Suitability of existing service discovery protocols for mobile users in an ambient intelligence environment
|
|
|
- Ashley Hutchinson
- 10 years ago
- Views:
Transcription
1 Suitability of existing service discovery protocols for mobile users in an ambient intelligence environment Davy Preuveneers Department of Computer Science K.U.Leuven Celestijnenlaan 200A B-3001 Leuven, Belgium Telephone: (+32) (0) Fax: (+32) (0) Yolande Berbers Department of Computer Science K.U.Leuven Celestijnenlaan 200A B-3001 Leuven, Belgium Telephone: (+32) (0) Fax: (+32) (0) Abstract Service discovery enables users to access information, resources and services anytime, anywhere. This involves a client, a service provider and an infrastructure for service registration and lookup. Clients use service discovery protocols (SDPs) to issue a service request to a service registry or an individual service provider. In this paper we investigate the suitability of existing SDPs for mobile users in an ambient intelligence context. After reviewing the most well-known SDPs, common problems in the domain of user mobility and solutions that are currently available are discussed. Keywords Service discovery, ambient intelligence, mobile computing, ad-hoc networking. Presentation Should this paper be accepted, it will be presented by Davy Preuveneers. I. INTRODUCTION In their report Scenarios for Ambient Intelligence in 2010 [9], the IST Advisory Group shows concrete visions of life in tomorrow s user-friendly information society where people are surrounded everywhere all the time by unobtrusive, interconnected intelligent objects. Ambient intelligence is a user-centered paradigm, based on the belief that the many networked devices will be moved into the background, while providing personalized services to the user and anticipating a user s desire at any place and time. To reduce the number of interactions with humans, services need to become more autonomous, for example by adapting to user preferences and situational context and interacting with other services in supporting a user who is performing a specific task. Typical devices on which a mobile user nowadays wants to use these services are laptops, tablet PCs, PDAs, mobile phones, etc. It is clear that these devices have varying capabilities and different resource constraints, for example limited processing power, memory, network bandwidth and battery life time. With the emergence of wireless ad-hoc networks and ubiquitous and pervasive computing, it is believed that these devices will be everywhere, but hidden from the users or nicely integrated into their environment. To support user mobility, several service discovery protocols (SDPs) have been proposed that enable device and service interaction. These protocols change the way services are configured, deployed and advertised on a network. Their aim is to enable mobile users to discover new services and to support seamless and scalable device and service interoperability. Service announcement and registration, service lookup, query and event mechanisms are the key features of the most common SDPs. Among the contenders are Jini [16], Universal Plug and Play (UPnP) [21], Salutation [19], Service Location Protocol (SLP) [6] and the Bluetooth SDP [4]. In this paper, we discuss the main characteristics of these protocols and focus on their applicability for a mobile user employing devices with limited capabilities. In section 2 we shortly describe existing SDPs. Section 3 presents common problems with these protocols with regard to user mobility and mechanisms to overcome them. Related work is described in section 4 and we end this paper with a conclusion in section 5. II. SERVICE DISCOVERY PROTOCOLS To make use of services in our environment, protocols need to be defined that describe user-service and service-service interactions. In this section we will describe the following protocols: Jini [16], Universal Plug and Play (UPnP) [21], Salutation [19], Service Location Protocol (SLP) [6] and the Bluetooth SDP [4]. They differ in support for several capabilities, like mobile code, heterogeneous network transport media, interoperability based on open standards and protocols, etc. A typical scenario requiring service discovery would be engineer Jack who is leaving home for the office. While on the road, he is using his handheld PC to synchronize with his agenda that is being maintained on the office network. This
2 way he knows which meetings have been scheduled for today. Then he notices he forgot to take along an important technical report he was working on yesterday evening at home on his desktop PC. He retrieves the document with his handheld PC and sends it to the printer at the office. In the meantime, he receives a message from the city traffic control system, installed by the local authorities, that there is a traffic jam on his way to work, suggesting to take another road. Being a little late, he receives an urgent incoming call on his handheld PC from the project manager. Jack immediately switches on the Internet connected audio system in his car and continues the communication using VoIP. Some aspects of this scenario can already be implemented using the current state-of-the-art in network technology, others require more effort. Several service discovery protocols are discussed below. A. Jini General description: Jini [16] is a Java-based architecture, developed by Sun Microsystems, based on the idea of federating groups of users and resources into a single dynamic distributed system, turning the network into an easy administered tool. It provides an infrastructure and programming model for developing and federating services to other members of the federation. Building blocks: Service communication is accomplished by a service protocol using Remote Method Invocation (RMI). A lookup service is used to locate services. When a device or application registers with a Jini network to advertise supplied services, it first uses the discovery protocol to locate an appropriate lookup service, and then joins it by using the join protocol. The lookup service then maps the interfaces and other attributes that describe the functionality of the service to the objects that implement it. Hence, a lookup service acts as a registry for all services available on the network, containing objects in the Java programming language. Discovery: Lookup occurs when a user or service needs to locate and invoke a service described by its interface. The service object in the lookup service is then downloaded by the interested client and is used as local proxy to the service that stored the object in the lookup service. The client interacts directly with the service provider via the service object and not by passing through the lookup service. Miscellaneous: The Jini architecture provides support for transactions and events. Transactions allow a series of operations within one or multiple services to be wrapped as one entity. A service protocol is provided to coordinate a two phase commit, so that all the changes occur atomically or none of them occur. Events are used to notify other entities in the network. Objects may register interest in events in another object and receive a notification when the event takes place. Code mobility is possible by making use of the provisions of the Java runtime environment. B. Universal Plug and Play General description: Universal Plug and Play (UPnP) [11], contributed by Microsoft and now further maintained by the UPnP Forum, is a technology that extends Plug and Play (PnP) to allow devices, appliances and services to connect to networks, enabling automatic discovery and control of devices, supporting zero-configuration. Devices can dynamically join a network, obtain an IP address, advertise their capabilities and discover those of other devices. UPnP uses standard TCP/IP and Internet protocols, including IP, TCP, UDP, HTTP and XML, and does not specify the APIs applications will use. Hence, it is independent of any programming language or operating system. Building blocks: The basic building blocks of a UPnP network are devices, services and control points. UPnP devices host the services and may contain nested devices. A control point is a controller for discovering and controlling other devices and may be incorporated in a device. When a device connects to the network, it tries to receive an IP address from a DHCP server. When no DHCP server is available, it selects a random address from a reserved range and sends out an ARP packet to see if the address has already been taken. This protocol is known as AutoIP and avoids any explicit network configuration. Discovery: UPnP uses Simple Service Discovery Protocol (SSDP) [5] for service discovery. Devices use it to announce their presence to others and to discover other devices or services. This protocol is similar to the discovery, join and lookup protocols of Jini. Service descriptions: Service descriptions are given in XML documents. They provide information about actions, parameters and variables that model the state of the service at runtime. When a control point sends an action request to a device s service, it sends a control message expressed in XML using SOAP to the control URL for the service. Miscellaneous: When a service changes its state at runtime, it publishes updates by sending event messages which other control points may subscribe to. These messages contain the names and values of the state variables of the service and are also expressed in XML and formatted using Generic Event Notification Architecture (GENA), a protocol to send and receive notifications using HTTP over TCP/IP and multicast UDP. C. Salutation General description: The Salutation architecture [19] is an approach developed by an open industry consortium known as the Salutation Consortium. Building blocks: It consists of Salutation Managers (SLMs) acting as service brokers that coordinate with one another. Services register their capabilities with a local or nearest available SLM and clients query an SLM when they need a service. The request for utilization of a service also passes through an SLM. SLMs do everything on behalf of their clients. A call-back mechanism notifies devices of events. Discovery: SLMs discover other nearby SLMs and exchange service registration information, even if SLMs are located on different transport media. This is done by using Transportation Managers, transport-dependent modules. They provide reliable
3 communication channels to the SLMs regardless of the underlying network infrastructure. SLMs redirect discovery requests to other SLMs using Sun s Open Network Computing Remote Procedure Call (RPC). Invoking services in a Salutation architecture is very flexible. In native mode Salutation provides support for vendor specific protocols that bypass SLMs. In emulated mode, SLMs manage the communication session by carrying the data from one party to another, while the data format is selected by client and server. In salutation mode, SLMs not only take care of the transmission but also define the structure of the message being transmitted. Salutation provides APIs to invoke these operations and to gather the results. Service descriptions: A service description is broken down into functional units, representing some essential feature of the service. Each unit provides a set of records which can be queried during service discovery. Miscellaneous: SLMs do not provide lease based access to services, like Jini and UPnP, but may be asked to periodically check the status of functional units to see if they are still available. D. Service Location Protocol General description: The Service Location Protocol Version 2 (SLPv2) [7] is a standard from Internet Engineering Task Force (IETF) and uses multicast and DHCP to initialize the framework. There is no need to configure single SLP agents. SLP scales from a single LAN to enterprise networks. It does not scale to the Internet, because DHCP and multicast require configuration and the Internet does not provide a centralized place for administration. Building blocks: The main components of SLPv2 are User Agent (UA), Service Agent (SA) and Directory Agent (DA). SAs advertise location and attributes on behalf of services, while UAs discover these properties on behalf of client software. DAs act as information caches that store relevant information from SAs about available services on the network. To decrease network bandwidth usage, UAs then query DAs for service discovery, but the use of DAs is optional. Discovery: There are two methods for DA discovery: active and passive. In active DA discovery, UAs and SAs multicast Service Requests for the DAs to the network. The available DAs will then respond to the request. In passive DA discovery, DAs multicast periodically advertisements for their services to the network. UAs and SAs can also learn the location the location of DAs using DHCP, by configuring DHCP to distribute the addresses of DAs to hosts that request them. When at least one DA is present, it collects all the information advertised by SAs, and UAs sent unicast messages to the DA, otherwise UAs and SAs communicate directly with one another. UAs then repeatedly multicast requests to SAs. SAs in turn unicast their response to the UA if they match the search criteria. Service descriptions: Services are advertised using a Service URL, which contains the service location, including IP address, port number and, if necessary, a path. Clients that obtain this URL have all the necessary information they need to connect to the service. The actual protocol used for communication between client and service is SLP independent. Service descriptions are given by Service Templates, defining a set of attributes, which UAs use to compose their requests. Miscellaneous: Service registration with a DA is lease based, and must be renewed to avoid expiration. E. Bluetooth Service Discovery Protocol General description: The Bluetooth SDP [4] is a discovery protocol only available in Bluetooth environments and therefore provides limited functionality compared to other protocols. Discovery: Bluetooth SDP provides service discovery by searching for service class or service attributes. Service browsing is used when no knowledge is available a priori. It provides no service brokering, nor service advertisements or registrations, nor eventing. III. COMMON PROBLEMS WITH SDPS In the previous sections we have discussed the main characteristics of several service discovery protocols. We will now present some challenges and shortcomings to achieve the goals of ambient intelligence. A. Semantic service discovery and user profiles Service discovery is very important from a user s point of view. When a user enters a previously undiscovered network, he or she would like to find out which services are available. Service registration and lookup in UPnP, Salutation and SLP is based on the exact matching of name/value pairs. Jini lookup requires the matching of interfaces in the service object. However, searching for services in terms of service properties is not adequate enough, considering the possibility of incomplete matches or synonyms for service attributes. Only returning services that completely match would limit the positive responses to service requests. When Jack in the above scenario would request a videophoning application service for mobile communication with his boss, the VoIP audio system in his car might be adequate enough in the user s context. One solution for the matching problem would be to use a standardized vocabulary to describe services. The United Nations Standard Products and Services Code (UNSPSC) [20] provides a multi-sector classification of products and services. Using this classification scheme to identify each service on all Jini, UPnP, Salutation and SLP devices would even improve interoperability. Using service ontologies and user preferences on top of the aforementioned protocols is another solution that improves the quality of responses to service requests. Service ontologies describe relationships between different entities. By specifying rules and constraints on service attributes, for example by imposing a priority on each option based on user preferences, facilitates inexact matching. Two frameworks for describing ontologies are DAML+OIL [8] and OWL [14]. The OWL Services Coalition, formerly the DAML Services Coalition, have
4 recently described an ontology specifically for web services in these frameworks, namely DAML-S [17] and OWL-S [18]. Enhanced service discovery in Bluetooth using ontologies is discussed in [2]. B. Interoperability and network transparency One thing that is not likely to change in the near future is the heterogeneity of available computing systems and devices. These systems will require self configuration. However Jini and Salutation do not address this issue. Before lookup services can be used, a Jini device needs to be assigned an IP address, subnet mask and optionally a gateway and DNS server. It would not be easy for Salutation, being a transport independent framework, to provide a generic solution. SLP and UPnP use DHCP for self configuration, however DHCP does not scale well to the Internet. Another requirement is the interoperability between different software platforms. The wide variety of available service discovery protocols is the main reason why it is important to have bridges between these protocols to allow protocol interoperability. Jini and UPnP interoperability is discussed in [1]. Virtual services are introduced as bridges between Jini and UPnP devices. The main problem to overcome is the fact that Jini relies heavily on mobile code for service discovery, while UPnP uses simple primitive types for communication. Therefore, Java interfaces and XML specifications need to be standardized. The combination of Jini and Bluetooth is discussed in [24]. Bluetooth is used as the underlying network to get Jini objects to communicate. The main problem is that a Bluetooth device needs extra memory, processing power and storage for the Java classes. A SLP-Jini bridge is discussed in [7]. When memory and processing resources for a Java Virtual Machine are too costly for an embedded device to advertise its services, SLP could be used instead. A Java Driver Factory, a class that can be used to produce Java objects, is used by the SLP-Jini bridge to instantiate a Java driver object based on the attributes of the SLP advertisement. The bridge then registers the service with a Jini Lookup server. Salutation and Bluetooth interoperability is discussed in [12]. Because a Salutation Manager is independent of underlying protocols and operating environments, it can interface to numerous protocols, including Bluetooth. The main advantage is that the Salutation Architecture allows to advertise and register services, while Bluetooth does not. By mapping the Bluetooth service profile to the Salutation APIs and the Bluetooth SDP to the Salutation Manager, it is possible for an application to locate services in, for example Bluetooth and TCP/IP networks by communicating to the Salutation Manager. Another problem is posed by the mobility of users and devices. Not only do network disconnections and different network connectivity cause problems, software can be mobile as well. A user might request to download a service to his PDA, for example a mail client. The Java Virtual Machine already provides support for code migration, but support for service migration between heterogeneous software platforms will be a must in the future. Also code mobility and state transfer of a remotely running application will be required, if the network connection is going to disappear due to user mobility. In most of the SDPs discussed above, services can only be run on the devices on which they are deployed. C. Resource constraints Embedded devices are known to have many resource constraints, like limited processing power, memory, network bandwidth and battery life time. Sometimes a trade-off needs to be made, for example between network bandwidth and processing power: will I run the application remotely or will I download it and run it on my personal device. Today there already exist various software platforms [15] [10] to allow service implementations on embedded devices. However they are usually trimmed down versions with limited capabilities of large development platforms. IV. RELATED WORK In this section we discuss briefly UDDI and WSDL, as they are well known standards in the area of web service specifications and registries. Also mentioned is the Semantic Web, which will allow better semantic discovery and interaction. The aforementioned OWL is one of the specifications being incorporated into the Semantic Web. A. UDDI Universal Description, Discovery and Integration (UDDI) [13] is a standard for an online registry to enable the publishing and dynamic discovery of web services. Services are described according to an XML schema defined by the UDDI specification. B. WSDL The Web Services and Description Language (WSDL) [23] is an XML format for describing network services as a set of endpoints operating on messages containing either documentoriented or procedure-oriented information. These endpoints are network addresses associated with certain protocols and data format specifications. WSDL does not support semantic description of services and hence is therefore less suited for semantic discovery. It is often used in conjunction with SOAP. C. Semantic Web The Semantic Web [22] was defined by Tim Berners-Lee e.a. [3] to be an extension of the current web in which information is given a well-defined meaning, better enabling computers and people to work in cooperation. To goal is to not only share data on the web for display purposes, but to allow this data to be used by computers for automation, integration and reuse of data across various applications, where computers have access to structured collections of information and sets of inference rules that they can use to conduct automated reasoning.
5 V. CONCLUSION After an overview of the current state-of-the-art in service discovery protocols including Jini, UPnP, Salutation, SLP and Bluetooth, we discussed their applicability in an ambient intelligence context. The major problems are limited service discovery based on attribute matching, network transparency and platform interoperability. Semantic service discovery using service ontologies and user profiles with preferences could be used to enhance service lookup. Protocol bridges are existing approaches that only provide a partial solution to overcome the user mobility problem, as services need to be mobile as well and hence require heterogeneous platform interoperability for true code mobility. Future work will be focused on integrating these technologies, while keeping in mind the limitations of the current resource constraint devices. REFERENCES [1] J. Allard, V. Chinta, S. Gundala, and G. G. Richard III. Jini Meets UPnP: An Architecture for Jini/UPnP Interoperability. In Proceedings of the 2003 International Symposium on Applications and the Internet (SAINT 2003). [2] Sasikanth Avancha, Anupam Joshi, and Tim Finin. Enhanced service discovery in bluetooth. IEEE Internet Computing, 35(6):96 99, June [3] Tim Berners-Lee, James Hendler, and Ora Lassila. The Semantic Web. Scientific American, May [4] Bluetooth SIG. Bluetooth Core Specification version 1.2, volume 3 - Part B, November [5] Yaron Y. Goland, Ting Cai, Paul Leachand, Ye Gu, and Shivaun Albright. Simple Service Discovery Protocol/1.0, IETF Draft draft-cai-ssdp-v1-03.txt, October [6] E. Guttman, C. Perkins, J. Veizades, and M. Day. Service Location Protocol, Version 2, RFC 2608, June [7] Erik Guttman. Service location protocol: Automatic discovery of IP network services. IEEE Internet Computing, 3(4):71 80, [8] Ian Horrocks, Frank van Harmelen, and Peter Patel-Schneider. DAML+OIL, Darpa Agent Markup Language and Ontology Interference Layer, March [9] ISTAG. Scenarios for Ambient Intelligence in Februari [10] Microsoft Corporation. Microsoft.NET Compact Framework. [11] Microsoft Corporation. Understanding Universal Plug and Play: A White Paper. June [12] Brent Miller. Mapping Salutation Architecture APIs to Bluetooth Service Discovery Layer, Bluetooth Consortium 1.C.118/1.0, July [13] OASIS. The Universal Description, Discovery and Integration (UDDI), September [14] Michael K. Smith, Chris Welty, and Deborah L. McGuinness. Owl web ontology language guide, August [15] Sun Microsystems Inc. JavaTM 2, Micro Edition (J2METM) Wireless Toolkit 2.1. [16] Sun Microsystems Inc. Jini Architectural Overview, Technical White Paper, May [17] The DAML Services Coalition. DAML-S: Semantic Markup for Web Services. May [18] The OWL Services Coalition. OWL-S: Semantic Markup for Web Services. November [19] The Salutation Consortium. Salutation Architecture Specification (Part- 1), Version 2.1, [20] United Nations Development Programme and Dun & Bradstreet Corporation. The United Nations Standard Products and Services Code [21] UPnP Forum. Universal Plug and Play Device Architecture Reference Specification, Version 1.0.1, May [22] W3C. Semantic Web. [23] W3C. Web Services Description Language (WSDL) March [24] Markus Wallmyr and Ola Markström. Bluetooth and Jini. The future of Networking, Department of Computer Systems, Institution of Information Technology, Uppsala University, 1999.
CHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.1 Introduction Service Discovery Protocols (SDPs) are network protocols which allow automatic detection of devices and services offered by these devices on a computer network [1].
How To Create A Service Discovery Protocol In Java (Java) And Other Networks
International Journal of Computer Research ISSN 1535-6698 Volume 11, Number 1, pp. 1-12 2002 Nova Science Publishers, Inc. PROTOCOLS FOR SERVICE DISCOVERY IN DYNAMIC AND MOBILE NETWORKS Computer and Information
An introduction to Service Discovery Protocols, with a closer view on the Service Location Protocol and Home Audio Video Interoperability
An introduction to Service Discovery Protocols, with a closer view on the Service Location Protocol and Home Audio Video Interoperability Maxim Langebrekke Department of Telematics Norwegian University
Automatic Configuration and Service Discovery for Networked Smart Devices
Automatic Configuration and Service Discovery for Networked Smart Devices Günter Obiltschnig Applied Informatics Software Engineering GmbH St. Peter 33 9184 St. Jakob im Rosental Austria Tel: +43 4253
SERVICE DISCOVERY AND MOBILITY MANAGEMENT
Objectives: 1) Understanding some popular service discovery protocols 2) Understanding mobility management in WLAN and cellular networks Readings: 1. Fundamentals of Mobile and Pervasive Computing (chapt7)
Mobile Devices: Server and Management Lesson 05 Service Discovery
Mobile Devices: Server and Management Lesson 05 Service Discovery Oxford University Press 2007. All rights reserved. 1 Service discovery An adaptable middleware in a device (or a mobile computing system)
The Ubiquitous Web, UPnP and Smart Homes
The Ubiquitous Web, UPnP and Smart Homes Franklin Reynolds Nokia Research Center, Cambridge [email protected] 1 NOKIA PCG.PPT / 15 6 2004 / Franklin Reynolds Our Vision "The essence of this vision
A COMPARISON OF SERVICE DISCOVERY PROTOCOLS AND IMPLEMENTATION OF THE SERVICE LOCATION PROTOCOL
A COMPARISON OF SERVICE DISCOVERY PROTOCOLS AND IMPLEMENTATION OF THE SERVICE LOCATION PROTOCOL Christian Bettstetter and Christoph Renner Technische Universität München (TUM) Institute of Communication
Mapping of Services on Bluetooth Radio Networks
Mapping of s on Bluetooth Radio Networks J. Dunlop and N. Amanquah University of Strathclyde -Department of Electronic and Electrical Engineering, Glasgow G1 1XW, Scotland Ph.: +44 141 5482081, Fax:+44
UPnP Control Point for Mobile Phones in Residential Networks
1 UPnP Control Point for Mobile Phones in Residential Networks Andreas Häber 1, Frank Reichert 2, and Andreas Fasbender 3 Abstract Together, Ericsson and HiA are studying the role of WiFi-enabled mobile
The Device Service Bus: A Solution for Embedded Device Integration through Web Services
The Device Service Bus: A Solution for Embedded Device Integration through Web Services Gustavo Medeiros Araújo Federal University of Santa Catarina Informatics and Statistics Department Florianópolis,
Research on the Model of Enterprise Application Integration with Web Services
Research on the Model of Enterprise Integration with Web Services XIN JIN School of Information, Central University of Finance& Economics, Beijing, 100081 China Abstract: - In order to improve business
Introduction to Service Oriented Architectures (SOA)
Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction
Incorporating Semantic Discovery into a Ubiquitous Computing Infrastructure
Incorporating Semantic Discovery into a Ubiquitous Computing Infrastructure Robert E. McGrath, Anand Ranganathan, M. Dennis Mickunas, and Roy H. Campbell Department of Computer Science, University or Illinois
Proxying UPnP service discovery and access to a non- IP Bluetooth network on a mobile phone
Proxying UPnP service discovery and access to a non- IP Bluetooth network on a mobile phone A. Delphinanto, A.M.J. Koonen Technische Universiteit Eindhoven Eindhoven, The Netherlands [email protected]
A Survey Study on Monitoring Service for Grid
A Survey Study on Monitoring Service for Grid Erkang You [email protected] ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide
Jini Technology Applied to Railway Systems
Jini Technology Applied to Railway Systems Txomin Nieva a, b,, Andreas Fabri b, Abdenbi Benammour a a Institute for computer Communications and Applications (ICA) Communication Systems Dept. (DSC) Swiss
A Distributed Architecture for Remote Service Discovery in Pervasive Computing
A Distributed Architecture for Remote Service Discovery in Pervasive Computing by Farzad Salehi A thesis submitted to the Department of Computer Science in conformity with the requirements for the degree
Introduction into Web Services (WS)
(WS) Adomas Svirskas Agenda Background and the need for WS SOAP the first Internet-ready RPC Basic Web Services Advanced Web Services Case Studies The ebxml framework How do I use/develop Web Services?
A Generic Database Web Service
A Generic Database Web Service Erdogan Dogdu TOBB Economics and Technology University Computer Engineering Department Ankara, Turkey [email protected] Yanchao Wang and Swetha Desetty Georgia State University
Deploying QoS sensitive services in OSGi enabled home networks based on UPnP
Deploying QoS sensitive services in OSGi enabled home networks based on UPnP Nico Goeminne, Kristof Cauwel, Filip De Turck, Bart Dhoedt Ghent University - IBBT - IMEC Department of Information Technology
Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols
E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and
E-Business Technologies for the Future
E-Business Technologies for the Future Michael B. Spring Department of Information Science and Telecommunications University of Pittsburgh [email protected] http://www.sis.pitt.edu/~spring Overview
On the Standardization of Semantic Web Services-based Network Monitoring Operations
On the Standardization of Semantic Web Services-based Network Monitoring Operations ChenglingZhao^, ZihengLiu^, YanfengWang^ The Department of Information Techonlogy, HuaZhong Normal University; Wuhan,
SmartTV User Interface Development for SmartTV using Web technology and CEA2014. George Sarosi [email protected]
SmartTV User Interface Development for SmartTV using Web technology and CEA2014. George Sarosi [email protected] Abstract Time Warner Cable is the second largest Cable TV operator in North America
VIA CONNECT PRO Deployment Guide
VIA CONNECT PRO Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...
Service Oriented Architecture
Service Oriented Architecture Charlie Abela Department of Artificial Intelligence [email protected] Last Lecture Web Ontology Language Problems? CSA 3210 Service Oriented Architecture 2 Lecture Outline
QoS Integration in Web Services
QoS Integration in Web Services M. Tian Freie Universität Berlin, Institut für Informatik Takustr. 9, D-14195 Berlin, Germany tian @inf.fu-berlin.de Abstract: With the growing popularity of Web services,
Emergency Services Interconnection Forum (ESIF) Emergency Services Messaging Interface Task Force ( Task Force 34 )
Emergency Services Interconnection Forum (ESIF) Emergency Services Messaging Interface Task Force ( Task Force 34 ) Contribution Title: Implementing ESMI with SIP and ESTP Contribution Number: Submission
Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks
Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,
Secure Semantic Web Service Using SAML
Secure Semantic Web Service Using SAML JOO-YOUNG LEE and KI-YOUNG MOON Information Security Department Electronics and Telecommunications Research Institute 161 Gajeong-dong, Yuseong-gu, Daejeon KOREA
Detecting rogue systems
Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often
IMPLEMENTATION OF AN AGENT MONITORING SYSTEM IN A JINI ENVIRONMENT WITH RESTRICTED USER ACCESS
IMPLEMENTATION OF AN AGENT MONITORING SYSTEM IN A JINI ENVIRONMENT WITH RESTRICTED USER ACCESS Marietta A. Gittens (Dr. Sadanand Srivastava, Dr. James Gil De Lamadrid) {mgittens, ssrivas, gildelam}@cs.bowiestate.edu
Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach
Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach Simone Leggio, Jukka Manner, Antti Hulkkonen, Kimmo Raatikainen Department of Computer Science University of Helsinki,
Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0
Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0 Course length: 5 Days Course No. 688 - Five days - Instructor-led Introduction This course provides students with the knowledge and skills required
VIA COLLAGE Deployment Guide
VIA COLLAGE Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...
Session Initiation Protocol (SIP) The Emerging System in IP Telephony
Session Initiation Protocol (SIP) The Emerging System in IP Telephony Introduction Session Initiation Protocol (SIP) is an application layer control protocol that can establish, modify and terminate multimedia
Service-Oriented Architectures
Architectures Computing & 2009-11-06 Architectures Computing & SERVICE-ORIENTED COMPUTING (SOC) A new computing paradigm revolving around the concept of software as a service Assumes that entire systems
Review: Lecture 1 - Internet History
Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration
The Study on Mobile Phone-oriented Application Integration Technology of Web Services 1
The Study on Mobile Phone-oriented Application Integration Technology of Web Services 1 Li Luqun 1, 2 Li Minglu 1 Cui Xianguo 2 1. Department of Computer Science of Shanghai Jiaotong University, 1954 Huashan
Web services with WebSphere Studio: Deploy and publish
Web services with WebSphere Studio: Deploy and publish Table of Contents If you're viewing this document online, you can click any of the topics below to link directly to that section. 1. Introduction...
Windows 7 Core Services: Application Experience. Application Information. Background Intelligent Transfer. Base Filtering Engine.
Yegor Hanov EECS710, Fall 2012 Homework Assignment 10/23/12 Assignment 2: Core Windows 7 Services I reviewed the list of active services running on my laptop during normal operation. The list [1] contains
Distributed systems. Distributed Systems Architectures
Distributed systems Distributed Systems Architectures Virtually all large computer-based systems are now distributed systems. Information processing is distributed over several computers rather than confined
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
W H I T E P A P E R A p p l i c a t i o n D e l i v e r y f o r C l o u d S e r v i c e s : C u s t o m i z i n g S e r v i c e C r e a t i o n i n V i r t u a l E n v i r o n m e n t s Sponsored by: Brocade
in Health Care and Sensor Networks
16 th FFV Workshop Web Services in Health Care and Sensor Networks Fahad Aijaz Department of Communication Networks RWTH Aachen University, Germany FFV Workshop, March 13, 2009 Outline Wireless Sensor
IT4405 Computer Networks (Compulsory)
IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and
District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification
1.1 Multipoint Control Unit (MCU) A. The MCU shall be capable of supporting (20) continuous presence HD Video Ports at 720P/30Hz resolution and (40) continuous presence ports at 480P/30Hz resolution. B.
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application Author: Fung, King Pong MSc in Information Technology The Hong Kong Polytechnic University June 1999 i Abstract Abstract of dissertation
Integration of Hotel Property Management Systems (HPMS) with Global Internet Reservation Systems
Integration of Hotel Property Management Systems (HPMS) with Global Internet Reservation Systems If company want to be competitive on global market nowadays, it have to be persistent on Internet. If we
CHAPTER 7 SUMMARY AND CONCLUSION
179 CHAPTER 7 SUMMARY AND CONCLUSION This chapter summarizes our research achievements and conclude this thesis with discussions and interesting avenues for future exploration. The thesis describes a novel
IPv6 over Power Line for the Digital Home
IPv6 over Power Line for the Digital Home Moscow, November 2004 Jordi Palet & Francisco Ortiz Consulintel - 1 Typical PLC Network Topology - 2 Next generation applications Every device, even every application,
What communication protocols are used to discover Tesira servers on a network?
Understanding device discovery methods in Tesira OBJECTIVES In this application note, basic networking concepts will be summarized to better understand how Tesira servers are discovered over networks.
CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
A Dynamic, Runtime-Extensible, Client-Managed Service Framework
A Dynamic, Runtime-Extensible, Client-Managed Service Framework D. Parry G. Wells, P. Clayton Computer Science Department Rhodes University Grahamstown, 6140 Email: [email protected] Tel: (046) 603 8640
SLA BASED SERVICE BROKERING IN INTERCLOUD ENVIRONMENTS
SLA BASED SERVICE BROKERING IN INTERCLOUD ENVIRONMENTS Foued Jrad, Jie Tao and Achim Streit Steinbuch Centre for Computing, Karlsruhe Institute of Technology, Karlsruhe, Germany {foued.jrad, jie.tao, achim.streit}@kit.edu
Network Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
Chapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your Wireless-G Router Model WGR614v9. You can access these features by selecting the items under
Case Study for Layer 3 Authentication and Encryption
CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client
Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards)
Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards) Michael P. Papazoglou (INFOLAB/CRISM, Tilburg University, The Netherlands)
Configuration Notes 0215
Mediatrix Digital and Analog VoIP Gateways DNS SRV Configuration for a Redundant Server Solution (SIP) Introduction... 2 Deployment Scenario... 2 DNS SRV (RFC 2782)... 3 Microsoft Server Configuration...
Event-based middleware services
3 Event-based middleware services The term event service has different definitions. In general, an event service connects producers of information and interested consumers. The service acquires events
Using mobile phones to access Web Services in a secure way. Dan Marinescu
Using mobile phones to access Web Services in a secure way Dan Marinescu March 7, 2007 Abstract Web Services is a technology that has gained in acceptance and popularity over the past years. The promise
Basic Network Configuration
Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the
LEARNING SOLUTIONS website milner.com/learning email [email protected] phone 800 875 5042
Course 6451B: Planning, Deploying and Managing Microsoft System Center Configuration Manager 2007 Length: 3 Days Published: June 29, 2012 Language(s): English Audience(s): IT Professionals Level: 300 Technology:
Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices
Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices Önder Uzun, Tanır Özçelebi, Johan Lukkien, Remi Bosman System Architecture and Networking Department of Mathematics and Computer
SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
Motivation Definitions EAI Architectures Elements Integration Technologies. Part I. EAI: Foundations, Concepts, and Architectures
Part I EAI: Foundations, Concepts, and Architectures 5 Example: Mail-order Company Mail order Company IS Invoicing Windows, standard software IS Order Processing Linux, C++, Oracle IS Accounts Receivable
Building a Highly Available and Scalable Web Farm
Page 1 of 10 MSDN Home > MSDN Library > Deployment Rate this page: 10 users 4.9 out of 5 Building a Highly Available and Scalable Web Farm Duwamish Online Paul Johns and Aaron Ching Microsoft Developer
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
