1/14/2016 11:59 PM1/14/2016 11:59 PM1/14/2016 11:59 PM Research overview Koen Victor, 12/2007.

Slides:



Advertisements
Similar presentations
SIP and Instant Messaging. SIP Summit SIP and Instant Messaging What Does Presence Have to Do With SIP? How to Deliver.
Advertisements

VON Europe /19/00 SIP and the Future of VON Protocols SIP and the Future of VON Protocols: Presence and IM Jonathan Rosenberg.
Fall VoN 2000 SIP for IP Communications Jonathan Rosenberg Chief Scientist.
Doc.: IEEE /0046r0 Submission July 2009 Ari Ahtiainen, NokiaSlide 1 A Cooperation Mechanism for Coexistence between Secondary User Networks on.
ProAssist ® complex assistance services management system Global Assistance & INGENIUM Praha.
H. 323 Chapter 4.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Speaker: Cathrin Weiß 11/23/2004 Proseminar Peer-to-Peer Information Systems.
Study of Hurricane and Tornado Operating Systems By Shubhanan Bakre.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
MobiShare: Sharing Context-Dependent Data & Services from Mobile Sources Efstratios Valavanis, Christopher Ververidis, Michalis Vazirgianis, George C.
A Context Aware Framework Mark Assad Supervisor: Bob Kummerfeld.
6/1/2015Ch.31 Defining Enterprise Architecture Bina Ramamurthy.
PZ13B Programming Language design and Implementation -4th Edition Copyright©Prentice Hall, PZ13B - Client server computing Programming Language.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
© 2005 Prentice Hall7-1 Stumpf and Teague Object-Oriented Systems Analysis and Design with UML.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
Abstract Shortest distance query is a fundamental operation in large-scale networks. Many existing methods in the literature take a landmark embedding.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Switched Networks Routing and Switching.
Client/Server Architecture
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Audumbar Chormale Advisor: Dr. Anupam Joshi M.S. Thesis Defense
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
N-Tier Architecture.
Cellular Networks How do Mobile & Satellite Phones work? What can we do with them?
Terminal Services in Windows Server ® 2008 Infrastructure Planning and Design.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Introduction to the Mobile Security (MD)  Chaitanya Nettem  Rawad Habib  2015.
Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Requirements II: Task Analysis. Objectives By the end of the class, you will be able to… Write detailed task descriptions to inform design. Create scenarios.
Configurable User Interface Framework for Cross-Disciplinary and Citizen Science Presented by: Peter Fox Authors: Eric Rozell, Han Wang, Patrick West,
A Delaunay Triangulation Architecture Supporting Churn and User Mobility in MMVEs Mohsen Ghaffari, Behnoosh Hariri and Shervin Shirmohammadi Advanced Communications.
1 CMPT 275 High Level Design Phase Architecture. Janice Regan, Objectives of Design  The design phase takes the results of the requirements analysis.
M i SMob i S Mob i Store - Mobile i nternet File Storage Platform Chetna Kaur.
Master Thesis Defense Jan Fiedler 04/17/98
 An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network.
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG.
A Comparative Study of Signaling Protocols for Data Management and Synchronization # Department of Computer Engineering, Kocaeli University.
Cerberus: A Context-Aware Security Scheme for Smart Spaces presented by L.X.Hung u-Security Research Group The First IEEE International Conference.
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES Lesson №18 Telecommunication software design for analyzing and control packets on the networks by using.
GroupWise Transition to Outlook Computer Training Solutions (CTS)
FDT Foil no 1 On Methodology from Domain to System Descriptions by Rolv Bræk NTNU Workshop on Philosophy and Applicablitiy of Formal Languages Geneve 15.
A policy-based per-flow mobility management system design
INRIA - Progress report DBGlobe meeting - Athens November 29 th, 2002.
SelfCon Foil no 1 Variability in Self-Adaptive Systems.
Lecture 4 Mechanisms & Kernel for NOSs. Mechanisms for Network Operating Systems  Network operating systems provide three basic mechanisms that support.
Providing web services to mobile users: The architecture design of an m-service portal Minder Chen - Dongsong Zhang - Lina Zhou Presented by: Juan M. Cubillos.
Renesas Electronics America Inc. © 2010 Renesas Electronics America Inc. All rights reserved. Overview of Ethernet Networking A Rev /31/2011.
20 Copyright © 2008, Oracle. All rights reserved. Cache Management.
Enterprise Computing with Jini Technology Mark Stang and Stephen Whinston Jan / Feb 2001, IT Pro presented by Alex Kotchnev.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
Copyright 2007, Information Builders. Slide 1 iWay Web Services and WebFOCUS Consumption Michael Florkowski Information Builders.
C ONTEXT AWARE SMART PHONE YOGITHA N. & PREETHI G.D. 6 th SEM, B.E.(C.S.E) SIDDAGANGA INSTITUTE OF TECHNOLOGY TUMKUR
Secure Access and Mobility Jason Kunst, Technical Marketing Engineer March 2016 Location Based Services with Mobility Services Engine ISE Location Services.
Planning File and Print Services Lesson 5. File Services Role The File Services role and the other storage- related features included with Windows Server.
Do Check The Following Points Before You Call A Printer Technical Support Team
Overview Issues in Mobile Databases – Data management – Transaction management Mobile Databases and Information Retrieval.
IP and MAC Addresses, DNS Servers
Introduction Wireless devices offering IP connectivity
Project Management: Messages
Resource Management IB Computer Science.
Full Page Watermarking
1st Draft for Defining IoT (1)
MICROSOFT OUTLOOK and Outlook service Provider
Elevator Inspection System
Location Information Services
MobileMAN Workshop 2 Cambridge 2 –
Cloud Computing.
Presentation transcript:

1/14/ :59 PM1/14/ :59 PM1/14/ :59 PM Research overview Koen Victor, 12/2007

12/ Topics Introduction  Goal of this work  Two examples  Problem description Approach  Addressing scheme Design Notation Coupling with the Overlay Network Mapping to the Overlay Network  Overlay network Design & Structure Functionality  Architecture Related Work

Problem In an unstructured mobile network, addressing data / devices / services is hard (objects):  Name of the object  Exact address in the network  -> Implies knowledge the user may not have Much information that is available to the user cannot be used to address objects  Contextual information  Relational information When an object connects to a network, it needs to integrate in the existing infrastructure 12/2007 3

4 Example: event in Yolande’s agenda Traditional way: synchronize via central server Central Calender System Need exact address of CSS: Internet access Could both be online and available, but CSS offline Not known whether this is the best way to schedule a meeting Both need to synchronize to have the latest CSS information

Example: event in Yolande’s agenda Proposed way: context supported addressing 12/ Where is Yolande? Does she have an agenda? Where is it? (How) Does she want to be notified now?

12/ Example: print on nearest printer Traditional way: name printer using location p2a-duplex p2a-slide p1a p4a p3a Know the naming scheme Default printer is not always the closest Unavailable printer

12/ Example: print on nearest printer Proposed way: context supported addressing p2a-duplex p2a-slide p1a p4a p3a “Print this document on the printer that is closest to me”

Example: print on nearest printer Proposed way: context supported addressing Several questions:  Where is the person printing the document?  What are the nearest printers?  What of these printers are suitable?  What of these are available? Alternative addresses: “Print this document on the printer that is closest to my desk” 12/2007 8

9 Goal of this work Address objects using  Specification of object features  Specification of context of the object In an unstructured mobile network  As seen by the user  Possibly with gateways to Internet or other networks  User doensn’t deal with network related issues Facilitating:  Knowing whether the object is addressable  Knowing whether the object is available  Communication via the real network address, and higher level protocols Meaning of address depends on its context

Advantages Meaning of address depends on context  Fixed address may become invalid when context changes e.g. printer closest to me No knowledge of network, infrastructure, technical details, availability… necessary  These parameters are filled in by contextual information e.g. no obligatory calendar synchronization Depends on all interested parties: e.g. by both issuer and addressee  Me: ‘printers nearest to me’  Sysadmin: ‘for which ‘me’ has access’ One simple address specification may deal with a lot of contextual information and policies 12/

12/ Building blocks Address notation  Flexible enough to specify a variety of addresses  Stringent enough to allow address checking and avoid unnecessary ambiguity Reasoning & Selection  What does the address mean?  What is the relevant context information / policies in the network? Searching  Where to find the relevant context information?  Where to find inference schemes to do reasoning? Structuring & Storing  How to allow new objects to the network?

12/ Topics Introduction  Goal of this work  Two examples  Problem description Approach  Addressing scheme Design Notation Coupling with the Overlay Network Mapping to the Overlay Network  Overlay network Design & Structure Functionality  Architecture Related Work

12/ Addressing Scheme Design plan context-based infrastructuredevelop routing strategiesdesign addressing scheme create structured address assignment model choose address allocation method plan configuration strategyplan security, QOSimprove availabilitytest Overlay networkOverlay network

14 Addressing Scheme Design “Place a meeting in the agenda of Yolande” Address is as simple as possible Ambiguity: there may be several Yolandes contextual parameters from the initiating application: Yolande of the research group Complete the address with Ambiguity: there may be several of her devices with the calendar application Complete the address with contextual parameters from the network: where is she now? (synchronization is application dependent)

Addressing Scheme 12/ “Place a meeting in the agenda of Yolande” Address is as simple as possible Ambiguity: are there preferences relating to scheduling of meetings? (phone, , calendar, not now) contextual parameters from the target: Right now, you should phone me Complete the address with Design Address Sender Context Network Context Target Context The address is completed by context information: context supported addressing

12/ Addressing Scheme Notation Flexible enough to specify a variety of addresses Stringent enough to allow address checking and avoid unnecessary ambiguity Independent of technical details (network, availability) Independent of practical details (Location of the target, target’s preferences, …) Allows to ‘fill in’ contextual information Should be adaptable to the application’s type of requests

Addressing Scheme Quite intuitive: Example address: Agenda(a),.owns(a) Or more specific: Agenda(a),.owns(a),.headOf( ),.isMobile Other way of specifying this: Application(a),.supports(a), Application.type(a) == agenda 12/ Notation example

Addressing Scheme Agenda(a),.owns(a) : system looks up what it means, depending on context Additionally, you can be more specific: Person(term) : the term is of type person Instances: Person( ) y, y.fullname(“Yolande Berbers”), y.headOf( ) If ‘embedded’ is not further specified, from the context (Yolande, Koen) the system can infer: embedded group 12/ Notation example

12/ Addressing Scheme Coupling with the overlay network No explicit coupling with the overlay However, the knowledge in the overlay will determine the result of a request Objects may be located but not able to communicate Objects may leave Therefore, there are 4 possible answers to a request: 1.Network address / list of network addresses 2.Object not found, but address valid 3.Object found, but not available 4.Address not valid

12/ Addressing Scheme Mapping to the overlay network Addresses can not be mapped directly to the overlay Search for objects and context specification used in the address using known search techniques Inspect relations, compare to address Search for context information needed for the context reasoning pda phone Second floor of CW Printer p2a CSS Embedded Taskforce

12/ Topics Introduction  Goal of this work  Two examples  Problem description Approach  Addressing scheme Design Notation Coupling with the Overlay Network Mapping to the Overlay Network  Overlay network Design & Structure Functionality  Architecture Related Work

12/ Overlay Network Tasks: Given a physical network network with context aware devices: structure Be able to provide one of the 4 answers Optimize for searching Allow queries for every object or context information in the network Allow queries for associations between these objects or information (needed for reasoning) Connect & integrate new objects to the overlay Fucti- onality

12/ Overlay Network Build as a semantic network, using associations between both context and objects Associations  Semantic, Temporal, Spatial, Procedural  Examples Spatial: CloseTo(A,B, distance) with distance Exact(20,m) or Fuzzy(visible) Semantic: isInterface(Interface#4864, SonyBravia#4864) Temporal: UsageFrequency(5 times / day, average) Procedural: isRemoteFor([Remote#12,Remote #6864], Interface#4864)  Object or context information points to other objects or context using associations.  Following these pointers is equal to navigating through the network Design & structure

12/ Overlay Network Objects & context that has the same association is grouped: context groups Examples  5th floor in CW building (a)  Printers in CW building (b)  Computers with internet access (e)  Objects that are accessed at least 2 times / minute (c)  All objects used by application X (d) Enpowers:  Searching: (a) * (b) -> Printers on the 5th floor in CW building  Optimalisation: (c) * (d) -> Place all frequently accessed objects near to application X  Backup all objects used by X on another network (e) Design & structure

Overlay Network Admission of objects / information to the network  Detect possible associations between the new objects / information and the environment  Make detected associations, join context groups Detection using adapted form of flooding: context-aware flooding  Format: object, distribution criteria, max_hardhops, max_softhops  Flooding bounded to relevant environment  Reference to relevant objects is returned -> possible association  If object is relevant in large environment -> new group candidate 12/ Design & structure

12/ Architecture Application Layer Context Supported Addressing Context Reasoning Search Algorithms Inference & Decision Engine Overlay Network Presence Management Searching Algorithms Optimalisation, QOS Persistence Management Network Layer RoutingQOSConnection Management