SlideShare a Scribd company logo
1 of 57
Download to read offline
Assessing data dissemination strategies
within Triple Spaces on the Web of Things
                          esIoT 2012


                ´                  ´          ˜
         Aitor Gomez-Goiri, Diego Lopez-de-Ipina

DeustoTech - Deusto Institute of Technology, University of Deusto
              http://www.morelab.deusto.es


                         July 4, 2012
Outline



     Introduction

     Data dissemination strategies

     Evaluation

     Conclusions




Assessing data dissemination strategies   2 / 57
Outline



     Introduction

     Data dissemination strategies

     Evaluation

     Conclusions




Assessing data dissemination strategies   Introduction   3 / 57
The Web of Things




             Growing connectivity of everyday objects.
             WoT to integrate things.
                     Scalable interaction, integration with the web world...
                     But also inherits problems from the web world!
             Lack of expressiveness and human orientation
                     The Semantic Web enables sharing knowledge across
                     different applications




Assessing data dissemination strategies     Introduction                   4 / 57
The Semantic Web


             The vision of the Semantic Web is to extend principles of
             the Web from documents to data. Data should be
             accessed using the general Web architecture using, e.g.,
             URI-s; data should be related to one another just as
             documents (or portions of documents) are already. This
             also means creation of a common framework that allows
             data to be shared and reused across application,
             enterprise, and community boundaries, to be processed
             automatically by tools as well as manually, including
             revealing possible new relationships among pieces of
             data. [Con11]




Assessing data dissemination strategies   Introduction           5 / 57
The Semantic Web


             The vision of the Semantic Web is to extend principles of
             the Web from documents to data. Data should be
             accessed using the general Web architecture using, e.g.,
             URI-s; data should be related to one another just as
             documents (or portions of documents) are already. This
             also means creation of a common framework that allows
             data to be shared and reused across application,
             enterprise, and community boundaries, to be processed
             automatically by tools as well as manually, including
             revealing possible new relationships among pieces of
             data. [Con11]




Assessing data dissemination strategies   Introduction           6 / 57
Triple Space Computing




             Describes the knowledge shared using the SW
                     2 applications using standard ontologies can interact among
                     them automatically enriching one each other.
             Space-based computing
                     time autonomy
                     space autonomy
                     reference autonomy




Assessing data dissemination strategies    Introduction                 7 / 57
Goal




      How to realize this shared blackboard in the IoT?




Assessing data dissemination strategies   Introduction   9 / 57
Outline


     Introduction

     Data dissemination strategies
        Centralization
        Negative broadcasting
        Gossiping based strategy

     Evaluation

     Conclusions




Assessing data dissemination strategies   Data dissemination strategies   10 / 57
Centralization in short




                         r = |Q| + wf .t.(|N| − 1)                                  (1)




Assessing data dissemination strategies   Data dissemination strategies   13 / 57
Negative broadcasting in short




                                    r = |Q|.(|N| − 1)                               (2)




Assessing data dissemination strategies   Data dissemination strategies   16 / 57
How to improve the NB?

                       Reducing the amount of receivers for a query.




Assessing data dissemination strategies   Data dissemination strategies   17 / 57
Problem: how to perfectly predict them without
        knowing all what they know?
TBox and ABox




     According to Nardi and Brachman [NB03]...

     TBox contains the knowledge which describes general properties
     of concepts or terminology.

     ABox contains knowledge that is specific to the individuals of the
     domain of discourse.




Assessing data dissemination strategies   Data dissemination strategies   22 / 57
In other words...




     With TBox we can describe the type of devices there are in the
     world or the sensors they have.

     With ABox we can specify that HTC is a mobile brand or that the
     sensed temperature is 3o C.




Assessing data dissemination strategies   Data dissemination strategies   23 / 57
TBox and ABox in IoT scenarios?




             Mobile devices: user profile,...
             Sensors and actuators
             The structure of the data barely changes!




Assessing data dissemination strategies   Data dissemination strategies   24 / 57
Our proposal




             We can assume that all the nodes have or can easily obtain
             the TBox information.
             Nodes gossip the classes of concepts (rdf:type) shared by
             other nodes.




Assessing data dissemination strategies   Data dissemination strategies   25 / 57
Subject       Predicate                   Object

wot:meas1      rdf:type        ssn:N02Observation
wot:meas1      ssn:observedProperty sweet:NO2
wot:meas1       ssn:observationResult wot:outpt1
wot:outpt1     ssn:hasValue              wot:val1
wot:val1      ssb:QuantityValue                17
wot:val1       dul:isClassifiedBy
             muo-ucum:microgram-per-cubic-meter
...             ...              ...
Subject       Predicate                  Object

wot:meas1      rdf:type       ssn:N02Observation
wot:meas1      ssn:observedProperty sweet:NO2
wot:meas1       ssn:observationResult wot:outpt1
wot:outpt1     ssn:hasValue             wot:val1
wot:val1       ssb:QuantityValue              17
wot:val1        dul:isClassifiedBy
             muo-ucum:microgram-per-cubic-meter
...             ...               ...
Outline



     Introduction

     Data dissemination strategies

     Evaluation

     Conclusions




Assessing data dissemination strategies   Evaluation   29 / 57
Remember




             We wanted to know which strategy fits better for IoT.
             Otsopack: our publicly available TSC middleware which uses
             HTTP.
             Therefore: communication between nodes was point to point
             and exchanges data RDF triples.




Assessing data dissemination strategies   Evaluation            30 / 57
Methodology




             Discovery process was ignored.
             The Semantic Sensor Network Ontology (SSN).
                     Datasets from the University of Utah and the University of
                     Deusto.
             Measures taken from real embedded web servers.
             Simpy.




Assessing data dissemination strategies     Evaluation                   31 / 57
Performance Metrics




             Precision: the fraction of nodes which answered relevant
             results.
             Recall: the fraction of relevant answers returned.
             Response time.




Assessing data dissemination strategies   Evaluation              32 / 57
Outline



     Introduction

     Data dissemination strategies

     Evaluation

     Conclusions




Assessing data dissemination strategies   Conclusions   36 / 57
Conclusions




             Need of a gossiping approach.
             Increase the precision.
             Simulate specific scenarios from the literature.




Assessing data dissemination strategies   Conclusions          37 / 57
Assessing data dissemination strategies   Conclusions   38 / 57
Bibliography




            World Wide Web Consortium.
            W3c semantic web faq, August 2011.
            D. Nardi and R.J. Brachman.
            An introduction to description logics.
            The description logic handbook: theory, implementation, and
            applications, pages 1–40, 2003.




Assessing data dissemination strategies   Bibliography        39 / 57
Assessing data dissemination strategies   Backup slides   40 / 57
Semantic Web example




Assessing data dissemination strategies   Backup slides   41 / 57
Write




     public String write(String spaceURI, Graph ITriples)
           throws TSException;




Assessing data dissemination strategies   Backup slides   42 / 57
Read




     public Graph read
         (String spaceURI, String graphURI, long timeout)
         throws TSException;

     public Graph read
         (String spaceURI, Template template, long timeout)
         throws TSException;


Assessing data dissemination strategies   Backup slides   43 / 57
Take




     public Graph take
         (String spaceURI, String graphURI, long timeout)
         throws TSException;

     public Graph take
         (String spaceURI, Template template, long timeout)
         throws TSException;


Assessing data dissemination strategies   Backup slides   44 / 57
Query




     public Graph query(String spaceURI, Template template)
         throws TSException;




Assessing data dissemination strategies   Backup slides   45 / 57
Reasoning



       Device                             TBox         ABox
       Regular computer
                                          2.787       0.045
        (Sesame 2.6.4)
       Samsung Galaxy Tab
                                          17.342      0.225
        (Sesame 2.4.2)
       FoxG20
                                          48.939      1.443
        (Fuxi)




Assessing data dissemination strategies      Backup slides    46 / 57
Our realization of the ideas towards this adaptation are
     incarnated on Otsopack Open source project
Otsopack Layers




                                                   Each Otsopack instance.




Assessing data dissemination strategies   Backup slides               48 / 57
About HTTP and TSC




     The HTTP verbs retrieve, create, modify or delete web resources

      The TS primitives retrieve, create, modify or delete RDF graphs
                                on a space

             (right, to be honest TS also offers a query, which works at space level)




Assessing data dissemination strategies     Backup slides                    49 / 57
A RESTful HTTP API




             To expose TS querying primitives
             HTTP status codes
             Using content negotiation




Assessing data dissemination strategies   Backup slides   50 / 57
Discovery




             Registry based discovery
             Multicast based implemented
             Easy to adopt new ones: DNS, mDNS, lmDNS etc.




Assessing data dissemination strategies   Backup slides      51 / 57
TSC API in depth



       HTTP request               URL
          GET                     /{sp}/query/wildcards/{s}/{p}/{o-uri}
                                  /{sp}/query/wildcards/{s}/{p}/{o-type}/{o-value}
               GET                /{sp}/graphs/{g}
               GET                /{sp}/graphs/wildcards/{s}/{p}/{o-uri}
                                  /{sp}/graphs/wildcards/{s}/{p}/{o-type}/{o-value}
           DELETE                 /{sp}/graphs/{g}
           DELETE                 /{sp}/graphs/wildcards/{s}/{p}/{o-uri}
                                  /{sp}/graphs/wildcards/{s}/{p}/{o-type}/{o-value}




Assessing data dissemination strategies        Backup slides                52 / 57
XBee gateway platform




          ConnectPort R X2 (XBee to IP
          gateway)
          RAM: 8MB
          Platform version: Python 2.4
          REST libraries: Python Std Lib
          Semantic libraries: None




Assessing data dissemination strategies   Backup slides   53 / 57
Case of study 1: XBee




             We developed a restricted middleware version using Python
             With more than 15 concurrent requests problems were
             experienced




Assessing data dissemination strategies   Backup slides       54 / 57
FoxG20 platform




          Processor: 400Mhz Atmel ARM9
          RAM: 64MB
          Platform version: Python 2.5
          REST libraries: Python Std Lib
          Semantic libraries: Fuxi




Assessing data dissemination strategies   Backup slides   55 / 57
Case of study 2: FoxG20



             Python implementation used
                     Because is lighter
                     Does not implement all the modules defined
                     This may be desirable for less powerful devices
             Reasoning took a long time
                     TBox: x17 regular computer, x2 galaxy tab
                     ABox: x32 - x6 galaxy tab
               ⇓
             should be limited to special occasions




Assessing data dissemination strategies    Backup slides               56 / 57
All rights of images are reserved by the
original owners*, the rest of the content is licensed
  under a Creative Commons by-sa 3.0 license.




  * Kit (practicalowl), Stefan Paunovi´ , Amortize and Marco Crupi Digi
                                      c
  International Inc. and Acme systems.

More Related Content

What's hot

Defending against collaborative attacks by
Defending against collaborative attacks byDefending against collaborative attacks by
Defending against collaborative attacks byjpstudcorner
 
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...TELKOMNIKA JOURNAL
 
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSLOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSEditor IJCATR
 
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...ijscai
 
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODELAN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODELijsptm
 
Paper id 71201913
Paper id 71201913Paper id 71201913
Paper id 71201913IJRAT
 
Paper id 24201422
Paper id 24201422Paper id 24201422
Paper id 24201422IJRAT
 
An Integrated Inductive-Deductive Framework for Data Mapping in Wireless Sens...
An Integrated Inductive-Deductive Framework for Data Mapping in Wireless Sens...An Integrated Inductive-Deductive Framework for Data Mapping in Wireless Sens...
An Integrated Inductive-Deductive Framework for Data Mapping in Wireless Sens...M H
 
An efficient hybrid peer to-peersystemfordistributeddatasharing
An efficient hybrid peer to-peersystemfordistributeddatasharingAn efficient hybrid peer to-peersystemfordistributeddatasharing
An efficient hybrid peer to-peersystemfordistributeddatasharingambitlick
 
Additive gaussian noise based data perturbation in multi level trust privacy ...
Additive gaussian noise based data perturbation in multi level trust privacy ...Additive gaussian noise based data perturbation in multi level trust privacy ...
Additive gaussian noise based data perturbation in multi level trust privacy ...IJDKP
 
Significant Data Hiding through Discrete Wavelet Transformation Approach
Significant Data Hiding through Discrete Wavelet Transformation ApproachSignificant Data Hiding through Discrete Wavelet Transformation Approach
Significant Data Hiding through Discrete Wavelet Transformation ApproachEswar Publications
 
expeditions praneeth_june-2021
expeditions praneeth_june-2021expeditions praneeth_june-2021
expeditions praneeth_june-2021Praneeth Vepakomma
 

What's hot (17)

Defending against collaborative attacks by
Defending against collaborative attacks byDefending against collaborative attacks by
Defending against collaborative attacks by
 
Dsto tr-1436
Dsto tr-1436Dsto tr-1436
Dsto tr-1436
 
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...
 
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSLOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
 
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...
 
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODELAN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
 
Paper id 71201913
Paper id 71201913Paper id 71201913
Paper id 71201913
 
Paper id 24201422
Paper id 24201422Paper id 24201422
Paper id 24201422
 
An Integrated Inductive-Deductive Framework for Data Mapping in Wireless Sens...
An Integrated Inductive-Deductive Framework for Data Mapping in Wireless Sens...An Integrated Inductive-Deductive Framework for Data Mapping in Wireless Sens...
An Integrated Inductive-Deductive Framework for Data Mapping in Wireless Sens...
 
Deep leaning Vincent Vanhoucke
Deep leaning Vincent VanhouckeDeep leaning Vincent Vanhoucke
Deep leaning Vincent Vanhoucke
 
An efficient hybrid peer to-peersystemfordistributeddatasharing
An efficient hybrid peer to-peersystemfordistributeddatasharingAn efficient hybrid peer to-peersystemfordistributeddatasharing
An efficient hybrid peer to-peersystemfordistributeddatasharing
 
41 125-1-pb
41 125-1-pb41 125-1-pb
41 125-1-pb
 
Additive gaussian noise based data perturbation in multi level trust privacy ...
Additive gaussian noise based data perturbation in multi level trust privacy ...Additive gaussian noise based data perturbation in multi level trust privacy ...
Additive gaussian noise based data perturbation in multi level trust privacy ...
 
Significant Data Hiding through Discrete Wavelet Transformation Approach
Significant Data Hiding through Discrete Wavelet Transformation ApproachSignificant Data Hiding through Discrete Wavelet Transformation Approach
Significant Data Hiding through Discrete Wavelet Transformation Approach
 
expeditions praneeth_june-2021
expeditions praneeth_june-2021expeditions praneeth_june-2021
expeditions praneeth_june-2021
 
17
1717
17
 
16
1616
16
 

Viewers also liked

Viewers also liked (9)

Redis
RedisRedis
Redis
 
Triple Space adaptation for IoT
Triple Space adaptation for IoTTriple Space adaptation for IoT
Triple Space adaptation for IoT
 
Presentación de Otsopack en Tecnalia
Presentación de Otsopack en TecnaliaPresentación de Otsopack en Tecnalia
Presentación de Otsopack en Tecnalia
 
2D arraya eta objetu arrayak
2D arraya eta objetu arrayak2D arraya eta objetu arrayak
2D arraya eta objetu arrayak
 
Zuhaitzak
ZuhaitzakZuhaitzak
Zuhaitzak
 
Coordination of Resource-Constrained Devices through a Distributed Semantic S...
Coordination of Resource-Constrained Devices through a Distributed Semantic S...Coordination of Resource-Constrained Devices through a Distributed Semantic S...
Coordination of Resource-Constrained Devices through a Distributed Semantic S...
 
Errekurtsibitatea
ErrekurtsibitateaErrekurtsibitatea
Errekurtsibitatea
 
RESTful Triple Spaces of Things
RESTful Triple Spaces of ThingsRESTful Triple Spaces of Things
RESTful Triple Spaces of Things
 
Introducción a PHP5
Introducción a PHP5Introducción a PHP5
Introducción a PHP5
 

Similar to Assessing data dissemination strategies

10.1.1.21.5883
10.1.1.21.588310.1.1.21.5883
10.1.1.21.5883paserv
 
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONranjith kumar
 
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONranjith kumar
 
Secure and distributed data discovery and dissemination in wireless sensor ne...
Secure and distributed data discovery and dissemination in wireless sensor ne...Secure and distributed data discovery and dissemination in wireless sensor ne...
Secure and distributed data discovery and dissemination in wireless sensor ne...Pvrtechnologies Nellore
 
Big data: Challenges, Practices and Technologies
Big data: Challenges, Practices and TechnologiesBig data: Challenges, Practices and Technologies
Big data: Challenges, Practices and TechnologiesNavneet Randhawa
 
On Using Network Science in Mining Developers Collaboration in Software Engin...
On Using Network Science in Mining Developers Collaboration in Software Engin...On Using Network Science in Mining Developers Collaboration in Software Engin...
On Using Network Science in Mining Developers Collaboration in Software Engin...IJDKP
 
On Using Network Science in Mining Developers Collaboration in Software Engin...
On Using Network Science in Mining Developers Collaboration in Software Engin...On Using Network Science in Mining Developers Collaboration in Software Engin...
On Using Network Science in Mining Developers Collaboration in Software Engin...IJDKP
 
A scenario based approach for dealing with
A scenario based approach for dealing withA scenario based approach for dealing with
A scenario based approach for dealing withijcsa
 
Java Abs Peer To Peer Design & Implementation Of A Tuple Space
Java Abs   Peer To Peer Design & Implementation Of A Tuple SpaceJava Abs   Peer To Peer Design & Implementation Of A Tuple Space
Java Abs Peer To Peer Design & Implementation Of A Tuple Spacencct
 
Java Abs Peer To Peer Design & Implementation Of A Tuple S
Java Abs   Peer To Peer Design & Implementation Of A Tuple SJava Abs   Peer To Peer Design & Implementation Of A Tuple S
Java Abs Peer To Peer Design & Implementation Of A Tuple Sncct
 
IRJET- Deduplication Detection for Similarity in Document Analysis Via Vector...
IRJET- Deduplication Detection for Similarity in Document Analysis Via Vector...IRJET- Deduplication Detection for Similarity in Document Analysis Via Vector...
IRJET- Deduplication Detection for Similarity in Document Analysis Via Vector...IRJET Journal
 
IRJET- Deduplication Detection for Similarity in Document Analysis Via Vector...
IRJET- Deduplication Detection for Similarity in Document Analysis Via Vector...IRJET- Deduplication Detection for Similarity in Document Analysis Via Vector...
IRJET- Deduplication Detection for Similarity in Document Analysis Via Vector...IRJET Journal
 
On distributed fuzzy decision trees for big data
On distributed fuzzy decision trees for big dataOn distributed fuzzy decision trees for big data
On distributed fuzzy decision trees for big datanexgentechnology
 
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKING
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKINGINTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKING
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKINGdannyijwest
 
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKING
INTELLIGENT SOCIAL NETWORKS MODEL BASED  ON SEMANTIC TAG RANKINGINTELLIGENT SOCIAL NETWORKS MODEL BASED  ON SEMANTIC TAG RANKING
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKINGdannyijwest
 
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKING
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKINGINTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKING
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKINGIJwest
 

Similar to Assessing data dissemination strategies (20)

10.1.1.21.5883
10.1.1.21.588310.1.1.21.5883
10.1.1.21.5883
 
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
 
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
 
Secure and distributed data discovery and dissemination in wireless sensor ne...
Secure and distributed data discovery and dissemination in wireless sensor ne...Secure and distributed data discovery and dissemination in wireless sensor ne...
Secure and distributed data discovery and dissemination in wireless sensor ne...
 
Big data: Challenges, Practices and Technologies
Big data: Challenges, Practices and TechnologiesBig data: Challenges, Practices and Technologies
Big data: Challenges, Practices and Technologies
 
31 34
31 3431 34
31 34
 
On Using Network Science in Mining Developers Collaboration in Software Engin...
On Using Network Science in Mining Developers Collaboration in Software Engin...On Using Network Science in Mining Developers Collaboration in Software Engin...
On Using Network Science in Mining Developers Collaboration in Software Engin...
 
On Using Network Science in Mining Developers Collaboration in Software Engin...
On Using Network Science in Mining Developers Collaboration in Software Engin...On Using Network Science in Mining Developers Collaboration in Software Engin...
On Using Network Science in Mining Developers Collaboration in Software Engin...
 
LatentCross.pdf
LatentCross.pdfLatentCross.pdf
LatentCross.pdf
 
Cyberistructure
CyberistructureCyberistructure
Cyberistructure
 
A scenario based approach for dealing with
A scenario based approach for dealing withA scenario based approach for dealing with
A scenario based approach for dealing with
 
Java Abs Peer To Peer Design & Implementation Of A Tuple Space
Java Abs   Peer To Peer Design & Implementation Of A Tuple SpaceJava Abs   Peer To Peer Design & Implementation Of A Tuple Space
Java Abs Peer To Peer Design & Implementation Of A Tuple Space
 
Java Abs Peer To Peer Design & Implementation Of A Tuple S
Java Abs   Peer To Peer Design & Implementation Of A Tuple SJava Abs   Peer To Peer Design & Implementation Of A Tuple S
Java Abs Peer To Peer Design & Implementation Of A Tuple S
 
IRJET- Deduplication Detection for Similarity in Document Analysis Via Vector...
IRJET- Deduplication Detection for Similarity in Document Analysis Via Vector...IRJET- Deduplication Detection for Similarity in Document Analysis Via Vector...
IRJET- Deduplication Detection for Similarity in Document Analysis Via Vector...
 
IRJET- Deduplication Detection for Similarity in Document Analysis Via Vector...
IRJET- Deduplication Detection for Similarity in Document Analysis Via Vector...IRJET- Deduplication Detection for Similarity in Document Analysis Via Vector...
IRJET- Deduplication Detection for Similarity in Document Analysis Via Vector...
 
Shifting the Burden from the User to the Data Provider
Shifting the Burden from the User to the Data ProviderShifting the Burden from the User to the Data Provider
Shifting the Burden from the User to the Data Provider
 
On distributed fuzzy decision trees for big data
On distributed fuzzy decision trees for big dataOn distributed fuzzy decision trees for big data
On distributed fuzzy decision trees for big data
 
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKING
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKINGINTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKING
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKING
 
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKING
INTELLIGENT SOCIAL NETWORKS MODEL BASED  ON SEMANTIC TAG RANKINGINTELLIGENT SOCIAL NETWORKS MODEL BASED  ON SEMANTIC TAG RANKING
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKING
 
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKING
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKINGINTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKING
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKING
 

More from Open University, KMi

Konposizioa, herentzia eta polimorfismoa
Konposizioa, herentzia eta  polimorfismoa Konposizioa, herentzia eta  polimorfismoa
Konposizioa, herentzia eta polimorfismoa Open University, KMi
 
"On the complementarity of Triple Spaces and the Web of Things" poster @ WoT2011
"On the complementarity of Triple Spaces and the Web of Things" poster @ WoT2011"On the complementarity of Triple Spaces and the Web of Things" poster @ WoT2011
"On the complementarity of Triple Spaces and the Web of Things" poster @ WoT2011Open University, KMi
 
A Triple Space-Based Semantic Distributed Middleware for Internet of Things
A Triple Space-Based Semantic Distributed Middleware for Internet of ThingsA Triple Space-Based Semantic Distributed Middleware for Internet of Things
A Triple Space-Based Semantic Distributed Middleware for Internet of ThingsOpen University, KMi
 

More from Open University, KMi (7)

Egitura linealak
Egitura linealakEgitura linealak
Egitura linealak
 
Konposizioa, herentzia eta polimorfismoa
Konposizioa, herentzia eta  polimorfismoa Konposizioa, herentzia eta  polimorfismoa
Konposizioa, herentzia eta polimorfismoa
 
Fitxategiak
FitxategiakFitxategiak
Fitxategiak
 
"On the complementarity of Triple Spaces and the Web of Things" poster @ WoT2011
"On the complementarity of Triple Spaces and the Web of Things" poster @ WoT2011"On the complementarity of Triple Spaces and the Web of Things" poster @ WoT2011
"On the complementarity of Triple Spaces and the Web of Things" poster @ WoT2011
 
A Triple Space-Based Semantic Distributed Middleware for Internet of Things
A Triple Space-Based Semantic Distributed Middleware for Internet of ThingsA Triple Space-Based Semantic Distributed Middleware for Internet of Things
A Triple Space-Based Semantic Distributed Middleware for Internet of Things
 
Presentacion Defensa
Presentacion DefensaPresentacion Defensa
Presentacion Defensa
 
Introducción a PHP5
Introducción a PHP5Introducción a PHP5
Introducción a PHP5
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

Assessing data dissemination strategies

  • 1. Assessing data dissemination strategies within Triple Spaces on the Web of Things esIoT 2012 ´ ´ ˜ Aitor Gomez-Goiri, Diego Lopez-de-Ipina DeustoTech - Deusto Institute of Technology, University of Deusto http://www.morelab.deusto.es July 4, 2012
  • 2. Outline Introduction Data dissemination strategies Evaluation Conclusions Assessing data dissemination strategies 2 / 57
  • 3. Outline Introduction Data dissemination strategies Evaluation Conclusions Assessing data dissemination strategies Introduction 3 / 57
  • 4. The Web of Things Growing connectivity of everyday objects. WoT to integrate things. Scalable interaction, integration with the web world... But also inherits problems from the web world! Lack of expressiveness and human orientation The Semantic Web enables sharing knowledge across different applications Assessing data dissemination strategies Introduction 4 / 57
  • 5. The Semantic Web The vision of the Semantic Web is to extend principles of the Web from documents to data. Data should be accessed using the general Web architecture using, e.g., URI-s; data should be related to one another just as documents (or portions of documents) are already. This also means creation of a common framework that allows data to be shared and reused across application, enterprise, and community boundaries, to be processed automatically by tools as well as manually, including revealing possible new relationships among pieces of data. [Con11] Assessing data dissemination strategies Introduction 5 / 57
  • 6. The Semantic Web The vision of the Semantic Web is to extend principles of the Web from documents to data. Data should be accessed using the general Web architecture using, e.g., URI-s; data should be related to one another just as documents (or portions of documents) are already. This also means creation of a common framework that allows data to be shared and reused across application, enterprise, and community boundaries, to be processed automatically by tools as well as manually, including revealing possible new relationships among pieces of data. [Con11] Assessing data dissemination strategies Introduction 6 / 57
  • 7. Triple Space Computing Describes the knowledge shared using the SW 2 applications using standard ontologies can interact among them automatically enriching one each other. Space-based computing time autonomy space autonomy reference autonomy Assessing data dissemination strategies Introduction 7 / 57
  • 8.
  • 9. Goal How to realize this shared blackboard in the IoT? Assessing data dissemination strategies Introduction 9 / 57
  • 10. Outline Introduction Data dissemination strategies Centralization Negative broadcasting Gossiping based strategy Evaluation Conclusions Assessing data dissemination strategies Data dissemination strategies 10 / 57
  • 11.
  • 12.
  • 13. Centralization in short r = |Q| + wf .t.(|N| − 1) (1) Assessing data dissemination strategies Data dissemination strategies 13 / 57
  • 14.
  • 15.
  • 16. Negative broadcasting in short r = |Q|.(|N| − 1) (2) Assessing data dissemination strategies Data dissemination strategies 16 / 57
  • 17. How to improve the NB? Reducing the amount of receivers for a query. Assessing data dissemination strategies Data dissemination strategies 17 / 57
  • 18.
  • 19.
  • 20. Problem: how to perfectly predict them without knowing all what they know?
  • 21.
  • 22. TBox and ABox According to Nardi and Brachman [NB03]... TBox contains the knowledge which describes general properties of concepts or terminology. ABox contains knowledge that is specific to the individuals of the domain of discourse. Assessing data dissemination strategies Data dissemination strategies 22 / 57
  • 23. In other words... With TBox we can describe the type of devices there are in the world or the sensors they have. With ABox we can specify that HTC is a mobile brand or that the sensed temperature is 3o C. Assessing data dissemination strategies Data dissemination strategies 23 / 57
  • 24. TBox and ABox in IoT scenarios? Mobile devices: user profile,... Sensors and actuators The structure of the data barely changes! Assessing data dissemination strategies Data dissemination strategies 24 / 57
  • 25. Our proposal We can assume that all the nodes have or can easily obtain the TBox information. Nodes gossip the classes of concepts (rdf:type) shared by other nodes. Assessing data dissemination strategies Data dissemination strategies 25 / 57
  • 26. Subject Predicate Object wot:meas1 rdf:type ssn:N02Observation wot:meas1 ssn:observedProperty sweet:NO2 wot:meas1 ssn:observationResult wot:outpt1 wot:outpt1 ssn:hasValue wot:val1 wot:val1 ssb:QuantityValue 17 wot:val1 dul:isClassifiedBy muo-ucum:microgram-per-cubic-meter ... ... ...
  • 27. Subject Predicate Object wot:meas1 rdf:type ssn:N02Observation wot:meas1 ssn:observedProperty sweet:NO2 wot:meas1 ssn:observationResult wot:outpt1 wot:outpt1 ssn:hasValue wot:val1 wot:val1 ssb:QuantityValue 17 wot:val1 dul:isClassifiedBy muo-ucum:microgram-per-cubic-meter ... ... ...
  • 28.
  • 29. Outline Introduction Data dissemination strategies Evaluation Conclusions Assessing data dissemination strategies Evaluation 29 / 57
  • 30. Remember We wanted to know which strategy fits better for IoT. Otsopack: our publicly available TSC middleware which uses HTTP. Therefore: communication between nodes was point to point and exchanges data RDF triples. Assessing data dissemination strategies Evaluation 30 / 57
  • 31. Methodology Discovery process was ignored. The Semantic Sensor Network Ontology (SSN). Datasets from the University of Utah and the University of Deusto. Measures taken from real embedded web servers. Simpy. Assessing data dissemination strategies Evaluation 31 / 57
  • 32. Performance Metrics Precision: the fraction of nodes which answered relevant results. Recall: the fraction of relevant answers returned. Response time. Assessing data dissemination strategies Evaluation 32 / 57
  • 33.
  • 34.
  • 35.
  • 36. Outline Introduction Data dissemination strategies Evaluation Conclusions Assessing data dissemination strategies Conclusions 36 / 57
  • 37. Conclusions Need of a gossiping approach. Increase the precision. Simulate specific scenarios from the literature. Assessing data dissemination strategies Conclusions 37 / 57
  • 38. Assessing data dissemination strategies Conclusions 38 / 57
  • 39. Bibliography World Wide Web Consortium. W3c semantic web faq, August 2011. D. Nardi and R.J. Brachman. An introduction to description logics. The description logic handbook: theory, implementation, and applications, pages 1–40, 2003. Assessing data dissemination strategies Bibliography 39 / 57
  • 40. Assessing data dissemination strategies Backup slides 40 / 57
  • 41. Semantic Web example Assessing data dissemination strategies Backup slides 41 / 57
  • 42. Write public String write(String spaceURI, Graph ITriples) throws TSException; Assessing data dissemination strategies Backup slides 42 / 57
  • 43. Read public Graph read (String spaceURI, String graphURI, long timeout) throws TSException; public Graph read (String spaceURI, Template template, long timeout) throws TSException; Assessing data dissemination strategies Backup slides 43 / 57
  • 44. Take public Graph take (String spaceURI, String graphURI, long timeout) throws TSException; public Graph take (String spaceURI, Template template, long timeout) throws TSException; Assessing data dissemination strategies Backup slides 44 / 57
  • 45. Query public Graph query(String spaceURI, Template template) throws TSException; Assessing data dissemination strategies Backup slides 45 / 57
  • 46. Reasoning Device TBox ABox Regular computer 2.787 0.045 (Sesame 2.6.4) Samsung Galaxy Tab 17.342 0.225 (Sesame 2.4.2) FoxG20 48.939 1.443 (Fuxi) Assessing data dissemination strategies Backup slides 46 / 57
  • 47. Our realization of the ideas towards this adaptation are incarnated on Otsopack Open source project
  • 48. Otsopack Layers Each Otsopack instance. Assessing data dissemination strategies Backup slides 48 / 57
  • 49. About HTTP and TSC The HTTP verbs retrieve, create, modify or delete web resources The TS primitives retrieve, create, modify or delete RDF graphs on a space (right, to be honest TS also offers a query, which works at space level) Assessing data dissemination strategies Backup slides 49 / 57
  • 50. A RESTful HTTP API To expose TS querying primitives HTTP status codes Using content negotiation Assessing data dissemination strategies Backup slides 50 / 57
  • 51. Discovery Registry based discovery Multicast based implemented Easy to adopt new ones: DNS, mDNS, lmDNS etc. Assessing data dissemination strategies Backup slides 51 / 57
  • 52. TSC API in depth HTTP request URL GET /{sp}/query/wildcards/{s}/{p}/{o-uri} /{sp}/query/wildcards/{s}/{p}/{o-type}/{o-value} GET /{sp}/graphs/{g} GET /{sp}/graphs/wildcards/{s}/{p}/{o-uri} /{sp}/graphs/wildcards/{s}/{p}/{o-type}/{o-value} DELETE /{sp}/graphs/{g} DELETE /{sp}/graphs/wildcards/{s}/{p}/{o-uri} /{sp}/graphs/wildcards/{s}/{p}/{o-type}/{o-value} Assessing data dissemination strategies Backup slides 52 / 57
  • 53. XBee gateway platform ConnectPort R X2 (XBee to IP gateway) RAM: 8MB Platform version: Python 2.4 REST libraries: Python Std Lib Semantic libraries: None Assessing data dissemination strategies Backup slides 53 / 57
  • 54. Case of study 1: XBee We developed a restricted middleware version using Python With more than 15 concurrent requests problems were experienced Assessing data dissemination strategies Backup slides 54 / 57
  • 55. FoxG20 platform Processor: 400Mhz Atmel ARM9 RAM: 64MB Platform version: Python 2.5 REST libraries: Python Std Lib Semantic libraries: Fuxi Assessing data dissemination strategies Backup slides 55 / 57
  • 56. Case of study 2: FoxG20 Python implementation used Because is lighter Does not implement all the modules defined This may be desirable for less powerful devices Reasoning took a long time TBox: x17 regular computer, x2 galaxy tab ABox: x32 - x6 galaxy tab ⇓ should be limited to special occasions Assessing data dissemination strategies Backup slides 56 / 57
  • 57. All rights of images are reserved by the original owners*, the rest of the content is licensed under a Creative Commons by-sa 3.0 license. * Kit (practicalowl), Stefan Paunovi´ , Amortize and Marco Crupi Digi c International Inc. and Acme systems.