WAWC’05 Enhancing Mobile Peer-To-Peer Environment with Neighborhood Information Arto Hämäläinen -

Slides:



Advertisements
Similar presentations
Web Services Architecture An interoperability architecture for the World Wide Service Network.
Advertisements

I/O Organization popo.
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A 1 September 2005MC-SSL Simulation 1 Analysis of Scalable Security – MC-SSL Simulation Reducing.
A mobile single sign-on system Master thesis 2006 Mats Byfuglien.
Part 2: Preventing Loops in the Network
HCE AND BLE UNIVERSITY TOMORROWS TRANSACTIONS LONDON, 20 TH MARCH 2014.
Design and Implementation of the OLSR Protocol in an Ad Hoc Framework Juan Gutiérrez Plaza Supervisor: Raimo Kantola Instructor: José Costa Requena Networking.
Lesson 1-Introducing Basic Network Concepts
Technical Architectures
MOBILITY SUPPORT IN IPv6
A first Demonstrator for a CAHN infrastructure Bluetooth in CAHN.
Service Based Task Migration in Ubiquitous Environment Jari Porras 5th Workshop on Applications of Wireless Communications Lappeenranta, August 15th, 2007.
Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.
OUTLINE WHAT ? HOW ? WHY ? BLUEPOST Poster and Message Content Specified by the User Displaying the Poster Content on a Monitor Sending Messages to.
WSN Simulation Template for OMNeT++
Bonrix Track & Trace System A GPS Based Vehicle Tracing System (SMS, GPRS/3G, Offline) Bonrix Software Systems Ahmedabad (INDIA) Website:
Blue Tears Project Bluetooth Tracking: Distributed Information Systems.
Boyu Chen Yulin Xia Haoyu Xu Viterbi School of Engineering University of Southern California P2P file sharing system with a central server.
Mobility in the Virtual Office: A Document-Centric Workflow Approach Ralf Carbon, Gregor Johann, Thorsten Keuler, Dirk Muthig, Matthias Naab, Stefan Zilch.
Query Processing in Mobile Databases
© Siemens 2006 All Rights Reserved 1 Challenges and Limitations in a Back-End Controlled SmartHome Thesis Work Presentation Niklas Salmela Supervisor:
Wireless Ad Hoc VoIP Thesis by: Patrick Stuedi & Gustavo Alonso Presentation by: Anil Kumar Marukala & Syed Khaja Najmuddin Ahmed.
Networking Components By: Michael J. Hardrick. HUB  A low cost device that sends data from one computer to all others usually operating on Layer 1 of.
UNITRONICS GPRS.
Control Over WirelessHART Network S. Han, X. Zhu, Al Mok University of Texas at Austin M. Nixon, T. Blevins, D. Chen Emerson Process Management.
Enabling Workflow in UPnP Networks Andreas BobekUniversity of Rostock Faculty of Computer Science and Electrical Engineering Andreas Bobek, Hendrik Bohn,
Basic Network Concepts Introduction to Computing Lecture#28.
Bluetooth Kirthika Parmeswaran Telcordia Technologies OOPSLA’2000.
Wei Gao1 and Qinghua Li2 1The University of Tennessee, Knoxville
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Software Architecture Framework for Ubiquitous Computing Divya ChanneGowda Athrey Joshi.
TF-DI Meeting 13-Aug Agenda Discovery presentation from William Miller Review of discussions at F2F Sunnyvale Interaction patterns of tech landscape.
Rev PA102/03/20041 Communication Between Peer Wireless Sensor Networks over 2.5G/3G Mobile Networks Srdjan Krco R&D Ericsson Ireland
CHAPTER 3 TOP LEVEL VIEW OF COMPUTER FUNCTION AND INTERCONNECTION
CELLULAR DATA NETWORKS Mr. Husnain Sherazi Lecture 5.
SP1 – Meeting March 1 st - 2nd 2007 – Pontedera (Pisa) Electronic Systems 1 Integrated Project Co-operative Systems for Road Safety “Smart Vehicles on.
Your Name Your Title Your Organization (Line #1)‏ Your Organization (Line #2)‏ WSN in enhancing exercise experience in personal fitness Goran.
Blue Tears Project Bluetooth Tracking: Distributed Information Systems.
Open Service Gateway Initiative (OSGi) Reporter : 林學灝 侯承育 1.
Hybrid Cellular-Ad hoc Data Network Shuai Zhang, Ziwen Zhang, Jikai Yin.
Engineering Workshops Purposes of Neighbor Solicitation.
Work Group / Work Item Proposal Slide 1 © 2012 oneM2M Partners oneM2M-TP oneM2M_Work_Group_Work_Item_Proposal Group name: Technical Plenary Source:
Standards and Protocols Slide show for WiFi Characteristics of a wireless local network. It was named after a group of people who invented. The.
Experience Sharing in Mobile Peer Communities EPI Planete, INRIA International Consortium Meeting (Oulou) 10 June, 2009.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
1 Service Sharing with Trust in Pervasive Environment: Now it’s Time to Break the Jinx Sheikh I. Ahamed, Munirul M. Haque and Nilothpal Talukder Ubicomp.
Home Networking. The Smith Family This is the house the Smiths live in. Can you spot their digital devices?
Jini Architecture Introduction System Overview An Example.
ICS 156: Networking Lab Magda El Zarki Professor, ICS UC, Irvine.
Web Services An Introduction Copyright © Curt Hill.
Doc.: IEEE Submission November 2003, Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission.
The Personal Server Changing the Way We Think About Ubiquitous Computing Roy Want, et al. / Intel Research UBICOMP 2002 Nov Seungjae Lee
IT3002 Computer Architecture
E81 CSE 532S: Advanced Multi-Paradigm Software Development Venkita Subramonian, Christopher Gill, Ying Huang, Marc Sentany Department of Computer Science.
Communication and Security in Machine-to-Machine Systems Date │ Reporter │ 李雅樺 1.
Slide 1 2/22/2016 Policy-Based Management With SNMP SNMPCONF Working Group - Interim Meeting May 2000 Jon Saperia.
Wireless Mesh Networking or Peer to Peer Technology Andre Lukito – Johnsonsu – Wednesday, 9.
Nguyen Thi Thanh Nha HMCL by Roelof Kemp, Nicholas Palmer, Thilo Kielmann, and Henri Bal MOBICASE 2010, LNICST 2012 Cuckoo: A Computation Offloading Framework.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Resolve common problems with wired and wireless networks. Objective – 2%
1INTRODUCTION TO NETWORKING. Objective Introduction to networks. Need for networks. Classification of networks. 2INTRODUCTION TO NETWORKING.
1 Wireless Networks Lecture 17 GPRS: General Packet Radio Service (Part I) Dr. Ghalib A. Shah.
SOURCE:2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING AUTHER: MINGLIU LIU, DESHI LI, HAILI MAO SPEAKER: JIAN-MING HONG.
A Semi-Automated Digital Preservation System based on Semantic Web Services Jane Hunter Sharmin Choudhury DSTC PTY LTD, Brisbane, Australia Slides by Ananta.
Proposal on system description, reference model and draft outline
Chapter 3: Dynamic Routing
* Essential Network Security Book Slides.
Mobile Computing.
A mobile single sign-on system
Examples of deployment scenarios
Presentation transcript:

WAWC’05 Enhancing Mobile Peer-To-Peer Environment with Neighborhood Information Arto Hämäläinen -

2 Outline Introduction to PeerHood - a Peer-to-Peer neighborhood –overall structure and detailed technical architecture Neighborhood Information exchange Usage Scenarios Evaluation

3 PeerHood - Peer-to-peer neighborhood PeerHood is an environment consisting a number of personal trusted devices (PTDs), e.g. mobile phone, PDA, laptops PTDs sense their neighbors in the changing mobile environment using different network technologies PeerHood layer in PTD

4 PTDs and their neighborhoods

5 PeerHood - Peer-to-peer neighborhood Methods for searching depend on used network plug-in –In Bluetooth, its device and service discovery mechanisms are used, own methods in Wi-Fi and GPRS –Devices found are then stored in the local device database PeerHood provides a common network interface to connect to other PeerHood devices - independent from the underlying communications technology

6 PeerHood components

7 PeerHood class diagram

8 PeerHood library interface Applications in PTD can send requests for the PeerHood daemon through the PeerHood library –Available functions include methods to list available devices and services, register and unregister local services offered by the application and to connect remote devices and services –Library interface also includes common read and write methods Same read and write methods for every network plugin

9 Neighborhood information exchange Neighborhood information exchange is used to gather information about the neighboring devices from already discovered devices –Possibly revealing undiscovered devices and services –It can be used to speed up the device and service discovery and locate services not reachable with network technology currently in use –The neighborhood information exchange can either be enabled or disabled in devices, more detailed configuration is planned

10 Neighborhood information exchange Neighborhood information exchange is carried out by the PeerHood daemon –It’s enabled or disabled using the configuration file or manually registering local neighborhood info service through the PeerHood library interface –If a remote device offers neighborhood information service, request is sent to the device and response is stored in local device database with the information about the offering device

11 Neighborhood information exchange, usage scenarios Personal networking outside the immediate vicinity –interesting services found through neighborhood information exchange could be reached using longer range technology or via gateway device Exchange of detailed device information –Service-specific information offered Dedicated service discovery –Mobile device could use a dedicated device to carry out their device discovery (e.g. office/home PC) to save own batteries

12 Neighborhood information exchange Device discoveries may fail, and neighborhood info can be used to get information about undiscovered devices

13 Evaluation To evaluate the neighborhood information exchange, ten tests were carried out with and without it - in a situation corresponding to MSC in previous slide Fixed and mobile devices had different intervals in device discovery Time taken to find two other PeerHood devices was measured

14 Conclusions and future work Neighborhood information exchange can be used to speed up device discovery in peer-to-peer environment and to find out devices outside the immediate vicinity or use alternative device discovery solutions Further work is still needed –the roles and nature of different devices needs to be defined and implemented –security and trust issues to be addressed as well as more detailed configuration of operation