223 research outputs found

    POLICY-BASED MIDDLEWARE FOR MOBILE CLOUD COMPUTING

    Get PDF
    Mobile devices are the dominant interface for interacting with online services as well as an efficient platform for cloud data consumption. Cloud computing allows the delivery of applications/functionalities as services over the internet and provides the software/hardware infrastructure to host these services in a scalable manner. In mobile cloud computing, the apps running on the mobile device use cloud hosted services to overcome resource constraints of the host device. This approach allows mobile devices to outsource the resource-consuming tasks. Furthermore, as the number of devices owned by a single user increases, there is the growing demand for cross-platform application deployment to ensure a consistent user experience. However, the mobile devices communicate through unstable wireless networks, to access the data and services hosted in the cloud. The major challenges that mobile clients face when accessing services hosted in the cloud, are network latency and synchronization of data. To address the above mentioned challenges, this research proposed an architecture which introduced a policy-based middleware that supports user to access cloud hosted digital assets and services via an application across multiple mobile devices in a seamless manner. The major contribution of this thesis is identifying different information, used to configure the behavior of the middleware towards reliable and consistent communication among mobile clients and the cloud hosted services. Finally, the advantages of the using policy-based middleware architecture are illustrated by experiments conducted on a proof-of-concept prototype

    Support infrastructures for multimedia services with guaranteed continuity and QoS

    Get PDF
    Advances in wireless networking and content delivery systems are enabling new challenging provisioning scenarios where a growing number of users access multimedia services, e.g., audio/video streaming, while moving among different points of attachment to the Internet, possibly with different connectivity technologies, e.g., Wi-Fi, Bluetooth, and cellular 3G. That calls for novel middlewares capable of dynamically personalizing service provisioning to the characteristics of client environments, in particular to discontinuities in wireless resource availability due to handoffs. This dissertation proposes a novel middleware solution, called MUM, that performs effective and context-aware handoff management to transparently avoid service interruptions during both horizontal and vertical handoffs. To achieve the goal, MUM exploits the full visibility of wireless connections available in client localities and their handoff implementations (handoff awareness), of service quality requirements and handoff-related quality degradations (QoS awareness), and of network topology and resources available in current/future localities (location awareness). The design and implementation of the all main MUM components along with extensive on the field trials of the realized middleware architecture confirmed the validity of the proposed full context-aware handoff management approach. In particular, the reported experimental results demonstrate that MUM can effectively maintain service continuity for a wide range of different multimedia services by exploiting handoff prediction mechanisms, adaptive buffering and pre-fetching techniques, and proactive re-addressing/re-binding

    Edge Computing for Extreme Reliability and Scalability

    Get PDF
    The massive number of Internet of Things (IoT) devices and their continuous data collection will lead to a rapid increase in the scale of collected data. Processing all these collected data at the central cloud server is inefficient, and even is unfeasible or unnecessary. Hence, the task of processing the data is pushed to the network edges introducing the concept of Edge Computing. Processing the information closer to the source of data (e.g., on gateways and on edge micro-servers) not only reduces the huge workload of central cloud, also decreases the latency for real-time applications by avoiding the unreliable and unpredictable network latency to communicate with the central cloud

    Web service control of component-based agile manufacturing systems

    Get PDF
    Current global business competition has resulted in significant challenges for manufacturing and production sectors focused on shorter product lifecyc1es, more diverse and customized products as well as cost pressures from competitors and customers. To remain competitive, manufacturers, particularly in automotive industry, require the next generation of manufacturing paradigms supporting flexible and reconfigurable production systems that allow quick system changeovers for various types of products. In addition, closer integration of shop floor and business systems is required as indicated by the research efforts in investigating "Agile and Collaborative Manufacturing Systems" in supporting the production unit throughout the manufacturing lifecycles. The integration of a business enterprise with its shop-floor and lifecycle supply partners is currently only achieved through complex proprietary solutions due to differences in technology, particularly between automation and business systems. The situation is further complicated by the diverse types of automation control devices employed. Recently, the emerging technology of Service Oriented Architecture's (SOA's) and Web Services (WS) has been demonstrated and proved successful in linking business applications. The adoption of this Web Services approach at the automation level, that would enable a seamless integration of business enterprise and a shop-floor system, is an active research topic within the automotive domain. If successful, reconfigurable automation systems formed by a network of collaborative autonomous and open control platform in distributed, loosely coupled manufacturing environment can be realized through a unifying platform of WS interfaces for devices communication. The adoption of SOA- Web Services on embedded automation devices can be achieved employing Device Profile for Web Services (DPWS) protocols which encapsulate device control functionality as provided services (e.g. device I/O operation, device state notification, device discovery) and business application interfaces into physical control components of machining automation. This novel approach supports the possibility of integrating pervasive enterprise applications through unifying Web Services interfaces and neutral Simple Object Access Protocol (SOAP) message communication between control systems and business applications over standard Ethernet-Local Area Networks (LAN's). In addition, the re-configurability of the automation system is enhanced via the utilisation of Web Services throughout an automated control, build, installation, test, maintenance and reuse system lifecycle via device self-discovery provided by the DPWS protocol...cont'd

    Remote maintenance of real time controller software over the internet

    Get PDF
    The aim of the work reported in this thesis is to investigate how to establish a standard platform for remote maintenance of controller software, which provides remote monitoring, remote fault identification and remote performance recovery services for geographically distributed controller software over the Internet. A Linear Quadratic Gaussian (LQG) controller is used as the benchmark for the control performance assessment; the LQG benchmark variances are estimated based on the Lyapunov equation and subspace matrices. The LQG controller is also utilized as the reference model of the actual controller to detect the controller failures. Discrepancies between control signals of the LQG and the actual controller are employed to a General Likelihood Ratio (GLR) test and the controller failure detection is characterized to detect sudden jumping points in the mean or variance of the discrepancies. To restore the degraded control performance caused by the controller failures, a compensator is designed and inserted into the post-fault control loop, which serially links with the faulty controller and recovers the degraded control performance into an acceptable range. Techniques of controller performance monitoring, controller failure detection and maintenance are extended into the Internet environment. An Internet-based maintenance system for controller software is developed, which provides remote control performance assessment and recovery services, and remote fault identification service over the Internet for the geographically distributed controller software. The integration between the mobile agent technology and the controller software maintenance is investigated. A mobile agent based controller software maintenance system is established; the mobile agent structure is designed to be flexible and the travelling agents can be remotely updated over the Internet. Also, the issue of heavy data process and transfer over the Internet is probed and a novel data process and transfer scheme is introduced. All the proposed techniques are tested on sirnulations or a process control unit. Simulation and experimental results illustrate the effectiveness of the proposed techniques.EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    Situation-aware Edge Computing

    Get PDF
    Future wireless networks must cope with an increasing amount of data that needs to be transmitted to or from mobile devices. Furthermore, novel applications, e.g., augmented reality games or autonomous driving, require low latency and high bandwidth at the same time. To address these challenges, the paradigm of edge computing has been proposed. It brings computing closer to the users and takes advantage of the capabilities of telecommunication infrastructures, e.g., cellular base stations or wireless access points, but also of end user devices such as smartphones, wearables, and embedded systems. However, edge computing introduces its own challenges, e.g., economic and business-related questions or device mobility. Being aware of the current situation, i.e., the domain-specific interpretation of environmental information, makes it possible to develop approaches targeting these challenges. In this thesis, the novel concept of situation-aware edge computing is presented. It is divided into three areas: situation-aware infrastructure edge computing, situation-aware device edge computing, and situation-aware embedded edge computing. Therefore, the concepts of situation and situation-awareness are introduced. Furthermore, challenges are identified for each area, and corresponding solutions are presented. In the area of situation-aware infrastructure edge computing, economic and business-related challenges are addressed, since companies offering services and infrastructure edge computing facilities have to find agreements regarding the prices for allowing others to use them. In the area of situation-aware device edge computing, the main challenge is to find suitable nodes that can execute a service and to predict a node’s connection in the near future. Finally, to enable situation-aware embedded edge computing, two novel programming and data analysis approaches are presented that allow programmers to develop situation-aware applications. To show the feasibility, applicability, and importance of situation-aware edge computing, two case studies are presented. The first case study shows how situation-aware edge computing can provide services for emergency response applications, while the second case study presents an approach where network transitions can be implemented in a situation-aware manner

    Integrating Usability Models into Pervasive Application Development

    Get PDF
    This thesis describes novel processes in two important areas of human-computer interaction (HCI) and demonstrates ways to combine these in appropriate ways. First, prototyping plays an essential role in the development of complex applications. This is especially true if a user-centred design process is followed. We describe and compare a set of existing toolkits and frameworks that support the development of prototypes in the area of pervasive computing. Based on these observations, we introduce the EIToolkit that allows the quick generation of mobile and pervasive applications, and approaches many issues found in previous works. Its application and use is demonstrated in several projects that base on the architecture and an implementation of the toolkit. Second, we present novel results and extensions in user modelling, specifically for predicting time to completion of tasks. We extended established concepts such as the Keystroke-Level Model to novel types of interaction with mobile devices, e.g. using optical markers and gestures. The design, creation, as well as a validation of this model are presented in some detail in order to show its use and usefulness for making usability predictions. The third part is concerned with the combination of both concepts, i.e. how to integrate user models into the design process of pervasive applications. We first examine current ways of developing and show generic approaches to this problem. This leads to a concrete implementation of such a solution. An innovative integrated development environment is provided that allows for quickly developing mobile applications, supports the automatic generation of user models, and helps in applying these models early in the design process. This can considerably ease the process of model creation and can replace some types of costly user studies.Diese Dissertation beschreibt neuartige Verfahren in zwei wichtigen Bereichen der Mensch-Maschine-Kommunikation und erläutert Wege, diese geeignet zu verknüpfen. Zum einen spielt die Entwicklung von Prototypen insbesondere bei der Verwendung von benutzerzentrierten Entwicklungsverfahren eine besondere Rolle. Es werden daher auf der einen Seite eine ganze Reihe vorhandener Arbeiten vorgestellt und verglichen, die die Entwicklung prototypischer Anwendungen speziell im Bereich des Pervasive Computing unterstützen. Ein eigener Satz an Werkzeugen und Komponenten wird präsentiert, der viele der herausgearbeiteten Nachteile und Probleme solcher existierender Projekte aufgreift und entsprechende Lösungen anbietet. Mehrere Beispiele und eigene Arbeiten werden beschrieben, die auf dieser Architektur basieren und entwickelt wurden. Auf der anderen Seite werden neue Forschungsergebnisse präsentiert, die Erweiterungen von Methoden in der Benutzermodellierung speziell im Bereich der Abschätzung von Interaktionszeiten beinhalten. Mit diesen in der Dissertation entwickelten Erweiterungen können etablierte Konzepte wie das Keystroke-Level Model auf aktuelle und neuartige Interaktionsmöglichkeiten mit mobilen Geräten angewandt werden. Der Entwurf, das Erstellen sowie eine Validierung der Ergebnisse dieser Erweiterungen werden detailliert dargestellt. Ein dritter Teil beschäftigt sich mit Möglichkeiten die beiden beschriebenen Konzepte, zum einen Prototypenentwicklung im Pervasive Computing und zum anderen Benutzermodellierung, geeignet zu kombinieren. Vorhandene Ansätze werden untersucht und generische Integrationsmöglichkeiten beschrieben. Dies führt zu konkreten Implementierungen solcher Lösungen zur Integration in vorhandene Umgebungen, als auch in Form einer eigenen Applikation spezialisiert auf die Entwicklung von Programmen für mobile Geräte. Sie erlaubt das schnelle Erstellen von Prototypen, unterstützt das automatische Erstellen spezialisierter Benutzermodelle und ermöglicht den Einsatz dieser Modelle früh im Entwicklungsprozess. Dies erleichtert die Anwendung solcher Modelle und kann Aufwand und Kosten für entsprechende Benutzerstudien einsparen

    Control mechanisms for mobile terminals in heterogeneous access technology environments

    Get PDF
    Internet is evolving to become mobile and ubiquitous. As a consequence, there is a trend towards a diversification of the access technologies, as it can be seen with the recent appearance of wireless technologies such as WiFi or UMTS and the future deployment of WiMAX. Following these new opportunities, multi-technology terminals able to connect to the Internet through different technologies are appearing in the market. In this scenario, users start to demand new solutions able to use these new technologies in a transparent way from the user point of view. Foreseeing this demand, the IEEE started developing the specification IEEE 802.21, which enables multi-technology terminals to handover from one technology to another in a transparent way for the user. This specification has not yet being finished, and its deployment requires from the research community to analyze how to integrate it in current networks, how to achieve maximum benefit from its possibilities, and how to configure its parameters. In this thesis we propose control mechanisms for IP terminals to i) support efficient handovers in multi-technology environments applying the 802.21 framework and ii) allow the use of several interfaces and/or multiple providers by the terminals to improve the failure robustness of their communications. These mechanisms are focused in the terminal, although we also provide details on how to integrate IEEE 802.21 into nowadays operator's networks. The contributions of this thesis are threefold. In the first place the integration of 802.21 into terminals has been studied, focusing on the configuration of the parameters required to decide when to perform a handover in the case when the handover is initiated by the terminal. This analysis has also been done taking into account variables such as the terminal speed and the delay of the links. In the second place, we have studied how to introduce the Network Controlled Handover concept, using 802.21, into the network, including the possibility of the handover being initiated by the network. We have analyzed which are the main benefits of this approach and proposed and validated an implementation of this concept in 802.21. In third place we have analyzed a protocol, REAP, under development in the IETF, which allows terminals to detect and recover from failures in the links used in their communications. We have focused in the analytical characterization of the time required to detect a failure, since this parameter is crucial for the application's behavior. The applications should be able to cope with a failure without being disrupted by it. Through the analytical study performed, the REAP protocol can be properly configured to achieve a target recovery time. All the proposed mechanisms have been validated through simulation, using several tools such as OPNET, OMNET++ and MatlabLas tecnologías de acceso están evolucionando hacia un perfil móvil y ubicuo. Así mismo se está produciendo una diversificación en las tecnologías de acceso disponibles, con la proliferación de tecnologías inalámbricas como WiFi o UMTS y el despliegue próximo de WiMAX. Con la diversificación en el acceso aparecen también los primeros terminales multi-tecnología, capaces de utilizar diferentes redes simultáneamente. En este escenario, los usuarios empiezan a demandar soluciones y servicios capaces de utilizar estas tecnologías de forma transparente al usuario. Anticipándose a esta demanda, el IEEE comenzó la estandarización de la especificación 802.21 que permitirá a terminales multi-tecnología la posibilidad de realizar traspasos transparentes entre diferentes redes de acceso. Dicha especificación todavía no ha sido completada y su despliegue requiere la investigación de cómo integrarla en las redes actuales, cómo obtener el máximo beneficio de las posibilidades que presenta, así como de la configuración de sus parámetros. En la presente Tesis Doctoral proponemos una arquitectura que dota a terminales IP de mecanismos de control para i) soportar movilidad eficiente en entornos multi-tecnología en el marco de 802.21 y ii) permitir el uso de múltiples interfaces y/o proveedores con el objetivo de mejorar la robustez ante fallos en las comunicaciones. Dicha arquitectura se centra en el terminal aunque también se aportan detalles de cómo introducir las modificaciones requeridas por IEEE 802.21 en las redes de los operadores. Las contribuciones realizadas son varias. En primer lugar se ha estudiado la integración de IEEE 802.21 en un terminal, centrándonos en la configuración de los parámetros utilizados para determinar el momento del traspaso cuando éste es iniciado por el terminal. En segundo lugar se estudió cómo introducir, usando IEEE 802.21, el concepto de traspaso controlado por la red incluyendo la posibilidad de que la propia red sea la iniciadora del traspaso, analizando sus beneficios y aportando una propuesta de implementación dentro de IEEE 802.21. En tercer lugar analizamos un protocolo, REAP, que se está desarrollando dentro del IETF para permitir, desde los terminales, la detección y recuperación frente a fallos en los enlaces usados en sus comunicaciones. Dentro de este bloque nos centramos en la caracterización analítica del tiempo requerido para detectar un fallo ya que este parámetro es de vital importancia para el funcionamiento de las aplicaciones, que deben poder sobrevivir a un fallo sin verse completamente interrumpidas por él. Con el estudio analítico realizado es posible configurar REAP para alcanzar un tiempo determinado de recuperación ante fallo. Todos los mecanismos propuestos han sido validados mediante simulación empleando diversas herramientas como OPNET, OMNET++ y Matla

    Organization based multiagent architecture for distributed environments

    Get PDF
    [EN]Distributed environments represent a complex field in which applied solutions should be flexible and include significant adaptation capabilities. These environments are related to problems where multiple users and devices may interact, and where simple and local solutions could possibly generate good results, but may not be effective with regards to use and interaction. There are many techniques that can be employed to face this kind of problems, from CORBA to multi-agent systems, passing by web-services and SOA, among others. All those methodologies have their advantages and disadvantages that are properly analyzed in this documents, to finally explain the new architecture presented as a solution for distributed environment problems. The new architecture for solving complex solutions in distributed environments presented here is called OBaMADE: Organization Based Multiagent Architecture for Distributed Environments. It is a multiagent architecture based on the organizations of agents paradigm, where the agents in the architecture are structured into organizations to improve their organizational capabilities. The reasoning power of the architecture is based on the Case-Based Reasoning methology, being implemented in a internal organization that uses agents to create services to solve the external request made by the users. The OBaMADE architecture has been successfully applied to two different case studies where its prediction capabilities have been properly checked. Those case studies have showed optimistic results and, being complex systems, have demonstrated the abstraction and generalizations capabilities of the architecture. Nevertheless OBaMADE is intended to be able to solve much other kind of problems in distributed environments scenarios. It should be applied to other varieties of situations and to other knowledge fields to fully develop its potencial.[ES]Los entornos distribuidos representan un campo de conocimiento complejo en el que las soluciones a aplicar deben ser flexibles y deben contar con gran capacidad de adaptación. Este tipo de entornos está normalmente relacionado con problemas donde varios usuarios y dispositivos entran en juego. Para solucionar dichos problemas, pueden utilizarse sistemas locales que, aunque ofrezcan buenos resultados en términos de calidad de los mismos, no son tan efectivos en cuanto a la interacción y posibilidades de uso. Existen múltiples técnicas que pueden ser empleadas para resolver este tipo de problemas, desde CORBA a sistemas multiagente, pasando por servicios web y SOA, entre otros. Todas estas mitologías tienen sus ventajas e inconvenientes, que se analizan en este documento, para explicar, finalmente, la nueva arquitectura presentada como una solución para los problemas generados en entornos distribuidos. La nueva arquitectura aquí se llama OBaMADE, que es el acrónimo del inglés Organization Based Multiagent Architecture for Distributed Environments (Arquitectura Multiagente Basada en Organizaciones para Entornos Distribuidos). Se trata de una arquitectura multiagente basasa en el paradigma de las organizaciones de agente, donde los agentes que forman parte de la arquitectura se estructuran en organizaciones para mejorar sus capacidades organizativas. La capacidad de razonamiento de la arquitectura está basada en la metodología de razonamiento basado en casos, que se ha implementado en una de las organizaciones internas de la arquitectura por medio de agentes que crean servicios que responden a las solicitudes externas de los usuarios. La arquitectura OBaMADE se ha aplicado de forma exitosa a dos casos de estudio diferentes, en los que se han demostrado sus capacidades predictivas. Aplicando OBaMADE a estos casos de estudio se han obtenido resultados esperanzadores y, al ser sistemas complejos, se han demostrado las capacidades tanto de abstracción como de generalización de la arquitectura presentada. Sin embargo, esta arquitectura está diseñada para poder ser aplicada a más tipo de problemas de entornos distribuidos. Debe ser aplicada a más variadas situaciones y a otros campos de conocimiento para desarrollar completamente el potencial de esta arquitectura

    Advances in Grid Computing

    Get PDF
    This book approaches the grid computing with a perspective on the latest achievements in the field, providing an insight into the current research trends and advances, and presenting a large range of innovative research papers. The topics covered in this book include resource and data management, grid architectures and development, and grid-enabled applications. New ideas employing heuristic methods from swarm intelligence or genetic algorithm and quantum encryption are considered in order to explain two main aspects of grid computing: resource management and data management. The book addresses also some aspects of grid computing that regard architecture and development, and includes a diverse range of applications for grid computing, including possible human grid computing system, simulation of the fusion reaction, ubiquitous healthcare service provisioning and complex water systems
    corecore