SlideShare a Scribd company logo
1 of 61
 The Telecom Market and Evolution of Cellular
Standards
 Infrastructure will support diverse range of data services
 Currently data usage is low
 Mobile telephony is much more popular than fixed systems
 Asia Pacific, Middle East and Africa has tremendous potential for
subscription (around 17-20% currently)
 Subscribers do not prefer to pay more for innovative services
 Mobile devices evolved incrementally to support camera, gaming, e-
wallet, mp3 player
 Operators have diverse standards which makes subscriber’s life
difficult (e.g. call forward, voicemail)
 Opportunity is to have IP enabled infrastructure for all the services
 Mobile devices are supporting multiple network interfaces
 Services bundling can be interesting from user point view
 IP enabled network supports all possible Multi-Media services
 The Telecom Market and Evolution of Cellular
Standards
 IP, SIP and IMS (IP Multimedia Subsystem)
 IMS control: Rules, SIP: Map, IP: Roads
 Multi-Vendor and Multi-Operator IMS can run on
top of diverse networks
 The Telecom Market and Evolution of Cellular Standards
 HSPA: High Speed PAcket Access
 SPEED: Higher bit rates 40 / 10 Mbps
 Reduced delay
 Capacity: Targeting almost double number of VoIP users
 The key is that the user should be able to afford the technology in terms of money
 2Q06: Mobile phone with HSDPA with 1.8 Mbps, PC card with 3.6 Mbps
 2H06: Volume handsets 3.6 Mbps
 1H07: PC cards and handsets with 7.2 Mbps DL
 Enhanced uplink support, 1.46 Mbps
 GPRS, EDGE, WCDMA, HSDA chipsets are lightweight
 WiMax (Wireless Broadband) X HSPA (Mobile Broadband) have different starting points –
different use
 3G LTE (Long Term Evolution): Multiple Receivers on a mobile device
 3G LTE testbed: Up to peak 100 Mbps DL and 20 Mbps UL
 In short: The cellular networks are going to provide substantial data rates for DL/UL
 Future looks good!
 Mobility Metrics to Enable Adaptive Routing in
MANET (Carleton University, Canada)
 Mobile nodes adjusts its routing behavior individually based
on its environment to improve routing performance
 Need to generalize adaptiveness in the routing protocols
 Change routing params based on environment
 Mobility metrics: Parameters that represent current mobility
status a node can monitor: no. of link breaks, relative mobility,
link duration
 If every node can adjust its routing behavior based on network
conditions around it, the protocol performance can be
improved!
 The knowledge of link breaks can be used to tune the protocol
params e.g. hello interval for improved performance
 Routing with uncertainty in the position of the
destination (Carleton University, Canada)
 For position based routing algorithms
 What if the source is uncertain about the position of
the destination? (source may have knowledge about
destination’s speed)
 2 phases: Reach some node in the region
 Flooding is resource intensive and still does not guarantee
delivery if the node has moved outside the region
 Hybrid approaches are proposed to improve delivery rate
and reduce transmission cost
 Multi-path routing based secure data
transmission in Ad Hoc networks (Washington
State Uni., VS)
 Detecting misbehaving nodes which ca drop the
packets going to the destination
 Multipath routing combined with feedback
mechanism
 Remove the misbehaving path from the source’s
cache
 Sybil attack (a node keeps multiple identities) fails
the scheme
 A mobility prediction based weighted
clustering algorithm using local cluster-heads
election for QoS in MANETs (Univ. of Guelph,
Canada)
 Not presented
 A Fault Tolerant Routing Algorithm for Mobile
Ad Hoc Networks Using a Stochastic Learning
Based Weak Estimation Procedure (Carleton
University, Canada)
 Fault tolerance is important because of adversarial
conditions in MANET
 Use stochastic learning
 Cooperative Caching with Adaptive Prefetching in
MANET (University of Guelph, Canada)
 Caching in MANET can be used for data caching, route caching
 Proposed work combines cooperative caching with prefetching
 Uses clusturing architecture to reduce overhead
 Uses hybrid cache replacement policy
 Cooperative: Neighbor store items and provide them
 Prefetching: Proactively fetching most frequently accessed data
 Increases data accessibility ratio and query delay at lower
prefetch thresholds and larger cache sizes
 An Abstract Model for Supporting
Interoperability in MANET (American
University of Beirut, Lebanon)
 Consider the situation where mobile node is
facilitated with multiple network interfaces
 Proposes communication abstract model supporting
interoperability and coexistence between
heterogeneous mobile devices
 Communication service layer, capability layer,
interface layer
 A Tabu Search Heuristics for the Global
Planning of UMTS Networks (Ecole
Polytechnique de Montreal, Canada)
 Tabu search heuristics for global planning problem –
cell planning, access network planning, core network
planning
 Indoor wLAN planning with a QoS constraint
based on a Markovian Performance Evaluation
Model (INSA Lyon, France)
 Get the best possible network QoS configuration
 Realistic planning solutions with limited
computational load
 Optimization criteria: coverage, interference
avoidance, throughput guarantee (mean available
bandwidth to the user)
 However, is static approach, does not take into
account dynamic behavior of the users
 Performance (evaluation) of multi-interface
based wireless mesh backbone to support VoIP
service delivery (CTTC, Spain)
 For 802.11 based network to provide VoIP services
 The available E-Model predicts the voice quality of a
phone call using transmission params to provide
numerical indication of quality of a call (R-Factor)
 The degradation occurs because when number of
subscribers increase, the nodes compete for channel
access with other nodes located beyond their
transmission range, thus increasing delay
 IEEE 802.11 handover assisted by GPS
information (LSIIT, France)
 Targets the problem of link and network layer
handover when a mobile node roams through access
points
 Choose the closest AP based on location obtained
using GPS sensing
 Reduces the layer 2 and 3 handover latencies
 Performance evaluation of dynamic networks
using an evolving graph combinatorial model
BEST STUDENT PAPER AWARD (University
of Sao Paulo, Brazil)
 Fixed Schedule Dynamic Networks (FSDN): MANET
with predictable dynamics e.g. satellite network
 Assess applicability of evolving graph theory in the
construction of efficient routing protocols in realistic
scenarios
 Comparison of EGproto with DSDV, DSR and AODV
 EGproto is most suitable for FSDNs
 Resource Management for End-to-End QoS in a
Mobile Environment (LaBRI Laboratory,
France)
 Resource management for E2E QoS based on QoS
NSLP signaling aplication
 Use QoS NSLP messages to make reservation in
advance to reduce the impact of handover on QoS
 A New SCTP mobility Scheme Supporting Vertical
Handover (LARIM, Canada)
 Vertical handover: Across heterogeneous mobile environments
 Related work on 3G/WLAN integration
 Use of SCTP (Stream Control Transmission Protocol): A
mobility management for IP-based networks that focuses on
the transport and session layers instead of network layer

 SCTP+:
 Simultaneous dynamic address reconfiguration
 Everything is simulated
 Possibly can use Arjan’s work for context detection
 On Channel Selection Strategies for Multi-Channel MAC protocols
in Wireless Ad Hoc Networks (University of Calgary, Canada)
 Multi-Hop ad-hoc networks: hidden terminal and exposed terminal
problem
 Multi-channel MAC protocols: Use of different channels for different
purposes
 Bi-Directional MC MAC protocol: Good for TCP because data and ack
can be sent over different links
 Problems:
 Does it matter how channels are chosen?
 Impacts on performance
 Channel selection: Random selection, lowest channel available
 Soft channel: Select one used previously or use above selection
 Soft channel is better: 100% TCP throughput improvement is possible
with Soft Channel Reservation
 Location based services and positioning
methods in urban heterogeneous mobile comm
networks
 A Distributed Architecture for Reasoning about Higher Level
Context (Dresden Univ. of Tech., Germany)
 Deals with higher level context
 Dynamics of primitive context
 Knowledge base, empirical ambient knowledge (EAK), aggregators for
aggregation of primitive context, composer composes higher level
context information
 Bayesian Composer which computes posterior probabilities in order to
discriminate between various contextual states, and likelihood
estimates to revise belief of EAK
 Applications in Heath Care (stress level), Activity Assistance,
Adaptive Multimodal Systems (which kind of user interface to use?)
 Bayesian Network helps to capture higher level context even if only a
subpart of its aspects could be captured
 Use ontologies which are application specific
 A Media Access Protocol for Proactive Information
Discovery in Ubiquitous Networks (Univ. of Tokyo,
Japan)
 A node selects an adequate broadcast rate considering the
network topology to deal with collision problems
 Fame size in the Framed Aloha has a tradeoff of delivery time
and collision
 Discovery time represents time required to discover neighbors
with some probability
 Example of service discovery is shop discount application in
which devices in shops provide discount information
 Frame size is selected adaptively after considering the
requirements of the discovery time (e.g. 4 secs)
 Indexing Mobile Objects: A strategy for
supporting Dynamic Channel Allocation in
Cellular Networks (Univ. of Fortaleza, Brazil)
 A Hybrid Model of Context-Aware Service
Provisioning Implemented on Smart Phones (Helsinki
Institute of Info. Tech., Finland)
 Services are scattered in the network, no complete access to
user’s context and recommendations are important
 Services can be centralized or distributed (P2P)
 Hybrid model is service generated but user annotated
 In Hybrid model, service selection is based on service
annotation (recommendation by user) which is linked to the
service
 Implementation: for guided sailing in the area full of islands
 Real trial with 9 sailboats, 28 participants Nokia 6630 + BT-GPS
device
 Technical problems due to 2G/3G handovers and GPS device
disconnections
 Wireless Web Services Using Mobile Agents and Ontologies (University
of Athens, Greece)
 Use of mobile agents to find the services from the service registry
 Users invoke a set of services with only one interaction with the fixed network
 User off-line operation
 MA is user representative in the fixed network
 Moves, finds, executes SWS and deliver results to the user
 RSA is Registry Stationary Agent and acts as a broker between
 PSA resides in the host offering service
 WSP (Web Service Provider) provides service expressed in WSDL and OWL-S
 Performance evaluation has been done for various systems
 Conventional WS business model
 MA framework with stationary agents
 w/o agents
 Hybrid
 MA cloning has also been considered
 Generating and Supporting Dynamic Heterogeneous MAS (Monash
University, Australia)
 Run time support is an important element of any MASs
 Planning is based on the mission
 Plan is a Directed Acyclic Graph based on Task Decomposition Graph (TDG)
 Intermediate nodes of TDG are compound tasks
 Leaves of TDG are primitive tasks
 Build the plan top-down and execute bottom-up
 Mission is a tuple (o, P, A, Z)
 Plan’s structure is dynamic and evolving as the mission is executed
 Mission execution history is captured and preserved
 To suspend and resume mission execution
 Extensive performance evaluation has been done
 MAs can be interfaced with Web Services where MAs execute web services
locally on the servers they visit
 An Agile Vertical Handoff Scheme for Heterogeneous Networks
(National Chung Hsig University, Taiwan)
 How to achieve seamless vertical handoff?
 How to pass NAT gateway and adapt TCP behavior?
 Multiple communication networks
 Vertical handoff is in heterogeneous networks (e.g. wireless LAN to
3G)
 Previous approaches include using Mobile IP with m/cast, COA is
changed to m/cast address
 In NAT, the problem is that the comm. Must be initiated by private
n/w
 Vertical hand-off does not work in case of IP address change
 Solution is to use old IP address? (what happens when new IP address
is assigned?)
 Use of Contention window size for TCP adaptation
 Implementation in Linux – changes to communication manager

 Introducing Reliability and Load balancing in Home Link of
Mobile IPv6 Based Networks (Southern Methodist Univ. USA)
 In addition to Mobile IPv4, Mobile IPv6 allows multiple HA in home
network
 Problem TBA is what happens one of the HA fails in IPv6 and home
link fails?
 Introduced VHA Reliability P on top of which V Ho Link and V Ho
Network Protocols
 All home Agents have one global IP Address which is resolved to one
of the HAs
 Every HA is active, backup or inactive
 Use of Heart Beats to detect failure
 Use of multiple links for fault tolerance
 Simulation using OPNET
 Modeling and Using Context in Adapting Applications to Pervasive
Environments (LIRIS-INSA, France)
 Context is set of external parameters (only for legacy applications, depends
whether to interpret external or internal) that modify the behavior of
application by defining new views on its data and services
 SECAS Architecture takes care of capturing, disseminating and adapting to the
context
 Context (subject, predicate, value, time, certainty)
 Intelligent and semantic processing is handled by ontologies
 High level context is reasoned from low level context
 Functional model of application is application service description + service
description
 Initial functional model is adapted based on context information
 Adaptation rules are defined for adaptation action
 Pairs (context situation + adaptation action)
 Implementation for healthcare domain
 Future work on content adaptation module and UI adaptation module
 A Scalable Execution Control Method for Context-dependent Services (NTT
DoCoMo, Japan)
 Context dependent services: Recommendation services, child surveillance, healthcare
service, friend-finder service
 In case of large number of services, context needs to be gathered from various sources
 Components for context acquisition (e.g. cell phones with GPS device)
 Context collection
 Service has execution conditions based on collected context
 Determination of execution: calculate expected utility and choose one with higher EU
 Utility: Effect of execution/non-execution for the user
 The time at which execution condition is likely to be satisfied is anticipated
 Predict context values
 Utility in the future can be estimated using predicted values
 Use Bayesian networks for probability
 Can be used for MSP in proactive adaptation
 Simulation for restaurant recommendation system where user is looking for the restaurant
within particular area
 The services provide the recommendation for the particular instance
 Gather context when service execution condition is about to be satisfied – context is
location of the user and availability of tables
 Situation Awareness: Dealing with Vague Context (University of Athens,
Greece)
 Situation: logically interrelated context
 Proposed context model deals with inexact situation determination through
Fuzzy Inference rules
 Situation awareness: Reasoning (Determination) and Activation
 Situation are modeled using Ontologies: Similar situations means similar
contexts from specific ontologies
 Resoner selects most similar situation SMax, each situation that subsumes
SMax, each situation compatible with SMax, each situation maximizing
similarity function
 Uncertain decision is taken close to ‘notification’ boundaries
 Fuzzy rules to decide whether to perform a specific task based on the current
user situation
 Ontologies used: IEEE SUO, GUMO< FOAF< FIPA< DAML-Time/Time Entry
 Racer and Fuzzy Jess for reasoning
 Granular Best Match Algorithm for Context-Aware Computing Systems
(Middle East Technical University, Turkey)
 Dealing with the multi-granular and fuzzy context information
 Matching: Pattern matching, string match, fuzzy and app. match
 Context matching issues: Provided context vs. desired context, unique
characteristics of contextual information, different abstraction levels,
uncertainty, different representations
 Granular best match: proposed for subjective, fuzzy, multi-granular and multi-
dimensional characteristics of context information
 Use of weight and threshold parameters for matching
 Weight specifies the importance from the user point of view, threshold specifies the
triggering criteria
 Implementation Using CA Personal Reminder Agent tool (Location, Time,
People, Activity, Aggregate)
 Scenario 1: Context history search from previously recorded contexts
 Scenario 2: Reminder creation (Remind for purchasing gift when I am not busy and
near shopping center)
 Personalizing Pervasive Services on Top of
Heterogeneous Networks (University of Exeter,
UK)
 DAIDALOS project to provide a universal and open
service platform to offer pervasive services to
application developers in a transparent way
 User preferences are non-logic based
(attribute/value), modeled using ontologies
 Targeted for service composition, QoS configuration,
and privacy consideration
 In QoS: User changes the session from terminal A to
B results in session transfer, QoS adaptation
 Designing Pervasive Services for Physical Hypermedia
(Universite de Lyon, France)
 Physical Hypermedia: Organizing Collections of Mixed
Physical and Digital Material (e.g. building supplemented by
web pages)
 Hypermedia: A database format similar to hypertext in which
text, sound, or video images related to that on a display can be
accessed directly from the display
 Design and implementation of a software substrate for
pervasive applications in physical hypermedia
 Prototype: Extension of SOA for location aware applications
with the notion of navigation activity (Navigation Aware
Services)
 Stream Processing in Networks of Smart
Environments (Humboldt University of Berlin,
Germany)
 Business apps aim to integrate data for smart devices
(sensors) which have properties of data streams
 For sensors, communicating is much more energy
consuming than calculations
 The problem of determining stream window size is
NP hard
 Solved using GA
 Optimization params: Message delay, value based
errors, node specific energy consumption
 An Affinity-driven Clustering Approach for
Service Discovery and Composition for
Pervasive Computing (Univ. of Belfort-
Montbeliard, France)
 Adaptive Servers/Client paradigm (service goes to
client) and Spontaneous Service Emergence
paradigm have emerged over the current CS
paradigm
 Objective is to take a Self-Organizing approach to
Service Discovery and Composition
 Self organizing approach: nodes can establish
relationships between them based on their affinity
 Affinity values can be adjusted run-time
 Equation calculates affinity between nodes
 Rule Based Approach Towards Context-Aware
User Notification Service (Fraunhofer Institute,
Germany)
 Notification service should provide unified way to
notify the changes in the environment
 ANS – Awareness and Notification Service
 Rule based approach
 Enables users to state what they are interested in
 ANS consists of Knowledge repository, Notification Profile
Manager, Rule Engine, Notifier
 ANS rule language consists of: Clause and Semantics e.g.
Upon leaveRoom() When IsOnline() Do Notify()
 Building Mobile Augmented Reality Services in
Pervasive Computing Environments (Waseda
University, Japan)
 Too many appliances with control panels, and
remote controls
 Tangible UIs and Universal Remote Controllers have
been proposed
 Vidgets: To control home appliances using PDA like
devices
 Mobile code: Download controlling s/w automatically
 Deal with search, select and use appliances which have
sensors
 A Service Provisioning System for Distributed
Personalization with Private Data Protection
(NTT DoCoMo, Japan)
 Service behavior adapts according to various data
however data can not be accessed (privacy problem)
 User’s private data - > Rule calculation -> Service
execution
 Scenario on restaurant selection based on user
preferences (e.g. type of restaurant, budget)
 Using A 2D Colorized Barcode Solution for
Authentication in Pervasive Computing (William
Claycomb, New Mexico Tech, USA)
 The problem is how to exchange information securely?
 Ubicode: Using digital camera to capture an image of tag and
decode information within
 Improvement: Expand Barcode capacity by adding color
 The tag has details of Network address, hash of host’s public
key
 Mobile takes a picture of visual tag, extracts net. Address and
requests host’ public key
 Verification of public key using Hash code in the tag
 1584 images tested
 ARPM: An Adaptive Routing Protocol for
MANETs (University Claude Bernard Lyon,
France)
 Adapts the routing process to the mobility of nodes
 A node perception of the topological changes is
measured by the neighborhood change
 Mobile Personal Agents for Smart Spaces (University of
Alcala, Spain)
 Smart env. Uses sensors
 SETH: Smart EnvironmenT Hierarchy is a hierarchy of smart
spaces (e.g. City -> Home -> Car)
 SETH devices: Devices w/o and with Agents
 Identification and Personal devices
 Device, System, Service and Personal Agents
 PA uses Context Agents and Service Agents
 PA migrates whenever and wherever user requests service
 Assumes that there are no personal devices
 Predictive Mobility Models based on Kth
Markov Models (University of Franche-Comte,
France)
 Markov Models have been used previously to
mobility predictions
 Threshold is used to determine for the selection of
state and it can trigger complete or partial handoff
 Mobile Environmental Knowledge Assistant
(INSA Lyon, France)
 Each player in mobile environment is as agent
 Agent consists of knowledge represented by
ontology and a decision mechanism (associated to
utility function)
 Agents create community and other agents can
participate in the community
 User devices are personal agents while sensors are
context agents e.g. foot pressure sensor is context
agent while personal assistant of traveler is personal
agent
 A flexible and extensible component-oriented
middleware for creating CA applications in
Java (Catholic Univ. of Minas Gerais, Brazil)
 Not presented
 A Client Side Architecture for Supporting Pervasive
Enterprise Communications (Vanderbit University,
Avaya Labs, USA)
 Business processes need to communicate with people and
connect people with each other
 HERMES middleware connect the people at right time with the
right communication media
 User presence, communication activity, communication device
characteristics are important context, nature of request,
enterprise/personal rules/policies are other factors
 Client side should take care of application user dialogues,
session management and transparency
 Multimodal interfaces are being considered e.g. mobile phones
 Adaptation Methodology for the Deployment of Mobile Component based
Applications (INT, France)
 Mobile devices are subject to communication and computation context changes which
results in repetitive deployment tasks
 Deployment params are application architecture, placement of each component,
component implementation, property values
 Vary deployment params according to the context information
 Adaptation rule are association between context constraint to parameter
 Properties’ adaptation rules are for functional and non-functional properties
 Application level rules specify variability of app. architecture according to context and
complete component level rules that depend on the application semantics
 Obligatory and optional components/connections – optional require specification of
context constraints
 Consistency check on the application rules
 Deployment adaptation
 Collect context, filter context, extract deployment adaptation rules
 Check the existence of the component
 Determine connections between components
 Use generic algorithm for the placement and implementation of components
 CCM is used for implementation
 OpenCCM is for applications while OSGI is for services
 COCOA: Conversation based Service Composition for
Pervasive Computing Environments (INRIA, France)
 Adaptive application which streams between two different
media based on context information (on the fly service
composition)
 Work done for Semantic Web Services
 OWL-S based model for services and tasks
 Service discovery semantically matches service requested
capability and service advertised capability
 Service composition is mapped with Finite State Automata
 Different environments may have different number of services
contributing to the composition
 Part of AMIGO project
 Conversation is Workflow e.g. travel service require a sequence
of services
 Taxonomy Caching: A Scalable Low-Cost Mechanism
for Indexing Remote Contents in P2P Systems (NTNU,
Norway)
 Describe contents according to taxonomy
 Taxonomy info is cached at peers
 The content of a peer are expressed using taxonomy
 Remote peers maintain a taxonomy overview instead of
detailed indexing information
 Use cached taxonomy overview to route queries to appropriate
peers to reduce latency and find relevant data
 Distributing taxonomic information is done by basic
mechanism e.g. piggyback matching category with query result
or lazy distribution by gossiping
 Future work is employing techniques for XML/XPath querying
in P2P
 Designing a Publish-Subscribe Substrate for
Privacy/Security in Pervasive Environments
(Miami University, USA)
 Content based publish subscribe
 Problem of authorization, access control
 Use of policy language based on KeyNote trust
management system (sample rules contain
Authorizer, Licensees, Conditions)
 Actions are authenticate, advertise, publish,
subscribe etc.
 Environment dependent sharing and privacy
protected access to services
 On Existence Proofs for Multiple RFID tags
(University of Florida, USA)
 RFID is replacement for Bar Codes
 Problem is presence of same RFID tags at the same
place at same time
 ‘Yoking Proofs’ exist
 ????
 Towards Autonomic Residential Gateways
(Grenoble University, France)
 Home automation provides comfort, security,
healthcare etc. but require security, scalability,
heterogeneity, flexibility, dynamism, autonomy (self
managing, the last step is to contact human user)
 Residential gateway follows principles of SOA, hosts
services, coordinate and control devices
 Work in progress..!
 Resurrection: A platform for spontaneously
Generating and Managing Proximity
Documents (INSA Lyon, France)
 Portable devices + Documents
 Many people take notes of the meeting (document)
 A dynamic document embeds and provides
functions allowing automatic assess and
modification of the document data
 Resurrection management service manages the
creation and destruction of documents
 Use of OSGI for service deployment and UPnP for
service discovery
 An Approach for Configuring Ontology Based
Application Context Model (SW Robot
Research Lab, ETRI, Korea)
 Problem: IS it possible to support all ubiquitous
applications which use context?
 Application context model as Instance layer, Domain
ontology layer, Common ontology layer, Stored
vocabulary layer
 The presentation was not very clear and seem not to
meet the claim made in the paper
 Ontology-Based Context-Aware Service
Discovery for Pervasive Environments (Amigo)
 Semantic-Based Context-Aware Service
Discovery in Pervasive-Computing
Environments (University of Waterloo,
Canada)
 Work for web services
 Parse request and expand it (reasoning)
 Retrieve user’s contextual information
 Construct SPARQL query to find matching
 services
 Rank matching services
 Pervasive spontaneous composition (France
Telecom, France)
 Pervasive Service Oriented Middleware
 Adapt to dynamic service availability
 Adapt to service discovery protocol multiplicity
 Make the use of local and distant services transparent
(priority of local binding)
 Technological choices
 OSGI
 DSCL: A Language to support Dynamic Service Composition
(Ludwig Maximilian University Munich, Germany)
 Dynamic Service Composition
 With respect to availability of services
 Usage of equivalent services
 DSCL refers to other services
 Context-Awareness
 Instantiation according to the situation
 Selection of services based on the user‘s context
 DSCL describes context
 Personalization
 Selection of services based on user preferences
 Composition based on user preferences
 DSCL supports defining objective function
 Instantiable composition of services in a home
environment (Katholieke Universiteit Leuven,
Belgium)
 Instantiable composition
 Devices / services belong to class
 Cameras, monitors, MP3 players
 Do not associate a composition to specific devices
 Associate composition to class of devices
 Instantiate composition at runtime
 Comments?

More Related Content

What's hot

MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...IJCNCJournal
 
IRJET- GMPLS based Multilayer Service Network Architecture
IRJET- GMPLS based Multilayer Service Network ArchitectureIRJET- GMPLS based Multilayer Service Network Architecture
IRJET- GMPLS based Multilayer Service Network ArchitectureIRJET Journal
 
A Novel De Routing Scheme for Vehicular Ad-Hoc Network
A Novel De Routing Scheme for Vehicular Ad-Hoc NetworkA Novel De Routing Scheme for Vehicular Ad-Hoc Network
A Novel De Routing Scheme for Vehicular Ad-Hoc NetworkIRJET Journal
 
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...IJCSES Journal
 
IRJET- Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
IRJET-  	  Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...IRJET-  	  Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
IRJET- Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...IRJET Journal
 
RichardLaca-Resume-Associate Engineer-Telecom
RichardLaca-Resume-Associate Engineer-TelecomRichardLaca-Resume-Associate Engineer-Telecom
RichardLaca-Resume-Associate Engineer-TelecomRichard Laca
 
Crosslayertermpaper
CrosslayertermpaperCrosslayertermpaper
CrosslayertermpaperB.T.L.I.T
 
PhD. Thesis defence Slides
PhD. Thesis defence SlidesPhD. Thesis defence Slides
PhD. Thesis defence SlidesDenis Rosario
 
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...IJERA Editor
 
Routing protocol for hetrogeneous wireless mesh network
Routing protocol for hetrogeneous wireless mesh networkRouting protocol for hetrogeneous wireless mesh network
Routing protocol for hetrogeneous wireless mesh networkredpel dot com
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop TransmissionIOSR Journals
 
Routing Optimization with Load Balancing: an Energy Efficient Approach
Routing Optimization with Load Balancing: an Energy Efficient ApproachRouting Optimization with Load Balancing: an Energy Efficient Approach
Routing Optimization with Load Balancing: an Energy Efficient ApproachEswar Publications
 
ASSESSING PERCEPTUAL VIDEO QUALITY IN WIMAX NETWORKS
ASSESSING PERCEPTUAL VIDEO QUALITY IN WIMAX NETWORKS ASSESSING PERCEPTUAL VIDEO QUALITY IN WIMAX NETWORKS
ASSESSING PERCEPTUAL VIDEO QUALITY IN WIMAX NETWORKS ijujournal
 
ASSESSING PERCEPTUAL VIDEO QUALITY IN WIMAX NETWORKS
ASSESSING PERCEPTUAL VIDEO QUALITY IN WIMAX NETWORKS ASSESSING PERCEPTUAL VIDEO QUALITY IN WIMAX NETWORKS
ASSESSING PERCEPTUAL VIDEO QUALITY IN WIMAX NETWORKS ijujournal
 
Assessing perceptual video quality in wimax networks
Assessing perceptual video quality in wimax networksAssessing perceptual video quality in wimax networks
Assessing perceptual video quality in wimax networksijujournal
 
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...pijans
 
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKSBIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKSijwmn
 
Mtadf multi hop traffic aware data for warding for congestion control in wir...
Mtadf  multi hop traffic aware data for warding for congestion control in wir...Mtadf  multi hop traffic aware data for warding for congestion control in wir...
Mtadf multi hop traffic aware data for warding for congestion control in wir...ijwmn
 
IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...
IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...
IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...IRJET Journal
 
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...pijans
 

What's hot (20)

MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
 
IRJET- GMPLS based Multilayer Service Network Architecture
IRJET- GMPLS based Multilayer Service Network ArchitectureIRJET- GMPLS based Multilayer Service Network Architecture
IRJET- GMPLS based Multilayer Service Network Architecture
 
A Novel De Routing Scheme for Vehicular Ad-Hoc Network
A Novel De Routing Scheme for Vehicular Ad-Hoc NetworkA Novel De Routing Scheme for Vehicular Ad-Hoc Network
A Novel De Routing Scheme for Vehicular Ad-Hoc Network
 
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
 
IRJET- Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
IRJET-  	  Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...IRJET-  	  Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
IRJET- Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
 
RichardLaca-Resume-Associate Engineer-Telecom
RichardLaca-Resume-Associate Engineer-TelecomRichardLaca-Resume-Associate Engineer-Telecom
RichardLaca-Resume-Associate Engineer-Telecom
 
Crosslayertermpaper
CrosslayertermpaperCrosslayertermpaper
Crosslayertermpaper
 
PhD. Thesis defence Slides
PhD. Thesis defence SlidesPhD. Thesis defence Slides
PhD. Thesis defence Slides
 
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
Implementation of Vacate on Demand Algorithm in Various Spectrum Sensing Netw...
 
Routing protocol for hetrogeneous wireless mesh network
Routing protocol for hetrogeneous wireless mesh networkRouting protocol for hetrogeneous wireless mesh network
Routing protocol for hetrogeneous wireless mesh network
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
 
Routing Optimization with Load Balancing: an Energy Efficient Approach
Routing Optimization with Load Balancing: an Energy Efficient ApproachRouting Optimization with Load Balancing: an Energy Efficient Approach
Routing Optimization with Load Balancing: an Energy Efficient Approach
 
ASSESSING PERCEPTUAL VIDEO QUALITY IN WIMAX NETWORKS
ASSESSING PERCEPTUAL VIDEO QUALITY IN WIMAX NETWORKS ASSESSING PERCEPTUAL VIDEO QUALITY IN WIMAX NETWORKS
ASSESSING PERCEPTUAL VIDEO QUALITY IN WIMAX NETWORKS
 
ASSESSING PERCEPTUAL VIDEO QUALITY IN WIMAX NETWORKS
ASSESSING PERCEPTUAL VIDEO QUALITY IN WIMAX NETWORKS ASSESSING PERCEPTUAL VIDEO QUALITY IN WIMAX NETWORKS
ASSESSING PERCEPTUAL VIDEO QUALITY IN WIMAX NETWORKS
 
Assessing perceptual video quality in wimax networks
Assessing perceptual video quality in wimax networksAssessing perceptual video quality in wimax networks
Assessing perceptual video quality in wimax networks
 
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
 
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKSBIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
 
Mtadf multi hop traffic aware data for warding for congestion control in wir...
Mtadf  multi hop traffic aware data for warding for congestion control in wir...Mtadf  multi hop traffic aware data for warding for congestion control in wir...
Mtadf multi hop traffic aware data for warding for congestion control in wir...
 
IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...
IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...
IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...
 
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
 

Similar to A dhoc networks

DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSDATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSEditor IJMTER
 
Multi-Criteria Handoff Decision Algorithms In Wireless Networks
Multi-Criteria Handoff Decision Algorithms In Wireless NetworksMulti-Criteria Handoff Decision Algorithms In Wireless Networks
Multi-Criteria Handoff Decision Algorithms In Wireless Networksiosrjce
 
A Process Oriented Development Flow for Wireless System Networks by Bernard P...
A Process Oriented Development Flow for Wireless System Networks by Bernard P...A Process Oriented Development Flow for Wireless System Networks by Bernard P...
A Process Oriented Development Flow for Wireless System Networks by Bernard P...ESUG
 
Wireless communication and Network
Wireless communication and Network Wireless communication and Network
Wireless communication and Network Chanaka Lasantha
 
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...pijans
 
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUVinish Alikkal
 
Mobile ad hoc networks (manet)
Mobile ad hoc networks (manet)Mobile ad hoc networks (manet)
Mobile ad hoc networks (manet)Vinish Alikkal
 
Fuzzy Based Vertical Handoff Decision Controller for Future Networks
Fuzzy Based Vertical Handoff Decision Controller for Future NetworksFuzzy Based Vertical Handoff Decision Controller for Future Networks
Fuzzy Based Vertical Handoff Decision Controller for Future NetworksIJAEMSJORNAL
 
rupali published paper
rupali published paperrupali published paper
rupali published paperRoopali Singh
 
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...IJCNCJournal
 
Bandwidth estimation for ieee 802
Bandwidth estimation for ieee 802Bandwidth estimation for ieee 802
Bandwidth estimation for ieee 802Mumbai Academisc
 
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...IOSR Journals
 
Quality of experience aware network selection model for service provisioning...
Quality of experience aware network selection model for service  provisioning...Quality of experience aware network selection model for service  provisioning...
Quality of experience aware network selection model for service provisioning...IJECEIAES
 
Cooperation versus multiplexing multicast scheduling algorithms for ofdma rel...
Cooperation versus multiplexing multicast scheduling algorithms for ofdma rel...Cooperation versus multiplexing multicast scheduling algorithms for ofdma rel...
Cooperation versus multiplexing multicast scheduling algorithms for ofdma rel...Shakas Technologies
 
Handover Microsoft
Handover MicrosoftHandover Microsoft
Handover Microsoftodcsss08
 
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless NetworkThroughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Networkijtsrd
 

Similar to A dhoc networks (20)

DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSDATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
 
Multi-Criteria Handoff Decision Algorithms In Wireless Networks
Multi-Criteria Handoff Decision Algorithms In Wireless NetworksMulti-Criteria Handoff Decision Algorithms In Wireless Networks
Multi-Criteria Handoff Decision Algorithms In Wireless Networks
 
A Process Oriented Development Flow for Wireless System Networks by Bernard P...
A Process Oriented Development Flow for Wireless System Networks by Bernard P...A Process Oriented Development Flow for Wireless System Networks by Bernard P...
A Process Oriented Development Flow for Wireless System Networks by Bernard P...
 
(part-2)Book
(part-2)Book(part-2)Book
(part-2)Book
 
Wireless communication and Network
Wireless communication and Network Wireless communication and Network
Wireless communication and Network
 
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...
 
C0941017
C0941017C0941017
C0941017
 
A044030110
A044030110A044030110
A044030110
 
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTU
 
Mobile ad hoc networks (manet)
Mobile ad hoc networks (manet)Mobile ad hoc networks (manet)
Mobile ad hoc networks (manet)
 
Fuzzy Based Vertical Handoff Decision Controller for Future Networks
Fuzzy Based Vertical Handoff Decision Controller for Future NetworksFuzzy Based Vertical Handoff Decision Controller for Future Networks
Fuzzy Based Vertical Handoff Decision Controller for Future Networks
 
rupali published paper
rupali published paperrupali published paper
rupali published paper
 
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...
 
Networking
NetworkingNetworking
Networking
 
Bandwidth estimation for ieee 802
Bandwidth estimation for ieee 802Bandwidth estimation for ieee 802
Bandwidth estimation for ieee 802
 
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
 
Quality of experience aware network selection model for service provisioning...
Quality of experience aware network selection model for service  provisioning...Quality of experience aware network selection model for service  provisioning...
Quality of experience aware network selection model for service provisioning...
 
Cooperation versus multiplexing multicast scheduling algorithms for ofdma rel...
Cooperation versus multiplexing multicast scheduling algorithms for ofdma rel...Cooperation versus multiplexing multicast scheduling algorithms for ofdma rel...
Cooperation versus multiplexing multicast scheduling algorithms for ofdma rel...
 
Handover Microsoft
Handover MicrosoftHandover Microsoft
Handover Microsoft
 
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless NetworkThroughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
 

More from Sattar kayani

More from Sattar kayani (17)

Q3 (a)
Q3 (a)Q3 (a)
Q3 (a)
 
Van meeter equaiton
Van meeter equaitonVan meeter equaiton
Van meeter equaiton
 
314 supp 6_isom_form
314 supp 6_isom_form314 supp 6_isom_form
314 supp 6_isom_form
 
314 supp 6_isom_form
314 supp 6_isom_form314 supp 6_isom_form
314 supp 6_isom_form
 
Reagent types chem
Reagent types chemReagent types chem
Reagent types chem
 
4 converted (1)
4 converted (1)4 converted (1)
4 converted (1)
 
Water soluble
Water solubleWater soluble
Water soluble
 
Water soluble vs Fat Soluable
Water soluble vs Fat SoluableWater soluble vs Fat Soluable
Water soluble vs Fat Soluable
 
6 defects
6 defects6 defects
6 defects
 
Create wireless ad hoc internet connection on windows 10
Create wireless ad hoc internet connection on windows 10Create wireless ad hoc internet connection on windows 10
Create wireless ad hoc internet connection on windows 10
 
Dua
DuaDua
Dua
 
Kinds of sentence
Kinds of sentenceKinds of sentence
Kinds of sentence
 
Lecture 8
Lecture 8Lecture 8
Lecture 8
 
Artificial intelligence cs607 handouts lecture 11 - 45
Artificial intelligence   cs607 handouts lecture 11 - 45Artificial intelligence   cs607 handouts lecture 11 - 45
Artificial intelligence cs607 handouts lecture 11 - 45
 
Dsys guide37
Dsys guide37Dsys guide37
Dsys guide37
 
03 basic computer_network
03 basic computer_network03 basic computer_network
03 basic computer_network
 
Class01
Class01Class01
Class01
 

Recently uploaded

A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfsmsksolar
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxnuruddin69
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...HenryBriggs2
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stageAbc194748
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwaitjaanualu31
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086anil_gaur
 

Recently uploaded (20)

A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stage
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 

A dhoc networks

  • 1.
  • 2.  The Telecom Market and Evolution of Cellular Standards  Infrastructure will support diverse range of data services  Currently data usage is low  Mobile telephony is much more popular than fixed systems  Asia Pacific, Middle East and Africa has tremendous potential for subscription (around 17-20% currently)  Subscribers do not prefer to pay more for innovative services  Mobile devices evolved incrementally to support camera, gaming, e- wallet, mp3 player  Operators have diverse standards which makes subscriber’s life difficult (e.g. call forward, voicemail)  Opportunity is to have IP enabled infrastructure for all the services  Mobile devices are supporting multiple network interfaces  Services bundling can be interesting from user point view  IP enabled network supports all possible Multi-Media services
  • 3.  The Telecom Market and Evolution of Cellular Standards  IP, SIP and IMS (IP Multimedia Subsystem)  IMS control: Rules, SIP: Map, IP: Roads  Multi-Vendor and Multi-Operator IMS can run on top of diverse networks
  • 4.  The Telecom Market and Evolution of Cellular Standards  HSPA: High Speed PAcket Access  SPEED: Higher bit rates 40 / 10 Mbps  Reduced delay  Capacity: Targeting almost double number of VoIP users  The key is that the user should be able to afford the technology in terms of money  2Q06: Mobile phone with HSDPA with 1.8 Mbps, PC card with 3.6 Mbps  2H06: Volume handsets 3.6 Mbps  1H07: PC cards and handsets with 7.2 Mbps DL  Enhanced uplink support, 1.46 Mbps  GPRS, EDGE, WCDMA, HSDA chipsets are lightweight  WiMax (Wireless Broadband) X HSPA (Mobile Broadband) have different starting points – different use  3G LTE (Long Term Evolution): Multiple Receivers on a mobile device  3G LTE testbed: Up to peak 100 Mbps DL and 20 Mbps UL  In short: The cellular networks are going to provide substantial data rates for DL/UL  Future looks good!
  • 5.  Mobility Metrics to Enable Adaptive Routing in MANET (Carleton University, Canada)  Mobile nodes adjusts its routing behavior individually based on its environment to improve routing performance  Need to generalize adaptiveness in the routing protocols  Change routing params based on environment  Mobility metrics: Parameters that represent current mobility status a node can monitor: no. of link breaks, relative mobility, link duration  If every node can adjust its routing behavior based on network conditions around it, the protocol performance can be improved!  The knowledge of link breaks can be used to tune the protocol params e.g. hello interval for improved performance
  • 6.  Routing with uncertainty in the position of the destination (Carleton University, Canada)  For position based routing algorithms  What if the source is uncertain about the position of the destination? (source may have knowledge about destination’s speed)  2 phases: Reach some node in the region  Flooding is resource intensive and still does not guarantee delivery if the node has moved outside the region  Hybrid approaches are proposed to improve delivery rate and reduce transmission cost
  • 7.  Multi-path routing based secure data transmission in Ad Hoc networks (Washington State Uni., VS)  Detecting misbehaving nodes which ca drop the packets going to the destination  Multipath routing combined with feedback mechanism  Remove the misbehaving path from the source’s cache  Sybil attack (a node keeps multiple identities) fails the scheme
  • 8.  A mobility prediction based weighted clustering algorithm using local cluster-heads election for QoS in MANETs (Univ. of Guelph, Canada)  Not presented
  • 9.  A Fault Tolerant Routing Algorithm for Mobile Ad Hoc Networks Using a Stochastic Learning Based Weak Estimation Procedure (Carleton University, Canada)  Fault tolerance is important because of adversarial conditions in MANET  Use stochastic learning
  • 10.  Cooperative Caching with Adaptive Prefetching in MANET (University of Guelph, Canada)  Caching in MANET can be used for data caching, route caching  Proposed work combines cooperative caching with prefetching  Uses clusturing architecture to reduce overhead  Uses hybrid cache replacement policy  Cooperative: Neighbor store items and provide them  Prefetching: Proactively fetching most frequently accessed data  Increases data accessibility ratio and query delay at lower prefetch thresholds and larger cache sizes
  • 11.  An Abstract Model for Supporting Interoperability in MANET (American University of Beirut, Lebanon)  Consider the situation where mobile node is facilitated with multiple network interfaces  Proposes communication abstract model supporting interoperability and coexistence between heterogeneous mobile devices  Communication service layer, capability layer, interface layer
  • 12.  A Tabu Search Heuristics for the Global Planning of UMTS Networks (Ecole Polytechnique de Montreal, Canada)  Tabu search heuristics for global planning problem – cell planning, access network planning, core network planning
  • 13.  Indoor wLAN planning with a QoS constraint based on a Markovian Performance Evaluation Model (INSA Lyon, France)  Get the best possible network QoS configuration  Realistic planning solutions with limited computational load  Optimization criteria: coverage, interference avoidance, throughput guarantee (mean available bandwidth to the user)  However, is static approach, does not take into account dynamic behavior of the users
  • 14.  Performance (evaluation) of multi-interface based wireless mesh backbone to support VoIP service delivery (CTTC, Spain)  For 802.11 based network to provide VoIP services  The available E-Model predicts the voice quality of a phone call using transmission params to provide numerical indication of quality of a call (R-Factor)  The degradation occurs because when number of subscribers increase, the nodes compete for channel access with other nodes located beyond their transmission range, thus increasing delay
  • 15.  IEEE 802.11 handover assisted by GPS information (LSIIT, France)  Targets the problem of link and network layer handover when a mobile node roams through access points  Choose the closest AP based on location obtained using GPS sensing  Reduces the layer 2 and 3 handover latencies
  • 16.  Performance evaluation of dynamic networks using an evolving graph combinatorial model BEST STUDENT PAPER AWARD (University of Sao Paulo, Brazil)  Fixed Schedule Dynamic Networks (FSDN): MANET with predictable dynamics e.g. satellite network  Assess applicability of evolving graph theory in the construction of efficient routing protocols in realistic scenarios  Comparison of EGproto with DSDV, DSR and AODV  EGproto is most suitable for FSDNs
  • 17.  Resource Management for End-to-End QoS in a Mobile Environment (LaBRI Laboratory, France)  Resource management for E2E QoS based on QoS NSLP signaling aplication  Use QoS NSLP messages to make reservation in advance to reduce the impact of handover on QoS
  • 18.  A New SCTP mobility Scheme Supporting Vertical Handover (LARIM, Canada)  Vertical handover: Across heterogeneous mobile environments  Related work on 3G/WLAN integration  Use of SCTP (Stream Control Transmission Protocol): A mobility management for IP-based networks that focuses on the transport and session layers instead of network layer   SCTP+:  Simultaneous dynamic address reconfiguration  Everything is simulated  Possibly can use Arjan’s work for context detection
  • 19.  On Channel Selection Strategies for Multi-Channel MAC protocols in Wireless Ad Hoc Networks (University of Calgary, Canada)  Multi-Hop ad-hoc networks: hidden terminal and exposed terminal problem  Multi-channel MAC protocols: Use of different channels for different purposes  Bi-Directional MC MAC protocol: Good for TCP because data and ack can be sent over different links  Problems:  Does it matter how channels are chosen?  Impacts on performance  Channel selection: Random selection, lowest channel available  Soft channel: Select one used previously or use above selection  Soft channel is better: 100% TCP throughput improvement is possible with Soft Channel Reservation
  • 20.  Location based services and positioning methods in urban heterogeneous mobile comm networks
  • 21.  A Distributed Architecture for Reasoning about Higher Level Context (Dresden Univ. of Tech., Germany)  Deals with higher level context  Dynamics of primitive context  Knowledge base, empirical ambient knowledge (EAK), aggregators for aggregation of primitive context, composer composes higher level context information  Bayesian Composer which computes posterior probabilities in order to discriminate between various contextual states, and likelihood estimates to revise belief of EAK  Applications in Heath Care (stress level), Activity Assistance, Adaptive Multimodal Systems (which kind of user interface to use?)  Bayesian Network helps to capture higher level context even if only a subpart of its aspects could be captured  Use ontologies which are application specific
  • 22.  A Media Access Protocol for Proactive Information Discovery in Ubiquitous Networks (Univ. of Tokyo, Japan)  A node selects an adequate broadcast rate considering the network topology to deal with collision problems  Fame size in the Framed Aloha has a tradeoff of delivery time and collision  Discovery time represents time required to discover neighbors with some probability  Example of service discovery is shop discount application in which devices in shops provide discount information  Frame size is selected adaptively after considering the requirements of the discovery time (e.g. 4 secs)
  • 23.  Indexing Mobile Objects: A strategy for supporting Dynamic Channel Allocation in Cellular Networks (Univ. of Fortaleza, Brazil)
  • 24.
  • 25.  A Hybrid Model of Context-Aware Service Provisioning Implemented on Smart Phones (Helsinki Institute of Info. Tech., Finland)  Services are scattered in the network, no complete access to user’s context and recommendations are important  Services can be centralized or distributed (P2P)  Hybrid model is service generated but user annotated  In Hybrid model, service selection is based on service annotation (recommendation by user) which is linked to the service  Implementation: for guided sailing in the area full of islands  Real trial with 9 sailboats, 28 participants Nokia 6630 + BT-GPS device  Technical problems due to 2G/3G handovers and GPS device disconnections
  • 26.  Wireless Web Services Using Mobile Agents and Ontologies (University of Athens, Greece)  Use of mobile agents to find the services from the service registry  Users invoke a set of services with only one interaction with the fixed network  User off-line operation  MA is user representative in the fixed network  Moves, finds, executes SWS and deliver results to the user  RSA is Registry Stationary Agent and acts as a broker between  PSA resides in the host offering service  WSP (Web Service Provider) provides service expressed in WSDL and OWL-S  Performance evaluation has been done for various systems  Conventional WS business model  MA framework with stationary agents  w/o agents  Hybrid  MA cloning has also been considered
  • 27.  Generating and Supporting Dynamic Heterogeneous MAS (Monash University, Australia)  Run time support is an important element of any MASs  Planning is based on the mission  Plan is a Directed Acyclic Graph based on Task Decomposition Graph (TDG)  Intermediate nodes of TDG are compound tasks  Leaves of TDG are primitive tasks  Build the plan top-down and execute bottom-up  Mission is a tuple (o, P, A, Z)  Plan’s structure is dynamic and evolving as the mission is executed  Mission execution history is captured and preserved  To suspend and resume mission execution  Extensive performance evaluation has been done  MAs can be interfaced with Web Services where MAs execute web services locally on the servers they visit
  • 28.  An Agile Vertical Handoff Scheme for Heterogeneous Networks (National Chung Hsig University, Taiwan)  How to achieve seamless vertical handoff?  How to pass NAT gateway and adapt TCP behavior?  Multiple communication networks  Vertical handoff is in heterogeneous networks (e.g. wireless LAN to 3G)  Previous approaches include using Mobile IP with m/cast, COA is changed to m/cast address  In NAT, the problem is that the comm. Must be initiated by private n/w  Vertical hand-off does not work in case of IP address change  Solution is to use old IP address? (what happens when new IP address is assigned?)  Use of Contention window size for TCP adaptation  Implementation in Linux – changes to communication manager 
  • 29.  Introducing Reliability and Load balancing in Home Link of Mobile IPv6 Based Networks (Southern Methodist Univ. USA)  In addition to Mobile IPv4, Mobile IPv6 allows multiple HA in home network  Problem TBA is what happens one of the HA fails in IPv6 and home link fails?  Introduced VHA Reliability P on top of which V Ho Link and V Ho Network Protocols  All home Agents have one global IP Address which is resolved to one of the HAs  Every HA is active, backup or inactive  Use of Heart Beats to detect failure  Use of multiple links for fault tolerance  Simulation using OPNET
  • 30.  Modeling and Using Context in Adapting Applications to Pervasive Environments (LIRIS-INSA, France)  Context is set of external parameters (only for legacy applications, depends whether to interpret external or internal) that modify the behavior of application by defining new views on its data and services  SECAS Architecture takes care of capturing, disseminating and adapting to the context  Context (subject, predicate, value, time, certainty)  Intelligent and semantic processing is handled by ontologies  High level context is reasoned from low level context  Functional model of application is application service description + service description  Initial functional model is adapted based on context information  Adaptation rules are defined for adaptation action  Pairs (context situation + adaptation action)  Implementation for healthcare domain  Future work on content adaptation module and UI adaptation module
  • 31.  A Scalable Execution Control Method for Context-dependent Services (NTT DoCoMo, Japan)  Context dependent services: Recommendation services, child surveillance, healthcare service, friend-finder service  In case of large number of services, context needs to be gathered from various sources  Components for context acquisition (e.g. cell phones with GPS device)  Context collection  Service has execution conditions based on collected context  Determination of execution: calculate expected utility and choose one with higher EU  Utility: Effect of execution/non-execution for the user  The time at which execution condition is likely to be satisfied is anticipated  Predict context values  Utility in the future can be estimated using predicted values  Use Bayesian networks for probability  Can be used for MSP in proactive adaptation  Simulation for restaurant recommendation system where user is looking for the restaurant within particular area  The services provide the recommendation for the particular instance  Gather context when service execution condition is about to be satisfied – context is location of the user and availability of tables
  • 32.  Situation Awareness: Dealing with Vague Context (University of Athens, Greece)  Situation: logically interrelated context  Proposed context model deals with inexact situation determination through Fuzzy Inference rules  Situation awareness: Reasoning (Determination) and Activation  Situation are modeled using Ontologies: Similar situations means similar contexts from specific ontologies  Resoner selects most similar situation SMax, each situation that subsumes SMax, each situation compatible with SMax, each situation maximizing similarity function  Uncertain decision is taken close to ‘notification’ boundaries  Fuzzy rules to decide whether to perform a specific task based on the current user situation  Ontologies used: IEEE SUO, GUMO< FOAF< FIPA< DAML-Time/Time Entry  Racer and Fuzzy Jess for reasoning
  • 33.  Granular Best Match Algorithm for Context-Aware Computing Systems (Middle East Technical University, Turkey)  Dealing with the multi-granular and fuzzy context information  Matching: Pattern matching, string match, fuzzy and app. match  Context matching issues: Provided context vs. desired context, unique characteristics of contextual information, different abstraction levels, uncertainty, different representations  Granular best match: proposed for subjective, fuzzy, multi-granular and multi- dimensional characteristics of context information  Use of weight and threshold parameters for matching  Weight specifies the importance from the user point of view, threshold specifies the triggering criteria  Implementation Using CA Personal Reminder Agent tool (Location, Time, People, Activity, Aggregate)  Scenario 1: Context history search from previously recorded contexts  Scenario 2: Reminder creation (Remind for purchasing gift when I am not busy and near shopping center)
  • 34.  Personalizing Pervasive Services on Top of Heterogeneous Networks (University of Exeter, UK)  DAIDALOS project to provide a universal and open service platform to offer pervasive services to application developers in a transparent way  User preferences are non-logic based (attribute/value), modeled using ontologies  Targeted for service composition, QoS configuration, and privacy consideration  In QoS: User changes the session from terminal A to B results in session transfer, QoS adaptation
  • 35.  Designing Pervasive Services for Physical Hypermedia (Universite de Lyon, France)  Physical Hypermedia: Organizing Collections of Mixed Physical and Digital Material (e.g. building supplemented by web pages)  Hypermedia: A database format similar to hypertext in which text, sound, or video images related to that on a display can be accessed directly from the display  Design and implementation of a software substrate for pervasive applications in physical hypermedia  Prototype: Extension of SOA for location aware applications with the notion of navigation activity (Navigation Aware Services)
  • 36.  Stream Processing in Networks of Smart Environments (Humboldt University of Berlin, Germany)  Business apps aim to integrate data for smart devices (sensors) which have properties of data streams  For sensors, communicating is much more energy consuming than calculations  The problem of determining stream window size is NP hard  Solved using GA  Optimization params: Message delay, value based errors, node specific energy consumption
  • 37.  An Affinity-driven Clustering Approach for Service Discovery and Composition for Pervasive Computing (Univ. of Belfort- Montbeliard, France)  Adaptive Servers/Client paradigm (service goes to client) and Spontaneous Service Emergence paradigm have emerged over the current CS paradigm  Objective is to take a Self-Organizing approach to Service Discovery and Composition  Self organizing approach: nodes can establish relationships between them based on their affinity  Affinity values can be adjusted run-time  Equation calculates affinity between nodes
  • 38.  Rule Based Approach Towards Context-Aware User Notification Service (Fraunhofer Institute, Germany)  Notification service should provide unified way to notify the changes in the environment  ANS – Awareness and Notification Service  Rule based approach  Enables users to state what they are interested in  ANS consists of Knowledge repository, Notification Profile Manager, Rule Engine, Notifier  ANS rule language consists of: Clause and Semantics e.g. Upon leaveRoom() When IsOnline() Do Notify()
  • 39.  Building Mobile Augmented Reality Services in Pervasive Computing Environments (Waseda University, Japan)  Too many appliances with control panels, and remote controls  Tangible UIs and Universal Remote Controllers have been proposed  Vidgets: To control home appliances using PDA like devices  Mobile code: Download controlling s/w automatically  Deal with search, select and use appliances which have sensors
  • 40.  A Service Provisioning System for Distributed Personalization with Private Data Protection (NTT DoCoMo, Japan)  Service behavior adapts according to various data however data can not be accessed (privacy problem)  User’s private data - > Rule calculation -> Service execution  Scenario on restaurant selection based on user preferences (e.g. type of restaurant, budget)
  • 41.  Using A 2D Colorized Barcode Solution for Authentication in Pervasive Computing (William Claycomb, New Mexico Tech, USA)  The problem is how to exchange information securely?  Ubicode: Using digital camera to capture an image of tag and decode information within  Improvement: Expand Barcode capacity by adding color  The tag has details of Network address, hash of host’s public key  Mobile takes a picture of visual tag, extracts net. Address and requests host’ public key  Verification of public key using Hash code in the tag  1584 images tested
  • 42.  ARPM: An Adaptive Routing Protocol for MANETs (University Claude Bernard Lyon, France)  Adapts the routing process to the mobility of nodes  A node perception of the topological changes is measured by the neighborhood change
  • 43.  Mobile Personal Agents for Smart Spaces (University of Alcala, Spain)  Smart env. Uses sensors  SETH: Smart EnvironmenT Hierarchy is a hierarchy of smart spaces (e.g. City -> Home -> Car)  SETH devices: Devices w/o and with Agents  Identification and Personal devices  Device, System, Service and Personal Agents  PA uses Context Agents and Service Agents  PA migrates whenever and wherever user requests service  Assumes that there are no personal devices
  • 44.  Predictive Mobility Models based on Kth Markov Models (University of Franche-Comte, France)  Markov Models have been used previously to mobility predictions  Threshold is used to determine for the selection of state and it can trigger complete or partial handoff
  • 45.  Mobile Environmental Knowledge Assistant (INSA Lyon, France)  Each player in mobile environment is as agent  Agent consists of knowledge represented by ontology and a decision mechanism (associated to utility function)  Agents create community and other agents can participate in the community  User devices are personal agents while sensors are context agents e.g. foot pressure sensor is context agent while personal assistant of traveler is personal agent
  • 46.  A flexible and extensible component-oriented middleware for creating CA applications in Java (Catholic Univ. of Minas Gerais, Brazil)  Not presented
  • 47.  A Client Side Architecture for Supporting Pervasive Enterprise Communications (Vanderbit University, Avaya Labs, USA)  Business processes need to communicate with people and connect people with each other  HERMES middleware connect the people at right time with the right communication media  User presence, communication activity, communication device characteristics are important context, nature of request, enterprise/personal rules/policies are other factors  Client side should take care of application user dialogues, session management and transparency  Multimodal interfaces are being considered e.g. mobile phones
  • 48.  Adaptation Methodology for the Deployment of Mobile Component based Applications (INT, France)  Mobile devices are subject to communication and computation context changes which results in repetitive deployment tasks  Deployment params are application architecture, placement of each component, component implementation, property values  Vary deployment params according to the context information  Adaptation rule are association between context constraint to parameter  Properties’ adaptation rules are for functional and non-functional properties  Application level rules specify variability of app. architecture according to context and complete component level rules that depend on the application semantics  Obligatory and optional components/connections – optional require specification of context constraints  Consistency check on the application rules  Deployment adaptation  Collect context, filter context, extract deployment adaptation rules  Check the existence of the component  Determine connections between components  Use generic algorithm for the placement and implementation of components  CCM is used for implementation  OpenCCM is for applications while OSGI is for services
  • 49.  COCOA: Conversation based Service Composition for Pervasive Computing Environments (INRIA, France)  Adaptive application which streams between two different media based on context information (on the fly service composition)  Work done for Semantic Web Services  OWL-S based model for services and tasks  Service discovery semantically matches service requested capability and service advertised capability  Service composition is mapped with Finite State Automata  Different environments may have different number of services contributing to the composition  Part of AMIGO project  Conversation is Workflow e.g. travel service require a sequence of services
  • 50.  Taxonomy Caching: A Scalable Low-Cost Mechanism for Indexing Remote Contents in P2P Systems (NTNU, Norway)  Describe contents according to taxonomy  Taxonomy info is cached at peers  The content of a peer are expressed using taxonomy  Remote peers maintain a taxonomy overview instead of detailed indexing information  Use cached taxonomy overview to route queries to appropriate peers to reduce latency and find relevant data  Distributing taxonomic information is done by basic mechanism e.g. piggyback matching category with query result or lazy distribution by gossiping  Future work is employing techniques for XML/XPath querying in P2P
  • 51.  Designing a Publish-Subscribe Substrate for Privacy/Security in Pervasive Environments (Miami University, USA)  Content based publish subscribe  Problem of authorization, access control  Use of policy language based on KeyNote trust management system (sample rules contain Authorizer, Licensees, Conditions)  Actions are authenticate, advertise, publish, subscribe etc.  Environment dependent sharing and privacy protected access to services
  • 52.  On Existence Proofs for Multiple RFID tags (University of Florida, USA)  RFID is replacement for Bar Codes  Problem is presence of same RFID tags at the same place at same time  ‘Yoking Proofs’ exist  ????
  • 53.  Towards Autonomic Residential Gateways (Grenoble University, France)  Home automation provides comfort, security, healthcare etc. but require security, scalability, heterogeneity, flexibility, dynamism, autonomy (self managing, the last step is to contact human user)  Residential gateway follows principles of SOA, hosts services, coordinate and control devices  Work in progress..!
  • 54.  Resurrection: A platform for spontaneously Generating and Managing Proximity Documents (INSA Lyon, France)  Portable devices + Documents  Many people take notes of the meeting (document)  A dynamic document embeds and provides functions allowing automatic assess and modification of the document data  Resurrection management service manages the creation and destruction of documents  Use of OSGI for service deployment and UPnP for service discovery
  • 55.  An Approach for Configuring Ontology Based Application Context Model (SW Robot Research Lab, ETRI, Korea)  Problem: IS it possible to support all ubiquitous applications which use context?  Application context model as Instance layer, Domain ontology layer, Common ontology layer, Stored vocabulary layer  The presentation was not very clear and seem not to meet the claim made in the paper
  • 56.
  • 57.  Ontology-Based Context-Aware Service Discovery for Pervasive Environments (Amigo)  Semantic-Based Context-Aware Service Discovery in Pervasive-Computing Environments (University of Waterloo, Canada)  Work for web services  Parse request and expand it (reasoning)  Retrieve user’s contextual information  Construct SPARQL query to find matching  services  Rank matching services
  • 58.  Pervasive spontaneous composition (France Telecom, France)  Pervasive Service Oriented Middleware  Adapt to dynamic service availability  Adapt to service discovery protocol multiplicity  Make the use of local and distant services transparent (priority of local binding)  Technological choices  OSGI
  • 59.  DSCL: A Language to support Dynamic Service Composition (Ludwig Maximilian University Munich, Germany)  Dynamic Service Composition  With respect to availability of services  Usage of equivalent services  DSCL refers to other services  Context-Awareness  Instantiation according to the situation  Selection of services based on the user‘s context  DSCL describes context  Personalization  Selection of services based on user preferences  Composition based on user preferences  DSCL supports defining objective function
  • 60.  Instantiable composition of services in a home environment (Katholieke Universiteit Leuven, Belgium)  Instantiable composition  Devices / services belong to class  Cameras, monitors, MP3 players  Do not associate a composition to specific devices  Associate composition to class of devices  Instantiate composition at runtime