SlideShare a Scribd company logo
1 of 20
Download to read offline
A Parameter-Based Service Discovery Protocol
        for Mobile Ad-Hoc Networks

                                           ´          ˜
                  Unai Aguilera and Diego Lopez-de-Ipina
                        unai.aguilera@deusto.es


      DeustoTech - Deusto Institute of Technology, University of Deusto
                               Bilbao, Spain
                    http://www.morelab.deusto.es


                               July 10, 2012
Outline


   Introduction

   Overview

   Taxonomy usage

   Search

   Conclusions




ADHOC-NOW 2012, Belgrade, Serbia   2 / 20
Motivation


          MANET of devices providing services.
          Devices connect/disconnect
          No central information manager
          Service Oriented Applications ⇒ Service Discovery
          Current solutions
                 Search using service identifiers or service type
                 Not suitable when searching for functional properties
          Service Composition
                 Create service work-flows to provide new functionalities to the
                 users.
                 Discover compatible services (Input/Output).




ADHOC-NOW 2012, Belgrade, Serbia       Introduction                  3 / 20
Parameter-based Service Discovery



          Services are located using their input/output parameters
          I/O parameters are classified
                 Taxonomy of concepts
          Parameter dissemination
          Service search and route management
          Other elements
                 Neighbour detection ⇒ using periodic beacon messages.
                 Reliable broadcast ⇒ ACK messages




ADHOC-NOW 2012, Belgrade, Serbia        Overview                 4 / 20
Parameter dissemination


          Each node mantains a Parameter table
          The higher the value ⇒ the closer a parameter of that type.
          Local parameters Dd (max. dissemination value).
          Real distance (hops) = Dd - value.
          Decremented with each hop until it reaches 0.




ADHOC-NOW 2012, Belgrade, Serbia   Overview                  5 / 20
Parameter table


          Defined as a table of {P, L} pairs.
                 P ⇒ parameter type.
                 L ⇒ list of elements (D, N). Multiple Paths
                        D ⇒ disseminated distance value.
                        N ⇒ neighbour (e.g network address) which supplied the
                        information. Avoid back-propagation.
          Proactive algorithm
                 Dissemination starts on nodes with services.
                 New neighbour detection ⇒ broadcast parameter table.
                 Neighbour disappears ⇒ remove entries received from that
                 node.
          Updates are propagated across the network.




ADHOC-NOW 2012, Belgrade, Serbia           Overview                      6 / 20
Updates propagation


          Changes are propagated to neighbours using UpdateTable
          messages.
                 Deletions ⇒ list of entries which must be removed from
                 receiver’s tables.
                 Additions ⇒ contains new information to be added.
          Nodes apply received updates
          Changes are incremental. Reliable broadcast needed.
          If changes occur in a node parameter table ⇒ continue prop
          agation. Except
                 Maximum dissemination distance reached.
                 No more values to delete.




ADHOC-NOW 2012, Belgrade, Serbia       Overview                    7 / 20
Taxonomy and parameter grouping

          Pre-shared taxonomy relates the types of disseminated
          service’s parameters
                 Expressed in XMLSchema, RDF or OWL.
          Let A and B be two different parameters
                 Equality occurs when their type is equal.
                 Subsumption means that A has a more general type than B.
                 Not-related if none of previous conditions occurs.
          Parameter grouping
                 A group represents all those parameters related through
                 equality or subsumption relationships.
          Parameter tables are grouped during dissemination.
                 Reduce the number of broadcasted messages.
                 Most general concept. (A and B as A)
                 Highest value.


ADHOC-NOW 2012, Belgrade, Serbia     Taxonomy usage                8 / 20
Neighbour detection


          Protocol is proactive.
                 Disseminates and maintains parameter information.
                 Searches are hold until explictly cancelled.
          Reaction to network mobility needed.
          Usage of periodic beacon messages.
                 Table of known neighbours.
                 Nodes send beacons with a period Tb
                 Expiration time T ≥ 2 ∗ Tb
          Any message acts as beacon message.
          Neighbour updates are notified with an small delay.




ADHOC-NOW 2012, Belgrade, Serbia     Taxonomy usage                  9 / 20
Reliable broadcast



          IEEE802.11 does not avoid hidden terminal/collisions.
          Proposed dissemination uses incremental changes.
          Reliable broadcast
                 List of expected destinations.
                 1-hop neighbours reply with an ACK message.
                 Messages will be repeated until correctly received.
                 Random time for rebroadcast.
          To reduce number of broadcasted messages.
                 Multiple messages ⇒ one single broadcast.




ADHOC-NOW 2012, Belgrade, Serbia      Taxonomy usage                   10 / 20
Taxonomy propagation

          A subsumes B
          New nodes appear




ADHOC-NOW 2012, Belgrade, Serbia   Taxonomy usage   11 / 20
Taxonomy propagation

          A subsumes B
          Network breaks




ADHOC-NOW 2012, Belgrade, Serbia   Taxonomy usage   12 / 20
Experiments configuration

          Simulated with NS-2 + AgentJ (Java 1.6 implementation).
                 100 nodes.
                 700x700 area.
                 Transmission range 100 m.
                 IEEE802.11 as MAC protocol.
                 11 Mb/s and MTU 1500 bytes.
                 Maximum dissemination distance 10 hops.
                 Random Waypoint
                 Speed 0-5 m/s. Pause time: 50, 100 s.
          This scenario has1
                 Average Network Partition ≤ 5%
                 Average Shortest Path = 4.15 hops


      1
        Kurkowski, S., Navidi, W., Camp, T.: Constructing MANET simulation
   scenarios that meet standards. In: IEEE Intl. Conf. on Mobile Adhoc and
   Sensor Systems. pp. 1–9 (2007)
ADHOC-NOW 2012, Belgrade, Serbia    Taxonomy usage                   13 / 20
Dissemination experiment



          2 to 20 services deployed with and without replication.




ADHOC-NOW 2012, Belgrade, Serbia   Taxonomy usage             14 / 20
Service search

          Service search is started by sending a SearchMessage
                 Types of service’s parameters to locate.
                 Propagation controlled using a TTL.
                 Flooded ⇒ Unique search ID.
                 Active until explicitly cancelled.
          Two search types:
                 Exact: I/O parameters of the same exact type are located.
                 Generic: exact and subsumed types are located.
          Node accepts a search message ⇒ SearchResponse
          message is sent to searching node.
                 Using unicast routes created during the propagation of search
                 messages.
                 Response message also create unicast routes.
          Route tables are updated during mobility.


ADHOC-NOW 2012, Belgrade, Serbia         Search                    15 / 20
Search pruning


          Search is propagated only if:
                 TTL ≥ (Dd − v ).
                 v is obtained from the parameter table
          Meaning that:
                 Near compatible parameters exist.
                 Can be reached with the current search message TTL.




ADHOC-NOW 2012, Belgrade, Serbia         Search                  16 / 20
Search experiment
          30 services randomly distributed with 6 parameters each one.
          Searches performed each 5 seconds. Groups of 5 nodes.
          10 seconds until search cancelled.

                                   a)            b)




                                   c)            d)




ADHOC-NOW 2012, Belgrade, Serbia        Search              17 / 20
Conclusions


          Protocol for service discovery proposed and tested.
          Situations where a functional search is required (e.g service
          composition).
          Two parts:
                 Dissemination
                        Disseminates service I/O parameters instead of service type or
                        id.
                        Uses taxonomy information to group paramaters and decrease
                        the number of messages.
                 Service search
                        Performs pruning based on disseminated information to reduce
                        message overhead.




ADHOC-NOW 2012, Belgrade, Serbia           Conclusions                    18 / 20
Future work




          Generalize proposed protocol to propagate and search any
          kind of information, not only service parameters.
          Propagation of taxonomies through ad hoc network avoiding
          a pre-shared one.




ADHOC-NOW 2012, Belgrade, Serbia   Conclusions            19 / 20
Questions?




                                   Thank you!




ADHOC-NOW 2012, Belgrade, Serbia      Conclusions   20 / 20

More Related Content

What's hot

Icemc22010[1].bd siitdstm
Icemc22010[1].bd siitdstmIcemc22010[1].bd siitdstm
Icemc22010[1].bd siitdstmhanums1
 
Performance Evaluation and Comparisons for IPv4&IPv6 using mpls Technologies
Performance Evaluation and Comparisons for IPv4&IPv6 using mpls TechnologiesPerformance Evaluation and Comparisons for IPv4&IPv6 using mpls Technologies
Performance Evaluation and Comparisons for IPv4&IPv6 using mpls Technologiesiosrjce
 
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...IOSR Journals
 
Iccsit2010 paper2
Iccsit2010 paper2Iccsit2010 paper2
Iccsit2010 paper2hanums1
 
Performance Analysis of DRA Based OFDM Data Transmission With Respect to Nove...
Performance Analysis of DRA Based OFDM Data Transmission With Respect to Nove...Performance Analysis of DRA Based OFDM Data Transmission With Respect to Nove...
Performance Analysis of DRA Based OFDM Data Transmission With Respect to Nove...IJERA Editor
 
Network Models
Network ModelsNetwork Models
Network ModelsTechiNerd
 
Chaos Encryption and Coding for Image Transmission over Noisy Channels
Chaos Encryption and Coding for Image Transmission over Noisy ChannelsChaos Encryption and Coding for Image Transmission over Noisy Channels
Chaos Encryption and Coding for Image Transmission over Noisy Channelsiosrjce
 
The performance of turbo codes for wireless communication systems
The performance of turbo codes for wireless communication systemsThe performance of turbo codes for wireless communication systems
The performance of turbo codes for wireless communication systemschakravarthy Gopi
 
High Speed Decoding of Non-Binary Irregular LDPC Codes Using GPUs (Paper)
High Speed Decoding of Non-Binary Irregular LDPC Codes Using GPUs (Paper)High Speed Decoding of Non-Binary Irregular LDPC Codes Using GPUs (Paper)
High Speed Decoding of Non-Binary Irregular LDPC Codes Using GPUs (Paper)Enrique Monzo Solves
 
10.1.1.70.8789
10.1.1.70.878910.1.1.70.8789
10.1.1.70.8789Hoài Bùi
 
Supplementary material for my following paper: Infinite Latent Process Decomp...
Supplementary material for my following paper: Infinite Latent Process Decomp...Supplementary material for my following paper: Infinite Latent Process Decomp...
Supplementary material for my following paper: Infinite Latent Process Decomp...Tomonari Masada
 
A MULTI-LAYER HYBRID TEXT STEGANOGRAPHY FOR SECRET COMMUNICATION USING WORD T...
A MULTI-LAYER HYBRID TEXT STEGANOGRAPHY FOR SECRET COMMUNICATION USING WORD T...A MULTI-LAYER HYBRID TEXT STEGANOGRAPHY FOR SECRET COMMUNICATION USING WORD T...
A MULTI-LAYER HYBRID TEXT STEGANOGRAPHY FOR SECRET COMMUNICATION USING WORD T...IJNSA Journal
 

What's hot (13)

Icemc22010[1].bd siitdstm
Icemc22010[1].bd siitdstmIcemc22010[1].bd siitdstm
Icemc22010[1].bd siitdstm
 
Performance Evaluation and Comparisons for IPv4&IPv6 using mpls Technologies
Performance Evaluation and Comparisons for IPv4&IPv6 using mpls TechnologiesPerformance Evaluation and Comparisons for IPv4&IPv6 using mpls Technologies
Performance Evaluation and Comparisons for IPv4&IPv6 using mpls Technologies
 
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
 
Iccsit2010 paper2
Iccsit2010 paper2Iccsit2010 paper2
Iccsit2010 paper2
 
10 fn s04
10 fn s0410 fn s04
10 fn s04
 
Performance Analysis of DRA Based OFDM Data Transmission With Respect to Nove...
Performance Analysis of DRA Based OFDM Data Transmission With Respect to Nove...Performance Analysis of DRA Based OFDM Data Transmission With Respect to Nove...
Performance Analysis of DRA Based OFDM Data Transmission With Respect to Nove...
 
Network Models
Network ModelsNetwork Models
Network Models
 
Chaos Encryption and Coding for Image Transmission over Noisy Channels
Chaos Encryption and Coding for Image Transmission over Noisy ChannelsChaos Encryption and Coding for Image Transmission over Noisy Channels
Chaos Encryption and Coding for Image Transmission over Noisy Channels
 
The performance of turbo codes for wireless communication systems
The performance of turbo codes for wireless communication systemsThe performance of turbo codes for wireless communication systems
The performance of turbo codes for wireless communication systems
 
High Speed Decoding of Non-Binary Irregular LDPC Codes Using GPUs (Paper)
High Speed Decoding of Non-Binary Irregular LDPC Codes Using GPUs (Paper)High Speed Decoding of Non-Binary Irregular LDPC Codes Using GPUs (Paper)
High Speed Decoding of Non-Binary Irregular LDPC Codes Using GPUs (Paper)
 
10.1.1.70.8789
10.1.1.70.878910.1.1.70.8789
10.1.1.70.8789
 
Supplementary material for my following paper: Infinite Latent Process Decomp...
Supplementary material for my following paper: Infinite Latent Process Decomp...Supplementary material for my following paper: Infinite Latent Process Decomp...
Supplementary material for my following paper: Infinite Latent Process Decomp...
 
A MULTI-LAYER HYBRID TEXT STEGANOGRAPHY FOR SECRET COMMUNICATION USING WORD T...
A MULTI-LAYER HYBRID TEXT STEGANOGRAPHY FOR SECRET COMMUNICATION USING WORD T...A MULTI-LAYER HYBRID TEXT STEGANOGRAPHY FOR SECRET COMMUNICATION USING WORD T...
A MULTI-LAYER HYBRID TEXT STEGANOGRAPHY FOR SECRET COMMUNICATION USING WORD T...
 

Similar to A Parameter-Based Service Discovery Protocol for Mobile Ad-Hoc Networks

COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTSCOMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTSijp2p
 
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANETSIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANETijfcstjournal
 
Sequentail Max Search (SMS) resouce allocation algorithm
Sequentail Max Search (SMS) resouce allocation algorithm Sequentail Max Search (SMS) resouce allocation algorithm
Sequentail Max Search (SMS) resouce allocation algorithm amal algedir
 
IRJET- A Survey on Mobility in RPL for IoT Applications
IRJET- A Survey on Mobility in RPL for IoT ApplicationsIRJET- A Survey on Mobility in RPL for IoT Applications
IRJET- A Survey on Mobility in RPL for IoT ApplicationsIRJET Journal
 
Algorithm Solved IEEE Projects 2012 2013 Java @ Seabirdssolutions
Algorithm Solved IEEE Projects 2012 2013 Java @ SeabirdssolutionsAlgorithm Solved IEEE Projects 2012 2013 Java @ Seabirdssolutions
Algorithm Solved IEEE Projects 2012 2013 Java @ SeabirdssolutionsSBGC
 
Ieee projects 2012 for cse
Ieee projects 2012 for cseIeee projects 2012 for cse
Ieee projects 2012 for cseSBGC
 
Ieee projects 2012 for cse
Ieee projects 2012 for cseIeee projects 2012 for cse
Ieee projects 2012 for cseSBGC
 
Selective Green Device Discovery for Device to Device Communication
Selective Green Device Discovery for Device to Device CommunicationSelective Green Device Discovery for Device to Device Communication
Selective Green Device Discovery for Device to Device CommunicationTELKOMNIKA JOURNAL
 
ICWE2017 BigDataEurope
ICWE2017 BigDataEuropeICWE2017 BigDataEurope
ICWE2017 BigDataEuropeBigData_Europe
 
Vitality productivity Multipath Routing for Wireless Sensor Networks: A Genet...
Vitality productivity Multipath Routing for Wireless Sensor Networks: A Genet...Vitality productivity Multipath Routing for Wireless Sensor Networks: A Genet...
Vitality productivity Multipath Routing for Wireless Sensor Networks: A Genet...dbpublications
 
Major Report on ADIAN
Major Report on ADIANMajor Report on ADIAN
Major Report on ADIANsmittal121
 
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Narendra Singh Yadav
 
Flooding_vs_Gossiping_By_Debraj_Paul.pptx
Flooding_vs_Gossiping_By_Debraj_Paul.pptxFlooding_vs_Gossiping_By_Debraj_Paul.pptx
Flooding_vs_Gossiping_By_Debraj_Paul.pptxAbyThomas54
 
TFUZZY-OF: a new method for routing protocol for low-power and lossy networks...
TFUZZY-OF: a new method for routing protocol for low-power and lossy networks...TFUZZY-OF: a new method for routing protocol for low-power and lossy networks...
TFUZZY-OF: a new method for routing protocol for low-power and lossy networks...IJECEIAES
 
Device Discovery Schemes for Energy-Efficient Cluster Head Rotation in D2D
Device Discovery Schemes for Energy-Efficient Cluster Head Rotation in D2DDevice Discovery Schemes for Energy-Efficient Cluster Head Rotation in D2D
Device Discovery Schemes for Energy-Efficient Cluster Head Rotation in D2DTELKOMNIKA JOURNAL
 
Ncct Ieee Software Abstract Collection Volume 2 50+ Abst
Ncct   Ieee Software Abstract Collection Volume 2   50+ AbstNcct   Ieee Software Abstract Collection Volume 2   50+ Abst
Ncct Ieee Software Abstract Collection Volume 2 50+ Abstncct
 

Similar to A Parameter-Based Service Discovery Protocol for Mobile Ad-Hoc Networks (20)

COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTSCOMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
 
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANETSIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
 
Sequentail Max Search (SMS) resouce allocation algorithm
Sequentail Max Search (SMS) resouce allocation algorithm Sequentail Max Search (SMS) resouce allocation algorithm
Sequentail Max Search (SMS) resouce allocation algorithm
 
ewsn09
ewsn09ewsn09
ewsn09
 
IRJET- A Survey on Mobility in RPL for IoT Applications
IRJET- A Survey on Mobility in RPL for IoT ApplicationsIRJET- A Survey on Mobility in RPL for IoT Applications
IRJET- A Survey on Mobility in RPL for IoT Applications
 
Algorithm Solved IEEE Projects 2012 2013 Java @ Seabirdssolutions
Algorithm Solved IEEE Projects 2012 2013 Java @ SeabirdssolutionsAlgorithm Solved IEEE Projects 2012 2013 Java @ Seabirdssolutions
Algorithm Solved IEEE Projects 2012 2013 Java @ Seabirdssolutions
 
Ieee projects 2012 for cse
Ieee projects 2012 for cseIeee projects 2012 for cse
Ieee projects 2012 for cse
 
Ieee projects 2012 for cse
Ieee projects 2012 for cseIeee projects 2012 for cse
Ieee projects 2012 for cse
 
Selective Green Device Discovery for Device to Device Communication
Selective Green Device Discovery for Device to Device CommunicationSelective Green Device Discovery for Device to Device Communication
Selective Green Device Discovery for Device to Device Communication
 
ICWE2017 BigDataEurope
ICWE2017 BigDataEuropeICWE2017 BigDataEurope
ICWE2017 BigDataEurope
 
Vitality productivity Multipath Routing for Wireless Sensor Networks: A Genet...
Vitality productivity Multipath Routing for Wireless Sensor Networks: A Genet...Vitality productivity Multipath Routing for Wireless Sensor Networks: A Genet...
Vitality productivity Multipath Routing for Wireless Sensor Networks: A Genet...
 
Major Report on ADIAN
Major Report on ADIANMajor Report on ADIAN
Major Report on ADIAN
 
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
 
Ns2 x graphs
Ns2 x graphsNs2 x graphs
Ns2 x graphs
 
Flooding_vs_Gossiping_By_Debraj_Paul.pptx
Flooding_vs_Gossiping_By_Debraj_Paul.pptxFlooding_vs_Gossiping_By_Debraj_Paul.pptx
Flooding_vs_Gossiping_By_Debraj_Paul.pptx
 
Ip2515381543
Ip2515381543Ip2515381543
Ip2515381543
 
Ip2515381543
Ip2515381543Ip2515381543
Ip2515381543
 
TFUZZY-OF: a new method for routing protocol for low-power and lossy networks...
TFUZZY-OF: a new method for routing protocol for low-power and lossy networks...TFUZZY-OF: a new method for routing protocol for low-power and lossy networks...
TFUZZY-OF: a new method for routing protocol for low-power and lossy networks...
 
Device Discovery Schemes for Energy-Efficient Cluster Head Rotation in D2D
Device Discovery Schemes for Energy-Efficient Cluster Head Rotation in D2DDevice Discovery Schemes for Energy-Efficient Cluster Head Rotation in D2D
Device Discovery Schemes for Energy-Efficient Cluster Head Rotation in D2D
 
Ncct Ieee Software Abstract Collection Volume 2 50+ Abst
Ncct   Ieee Software Abstract Collection Volume 2   50+ AbstNcct   Ieee Software Abstract Collection Volume 2   50+ Abst
Ncct Ieee Software Abstract Collection Volume 2 50+ Abst
 

Recently uploaded

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 

Recently uploaded (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 

A Parameter-Based Service Discovery Protocol for Mobile Ad-Hoc Networks

  • 1. A Parameter-Based Service Discovery Protocol for Mobile Ad-Hoc Networks ´ ˜ Unai Aguilera and Diego Lopez-de-Ipina unai.aguilera@deusto.es DeustoTech - Deusto Institute of Technology, University of Deusto Bilbao, Spain http://www.morelab.deusto.es July 10, 2012
  • 2. Outline Introduction Overview Taxonomy usage Search Conclusions ADHOC-NOW 2012, Belgrade, Serbia 2 / 20
  • 3. Motivation MANET of devices providing services. Devices connect/disconnect No central information manager Service Oriented Applications ⇒ Service Discovery Current solutions Search using service identifiers or service type Not suitable when searching for functional properties Service Composition Create service work-flows to provide new functionalities to the users. Discover compatible services (Input/Output). ADHOC-NOW 2012, Belgrade, Serbia Introduction 3 / 20
  • 4. Parameter-based Service Discovery Services are located using their input/output parameters I/O parameters are classified Taxonomy of concepts Parameter dissemination Service search and route management Other elements Neighbour detection ⇒ using periodic beacon messages. Reliable broadcast ⇒ ACK messages ADHOC-NOW 2012, Belgrade, Serbia Overview 4 / 20
  • 5. Parameter dissemination Each node mantains a Parameter table The higher the value ⇒ the closer a parameter of that type. Local parameters Dd (max. dissemination value). Real distance (hops) = Dd - value. Decremented with each hop until it reaches 0. ADHOC-NOW 2012, Belgrade, Serbia Overview 5 / 20
  • 6. Parameter table Defined as a table of {P, L} pairs. P ⇒ parameter type. L ⇒ list of elements (D, N). Multiple Paths D ⇒ disseminated distance value. N ⇒ neighbour (e.g network address) which supplied the information. Avoid back-propagation. Proactive algorithm Dissemination starts on nodes with services. New neighbour detection ⇒ broadcast parameter table. Neighbour disappears ⇒ remove entries received from that node. Updates are propagated across the network. ADHOC-NOW 2012, Belgrade, Serbia Overview 6 / 20
  • 7. Updates propagation Changes are propagated to neighbours using UpdateTable messages. Deletions ⇒ list of entries which must be removed from receiver’s tables. Additions ⇒ contains new information to be added. Nodes apply received updates Changes are incremental. Reliable broadcast needed. If changes occur in a node parameter table ⇒ continue prop agation. Except Maximum dissemination distance reached. No more values to delete. ADHOC-NOW 2012, Belgrade, Serbia Overview 7 / 20
  • 8. Taxonomy and parameter grouping Pre-shared taxonomy relates the types of disseminated service’s parameters Expressed in XMLSchema, RDF or OWL. Let A and B be two different parameters Equality occurs when their type is equal. Subsumption means that A has a more general type than B. Not-related if none of previous conditions occurs. Parameter grouping A group represents all those parameters related through equality or subsumption relationships. Parameter tables are grouped during dissemination. Reduce the number of broadcasted messages. Most general concept. (A and B as A) Highest value. ADHOC-NOW 2012, Belgrade, Serbia Taxonomy usage 8 / 20
  • 9. Neighbour detection Protocol is proactive. Disseminates and maintains parameter information. Searches are hold until explictly cancelled. Reaction to network mobility needed. Usage of periodic beacon messages. Table of known neighbours. Nodes send beacons with a period Tb Expiration time T ≥ 2 ∗ Tb Any message acts as beacon message. Neighbour updates are notified with an small delay. ADHOC-NOW 2012, Belgrade, Serbia Taxonomy usage 9 / 20
  • 10. Reliable broadcast IEEE802.11 does not avoid hidden terminal/collisions. Proposed dissemination uses incremental changes. Reliable broadcast List of expected destinations. 1-hop neighbours reply with an ACK message. Messages will be repeated until correctly received. Random time for rebroadcast. To reduce number of broadcasted messages. Multiple messages ⇒ one single broadcast. ADHOC-NOW 2012, Belgrade, Serbia Taxonomy usage 10 / 20
  • 11. Taxonomy propagation A subsumes B New nodes appear ADHOC-NOW 2012, Belgrade, Serbia Taxonomy usage 11 / 20
  • 12. Taxonomy propagation A subsumes B Network breaks ADHOC-NOW 2012, Belgrade, Serbia Taxonomy usage 12 / 20
  • 13. Experiments configuration Simulated with NS-2 + AgentJ (Java 1.6 implementation). 100 nodes. 700x700 area. Transmission range 100 m. IEEE802.11 as MAC protocol. 11 Mb/s and MTU 1500 bytes. Maximum dissemination distance 10 hops. Random Waypoint Speed 0-5 m/s. Pause time: 50, 100 s. This scenario has1 Average Network Partition ≤ 5% Average Shortest Path = 4.15 hops 1 Kurkowski, S., Navidi, W., Camp, T.: Constructing MANET simulation scenarios that meet standards. In: IEEE Intl. Conf. on Mobile Adhoc and Sensor Systems. pp. 1–9 (2007) ADHOC-NOW 2012, Belgrade, Serbia Taxonomy usage 13 / 20
  • 14. Dissemination experiment 2 to 20 services deployed with and without replication. ADHOC-NOW 2012, Belgrade, Serbia Taxonomy usage 14 / 20
  • 15. Service search Service search is started by sending a SearchMessage Types of service’s parameters to locate. Propagation controlled using a TTL. Flooded ⇒ Unique search ID. Active until explicitly cancelled. Two search types: Exact: I/O parameters of the same exact type are located. Generic: exact and subsumed types are located. Node accepts a search message ⇒ SearchResponse message is sent to searching node. Using unicast routes created during the propagation of search messages. Response message also create unicast routes. Route tables are updated during mobility. ADHOC-NOW 2012, Belgrade, Serbia Search 15 / 20
  • 16. Search pruning Search is propagated only if: TTL ≥ (Dd − v ). v is obtained from the parameter table Meaning that: Near compatible parameters exist. Can be reached with the current search message TTL. ADHOC-NOW 2012, Belgrade, Serbia Search 16 / 20
  • 17. Search experiment 30 services randomly distributed with 6 parameters each one. Searches performed each 5 seconds. Groups of 5 nodes. 10 seconds until search cancelled. a) b) c) d) ADHOC-NOW 2012, Belgrade, Serbia Search 17 / 20
  • 18. Conclusions Protocol for service discovery proposed and tested. Situations where a functional search is required (e.g service composition). Two parts: Dissemination Disseminates service I/O parameters instead of service type or id. Uses taxonomy information to group paramaters and decrease the number of messages. Service search Performs pruning based on disseminated information to reduce message overhead. ADHOC-NOW 2012, Belgrade, Serbia Conclusions 18 / 20
  • 19. Future work Generalize proposed protocol to propagate and search any kind of information, not only service parameters. Propagation of taxonomies through ad hoc network avoiding a pre-shared one. ADHOC-NOW 2012, Belgrade, Serbia Conclusions 19 / 20
  • 20. Questions? Thank you! ADHOC-NOW 2012, Belgrade, Serbia Conclusions 20 / 20