In the context of the efforts to organize the knowledge in the new and emerging area of Cloud Computing we performed an analysis of relevant existing developments and built on this basis a framework for a semantic registry of cloud services. The framework contains core ontological definitions and extension mechanisms used to define ontologies for cloud services, related to the aspects of semantic discovery and composition of cloud services. The relevance of the proposed registry can be assessed in relation with cloud interoperability, cloud service composition, as well as software services that offer support for finding and selecting cloud services and for marketing advantages of different cloud providers.
{"title":"A Semantic Registry for Cloud Services","authors":"Cristina Mindruta, Teodor-Florin Fortiş","doi":"10.1109/WAINA.2013.100","DOIUrl":"https://doi.org/10.1109/WAINA.2013.100","url":null,"abstract":"In the context of the efforts to organize the knowledge in the new and emerging area of Cloud Computing we performed an analysis of relevant existing developments and built on this basis a framework for a semantic registry of cloud services. The framework contains core ontological definitions and extension mechanisms used to define ontologies for cloud services, related to the aspects of semantic discovery and composition of cloud services. The relevance of the proposed registry can be assessed in relation with cloud interoperability, cloud service composition, as well as software services that offer support for finding and selecting cloud services and for marketing advantages of different cloud providers.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131815601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Network tomography is the problem of discovering the delay and loss rate of the internal links of a network, assuming the internal nodes are not cooperating. The first step to solving this problem is finding network topology. Well-known tools such as trace route solve this problem, however they depend on cooperation of the internal nodes. This paper studies the problem of topology identification without relying on the cooperation of the internal nodes of the network. First, we suggest a novel probing scheme which is based on end-to-end unicast delay measurements. We then introduce a topology inference algorithm which uses the information from this probing scheme to find the topology of the network. Our experiments show that this approach improves the topology identification process compared to previous methods.
{"title":"Network Topology Inference from End-to-End Unicast Measurements","authors":"A. Malekzadeh, M. MacGregor","doi":"10.1109/WAINA.2013.215","DOIUrl":"https://doi.org/10.1109/WAINA.2013.215","url":null,"abstract":"Network tomography is the problem of discovering the delay and loss rate of the internal links of a network, assuming the internal nodes are not cooperating. The first step to solving this problem is finding network topology. Well-known tools such as trace route solve this problem, however they depend on cooperation of the internal nodes. This paper studies the problem of topology identification without relying on the cooperation of the internal nodes of the network. First, we suggest a novel probing scheme which is based on end-to-end unicast delay measurements. We then introduce a topology inference algorithm which uses the information from this probing scheme to find the topology of the network. Our experiments show that this approach improves the topology identification process compared to previous methods.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134166911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper describes the design of a test bed (Adhoc3) which has been developed as a research tool for evaluating the performance of the data dissemination protocols in the field of opportunistic networks. The test bed software system, including its requirements, the static and the dynamic structure, and the architecture, is designed and explained using UML diagrams which will provide the documentation for further software development.
{"title":"Designing a Testbed for Broadcast Opportunistic Wireless Data Dissemination Protocols","authors":"Nasif Muslim, Florian Pregizer","doi":"10.1109/WAINA.2013.32","DOIUrl":"https://doi.org/10.1109/WAINA.2013.32","url":null,"abstract":"This paper describes the design of a test bed (Adhoc3) which has been developed as a research tool for evaluating the performance of the data dissemination protocols in the field of opportunistic networks. The test bed software system, including its requirements, the static and the dynamic structure, and the architecture, is designed and explained using UML diagrams which will provide the documentation for further software development.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134102040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Markus Jung, J. Weidinger, W. Kastner, Alex C. Olivieri
Building automation is a vital part of many use cases related to energy efficiency and smart living in the context of smart cities. State of the art building automation systems like KNX, BACnet or ZigBee are based on control networks mainly used for local control scenarios using non-IP communications. This paper presents an integration approach for building automation systems using an IPv6 enabled service-oriented architecture allowing interconnecting heterogeneous technologies into a large-scale distributed control system. Details on the concept, a proof of concept implementation and performance evaluation results of a multi-protocol gateway are presented, offering a per-device IPv6 interface using a novel CoAP/EXI protocol binding for oBIX. The integration approach aims at providing a homogeneous integration layer that can be used to build advanced control scenarios that might arise in the context of smart cities.
{"title":"Building Automation and Smart Cities: An Integration Approach Based on a Service-Oriented Architecture","authors":"Markus Jung, J. Weidinger, W. Kastner, Alex C. Olivieri","doi":"10.1109/WAINA.2013.200","DOIUrl":"https://doi.org/10.1109/WAINA.2013.200","url":null,"abstract":"Building automation is a vital part of many use cases related to energy efficiency and smart living in the context of smart cities. State of the art building automation systems like KNX, BACnet or ZigBee are based on control networks mainly used for local control scenarios using non-IP communications. This paper presents an integration approach for building automation systems using an IPv6 enabled service-oriented architecture allowing interconnecting heterogeneous technologies into a large-scale distributed control system. Details on the concept, a proof of concept implementation and performance evaluation results of a multi-protocol gateway are presented, offering a per-device IPv6 interface using a novel CoAP/EXI protocol binding for oBIX. The integration approach aims at providing a homogeneous integration layer that can be used to build advanced control scenarios that might arise in the context of smart cities.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115490512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Golam Sarwar, R. Boreli, E. Lochin, A. Mifdaoui, Guillaume Smith
Reliable in order multipath data transfer under asymmetric heterogeneous network conditions has known problems related to receiver's buffer blocking, caused by out of order packet arrival. Several mitigation techniques have been proposed to address this issue mostly by using various packet retransmission schemes, load-balancing and bandwidth-estimation based mechanisms. In comparison to the existing reactive techniques for buffer block mitigation, we propose a novel and yet simpler to implement, delay aware packet scheduling scheme for multipath data transfer over asymmetric network paths, that proactively minimizes the blocking inside receiver's buffer. Our initial simulation results show that, in comparison to the default round robin packet scheduler, by using our proposed delay aware packet scheduling scheme, we can significantly improve overall performance while notably minimizing the receiver's buffer usage, which is also beneficial for multi-homed hand-held mobile devices with limited buffering capacity, which, due to their multi-homing and heterogeneous wireless network features (i.e. availability of 3G and Wi-Fi) are also one of the most common use cases for multi-path transport.
{"title":"Mitigating Receiver's Buffer Blocking by Delay Aware Packet Scheduling in Multipath Data Transfer","authors":"Golam Sarwar, R. Boreli, E. Lochin, A. Mifdaoui, Guillaume Smith","doi":"10.1109/WAINA.2013.80","DOIUrl":"https://doi.org/10.1109/WAINA.2013.80","url":null,"abstract":"Reliable in order multipath data transfer under asymmetric heterogeneous network conditions has known problems related to receiver's buffer blocking, caused by out of order packet arrival. Several mitigation techniques have been proposed to address this issue mostly by using various packet retransmission schemes, load-balancing and bandwidth-estimation based mechanisms. In comparison to the existing reactive techniques for buffer block mitigation, we propose a novel and yet simpler to implement, delay aware packet scheduling scheme for multipath data transfer over asymmetric network paths, that proactively minimizes the blocking inside receiver's buffer. Our initial simulation results show that, in comparison to the default round robin packet scheduler, by using our proposed delay aware packet scheduling scheme, we can significantly improve overall performance while notably minimizing the receiver's buffer usage, which is also beneficial for multi-homed hand-held mobile devices with limited buffering capacity, which, due to their multi-homing and heterogeneous wireless network features (i.e. availability of 3G and Wi-Fi) are also one of the most common use cases for multi-path transport.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115495871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the development of web services and its extension with Semantic Web augmented-Semantic Web Services (SWS), the modern approaches for business-to-business integration (B2Bi) focus on their business process integration between enterprises. Cross-enterprise collaboration is one of challenges on the B2Bi research nowadays. With the support of Semantic Web technologies, the gap between business and IT communities has been reduced in order to tackle the challenge. Semantic Web-based approaches for BPM have been foreseen as a promising solution with taking advantages of Semantic Web technologies such as ontologies, SWS. Taking into account the challenge of dynamically forming collaborative business processes with attached services into the execution, in this paper, based on our previous work, we propose a semantic framework for forming a dynamic collaboration of business processes within our BizKB systems for across-enterprise collaboration. We focus on a dynamic service discovery based on the consensus methodology.
{"title":"A Ontological Collaborative Framework for Bussiness Process Integration","authors":"M. Hoang, T. Nguyen, H. Hoang","doi":"10.1109/WAINA.2013.188","DOIUrl":"https://doi.org/10.1109/WAINA.2013.188","url":null,"abstract":"With the development of web services and its extension with Semantic Web augmented-Semantic Web Services (SWS), the modern approaches for business-to-business integration (B2Bi) focus on their business process integration between enterprises. Cross-enterprise collaboration is one of challenges on the B2Bi research nowadays. With the support of Semantic Web technologies, the gap between business and IT communities has been reduced in order to tackle the challenge. Semantic Web-based approaches for BPM have been foreseen as a promising solution with taking advantages of Semantic Web technologies such as ontologies, SWS. Taking into account the challenge of dynamically forming collaborative business processes with attached services into the execution, in this paper, based on our previous work, we propose a semantic framework for forming a dynamic collaboration of business processes within our BizKB systems for across-enterprise collaboration. We focus on a dynamic service discovery based on the consensus methodology.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123425414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Akihiro Kida, Tatsuro Takahashi, R. Shinkuma, H. Kasai, K. Yamaguchi, O. Mayora-Ibarra
As the number of network services provided in fixed and mobile environments are increasing recently, it becomes harder to expect users to manually pick up appropriate services from all these available. Therefore, it has been proposed that network services are automatically selected in accordance with relational information among people and other social objects, i.e., locations, things and contents. The fusion of online and physical sensing platforms has brought about the possibility of building relational information from sensing data: online logs and sensing data collected at mobile devices could reflect what objects people are related to in their daily lives. The relational information can be represented as a graph in which each node could be a social object and each link could represent a direct relation between two nodes and is called relational metric. We discuss how to build relational metrics from sensing data and propose a system design for it.
{"title":"System Design for Estimating Social Relationships from Sensing Data","authors":"Akihiro Kida, Tatsuro Takahashi, R. Shinkuma, H. Kasai, K. Yamaguchi, O. Mayora-Ibarra","doi":"10.1109/WAINA.2013.103","DOIUrl":"https://doi.org/10.1109/WAINA.2013.103","url":null,"abstract":"As the number of network services provided in fixed and mobile environments are increasing recently, it becomes harder to expect users to manually pick up appropriate services from all these available. Therefore, it has been proposed that network services are automatically selected in accordance with relational information among people and other social objects, i.e., locations, things and contents. The fusion of online and physical sensing platforms has brought about the possibility of building relational information from sensing data: online logs and sensing data collected at mobile devices could reflect what objects people are related to in their daily lives. The relational information can be represented as a graph in which each node could be a social object and each link could represent a direct relation between two nodes and is called relational metric. We discuss how to build relational metrics from sensing data and propose a system design for it.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125003021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Carboni, A. Pintus, Andrea Piras, Alberto Serra, A. Badii, Marco Tiemann
This paper describes a work-in-progress programming experiment where the playground is an entire city. Based on the SmartSantander FIRE infrastructure, the City Script project is aimed at integrating and experimenting a Web of Things scenario in which sensors and actuators in the city have a digital counterpart and can eventually used to compose mashups with social networks and other digital online sources of data.
{"title":"Scripting a Smart City: The CityScripts Experiment in Santander","authors":"D. Carboni, A. Pintus, Andrea Piras, Alberto Serra, A. Badii, Marco Tiemann","doi":"10.1109/WAINA.2013.85","DOIUrl":"https://doi.org/10.1109/WAINA.2013.85","url":null,"abstract":"This paper describes a work-in-progress programming experiment where the playground is an entire city. Based on the SmartSantander FIRE infrastructure, the City Script project is aimed at integrating and experimenting a Web of Things scenario in which sensors and actuators in the city have a digital counterpart and can eventually used to compose mashups with social networks and other digital online sources of data.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122905930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we propose a redeployment scheme of Wireless Sensor Network (WSN) nodes based on a stochastic process. WSN suffers from formation of hole in the network due to its asymmetric deployment, unbalanced energy consumption and intentional destruction of nodes in the network. The dynamic increase in Quality-of-Service (QoS) parameters such as coverage and connectivity also may lead to formation of holes which in turn degrades the performance of the network. Therefore, in order to maintain a desired QoS, a sensor redeployment scheme is important in WSN. During its lifecycle, a sensor node experiences active, sleep, diagnose, vulnerable, repair, and fail states. We analyze the Markov process and obtain the steady state probabilities for all the states. The availability of the nodes is presented with the help of SHARPE tool. Our work utilizes Discrete-Time Markov Chain and a Semi-Markov Process to illustrate the probabilities of WSN node in various states. The required redeployment nodes are then computed based on a stochastic analysis of the system and subject to the QoS requirements of the network.
{"title":"A Stochastic Process Based Framework of Redeployment Model for Wireless Sensor Network","authors":"Ravindara Bhatt, R. Datta","doi":"10.1109/WAINA.2013.176","DOIUrl":"https://doi.org/10.1109/WAINA.2013.176","url":null,"abstract":"In this paper we propose a redeployment scheme of Wireless Sensor Network (WSN) nodes based on a stochastic process. WSN suffers from formation of hole in the network due to its asymmetric deployment, unbalanced energy consumption and intentional destruction of nodes in the network. The dynamic increase in Quality-of-Service (QoS) parameters such as coverage and connectivity also may lead to formation of holes which in turn degrades the performance of the network. Therefore, in order to maintain a desired QoS, a sensor redeployment scheme is important in WSN. During its lifecycle, a sensor node experiences active, sleep, diagnose, vulnerable, repair, and fail states. We analyze the Markov process and obtain the steady state probabilities for all the states. The availability of the nodes is presented with the help of SHARPE tool. Our work utilizes Discrete-Time Markov Chain and a Semi-Markov Process to illustrate the probabilities of WSN node in various states. The required redeployment nodes are then computed based on a stochastic analysis of the system and subject to the QoS requirements of the network.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123753023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Video surveillance is used to solve the problems of public security and preservation of evidence. So far, many researchers have offered their secure systems. However, storage and streaming migration issues must be discussed in more detail. In the paper, a method for streaming service migration in a cloud video storage system and the system using the same are provided, and the cloud storage video system includes a directory host, stream processing apparatuses and detection apparatuses. The method includes: assigning a first stream processing apparatus to establish a first stream connection with a first detection apparatus among the detection apparatuses, and assigning at least a second stream processing apparatus to establish a second stream connection with the first detection apparatus but not to receive the video stream data from the first detection apparatus, and assigning the first processing apparatus to receive and store the video stream data from the first detection apparatus, and the second stream processing apparatus receives and stores the video stream data from the first detection apparatus when the directory host determines that the first stream connection is abnormal, and disconnects the first stream connection.
{"title":"The Cloud Streaming Service Migration in Cloud Video Storage System","authors":"Y. Tsai","doi":"10.1109/WAINA.2013.146","DOIUrl":"https://doi.org/10.1109/WAINA.2013.146","url":null,"abstract":"Video surveillance is used to solve the problems of public security and preservation of evidence. So far, many researchers have offered their secure systems. However, storage and streaming migration issues must be discussed in more detail. In the paper, a method for streaming service migration in a cloud video storage system and the system using the same are provided, and the cloud storage video system includes a directory host, stream processing apparatuses and detection apparatuses. The method includes: assigning a first stream processing apparatus to establish a first stream connection with a first detection apparatus among the detection apparatuses, and assigning at least a second stream processing apparatus to establish a second stream connection with the first detection apparatus but not to receive the video stream data from the first detection apparatus, and assigning the first processing apparatus to receive and store the video stream data from the first detection apparatus, and the second stream processing apparatus receives and stores the video stream data from the first detection apparatus when the directory host determines that the first stream connection is abnormal, and disconnects the first stream connection.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125585481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}