J. Steffan, Ludger Fiege, Mariano Cilia, A. Buchmann
One of the trends of wireless sensor networks (WSN) is to allow multiple applications to run on top of the same sensor network. This will have an enormous impact on the way WSN applications are developed, deployed and maintained. Many applications for WSN are still developed on very low level functions provided by simple operating systems or bare hardware. Alternatively, generic WSN middleware focuses on very high-level system abstractions, such as declarative query languages, and acts as black box that tries to automatically map applications to the underlying resources. In this paper, we propose scopes as a generic abstraction for the definition of groups of nodes. They bridge the gap between high- and low-level interfaces and enable the partitioning of WSN functionality. As middleware building block they facilitate the construction of tailored services in multipurpose WSNs.
{"title":"Scoping in wireless sensor networks: a position paper","authors":"J. Steffan, Ludger Fiege, Mariano Cilia, A. Buchmann","doi":"10.1145/1028509.1028521","DOIUrl":"https://doi.org/10.1145/1028509.1028521","url":null,"abstract":"One of the trends of wireless sensor networks (WSN) is to allow multiple applications to run on top of the same sensor network. This will have an enormous impact on the way WSN applications are developed, deployed and maintained. Many applications for WSN are still developed on very low level functions provided by simple operating systems or bare hardware. Alternatively, generic WSN middleware focuses on very high-level system abstractions, such as declarative query languages, and acts as black box that tries to automatically map applications to the underlying resources.\u0000 In this paper, we propose scopes as a generic abstraction for the definition of groups of nodes. They bridge the gap between high- and low-level interfaces and enable the partitioning of WSN functionality. As middleware building block they facilitate the construction of tailored services in multipurpose WSNs.","PeriodicalId":364168,"journal":{"name":"workshop on Middleware for Pervasive and Ad-hoc Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2004-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125603562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The terms pervasive and ubiquitous computing are used to describe a smart space populated by hundreds of intelligent devices that are embedded in their surroundings. Characteristically, ubiquitous computing devices must blend into the background, unobtrusively collaborating to provide value-added services for users. Services are thus essential to the success of this technology and, as a result, both service discovery and service management will play a vital role in generating the revenue stream that is a prerequisite for sustainable ubiquitous deployment. On the one hand, the services provided should be evident by their richness and variety and on the other, the complexity inherent in the environment must be hidden from users. In this paper, we describe RUBI, a resource discovery framework for ubiquitous computing. RUBI represents a novel approach to resource discovery, because the primacy of the need for adaptive autonomic behaviour is established within its design.
{"title":"Adaptive resource discovery for ubiquitous computing","authors":"R. Harbird, S. Hailes, C. Mascolo","doi":"10.1145/1028509.1028519","DOIUrl":"https://doi.org/10.1145/1028509.1028519","url":null,"abstract":"The terms pervasive and ubiquitous computing are used to describe a smart space populated by hundreds of intelligent devices that are embedded in their surroundings. Characteristically, ubiquitous computing devices must blend into the background, unobtrusively collaborating to provide value-added services for users. Services are thus essential to the success of this technology and, as a result, both service discovery and service management will play a vital role in generating the revenue stream that is a prerequisite for sustainable ubiquitous deployment. On the one hand, the services provided should be evident by their richness and variety and on the other, the complexity inherent in the environment must be hidden from users. In this paper, we describe RUBI, a resource discovery framework for ubiquitous computing. RUBI represents a novel approach to resource discovery, because the primacy of the need for adaptive autonomic behaviour is established within its design.","PeriodicalId":364168,"journal":{"name":"workshop on Middleware for Pervasive and Ad-hoc Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2004-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133793272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In pervasive computing environments, conditions are highly variable and resources are limited. In order to meet the needs of applications, systems must adapt dynamically to changing situations. Since adaptation at one system layer may be insufficient, cross-layer, or vertical approaches to adaptation may be needed. Moreover, adaptation in distributed systems often requires horizontal co-operation among hosts. This cooperation is not restricted to the source and destination(s) of a data stream, but might also include intermediate hosts in an overlay network or mobile ad hoc network. We refer to this combined capability as universal adaptation. We contend that the model defining interaction between adaptive middleware and the operating system is critical to realizing universal adaptation. We explore this hypothesis by evaluating the Kernel-Middleware eXchange (KMX), a specific model for cross-layer, cross-system adaptation. We present the KMX architecture and discuss its potential role in supporting universal adaptation in pervasive computing environments. We then describe a prototype implementation of KMX and show results of an experimental case study in which KMX is used to improve the quality of video streaming to mobile nodes in a hybrid wired-wireless network.
{"title":"Kernel-middleware interaction to support adaptation in pervasive computing environments","authors":"F. Samimi, P. McKinley, S. M. Sadjadi, Peng Ge","doi":"10.1145/1028509.1028516","DOIUrl":"https://doi.org/10.1145/1028509.1028516","url":null,"abstract":"In pervasive computing environments, conditions are highly variable and resources are limited. In order to meet the needs of applications, systems must adapt dynamically to changing situations. Since adaptation at one system layer may be insufficient, cross-layer, or <i>vertical</i> approaches to adaptation may be needed. Moreover, adaptation in distributed systems often requires <i>horizontal</i> co-operation among hosts. This cooperation is not restricted to the source and destination(s) of a data stream, but might also include intermediate hosts in an overlay network or mobile ad hoc network. We refer to this combined capability as <i>universal</i> adaptation. We contend that the model defining interaction between adaptive middleware and the operating system is critical to realizing universal adaptation. We explore this hypothesis by evaluating the <i>Kernel-Middleware eXchange (KMX)</i>, a specific model for cross-layer, cross-system adaptation. We present the KMX architecture and discuss its potential role in supporting universal adaptation in pervasive computing environments. We then describe a prototype implementation of KMX and show results of an experimental case study in which KMX is used to improve the quality of video streaming to mobile nodes in a hybrid wired-wireless network.","PeriodicalId":364168,"journal":{"name":"workshop on Middleware for Pervasive and Ad-hoc Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2004-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127087404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this position paper, we focus on issues related to middleware support for software mobility in ad hoc and pervasive systems. In particular, we are interested in moving the computational environment of a mobile user following his or her trajectory. We present details of WAIFARER, a prototype implementation that automatically saves and restores application level state to support this mobility. Security, integrity, and fault-tolerance are just some of the key problems that need to be addressed in the future.
{"title":"Environment mobility: moving the desktop around","authors":"D. Johansen, H. Johansen, R. V. Renesse","doi":"10.1145/1028509.1028518","DOIUrl":"https://doi.org/10.1145/1028509.1028518","url":null,"abstract":"In this position paper, we focus on issues related to middleware support for software mobility in ad hoc and pervasive systems. In particular, we are interested in moving the computational environment of a mobile user following his or her trajectory. We present details of WAIFARER, a prototype implementation that automatically saves and restores application level state to support this mobility. Security, integrity, and fault-tolerance are just some of the key problems that need to be addressed in the future.","PeriodicalId":364168,"journal":{"name":"workshop on Middleware for Pervasive and Ad-hoc Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2004-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120887071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Modahl, Bikash Agarwalla, G. Abowd, U. Ramachandran, T. S. Saponas
This paper surveys a variety of subsystems designed to be the building blocks from which sophisticated infrastructures for ubiquitous computing are assembled. Our experience shows that many of these building blocks fit neatly into one of five categories, each containing functionally-equivalent components. Effectively identifying the best-fit "lego pieces", which in turn determines the composite functionality of the resulting infrastructure, is critical. The selection process, however, is impeded by the lack of convention for labeling these classes of building blocks. The lack of clarity with respect to what ready-made subsystems are available within each class often results in naive re-implementations of ready-made components, monolithic and clumsy implementations, and implementations that impose non-standard interfaces onto the applications above. This paper explores each class of subsystems in light of the experience gained over two years of active development of both ubiquitous computing applications and software infrastructures for their deployment.
{"title":"Toward a standard ubiquitous computing framework","authors":"M. Modahl, Bikash Agarwalla, G. Abowd, U. Ramachandran, T. S. Saponas","doi":"10.1145/1028509.1028515","DOIUrl":"https://doi.org/10.1145/1028509.1028515","url":null,"abstract":"This paper surveys a variety of subsystems designed to be the building blocks from which sophisticated infrastructures for ubiquitous computing are assembled. Our experience shows that many of these building blocks fit neatly into one of five categories, each containing functionally-equivalent components. Effectively identifying the best-fit \"lego pieces\", which in turn determines the composite functionality of the resulting infrastructure, is critical. The selection process, however, is impeded by the lack of convention for labeling these classes of building blocks. The lack of clarity with respect to what ready-made subsystems are available within each class often results in naive re-implementations of ready-made components, monolithic and clumsy implementations, and implementations that impose non-standard interfaces onto the applications above. This paper explores each class of subsystems in light of the experience gained over two years of active development of both ubiquitous computing applications and software infrastructures for their deployment.","PeriodicalId":364168,"journal":{"name":"workshop on Middleware for Pervasive and Ad-hoc Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2004-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128938860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Souto, Germano Guimarães, Glauco Vasconcelos, M. Vieira, N. Rosa, C. Ferraz
The miniaturization of hardware components has lead to the development of Wireless Sensor Networks (WSN) and networked-applications over them. Meanwhile, middleware systems have also been proposed in order to both facilitating the development of these applications and providing common application services. The development of middleware for sensor networks, however, places new challenges to middleware developers due to the low availability of resources and processing capacity of the sensor nodes. In this context, this paper presents a middleware for WSN named Mires. Mires incorporates characteristics of message-oriented middleware by allowing applications communicate in a publish/subscribe way. In order to illustrate the proposed middleware, we implement an aggregation middleware service for an environment-monitoring application.
{"title":"A message-oriented middleware for sensor networks","authors":"E. Souto, Germano Guimarães, Glauco Vasconcelos, M. Vieira, N. Rosa, C. Ferraz","doi":"10.1145/1028509.1028514","DOIUrl":"https://doi.org/10.1145/1028509.1028514","url":null,"abstract":"The miniaturization of hardware components has lead to the development of Wireless Sensor Networks (WSN) and networked-applications over them. Meanwhile, middleware systems have also been proposed in order to both facilitating the development of these applications and providing common application services. The development of middleware for sensor networks, however, places new challenges to middleware developers due to the low availability of resources and processing capacity of the sensor nodes. In this context, this paper presents a middleware for WSN named Mires. Mires incorporates characteristics of message-oriented middleware by allowing applications communicate in a publish/subscribe way. In order to illustrate the proposed middleware, we implement an aggregation middleware service for an environment-monitoring application.","PeriodicalId":364168,"journal":{"name":"workshop on Middleware for Pervasive and Ad-hoc Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2004-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134225303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The characteristics of mobile environments, with the possibility of frequent disconnections and fluctuating bandwidth, have forced a rethink of traditional middleware. In particular, the synchronous communication paradigms often employed in standard middleware do not appear to be particularly suited to ad hoc environments, in which not even the intermittent availability of a backbone network can be assumed. Instead, asynchronous communication seems to be a generally more suitable paradigm for such environments. Message oriented middleware for traditional systems has been developed and used to provide an asynchronous paradigm of communication for distributed systems, and, recently, also for some specific mobile computing systems. In this paper, we present our experience in designing, implementing and evaluating EMMA (Epidemic Messaging Middleware for Ad hoc networks), an adaptation of Java Message Service (JMS) for mobile ad hoc environments. We discuss in detail the design challenges and some possible solutions, showing a concrete example of the feasibility and suitability of the application of the asynchronous paradigm in this setting and outlining a research roadmap for the coming years.
移动环境的特点,以及频繁断开连接和波动带宽的可能性,迫使人们重新思考传统中间件。特别是,标准中间件中经常使用的同步通信范式似乎并不特别适合于临时环境,在这种环境中,甚至不能假设骨干网络的间歇性可用性。相反,异步通信似乎是更适合这种环境的范例。传统系统的面向消息的中间件已经被开发出来,并用于为分布式系统提供异步通信范例,最近也用于一些特定的移动计算系统。在本文中,我们介绍了我们在设计、实现和评估EMMA (Ad hoc网络的流行消息中间件)方面的经验,EMMA是一种针对移动Ad hoc环境的Java消息服务(JMS)的改编。我们详细讨论了设计挑战和一些可能的解决方案,展示了在此设置中应用异步范式的可行性和适用性的具体示例,并概述了未来几年的研究路线图。
{"title":"Adapting asynchronous messaging middleware to ad hoc networking","authors":"Mirco Musolesi, C. Mascolo, S. Hailes","doi":"10.1145/1028509.1028513","DOIUrl":"https://doi.org/10.1145/1028509.1028513","url":null,"abstract":"The characteristics of mobile environments, with the possibility of frequent disconnections and fluctuating bandwidth, have forced a rethink of traditional middleware. In particular, the synchronous communication paradigms often employed in standard middleware do not appear to be particularly suited to ad hoc environments, in which not even the intermittent availability of a backbone network can be assumed. Instead, asynchronous communication seems to be a generally more suitable paradigm for such environments. Message oriented middleware for traditional systems has been developed and used to provide an asynchronous paradigm of communication for distributed systems, and, recently, also for some specific mobile computing systems.\u0000 In this paper, we present our experience in designing, implementing and evaluating EMMA (Epidemic Messaging Middleware for Ad hoc networks), an adaptation of Java Message Service (JMS) for mobile ad hoc environments. We discuss in detail the design challenges and some possible solutions, showing a concrete example of the feasibility and suitability of the application of the asynchronous paradigm in this setting and outlining a research roadmap for the coming years.","PeriodicalId":364168,"journal":{"name":"workshop on Middleware for Pervasive and Ad-hoc Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2004-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124296281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We propose an adaptive middleware design for context-aware applications that abstracts the applications from the sensors that provide context. Further, we use application-specific utility functions to choose, given multiple alternatives for providing a specific context, one alternative at any time that provides the context for all applications, whilst maximising the applications' total "satisfaction" with the quality of context from the chosen provider. Our middleware also implements autonomic properties, such as self-configuration and resilience to failures, in the provision of context information to context-aware applications.
{"title":"Adaptive middleware for context-aware applications in smart-homes","authors":"M. Huebscher, J. Mccann","doi":"10.1145/1028509.1028511","DOIUrl":"https://doi.org/10.1145/1028509.1028511","url":null,"abstract":"We propose an adaptive middleware design for context-aware applications that abstracts the applications from the sensors that provide context. Further, we use application-specific utility functions to choose, given multiple alternatives for providing a specific context, one alternative at any time that provides the context for all applications, whilst maximising the applications' total \"satisfaction\" with the quality of context from the chosen provider. Our middleware also implements autonomic properties, such as self-configuration and resilience to failures, in the provision of context information to context-aware applications.","PeriodicalId":364168,"journal":{"name":"workshop on Middleware for Pervasive and Ad-hoc Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2004-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125317892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This work presents a detailed analysis of the security requirements for Service Oriented Architecture in mobile computing, still missing in the current literature. The purpose of this work is twofold. First, to provide protocol architects and software engineers with a map of security requirements in ubiquitous computing, through the evaluation of existing protocols and architectures. Second, to highlight architectural issues, including technologies and trade offs, in the design and implementation of a secure service oriented architecture for ubiquitous computing.
{"title":"Security requirements in service oriented architectures for ubiquitous computing","authors":"Domenico Cotroneo, Almerindo Graziano, S. Russo","doi":"10.1145/1028509.1028522","DOIUrl":"https://doi.org/10.1145/1028509.1028522","url":null,"abstract":"This work presents a detailed analysis of the security requirements for Service Oriented Architecture in mobile computing, still missing in the current literature. The purpose of this work is twofold. First, to provide protocol architects and software engineers with a map of security requirements in ubiquitous computing, through the evaluation of existing protocols and architectures. Second, to highlight architectural issues, including technologies and trade offs, in the design and implementation of a secure service oriented architecture for ubiquitous computing.","PeriodicalId":364168,"journal":{"name":"workshop on Middleware for Pervasive and Ad-hoc Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2004-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130881334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a way to realize the idea of calm computing by adding a dynamic task model into the pervasive computing environment. This task model contains information about the actions to undertake to help a user realize his daily tasks. The task model's mapping onto a deployment plan guides an internal adaptation mechanism, which helps applications to evolve without causing user distraction. In addition, a foraging technique (relocation) is proposed that allows for expanding an application's computing space automatically whenever possible. This technique involves external adaptation mechanisms. Both adaptation mechanisms are driven by resource information and resource contracts that are negotiated between the middleware and the application components. This allows the middleware to do the adaptations automatically, realizing the idea of calm computing.
{"title":"Mobile adaptive tasks guided by resource contracts","authors":"Peter Rigole, Y. Berbers, T. Holvoet","doi":"10.1145/1028509.1028512","DOIUrl":"https://doi.org/10.1145/1028509.1028512","url":null,"abstract":"This paper proposes a way to realize the idea of calm computing by adding a dynamic task model into the pervasive computing environment. This task model contains information about the actions to undertake to help a user realize his daily tasks. The task model's mapping onto a deployment plan guides an internal adaptation mechanism, which helps applications to evolve without causing user distraction. In addition, a foraging technique (relocation) is proposed that allows for expanding an application's computing space automatically whenever possible. This technique involves external adaptation mechanisms. Both adaptation mechanisms are driven by resource information and resource contracts that are negotiated between the middleware and the application components. This allows the middleware to do the adaptations automatically, realizing the idea of calm computing.","PeriodicalId":364168,"journal":{"name":"workshop on Middleware for Pervasive and Ad-hoc Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2004-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117260059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}