An Approach for FIPA Agent Service Discovery in Mobile Ad Hoc Environments

Size: px
Start display at page:

Download "An Approach for FIPA Agent Service Discovery in Mobile Ad Hoc Environments"

Transcription

1 An Approach for FIPA Agent Service Discovery in Mobile Ad Hoc Environments Michael Pirker 1, Michael Berger 2, Michael Watzke 2 1 Profactor Produktionsforschungs GmbH, Im Stadtgut A2, 4407 Steyr, Austria michael.pirker@profactor.at 2 Siemens AG, Corporate Technology, Intelligent Autonomous Systems Group, Otto-Hahn-Ring 6, Munich, Germany {m.berger, michael.watzke}@siemens.com Abstract. FIPA (Foundation for Intelligent Physical Agents) is a standardisation organisation promoting development and specification of agent technologies. Until now FIPA specifications have not been considering mobile ad hoc networks. In such environments agents depend on flexible discovery mechanisms to take advantage of services provided by other agents. This paper describes the major steps that led to the current integration of ad hoc features to the FIPA specification framework. Additionally, application examples demonstrate the benefits of FIPA agents in mobile ad hoc environments. 1 Introduction The notion of Ambient Intelligence is currently receiving considerable attention in research and industry. Ambient Intelligence combines two basic technological notions: the intelligent personal assistance and delegation with the ability to dynamically discover and interact with services in a digital ambience. That ambience is aware of the user s presence, it is able to provide users with personalised services to their requirements, and it is able to anticipate their behaviour and responding to their presence. These two notions and the related shift from interactive to proactive computing are at the heart of Ambient Intelligence. Considering the technology for realizing that vision, agent technology will play an important role by providing intelligent, autonomous, proactive and adaptive software entities. Beside the intelligence, Ubiquitous Computing is a necessary prerequisite for Ambient Intelligence. According to [1], Ubiquitous Computing is the method of enhancing computer use by making many computers available throughout the physical environment, but making them effectively invisible to the user. Effectively, a ubiquitous computing environment is a dynamic distributed network of embedded devices and systems that can interact with humans to satisfy their requirements and provide them with a variety of information, communication, or collaboration services [2]. To support Ubiquitous Computing environments, a standardized, open and flexible infrastructure is needed. Since agent technology is very important for Ambient Intelligence, it is essential to figure out how current agent platforms (APs) can also support the requirements for a Ubiquitous Computing infrastructure. The next two sections will analyse and discuss

2 how FIPA (Foundation for Intelligent Physical Agents) [ as the leading organisation specifying standards for agent technologies, could extend the specifications for Ubiquitous Computing environments by adding ad hoc service discovery and collaboration. 1.1 FIPA s Agent Platform Approach The FIPA AP provides an infrastructure for deploying agents. Although FIPA's main concern is about achieving interoperability between APs, FIPA requires that every FIPA-compliant AP implements three capabilities: The mandatory Agent Management System (AMS, white pages) [3], the mandatory Message Transport Service (MTS) [4], and the optional Directory Facilitator (DF, yellow pages) [3]. The AMS is responsible for agent creation and deletion, maintenance of a whitepage directory service for agents residing on the AP and the agent life-cycle management. Agents from different APs communicate over the MTS by exchanging Agent Communication Language (ACL) messages. The DF implements a very efficient search and matching mechanisms by using specific high-level DF-agent-descriptions (DAD) [3]. Based on the FIPA DF definition, the search of agent services in other APs (remote discovery) is accomplished by using DF federations: DFs besides registering services offered by local agents may also register other DFs. This allows them to extend the search for services to remote platforms. FIPA has also recognized the importance of mobile computing and provides agent standard like a bit-efficient ACL and envelope encoding for connections with low bandwidth [5, 6]. These solutions have been proved to be efficient in environments where slow wireless networks are involved [7]. An example of a distributed FIPA-compliant AP running agents hosted on PCs as well as on small mobile devices such as PDAs or mobile phones is Jade-Leap [8]. 1.2 Aims and Options for a FIPA Standard in Mobile Ad Hoc Environments In addition to the approaches for mobile devices and slow mobile connections, mentioned above, FIPA needs a solution for agents interoperating in Ubiquitous Computing environments with ad hoc communication. The DF federation mechanism is not efficient for flexible service discovery with mobile ad hoc communication, for example, because it uses a two step approach for finding services: first find the remote DF and afterwards look for the services registered there. FIPA started a Technical Committee (TC ad hoc 1 ) in 2002 to develop a solution for FIPA platforms in ad hoc environments. Several proposals were made (e.g. [9], [10] and [11]). The TC made a classification and validation of the approaches. Paper [9] summarizes the discussion and describes requirements and possible approaches from an architectural point of view (Figure 1 shows two examples). Finally FIPA decided not to develop its own protocol for service discovery in ad hoc environments but to use already existing Discovery Middleware (DM). Two of the reasons for the decision are: Allowing registering and discovering agent services using existing Peer-to-Peer (P2P) / ad hoc discovery technologies that are specifically developed for these envi- 1 The authors are very grateful to all who contributed to the fruitful work of FIPA TC Ad Hoc.

3 ronments can enable a more efficient management of service descriptions and directories. Furthermore, existing P2P and ad hoc technologies can also be used as mechanisms for agent (platform) societies in fixed networks. Fig. 1. a) Architecture with discovery, b) Architecture with FIPA-defined discovery Based on that decision, this paper describes a special proposal to FIPA with an approach where the FIPA architecture will be extended by a mechanism managing underlying DMs. In addition, this paper describes a specific DM. In Chapter 2, existing DM technologies are evaluated for their usability. Chapter 3 describes the proposal for extending FIPA platforms by DM components. Chapter 4 describes the current implementation and application. Chapter 5 summarizes and concludes the paper. 2 Evaluation of Discovery Middleware Technologies Bluetooth [12], Universal Plug and Play (UPnP) [13], JXTA [14], Gnutella [15] and Chord [16] represent a considerable set of current technologies applicable to discovery in mobile ad hoc environments. Bluetooth and UPnP are ad hoc technologies specifying an extensive stack of protocols and application profiles. Distributed Hash Tables (DHTs) are becoming a wide-spread technology for P2P networks. DHT approaches like Chord allow more efficient discovery than traditional P2P protocols like Gnutella. JXTA is an emerging P2P networking standard, which lies between the Gnutella-like flooding protocols and DHT approaches. 2.1 Discovery Middleware Requirements One main requirement for a DM is, that the discovery process supported by the DM should also provide a template based search as specified for the DF in [3]. To enable this kind of discovery, first FIPA DADs must be mapped to the service representation of a DM. Second, these service representations must be efficiently discoverable. Although the overall focus for this work was on small mobile ad hoc networks comprising a couple of devices in single hop distance, another important DM feature is scalability. Future applications are likely to consist of an increasing number of mobile nodes, possibly in multi hop distance, sometimes operating in an infrastructureless environment and sometimes linked to a fixed network infrastructure. 2.2 Analysis of Discovery Middleware Technologies As Figure 2 shows, the focus for discovery is at the level of transport and service related mechanisms. The transport layer provides concepts and protocols to exchange data. Building on the transport layer, the service layer offers concepts and protocols for discovering and invoking services. All technologies introduced at the beginning of

4 this chapter cover with varying comprehensiveness these two layers. Next, important aspects of these technologies will be described and discussed. For details see [17]. Fig. 2. Overview of Discovery Middleware capabilities Bluetooth service records consist of mandatory and user definable attribute/value pairs describing an offered service. Within a service record Bluetooth only supports the search for attributes, and not for attribute/value pairs. In addition, searchable attributes must be predefined Universally Unique Identifiers (UUIDs). After a device has been discovered, a search query consisting of some UUIDs can be directed to the device and returns handles to matching service records. A handle can then be used to access the attribute/value pairs. Bluetooth is targeted at small mobile ad hoc networks organized in piconets of at maximum eight concurrently active devices, one master and seven slaves. Scalability is achieved by combining several piconets to a scatternet where some devices must participate in two piconets to act as a bridge. UPnP service description documents are XML documents describing service actions and their arguments, and state variables. UPnP only supports the search for certain service types listed within the device description document. First a certain type of device has to be discovered and its device description document must be retrieved. Then for each matching service type listed in the device description document the service description document can be retrieved. UPnP depends on multicasts, using one dedicated UPnP multicast address. JXTA advertisements are XML encoded resource descriptions. Although several predefined types of advertisements exist, extended or new types of arbitrarily nested advertisements may be introduced. Advertisements can be discovered on all or certain nodes of a peer group, depending on attribute/value pairs that must exist in matching advertisements. Peer groups are clusters of certain JXTA services provided by network nodes. By default only search queries using predefined attributes, like Type or ID, are possible. JXTA implements a DHT (Distributed Hash Tables) algorithm [18] that takes effect beyond a peer's local (multicasting based) neighbourhood. Additionally JXTA offers relays and the Endpoint Routing Protocol (ERP) to increase the number of peers efficiently. Relays can be used to bridge different physical or logical networks by forwarding messages on behalf of peers that can not directly address each other. The multi hop ERP connects peers within the virtual JXTA network, even across firewalls. Gnutella has no structure for storing service representations. It only supports the transmission of an arbitrary query string within a descriptor but does not deal with its

5 processing. Descriptors are the basic unit of information. They are transported in TCP datagrams and are routed by flooding the network. Flooding simply forwards descriptors to all known peers, which in turn do the same. As a Gnutella extension supernodes route descriptors and forward them to ordinary (edge)nodes. DHT approaches like Chord always need an additional structure to represent services. DHT algorithms provide good scalability. For n peers they offer access times of O(log n) and the size of routing tables has a logarithmic dependence on the number of nodes. DHTs also offer a high probability of finding existing services on the network. 2.3 Evaluation Results Choosing JXTA as a First Discovery Middleware Bluetooth and UPnP assist in finding a certain service on a certain device based on an ID like search criterion, namely UUIDs or service types. Also in DHTs a key(word) is used to distribute and locate service representations. Hence a search for a DAD could only be performed with the key used to compute the hash value but not with arbitrary attribute/value pairs. Bluetooth s scalability based on scatternets might turn out to be too sedate for dynamic environments. Gnutella flooding and DHTs offer better scalability but are even less suited for dynamic environments, because flooding is sedate and causes heavy network, and DHTs require a regular update for their routing and resource tables. Although multicasting causes notable network load, the dynamic topology of the targeted small networks can be managed quite efficiently with it. JXTA should be considered as a first DM because it can be adapted with reasonable effort to map and discover DADs. The nested structure of DADs is well reflected by JXTA advertisements and JXTA s open design allows the addition of a template based discovery mechanism using arbitrary attribute/value pairs. JXTA s scalability and its mixture of multicasting and DHTs guarantees operability in small mobile ad hoc networks and large scale fixed ones. In future applications this would allow the efficient linking of large scale fixed and small mobile networks. Moreover, since JXTA is an emerging and non-proprietary de facto standard for P2P computing it is likely to gain high acceptance in the FIPA community. 3 Ad Hoc Agent Service Discovery: Concept and Realisation Although JXTA can be used as a first DM, all current P2P / ad hoc technologies have strengths and weaknesses. Standardizing only one DM means to focus on just one (restricted) technology. An open architecture that allows the mapping of FIPA concepts to several (current and future) DMs seems to be the best solution to this problem. 3.1 Architecture Approach To offer agents one uniform (ad hoc) network discovery functionality, regardless of the utilized DM(s), the Agent Discovery Service (ADS) was introduced (Figure 3 (a)). The ADS is an AP component lying within the FIPA architecture at the same level as the MTS. The ADS manages one or more DMs, which are accessed via a standardised DM interface. The DMs take DADs, convert them to their internal representation, perform discovery and return DADs to the ADS. As the ADS does not affect existing FIPA AP components like the DF, it is a handy (ad hoc) network discovery test bed for different DMs.

6 Fig. 3. (a) The ad hoc agent service discovery architecture. (b) The JXTA DM configuration For agents the ADS offers a high-level DF-like interface supporting (de)registration and search of DADs. In contrast to the DF, the ADS additionally offers a subscribe mechanism supporting an asynchronous search for DADs: Once a DAD search template has been passed to the ADS, all matching DADs will be returned until unsubscribe is invoked. Agents can apply the offered ADS mechanisms either to selected DMs or to all available ones. This means that the network accessible via the ADS is a compound of all networks supported by the invoked DMs. 3.2 The JXTA Discovery Middleware Component The Generic Discovery Service (GDS), see Figure 3 (b), was defined within JXTA to discover GDS advertisements. GDS advertisements are a container for arbitrary attribute/value pairs and carry a small amount of meta-information to be processable by the GDS. DAD advertisements are defined with XML-Schema and are one special instance of GDS advertisements. DAD advertisements are used to represent FIPA DADs and DAD search templates within JXTA. The GDS uses JXTA's resolver service for the transport of GDS advertisements and uses JXTA's discovery service to discover them. Compared to JXTA s discovery service the GDS provides template based search and subscribe mechanisms that work with arbitrary attribute/value pairs for matching. The GDS implements a simple protocol, the Generic Discovery Protocol (GDP) to discover and exchange GDS advertisements. The GDP is a request/response protocol, comprising the GenericDiscoveryQuery and GenericDiscoveryResponse messages. The GenericDiscoveryQuery is used for emitting discovery queries and contains a GDS advertisement being the search template. The GenericDiscoveryResponse contains matching GDS advertisements. The Agent Peer Group (APG) was defined for hosting the GDS. The APG is, like all JXTA peer groups, a child of the JXTA Net Peer Group. The APG must be joined by all peers that want to invoke the GDS, because the APG is the scope of the GDS. 3.3 Integration in the FIPA Framework The integration of the described architecture approach with the existing FIPA framework was realized by integrating the key features of the ADS into the DF. (Hence the DF of Figure 3 (a) can be omitted and the ADS of Figure (a) becomes the new DF.) As a consequence the Agent Management Specification [3] had to be extended and the new JXTA Discovery Middleware Specification [19] had to be introduced.

7 The DF was extended to manage DMs, to have a subscribe mechanism and to offer introspection. While providing the usual high-level interface for agents, a DF may also wrap DMs. In this way agents become discoverable on different kinds of (ad hoc) networks depending on the underlying DM technologies. Additionally the DF may provide a subscribe mechanism as explained in Section 3.1. DF introspection provides agents with information about the internal configuration of a DF, e.g. its DMs. With this information, agents can register, search or subscribe using only selected DMs. Making available a new DM to the DF requires creating a new DM related specification. The first of this kind adheres to the JXTA DM design described in Section 3.2. The specification defines how a JXTA DM manages to map DADs to JXTA DAD advertisements and how to facilitate a template based search with the means of JXTA. 4 Implementation and Application The ADS architecture described in Section 3.1 was integrated in the Jade-Leap 3.01b Personal Java version. A JXTA DM as described in Section 3.2 was implemented on top of the JXTA 1.0 Personal Java version. The whole prototype was tested on WLAN enabled ipaq PDAs running Windows CE and Jeode Personal Java 1.2 by means of three simple Agents: The PublishAgent registers and deregisters its DAD in random time intervals to simulate the dynamic environments. The SearchAgent permanently emits search queries and the SubscribeAgent subscribes with a DAD template to find eventually registered PublishAgent DADs. In order to demonstrate and evaluate the benefits that the proposed FIPA ad hoc solution will bring to users we are porting existing demonstrators to the new platform. The first demonstrator (shown by Siemens at the Cebit fair in Hannover in February 2002) (see [20]) provides an application Jukebots giving a mobile phone or PDA the capability of generating and adapting automatically a music profile for its user. With the profiles of different users e.g. in a bar scenario, their mobile phones or PDAs will decide which songs are to be played by the disc jockey (human or computer) through a partly automated voting process. The second demonstrator implemented by Siemens CT shows a mobile ad hoc advertisement application Mobile Ad (see [9]). People having that application on their device may edit a profile which is describing which goods they advertise for which price and which they are looking for. During walking on the street, the mobile application detects other users and matches the profiles. If there are common interests in selling and buying, the contact information will be exchanged. Both demonstrators will use the capabilities of the DM approach. Further application examples can be seen in office environments (e.g. control of printing devices), home environments (control of TV) or in hospitals for managing medical devices. 5 Summary and Outlook Ubiquitous Computing combined with agent technology is a good basis for the highly dynamic and complex nature of Ambient Intelligence services and applications. We described an ongoing technical work within FIPA standardization organization enabling FIPA-compliant agent systems to operate in mobile ad hoc environments. FIPA decided not to develop its own protocol for service discovery but to exploit already

8 existing Discovery Middleware. An evaluation of selected P2P / ad hoc DMs showed that the mapping of FIPA concepts to several (current and future) DMs is the best solution because no DM fulfils all requirements and is appropriate for all ad hoc environments. We outlined a flexible approach that allows the integration of existing and upcoming DMs with the FIPA architecture, and described a possible JXTA DM. We showed that these extensions enable programmers to use high-level agent development in ad hoc environments to build reliable Ambient Intelligence applications. As foundation for many new and exciting applications the most important next step will be to define a FIPA standard for mobile ad hoc environments. Developing other DMs such as a Bluetooth DM will also be paying, because Bluetooth is already available in many mobile devices. Further research into a transition from single to multi hop DMs and the linking of large scale fixed and small mobile networks is also needed. References 1. M. Weiser: Some Computer Science Issues in Ubiquitous Computing. ACM, July M. Calisti and D. Greenwood: On the Road to Ambient Intelligence. Proc. 2nd European Workshop on Multiagent Systems (EUMAS), FIPA: Agent Management Specification, Dec FIPA: Agent Message Transport Service Specification, Dec FIPA: ACL Message Representation in Bit-Efficient Specification, Dec FIPA: Agent Message Transport Envelope Representation in Bit Efficient Spec., Dec H. Helin and M. Laukkanen: Performance Analysis of Software Agent Communication in Slow Wireless Networks. In: Proc. of the 11th International Conference on Computer Communications and Networks (ICCCN 02), pp , Oct M. Berger et al.: Towards an Agent-Based Infrastructure for Distributed Virtual Organizations. In Proc. of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (Wetice 2001), pp M. Berger, M. Watzke, H. Helin: Towards a FIPA approach for Mobile Ad hoc Environments. ICIN 03 (Intelligence in Next Generation Networks), Bordeaux, April J. Lawrence: Leap into ad hoc networks. Workshop on Ubiquitous Agents, AAMAS 02, Bologna, July C. Campo: Service Discovery in pervasive Multi-Agent Systems. Workshop on Ubiquitous Agents, AAMAS 02, Bologna, July Bluetooth SIG: Specification of the Bluetooth System, Vol. 1, Core, V. 1.1, Feb Microsoft Corporation: Universal Plug and Play Device Architecture, V. 1.0, June Sun Microsystems: Project JXTA v2.0: Java Programmer's Guide, March Clip2: The Gnutella Protocol Specification, Version 0.4, I. Stoica et al.: Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications. In: Proc. of the 2001 ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication. ACM Press, New York, pp , M. Pirker: A Concept for the Interoperability of FIPA Agents in Mobile Ad Hoc Environments. Diploma Thesis, Technical University Graz & Siemens AG, Sept B. Traversat et al: A Loosely-Consistent DHT Rendezvous Walker. Sun, March FIPA: JXTA Discovery Middleware Specification, Oct M. Berger et al.: Porting Distributed Agent-Middleware to Small Mobile Devices. Workshop on Ubiquitous Agents, AAMAS 02, Bologna, July 2002

Research on P2P-SIP based VoIP system enhanced by UPnP technology

Research on P2P-SIP based VoIP system enhanced by UPnP technology December 2010, 17(Suppl. 2): 36 40 www.sciencedirect.com/science/journal/10058885 The Journal of China Universities of Posts and Telecommunications http://www.jcupt.com Research on P2P-SIP based VoIP system

More information

JXTA Overview. Mathieu Jan IRISA Rennes Projet Paris

JXTA Overview. Mathieu Jan IRISA Rennes Projet Paris JXTA Overview Mathieu Jan IRISA Rennes Projet Paris Plan Why peer-to-peer (P2P)? Introduction to JXTA Goals Basic concepts Protocols JXTA 2.0 Loosely-Consistent DHT Conclusion 2 Why peer-to-peer (P2P)?

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION CHAPTER 1 INTRODUCTION 1.1 Introduction Service Discovery Protocols (SDPs) are network protocols which allow automatic detection of devices and services offered by these devices on a computer network [1].

More information

Automatic Configuration and Service Discovery for Networked Smart Devices

Automatic Configuration and Service Discovery for Networked Smart Devices Automatic Configuration and Service Discovery for Networked Smart Devices Günter Obiltschnig Applied Informatics Software Engineering GmbH St. Peter 33 9184 St. Jakob im Rosental Austria Tel: +43 4253

More information

STANDARDS FOR AGENTS AND AGENT BASED SYSTEMS (FIPA)

STANDARDS FOR AGENTS AND AGENT BASED SYSTEMS (FIPA) Course Number: SENG 609.22 Session: Fall, 2003 Course Name: Agent-based Software Engineering Department: Electrical and Computer Engineering Document Type: Tutorial Report STANDARDS FOR AGENTS AND AGENT

More information

Exploiting peer group concept for adaptive and highly available services

Exploiting peer group concept for adaptive and highly available services Exploiting peer group concept for adaptive and highly available services Muhammad Asif Jan Centre for European Nuclear Research (CERN) Switzerland Fahd Ali Zahid, Mohammad Moazam Fraz Foundation University,

More information

Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals

Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals Yujin Noishiki Hidetoshi Yokota Akira Idoue KDDI R&D Laboratories, Inc. 2-1-15 Ohara, Fujimino-Shi, Saitama,

More information

Mobile Devices: Server and Management Lesson 05 Service Discovery

Mobile Devices: Server and Management Lesson 05 Service Discovery Mobile Devices: Server and Management Lesson 05 Service Discovery Oxford University Press 2007. All rights reserved. 1 Service discovery An adaptable middleware in a device (or a mobile computing system)

More information

A Survey on Application of Agent-based Technology in Pervasive Computing

A Survey on Application of Agent-based Technology in Pervasive Computing A Survey on Application of Agent-based Technology in Pervasive Computing Provided by: M. Moussavi This tutorial has been provided as part of the coursework for: SENG 609.22 Agent-based Software Engineering

More information

Classic Grid Architecture

Classic Grid Architecture Peer-to to-peer Grids Classic Grid Architecture Resources Database Database Netsolve Collaboration Composition Content Access Computing Security Middle Tier Brokers Service Providers Middle Tier becomes

More information

JXTA TM : Beyond P2P File Sharing the Emergence of Knowledge Addressable Networks

JXTA TM : Beyond P2P File Sharing the Emergence of Knowledge Addressable Networks JXTA TM : Beyond P2P File Sharing the Emergence of Knowledge Addressable Networks Bernard Traversat tra@jxta.org JXTA Chief Architect Sun Microsystems 2005 JavaOne SM Conference Session 7208 Extended and

More information

8 Conclusion and Future Work

8 Conclusion and Future Work 8 Conclusion and Future Work This chapter concludes this thesis and provides an outlook on future work in the area of mobile ad hoc networks and peer-to-peer overlay networks 8.1 Conclusion Due to the

More information

Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol

Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Andraž Jere, Marko Meža, Boštjan Marušič, Štefan Dobravec, Tomaž Finkšt, Jurij F. Tasič Faculty of Electrical Engineering Tržaška

More information

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam A Survey on P2P File Sharing Systems Using Proximity-aware interest Clustering Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

More information

Experimental Comparison of Routing and Middleware Solutions for Mobile Ad Hoc Networks: Legacy vs Cross-Layer Approach

Experimental Comparison of Routing and Middleware Solutions for Mobile Ad Hoc Networks: Legacy vs Cross-Layer Approach Experimental Comparison of Routing and Middleware Solutions for Mobile Ad Hoc Networks: Legacy vs Cross-Layer Approach E. Borgia, M. Conti, F.Delmastro, and E. Gregori Pervasive Computing & Networking

More information

FIPA agent based network distributed control system

FIPA agent based network distributed control system FIPA agent based network distributed control system V.Gyurjyan, D. Abbott, G. Heyes, E. Jastrzembski, C. Timmer, E. Wolin TJNAF, Newport News, VA 23606, USA A control system with the capabilities to combine

More information

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,

More information

UPnP-Based Sensor Network Management Architecture

UPnP-Based Sensor Network Management Architecture -Based Sensor Network Management Architecture Hyungjoo Song, Daeyoung Kim, Kangwoo Lee, Jongwoo Sung Real-time and Embedded Systems Lab Information and Communications University {iamhjoo, kimd, kangn2,

More information

The Device Service Bus: A Solution for Embedded Device Integration through Web Services

The Device Service Bus: A Solution for Embedded Device Integration through Web Services The Device Service Bus: A Solution for Embedded Device Integration through Web Services Gustavo Medeiros Araújo Federal University of Santa Catarina Informatics and Statistics Department Florianópolis,

More information

A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM

A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM Dr.S. DHANALAKSHMI 1, R. ANUPRIYA 2 1 Prof & Head, 2 Research Scholar Computer Science and Applications, Vivekanandha College of Arts and Sciences

More information

UPnP Control Point for Mobile Phones in Residential Networks

UPnP Control Point for Mobile Phones in Residential Networks 1 UPnP Control Point for Mobile Phones in Residential Networks Andreas Häber 1, Frank Reichert 2, and Andreas Fasbender 3 Abstract Together, Ericsson and HiA are studying the role of WiFi-enabled mobile

More information

A Survey Study on Monitoring Service for Grid

A Survey Study on Monitoring Service for Grid A Survey Study on Monitoring Service for Grid Erkang You erkyou@indiana.edu ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide

More information

SERVICE DISCOVERY AND MOBILITY MANAGEMENT

SERVICE DISCOVERY AND MOBILITY MANAGEMENT Objectives: 1) Understanding some popular service discovery protocols 2) Understanding mobility management in WLAN and cellular networks Readings: 1. Fundamentals of Mobile and Pervasive Computing (chapt7)

More information

Integration of Mobile Agents and Web Services

Integration of Mobile Agents and Web Services Integration of Mobile Agents and Web Services Jan Peters Fraunhofer Institut für Graphische Datenverarbeitung Fraunhoferstraße 5, 64283 Darmstadt, Germany jan.peters@igd.fraunhofer.de Abstract. The web

More information

THE CONCEPTS OF AN END-USER-ENABLING ARCHITECTURE FOR UBIQUITOUS COMPUTING. Irene Mavrommati, Achilles Kameas 1

THE CONCEPTS OF AN END-USER-ENABLING ARCHITECTURE FOR UBIQUITOUS COMPUTING. Irene Mavrommati, Achilles Kameas 1 THE CONCEPTS OF AN END-USER-ENABLING ARCHITECTURE FOR UBIQUITOUS COMPUTING Irene Mavrommati, Achilles Kameas 1 Abstract This paper describes the set of concepts that underlie the Plug-Synapse model, which

More information

Global Accessible Objects (GAOs) in the Ambicomp Distributed Java Virtual Machine

Global Accessible Objects (GAOs) in the Ambicomp Distributed Java Virtual Machine Global Accessible Objects (GAOs) in the Ambicomp Distributed Java Virtual Machine Bjoern Saballus University of Karlsruhe Department of Computer Science System Architecture Group Am Fasanengarten 5 76131

More information

Peer-to-peer framework of Distributed Environment for Cooperative and Collaborative Work Service Composition

Peer-to-peer framework of Distributed Environment for Cooperative and Collaborative Work Service Composition Peer-to-peer framework of Distributed Environment for Cooperative and Collaborative Work Service Composition F. Astha Ekadiyanto (franziskus.ekadiyanto@stud.uni-due.de) CONTENTS Why P2P? The P2P Overlay

More information

A Generic Database Web Service

A Generic Database Web Service A Generic Database Web Service Erdogan Dogdu TOBB Economics and Technology University Computer Engineering Department Ankara, Turkey edogdu@etu.edu.tr Yanchao Wang and Swetha Desetty Georgia State University

More information

GISP: Global Information Sharing Protocol a distributed index for peer-to-peer systems

GISP: Global Information Sharing Protocol a distributed index for peer-to-peer systems GISP: Global Information Sharing Protocol a distributed index for peer-to-peer systems Daishi Kato Computer Science Department, Stanford University Visiting from NEC Corporation Abstract This paper proposes

More information

System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks

System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks OnurSoft Onur Tolga Şehitoğlu November 10, 2012 v1.0 Contents 1 Introduction 3 1.1 Purpose..............................

More information

Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices

Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices Önder Uzun, Tanır Özçelebi, Johan Lukkien, Remi Bosman System Architecture and Networking Department of Mathematics and Computer

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh

More information

Content Delivery Network (CDN) and P2P Model

Content Delivery Network (CDN) and P2P Model A multi-agent algorithm to improve content management in CDN networks Agostino Forestiero, forestiero@icar.cnr.it Carlo Mastroianni, mastroianni@icar.cnr.it ICAR-CNR Institute for High Performance Computing

More information

A Mechanism on OSGi Agent for Dynamic Monitoring Service Discovery Protocols in Local Network

A Mechanism on OSGi Agent for Dynamic Monitoring Service Discovery Protocols in Local Network A Mechanism on OSGi Agent for Dynamic Monitoring Service Discovery Protocols in Local Network Pitak Sawetsunthorn Abstract Although there are several standard services to discover protocol in the network

More information

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

Intelligent Agents for Routing on Mobile Ad-Hoc Networks Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based

More information

SmartTV User Interface Development for SmartTV using Web technology and CEA2014. George Sarosi george.sarosi@twcable.com

SmartTV User Interface Development for SmartTV using Web technology and CEA2014. George Sarosi george.sarosi@twcable.com SmartTV User Interface Development for SmartTV using Web technology and CEA2014. George Sarosi george.sarosi@twcable.com Abstract Time Warner Cable is the second largest Cable TV operator in North America

More information

Mapping of Services on Bluetooth Radio Networks

Mapping of Services on Bluetooth Radio Networks Mapping of s on Bluetooth Radio Networks J. Dunlop and N. Amanquah University of Strathclyde -Department of Electronic and Electrical Engineering, Glasgow G1 1XW, Scotland Ph.: +44 141 5482081, Fax:+44

More information

FIPA Agent Management Specification

FIPA Agent Management Specification 1 2 3 4 5 FOUNDATION FOR INTELLIGENT PHYSICAL AGENTS FIPA Agent Management Specification 6 7 Document title FIPA Agent Management Specification Document number SC00023K Document source FIPA TC Agent Management

More information

Object Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching

Object Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching 2012 2 nd International Conference on Information Communication and Management (ICICM 2012) IPCSIT vol. 55 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V55.5 Object Request Reduction

More information

Decentralized supplementary services for Voice-over-IP telephony

Decentralized supplementary services for Voice-over-IP telephony Decentralized supplementary services for Voice-over-IP telephony Christoph Spleiß and Gerald Kunzmann Technische Universität München 80333 Munich, Germany {christoph.spleiss,gerald.kunzmann}@tum.de Abstract.

More information

Security Services in Multi-Dimensional Network

Security Services in Multi-Dimensional Network 48 JOURNAL OF NETWORKS, VOL. 2, NO. 1, FEBRUARY 2007 Providing Security Services in a Resource Discovery System Juan Vera del Campo, Josep Pegueroles, Miguel Soriano Department of Telematic Engineering,

More information

A Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks

A Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks 1 A Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks Hasan Sözer, Metin Tekkalmaz, and İbrahim Körpeoğlu Abstract File sharing in wireless ad-hoc networks in a peerto-peer manner imposes many

More information

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL This chapter is to introduce the client-server model and its role in the development of distributed network systems. The chapter

More information

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Bridging the gap between peer-to-peer and conventional SIP networks

Bridging the gap between peer-to-peer and conventional SIP networks 1 Bridging the gap between peer-to-peer and conventional SIP networks Mosiuoa Tsietsi, Alfredo Terzoli, George Wells Department of Computer Science Grahamstown, South Africa Tel: +27 46 603 8291 hezekiah@rucus.ru.ac.za

More information

A DISTRIBUTED RESOURCE-MANAGEMENT APPROACH IN MANETS

A DISTRIBUTED RESOURCE-MANAGEMENT APPROACH IN MANETS Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 142-153 School of Engineering, Taylor s University College A DISTRIBUTED RESOURCE-MANAGEMENT APPROACH IN MANETS S. A. HOSSEINI-SENO 1,*,

More information

Introduction into Web Services (WS)

Introduction into Web Services (WS) (WS) Adomas Svirskas Agenda Background and the need for WS SOAP the first Internet-ready RPC Basic Web Services Advanced Web Services Case Studies The ebxml framework How do I use/develop Web Services?

More information

Mobile SCTP Transport Layer Mobility Management for the Internet

Mobile SCTP Transport Layer Mobility Management for the Internet Mobile SCTP Transport Layer Mobility Management for the Maximilian Riegel Siemens AG, Munich, Germany E-mail: maximilian.riegel@icn.siemens.de Dr. Michael Tüxen Siemens AG, Munich, Germany E-mail: michael.tuexen@icn.siemens.de

More information

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental

More information

3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies

3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies 3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies This paper describes a new framework of policy control sensor networks. Sensor networks are shared by various applications,

More information

Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach

Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach Simone Leggio, Jukka Manner, Antti Hulkkonen, Kimmo Raatikainen Department of Computer Science University of Helsinki,

More information

Load Balancing in Structured Overlay Networks. Tallat M. Shafaat tallat(@)kth.se

Load Balancing in Structured Overlay Networks. Tallat M. Shafaat tallat(@)kth.se Load Balancing in Structured Overlay Networks Tallat M. Shafaat tallat(@)kth.se Overview Background The problem : load imbalance Causes of load imbalance Solutions But first, some slides from previous

More information

Interoperability of Peer-To-Peer File Sharing Protocols

Interoperability of Peer-To-Peer File Sharing Protocols Interoperability of -To- File Sharing Protocols Siu Man Lui and Sai Ho Kwok -to- (P2P) file sharing software has brought a hot discussion on P2P file sharing among all businesses. Freenet, Gnutella, and

More information

Outlook. Corporate Research and Technologies, Munich, Germany. 20 th May 2010

Outlook. Corporate Research and Technologies, Munich, Germany. 20 th May 2010 Computing Architecture Computing Introduction Computing Architecture Software Architecture for Outlook Corporate Research and Technologies, Munich, Germany Gerald Kaefer * 4 th Generation Datacenter IEEE

More information

IST STREP Project. Deliverable D3.3.1u Middleware User s Guide Multi-Radio Device Management Layer. http://www.ist-plastic.org

IST STREP Project. Deliverable D3.3.1u Middleware User s Guide Multi-Radio Device Management Layer. http://www.ist-plastic.org IST STREP Project Deliverable D3.3.1u Middleware User s Guide Multi-Radio Device Management Layer http://www.ist-plastic.org Project Number : IST-26955 Project Title : PLASTIC Deliverable Type : Report

More information

2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment

2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment R&D supporting future cloud computing infrastructure technologies Research and Development on Autonomic Operation Control Infrastructure Technologies in the Cloud Computing Environment DEMPO Hiroshi, KAMI

More information

Unit 3 - Advanced Internet Architectures

Unit 3 - Advanced Internet Architectures Unit 3 - Advanced Internet Architectures Carlos Borrego Iglesias, Sergi Robles Carlos.Borrego@uab.cat,Sergi.Robles@uab.cat Departament d Enginyeria de la Informació i de les Comunicacions Universitat Autònoma

More information

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and

More information

Sharing @ The Edge: Secure Information Sharing

Sharing @ The Edge: Secure Information Sharing Sharing @ The Edge: Secure Information Sharing Tony White 1, Dwight Deugo 1, Steve Gutz 2 1 School of Computer Science, Carleton University 2 Texar Corporation {arpwhite@scs.carleton.ca, deugo@scs.carleton.ca,

More information

E-banking Services for Automated Agent-based Trading

E-banking Services for Automated Agent-based Trading E-banking Services for Automated Agent-based Trading Monique Calisti Whitestein Technologies AG Ghotthardstrasse 50 8002 Zurich, Switzerland mca@whitestein.com Emma Rollon Laboratoire d Intelligence Artificielle

More information

Web Service Based Data Management for Grid Applications

Web Service Based Data Management for Grid Applications Web Service Based Data Management for Grid Applications T. Boehm Zuse-Institute Berlin (ZIB), Berlin, Germany Abstract Web Services play an important role in providing an interface between end user applications

More information

Chord - A Distributed Hash Table

Chord - A Distributed Hash Table Kurt Tutschku Vertretung - Professur Rechnernetze und verteilte Systeme Chord - A Distributed Hash Table Outline Lookup problem in Peer-to-Peer systems and Solutions Chord Algorithm Consistent Hashing

More information

Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets

Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets # K.Deepika 1, M.Tech Computer Science Engineering, Mail: medeepusony@gmail.com # K.Meena 2, Assistant Professor

More information

A Semantic Marketplace of Peers Hosting Negotiating Intelligent Agents

A Semantic Marketplace of Peers Hosting Negotiating Intelligent Agents A Semantic Marketplace of Peers Hosting Negotiating Intelligent Agents Theodore Patkos and Dimitris Plexousakis Institute of Computer Science, FO.R.T.H. Vassilika Vouton, P.O. Box 1385, GR 71110 Heraklion,

More information

Software design (Cont.)

Software design (Cont.) Package diagrams Architectural styles Software design (Cont.) Design modelling technique: Package Diagrams Package: A module containing any number of classes Packages can be nested arbitrarily E.g.: Java

More information

Interacting the Edutella/JXTA Peer-to-Peer Network with Web Services

Interacting the Edutella/JXTA Peer-to-Peer Network with Web Services Interacting the Edutella/JXTA Peer-to-Peer Network with Web Services Changtao Qu Learning Lab Lower Saxony University of Hannover Expo Plaza 1, D-30539, Hannover, Germany qu @learninglab.de Wolfgang Nejdl

More information

Jini. Kurzfassung als Kapitel für die Vorlesung Verteilte Systeme. (unter Nutzung von Teilen von Andreas Zeidler und Roger Kehr)

Jini. Kurzfassung als Kapitel für die Vorlesung Verteilte Systeme. (unter Nutzung von Teilen von Andreas Zeidler und Roger Kehr) Jini Kurzfassung als Kapitel für die Vorlesung Verteilte Systeme Friedemann Mattern (unter Nutzung von Teilen von Andreas Zeidler und Roger Kehr) Jini Infrastructure ( middleware ) for dynamic, cooperative,

More information

A Peer-to-peer Extension of Network-Enabled Server Systems

A Peer-to-peer Extension of Network-Enabled Server Systems A Peer-to-peer Extension of Network-Enabled Server Systems Eddy Caron 1, Frédéric Desprez 1, Cédric Tedeschi 1 Franck Petit 2 1 - GRAAL Project / LIP laboratory 2 - LaRIA laboratory E-Science 2005 - December

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Deploying QoS sensitive services in OSGi enabled home networks based on UPnP

Deploying QoS sensitive services in OSGi enabled home networks based on UPnP Deploying QoS sensitive services in OSGi enabled home networks based on UPnP Nico Goeminne, Kristof Cauwel, Filip De Turck, Bart Dhoedt Ghent University - IBBT - IMEC Department of Information Technology

More information

A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT

A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT CATALOGUES Lican Huang Institute of Network & Distributed Computing, Zhejiang Sci-Tech University, No.5, St.2, Xiasha Higher Education Zone, Hangzhou,

More information

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390 The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar jenben@dtek.chalmers.se prarthan@dtek.chalmers.se Gothenburg, May

More information

Service-Oriented Architectures

Service-Oriented Architectures Architectures Computing & 2009-11-06 Architectures Computing & SERVICE-ORIENTED COMPUTING (SOC) A new computing paradigm revolving around the concept of software as a service Assumes that entire systems

More information

Multi-Agent System for Management and Monitoring of Routes Surveillance

Multi-Agent System for Management and Monitoring of Routes Surveillance Multi-Agent System for Management and Monitoring of Routes Surveillance Sara Rodríguez and Javier Bajo Departamento de Informática y Automática, Universidad de Salamanca Plaza de la Merced s/n, 37008,

More information

Remote support for lab activities in educational institutions

Remote support for lab activities in educational institutions Remote support for lab activities in educational institutions Marco Mari 1, Agostino Poggi 1, Michele Tomaiuolo 1 1 Università di Parma, Dipartimento di Ingegneria dell'informazione 43100 Parma Italy {poggi,mari,tomamic}@ce.unipr.it,

More information

Calto: A Self Sufficient Presence System for Autonomous Networks

Calto: A Self Sufficient Presence System for Autonomous Networks Calto: A Self Sufficient Presence System for Autonomous Networks Abstract In recent years much attention has been paid to spontaneously formed Ad Hoc networks. These networks can be formed without central

More information

Architectures and protocols in Peer-to-Peer networks

Architectures and protocols in Peer-to-Peer networks Architectures and protocols in Peer-to-Peer networks Ing. Michele Amoretti [amoretti@ce.unipr.it] II INFN SECURITY WORKSHOP Parma 24-25 February 2004 Contents - Definition of Peer-to-Peer network - P2P

More information

A Peer-to-Peer Approach to Content Dissemination and Search in Collaborative Networks

A Peer-to-Peer Approach to Content Dissemination and Search in Collaborative Networks A Peer-to-Peer Approach to Content Dissemination and Search in Collaborative Networks Ismail Bhana and David Johnson Advanced Computing and Emerging Technologies Centre, School of Systems Engineering,

More information

Mobile Agent System for Web Services Integration in Pervasive Networks

Mobile Agent System for Web Services Integration in Pervasive Networks Mobile Agent System for Web Services Integration in Pervasive Networks Fuyuki Ishikawa 1, Nobukazu Yoshioka 2, Yasuyuki Tahara 2, Shinichi Honiden 2,1 1 Graduate School of Information Science and Technology

More information

Distributed Computing over Communication Networks: Topology. (with an excursion to P2P)

Distributed Computing over Communication Networks: Topology. (with an excursion to P2P) Distributed Computing over Communication Networks: Topology (with an excursion to P2P) Some administrative comments... There will be a Skript for this part of the lecture. (Same as slides, except for today...

More information

XOP: Sharing XML Data Objects through Peer-to-Peer Networks

XOP: Sharing XML Data Objects through Peer-to-Peer Networks 22nd International Conference on Advanced Information Networking and Applications XOP: Sharing XML Data Objects through Peer-to-Peer Networks Itamar de Rezende, Frank Siqueira Department of Informatics

More information

Decentralized Service Discovery Approach Using Dynamic Virtual Server

Decentralized Service Discovery Approach Using Dynamic Virtual Server Decentralized Service Discovery Approach Using Virtual N.Aravindhu 1, C.Shalini 2, R.Jayalakshmi 3, S.Priyavadhani 4 Assistant Professor, Department of Computer Science, Christ College of Eng. and Technology,

More information

A Service Discovery: A Service Broker Approach

A Service Discovery: A Service Broker Approach A Service Discovery: A Service Broker Approach Teemu Koponen Helsinki University of Technology Telecommunication software and Multimedia Laboratory Email: teemu.koponen@hut.fi Teemupekka Virtanen Helsinki

More information

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of

More information

Survey on Load Rebalancing for Distributed File System in Cloud

Survey on Load Rebalancing for Distributed File System in Cloud Survey on Load Rebalancing for Distributed File System in Cloud Prof. Pranalini S. Ketkar Ankita Bhimrao Patkure IT Department, DCOER, PG Scholar, Computer Department DCOER, Pune University Pune university

More information

International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.

International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer. RESEARCH ARTICLE ISSN: 2321-7758 GLOBAL LOAD DISTRIBUTION USING SKIP GRAPH, BATON AND CHORD J.K.JEEVITHA, B.KARTHIKA* Information Technology,PSNA College of Engineering & Technology, Dindigul, India Article

More information

How To Make A Network Overlay More Efficient

How To Make A Network Overlay More Efficient Corporate Technology Service Layer Components for Resource Management in Distributed Applications Fabian Stäber Siemens Corporate Technology, Information and Communications Copyright Siemens AG 2007. Alle

More information

Salutation Architectures and the newly defined service discovery protocols from Microsoft and Sun

Salutation Architectures and the newly defined service discovery protocols from Microsoft and Sun Salutation Architectures and the newly defined service discovery from Microsoft and Sun How does the Salutation Architecture stack up A Salutation White Paper June 6, 1999 Bob Pascoe, Technical Consultant

More information

JoramMQ, a distributed MQTT broker for the Internet of Things

JoramMQ, a distributed MQTT broker for the Internet of Things JoramMQ, a distributed broker for the Internet of Things White paper and performance evaluation v1.2 September 214 mqtt.jorammq.com www.scalagent.com 1 1 Overview Message Queue Telemetry Transport () is

More information

Advanced Peer to Peer Discovery and Interaction Framework

Advanced Peer to Peer Discovery and Interaction Framework Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 peeyush_tugnawat@jdedwards.com Mohamed E. Fayad Computer Engineering

More information

A Review on Efficient File Sharing in Clustered P2P System

A Review on Efficient File Sharing in Clustered P2P System A Review on Efficient File Sharing in Clustered P2P System Anju S Kumar 1, Ratheesh S 2, Manoj M 3 1 PG scholar, Dept. of Computer Science, College of Engineering Perumon, Kerala, India 2 Assisstant Professor,

More information

P2P: centralized directory (Napster s Approach)

P2P: centralized directory (Napster s Approach) P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application

More information

Developers Integration Lab (DIL) System Architecture, Version 1.0

Developers Integration Lab (DIL) System Architecture, Version 1.0 Developers Integration Lab (DIL) System Architecture, Version 1.0 11/13/2012 Document Change History Version Date Items Changed Since Previous Version Changed By 0.1 10/01/2011 Outline Laura Edens 0.2

More information

Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4

Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

Efficient Discovery of Internet Gateways in Future Vehicular Communication Systems

Efficient Discovery of Internet Gateways in Future Vehicular Communication Systems Efficient Discovery of Internet Gateways in Future Vehicular Communication Systems Marc Bechler, Lars Wolf Technical University of Brunswick, Germany Email: [bechler, wolf]@ibr.cs.tu-bs.de Oliver Storz

More information

IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION

IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION N.Vijaya Sunder Sagar 1, M.Dileep Kumar 2, M.Nagesh 3, Lunavath Gandhi

More information

Distributed file system in cloud based on load rebalancing algorithm

Distributed file system in cloud based on load rebalancing algorithm Distributed file system in cloud based on load rebalancing algorithm B.Mamatha(M.Tech) Computer Science & Engineering Boga.mamatha@gmail.com K Sandeep(M.Tech) Assistant Professor PRRM Engineering College

More information