140 research outputs found

    A Taxonomy of Self-configuring Service Discovery Systems

    Get PDF
    We analyze the fundamental concepts and issues in service discovery. This analysis places service discovery in the context of distributed systems by describing service discovery as a third generation naming system. We also describe the essential architectures and the functionalities in service discovery. We then proceed to show how service discovery fits into a system, by characterizing operational aspects. Subsequently, we describe how existing state of the art performs service discovery, in relation to the operational aspects and functionalities, and identify areas for improvement

    Research Issues in Ad-Hoc Distributed Personal Networking

    Get PDF
    This paper discusses the research issues that need to be addressed in order to create a personal distributed environment where people interact with various companion, embedded, or invisible computers not only in their close vicinity but potentially anywhere. These systems are called personal networks (PNs). They constitute a category of distributed systems with very specific characteristics. They are configured in an ad hoc fashion, as the opportunity and the demand arise, to support personal applications. PNs consist of communicating clusters of personal digital devices, devices shared with other people and even infrastructure-based systems. At the heart of a PN is a core Personal Area Network (PAN), which is physically associated with the owner of the PN. Unlike the present PANs that have a geographically limited coverage, the Personal Operating Space, PNs have an unrestricted geographical span, and incorporate devices into the personal environment regardless of their geographic location. In order to do this they need the services of infrastructure-based networks and ad-hoc networks to extend their reach. A PN extends and complements the concept of pervasive computing. We show that PNs introduce new design challenges due to the heterogeneity of the involved technologies, the need for self-organization, the dynamics of the system composition, the application-driven nature, the co-operation with infrastructure-based networks, and the security hazards. We discuss the impact of these problems on network design, assess present and proposed solutions, and identify the research issues

    Context discovery using attenuated Bloom codes: model description and validation

    Get PDF
    A novel approach to performing context discovery in ad-hoc networks based on the use of attenuated Bloom filters is proposed in this report. In order to investigate the performance of this approach, a model has been developed. This document describes the model and its validation. The model has been implemented in Matlab, and results are also shown in this document. Attenuated Bloom filters appear to be a very promising approach for context discovery in ad hoc networks compared to conventional solutions. The results show that using attenuated Bloom filters in context discovery can well save traffic load in a fully distributed ad hoc network in practical situations

    Architecture and Protocols for Service and Application Deployment in Resource Aware Ubiquitous Environments

    Get PDF
    Realizing the potential of pervasive computing will be predicated upon the availability of a flexible, mobility-aware infrastructure and the technologies to support seamless service management, provisioning and delivery. Despite the advances in routing and media access control technologies, little progress has been made towards large-scale deployment of services and applications in pervasive and ubiquitous environments. The lack of a fixed infrastructure, coupled with the time-varying characteristics of the underlying network topology, make service delivery challenging. The goal of this research is to address the fundamental design issues of a service infrastructure for ubiquitous environments and provide a comprehensive solution which is robust, scalable, secure and takes into consideration node mobility and resource constraints. We discuss the main functionalities of the proposed architecture, describe the algorithms for registration and discovery and present a power-aware location-driven message forwarding algorithm to enable node interaction in this architecture. We also provide security schemes to ensure user privacy in this architecture. The proposed architecture was evaluated through theuse of simulations. The results show that the service architecture is scalable and robust, even when node mobility is high. The comparative analysis shows that our message forwarding algorithm consistently outperforms contemporary location-driven algorithms. Furthermore, thisresearch work was implemented as a proof-of-concept implementation and tested on a real world scenario

    Extensible Modeling and Simulation Framework (XMSF) Opportunities for Web-Based Modeling and Simulation

    Get PDF
    Technical Opportunities Workshop Whitepaper, 14 June 2002Purpose: As the Department of Defense (DoD) is engaged in both warfighting and institutional transformation for the new millennium, DoD Modeling & Simulation (M&S) also needs to identify and adopt transformational technologies which provide direct tactical relevance to warfighters. Because the only software systems that composably scale to worldwide scope utilize the World Wide Web, it is evident that an extensible Web-based framework shows great promise to scale up the capabilities of M&S systems to meet the needs of training, analysis, acquisition, and the operational warfighter. By embracing commercial web technologies as a shared-communications platform and a ubiquitous-delivery framework, DoD M&S can fully leverage mainstream practices for enterprise-wide software development

    Greenpass Client Tools for Delegated Authorization in Wireless Networks

    Get PDF
    Dartmouth\u27s Greenpass project seeks to provide strong access control to a wireless network while simultaneously providing flexible guest access; to do so, it augments the Wi-Fi Alliance\u27s existing WPA standard, which offers sufficiently strong user authentication and access control, with authorization based on SPKI certificates. SPKI allows certain local users to delegate network access to guests by issuing certificates that state, in essence, he should get access because I said it\u27s okay. The Greenpass RADIUS server described in Kim\u27s thesis [55] performs an authorization check based on such statements so that guests can obtain network access without requiring a busy network administrator to set up new accounts in a centralized database. To our knowledge, Greenpass is the first working delegation-based solution to Wi-Fi access control. My thesis describes the Greenpass client tools, which allow a guest to introduce himself to a delegator and allow the delegator to issue a new SPKI certificate to the guest. The guest does not need custom client software to introduce himself or to connect to the Wi-Fi network. The guest and delegator communicate using a set of Web applications. The guest obtains a temporary key pair and X.509 certificate if needed, then sends his public key value to a Web server we provide. The delegator looks up her guest\u27s public key and runs a Java applet that lets her verify her guests\u27 identity using visual hashing and issue a new SPKI certificate to him. The guest\u27s new certificate chain is stored as an HTTP cookie to enable him to push it to an authorization server at a later time. I also describe how Greenpass can be extended to control access to a virtual private network (VPN) and suggest several interesting future research and development directions that could build on this work.My thesis describes the Greenpass client tools, which allow a guest to introduce himself to a delegator and allow the delegator to issue a new SPKI certificate to the guest. The guest does not need custom client software to introduce himself or to connect to the Wi-Fi network. The guest and delegator communicate using a set of Web applications. The guest obtains a temporary key pair and X.509 certificate if needed, then sends his public key value to a Web server we provide. The delegator looks up her guest\u27s public key and runs a Java applet that lets her verify her guests\u27 identity using visual hashing and issue a new SPKI certificate to him. The guest\u27s new certificate chain is stored as an HTTP cookie to enable him to push it to an authorization server at a later time. I also describe how Greenpass can be extended to control access to a virtual private network (VPN) and suggest several interesting future research and development directions that could build on this work

    Building blocks for the internet of things

    Get PDF

    Integration of e-business strategy for multi-lifecycle production systems

    Get PDF
    Internet use has grown exponentially on the last few years becoming a global communication and business resource. Internet-based business, or e-Business will truly affect every sector of the economy in ways that today we can only imagine. The manufacturing sector will be at the forefront of this change. This doctoral dissertation provides a scientific framework and a set of novel decision support tools for evaluating, modeling, and optimizing the overall performance of e-Business integrated multi-lifecycle production systems. The characteristics of this framework include environmental lifecycle study, environmental performance metrics, hyper-network model of integrated e-supply chain networks, fuzzy multi-objective optimization method, discrete-event simulation approach, and scalable enterprise environmental management system design. The dissertation research reveals that integration of e-Business strategy into production systems can alter current industry practices along a pathway towards sustainability, enhancing resource productivity, improving cost efficiencies and reducing lifecycle environmental impacts. The following research challenges and scholarly accomplishments have been addressed in this dissertation: Identification and analysis of environmental impacts of e-Business. A pioneering environmental lifecycle study on the impact of e-Business is conducted, and fuzzy decision theory is further applied to evaluate e-Business scenarios in order to overcome data uncertainty and information gaps; Understanding, evaluation, and development of environmental performance metrics. Major environmental performance metrics are compared and evaluated. A universal target-based performance metric, developed jointly with a team of industry and university researchers, is evaluated, implemented, and utilized in the methodology framework; Generic framework of integrated e-supply chain network. The framework is based on the most recent research on large complex supply chain network model, but extended to integrate demanufacturers, recyclers, and resellers as supply chain partners. Moreover, The e-Business information network is modeled as a overlaid hypernetwork layer for the supply chain; Fuzzy multi-objective optimization theory and discrete-event simulation methods. The solution methods deal with overall system parameter trade-offs, partner selections, and sustainable decision-making; Architecture design for scalable enterprise environmental management system. This novel system is designed and deployed using knowledge-based ontology theory, and XML techniques within an agent-based structure. The implementation model and system prototype are also provided. The new methodology and framework have the potential of being widely used in system analysis, design and implementation of e-Business enabled engineering systems
    • ā€¦
    corecore