edu Mobile ad hoc network (MANET) is gaining importance with increasing number of applications. It can be
More informationResearch on Heterogeneous Communication Network for Power Distribution Automation
3rd International Conference on Material, Mechanical and Manufacturing Engineering (IC3ME 2015) Research on Heterogeneous Communication Network for Power Distribution Automation Qiang YU 1,a*, Hui HUANG
More informationPerformance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV
MIT International Journal of Electrical and Instrumentation Engineering, Vol. 3, No. 2, August 2013, pp. 57 61 57 Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through
More informationECE519 Advanced Operating Systems
IT 540 Operating Systems ECE519 Advanced Operating Systems Prof. Dr. Hasan Hüseyin BALIK (10 th Week) (Advanced) Operating Systems 10. Multiprocessor, Multicore and Real-Time Scheduling 10. Outline Multiprocessor
More informationKeywords Minimum Spanning Tree, Mobile Adhoc Network (MANET), Multicast, Overhead, Scalability, Spanning Tree.
Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Challenges
More informationUNIT 1 Questions & Solutions
UNIT 1 Questions & Solutions 1. Give any 5 differences between cellular wireless networks and ADHOC wireless network. Ans: The following table shows the difference between cellular networks and Adhoc wireless
More informationPERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH
PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH 1. Prof.S.P. Setti 2. Narasimha Raju K 3. Naresh Kumar K CS&SE Dept., CS&SE Dept., CS&SE Dept., AU College of Engineering, AU College of Engineering,
More informationSmart Ubiquitous Networks: Standardization and Challenges for Smartness of Networks
ITU Workshop on Standardization on IMT, M2M, IoT, Cloud Computing and SDN (Algiers, Algeria, 8 September 2013) Smart Ubiquitous Networks: Standardization and Challenges for Smartness of Networks Gyu Myoung
More informationDynamic bandwidth management for multihop wireless ad hoc networks
Dynamic bandwidth management for multihop wireless ad hoc networks Sofiane Khalfallah Email: sofiane.khalfallah@insa-lyon.fr Cheikh Sarr Email: Cheikh.Sarr@insa-lyon.fr Isabelle Guerin Lassous Email: Isabelle.Guerin-Lassous@inrialpes.fr
More informationPessimistic Backoff for Mobile Ad hoc Networks
Pessimistic Backoff for Mobile Ad hoc Networks Saher S. Manaseer Department of computing science Glasgow University saher@dcs.gla.ac.uk Muneer Masadeh Department of Computer Science Jordan University of
More informationAirTight: A Resilient Wireless Communication Protocol for Mixed- Criticality Systems
AirTight: A Resilient Wireless Communication Protocol for Mixed- Criticality Systems Alan Burns, James Harbin, Leandro Indrusiak, Iain Bate, Robert Davis and David Griffin Real-Time Systems Research Group
More informationA Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks
A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks P.Madhan Mohan #, J.James Johnson #, K.Murugan $ and V.Ramachandran % # Under Graduate Student $ Senior
More informationA Data-Centric Approach for Modular Assurance Abstract. Keywords: 1 Introduction
A Data-Centric Approach for Modular Assurance Gabriela F. Ciocarlie, Heidi Schubert and Rose Wahlin Real-Time Innovations, Inc. {gabriela, heidi, rose}@rti.com Abstract. A mixed-criticality system is one
More informationChapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr.
Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP. 343-396 1 5.1. NETWORK LAYER DESIGN ISSUES 5.2. ROUTING ALGORITHMS 5.3. CONGESTION CONTROL ALGORITHMS 5.4.
More informationSystem models for distributed systems
System models for distributed systems INF5040/9040 autumn 2010 lecturer: Frank Eliassen INF5040 H2010, Frank Eliassen 1 System models Purpose illustrate/describe common properties and design choices for
More informationReview of Medium Access Control protocol for MANET
Review of Medium Access Control protocol for MANET Khushboo Agarwal Department of CSE&IT, Madhav Institute of Technology and Science, Gwalior 474005 ka.agarwal5@gmail.com Abstract: The mobile Adhoc network
More informationInternet of Things (IoT) CSE237A
Internet of Things (IoT) CSE237A Class Overview What ve covered until now: All material that will be on exam! Where we are going today: IoT & exam review Due today: Article on IoT HW3 at 11:59pm; upload.pdf
More informationReflective Java and A Reflective Component-Based Transaction Architecture
Reflective Java and A Reflective Component-Based Transaction Architecture Zhixue Wu APM Ltd., Poseidon House, Castle Park, Cambridge CB3 0RD UK +44 1223 568930 zhixue.wu@citrix.com ABSTRACT In this paper,
More informationIntroduction to Distributed Systems
Introduction to Distributed Systems Other matters: review of the Bakery Algorithm: why can t we simply keep track of the last ticket taken and the next ticvket to be called? Ref: [Coulouris&al Ch 1, 2]
More informationCS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University
CS 555: DISTRIBUTED SYSTEMS [MESSAGING SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Distributed Servers Security risks
More informationIntroduction to Real-time Systems. Advanced Operating Systems (M) Lecture 2
Introduction to Real-time Systems Advanced Operating Systems (M) Lecture 2 Introduction to Real-time Systems Real-time systems deliver services while meeting some timing constraints Not necessarily fast,
More informationQoS and System Capacity Optimization in WiMAX Multi-hop Relay Using Flexible Tiered Control Technique
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore QoS and System Capacity Optimization in WiMAX Multi-hop Relay Using Flexible Tiered
More informationModelling direct application to network bandwidth provisioning for high demanding research applications
Modelling direct application to network bandwidth provisioning for high demanding research applications H. Wessing, Y. Yan and M. Berger Research Center COM Technical University of Denmark Bldg. 345V,
More information3. Quality of Service
3. Quality of Service Usage Applications Learning & Teaching Design User Interfaces Services Content Process ing Security... Documents Synchronization Group Communi cations Systems Databases Programming
More informationAdaptive Resource Allocation Mechanisms for Support of Data Traffic over ATM Satellite Networks Introduction The Dynamic Flow Control Scheme
Adaptive Resource Allocation Mechanisms for Support of Traffic over ATM Satellite Networks Tanja Lang and Nirmala Shenoy, Co-operative Research Centre for Satellite Systems, Institute for Telecommunications
More informationPacket Routing using Optimal Flooding Protocol in Cluster based MANET
IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 09 March 2016 ISSN (online): 2349-784X Packet Routing using Optimal Flooding Protocol in Cluster based MANET S.Bavani V.Aiswariya
More informationAN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS
AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT
More informationEnhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization
Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization Dhanveer Kaur 1, Harwant Singh Arri 2 1 M.Tech, Department of Computer Science and Engineering, Lovely
More informationMiddleware Design Framework for Mobile Computing
ISSN: 2222-4254 IJES Middleware Design Framework for Mobile Computing Imran Sarwar Bajwa School of Computer Science, University of Birmingham, Birmingham, B15 2TT, UK i.s.bajwa@cs.bham.ac.uk Abstract.
More informationGeospatial Information Service Based on Ad Hoc Network
I. J. Communications, Network and System Sciences, 2009, 2, 91-168 Published Online May 2009 in SciRes (http://www.scirp.org/journal/ijcns/). Geospatial Information Service Based on Ad Hoc Network Fuling
More informationCHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL
WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.
More information2. REVIEW OF RELATED RESEARCH WORK. 2.1 Methods of Data Aggregation
ata Aggregation in Wireless Sensor Networks with Minimum elay and Minimum Use of Energy: A comparative Study Bushra Qayyum Mohammed Saeed Jason Roberts Ph Student ean of Research Senior Lecturer University
More informationTransaction Processing in Mobile Database Systems
Ashish Jain* 1 http://dx.doi.org/10.18090/samriddhi.v7i2.8631 ABSTRACT In a mobile computing environment, a potentially large number of mobile and fixed users may simultaneously access shared data; therefore,
More informationGlasgow eprints Service
Yassein, M. B. and Ould-Khaoua, M. and Papanastasiou, S. (25) On the performance of probabilistic flooding in mobile ad hoc networks. In, th International Conference on Parallel and Distributed Systems,
More informationQoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET
2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar
More informationROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols
ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols 1 Why can t we use conventional routing algorithms here?? A sensor node does not have an identity (address) Content based and data centric
More informationChapter 5 Ad Hoc Wireless Network. Jang Ping Sheu
Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson
More informationPerformance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MOBILE APPLICATIONS IJCSMA Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV Er. Sandeep Singh Khehra 1, Er. Abhinash Singla
More informationZone-based Proactive Source Routing Protocol for Ad-hoc Networks
2014 IJSRSET Volume i Issue i Print ISSN : 2395-1990 Online ISSN : 2394-4099 Themed Section: Science Zone-based Proactive Source Routing Protocol for Ad-hoc Networks Dr.Sangheethaa.S 1, Dr. Arun Korath
More informationOn-road Wireless Sensor Network for Traffic Surveillance
On-road Wireless Sensor Network for Traffic Surveillance JaeJun Yoo, DoHyun Kim, KyoungHo Kim Vehicle/Ship/Defense IT Convergence Division Electronics and Telecommunications Research Institute Daejeon,
More informationWireless Networking & Mobile Computing
Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Network Layer: Ad Hoc Routing Tamer Nadeem Dept. of Computer Science The OSI Communication Model Page 2 Spring 2012 CS 752/852 - Wireless
More informationCall Admission Control in IP networks with QoS support
Call Admission Control in IP networks with QoS support Susana Sargento, Rui Valadas and Edward Knightly Instituto de Telecomunicações, Universidade de Aveiro, P-3810 Aveiro, Portugal ECE Department, Rice
More informationPerformance analysis of aodv, dsdv and aomdv using wimax in NS-2
Performance analysis of aodv, dsdv and aomdv using wimax in NS-2 Madhusrhee B Department Computer Science, L.J Institute of Technology, Ahmedabad, India Abstract WiMAX (IEEE 802.16) technology empowers
More informationData Model Considerations for Radar Systems
WHITEPAPER Data Model Considerations for Radar Systems Executive Summary The market demands that today s radar systems be designed to keep up with a rapidly changing threat environment, adapt to new technologies,
More informationA SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS
A SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS M Jansirani Research scholar Research Department of Computer Science Government Arts College (Autonomous),
More informationAn Industrial Employee Development Application Protocol Using Wireless Sensor Networks
RESEARCH ARTICLE An Industrial Employee Development Application Protocol Using Wireless Sensor Networks 1 N.Roja Ramani, 2 A.Stenila 1,2 Asst.professor, Dept.of.Computer Application, Annai Vailankanni
More informationCreate a smarter environment where information becomes insight
Create a smarter environment where information becomes insight How a seamless network can turn data into intelligence for your smart city or factory Contents Introduction 3 Smart city surveillance: From
More informationWSN Routing Protocols
WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before
More informationAODV-PA: AODV with Path Accumulation
-PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications
More informationImproving the Data Scheduling Efficiency of the IEEE (d) Mesh Network
Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw
More informationComputer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack
Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:
More informationPresented by: B. Dasarathy OMG Real-Time and Embedded Systems Workshop, Reston, VA, July 2004
* This work is supported by DARPA Contract NBCH-C-03-0132. Network QoS Assurance through Admission Control* by B. Coan, B. Dasarathy, S. Gadgil, K. Parmeswaran, I. Sebuktekin and R. Vaidyanathan, Telcordia
More informationA Survey of Context-Aware Mobile Computing Research
A Survey of Context-Aware Mobile Computing Research Guanling Chen and David Kotz 2005.11. 14 Cho Jaekyu jkcho@mmlab.snu.ac.kr Contents 1 2 3 4 5 6 7 8 Introduction Definition of Context Context-Aware Computing
More information