The document summarizes and compares several major service discovery approaches. It provides an overview of service discovery objectives and techniques, then surveys prominent protocols including SLP, Jini, and UPnP. Each approach is analyzed based on features like service description, discovery architecture, announcement/query mechanisms, and how they handle service usage and dynamic network changes. The comparison aims to identify strengths and limitations to guide future research in improving service discovery.
LLM is an integrated ICT platform which combines state-of-the-art cognitive exercises with physical activity in the framework of an advanced ambient assisted living environment.
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...ijujournal
Ubiquitous healthcare has become one of the prominent areas of research inorder to address the
challenges encountered in healthcare environment. In contribution to this area, this study developed a
system prototype that recommends diagonostic services based on physiological data collected in real time
from a distant patient. The prototype uses WBAN body sensors to be worn by the individual and an android
smart phone as a personal server. Physiological data is collected and uploaded to a Medical Health
Server (MHS) via GPRS/internet to be analysed. Our implemented prototype monitors the activity, location
and physiological data such as SpO2 and Heart Rate (HR) of the elderly and patients in rehabilitation. The
uploaded information can be accessed in real time by medical practitioners through a web application.
Provisioning Quality of Service of Wireless Telemedicine for E-Health Service...Mustafa Algaet
This review paper is that e-health technologies and wireless telemedicine systems are car-
ried out and some open survey constraints are detected. A proposal on QoS provisioning
in wireless e-health, handoff schemes for QoS support in wireless networks, as well as a
proposed scheme of priority for telemedicine/e-health services and techniques/methods for
IEEE 802.11 to ensure QoS. And important factor that is studied in this paper is quick deliv-
ery of a patient’s measurements and mobility support is another important issue for wireless
e-health applications.
Security Issues in Biomedical Wireless Sensor Networks Applications: A SurveyIJARTES
Abstract The use of wireless sensor networks in healthcare
applications is growing in a fast pace. Numerous applications
such as heart rate monitor, blood pressure monitor and
endoscopic capsule are already in use. To address the growing
use of sensor technology in this area, a new field known as
wireless body area networks has emerged. As most devices
and their applications are wireless in nature, security and
privacy concerns are among major areas of concern. Body
area networks can collect information about an individual’s
health, fitness and energy expenditure. Comprising body
sensors that communicate wirelessly with the patients
control device for monitoring and external communication.
This paper provides the challenges of using the wireless
sensor network in biomedical field and how to solve most of
these issues. To analyze the different security strategies in
Wireless Sensor Networks and propose this system to give
highest quality medical care with full security in their
reliability
LLM is an integrated ICT platform which combines state-of-the-art cognitive exercises with physical activity in the framework of an advanced ambient assisted living environment.
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...ijujournal
Ubiquitous healthcare has become one of the prominent areas of research inorder to address the
challenges encountered in healthcare environment. In contribution to this area, this study developed a
system prototype that recommends diagonostic services based on physiological data collected in real time
from a distant patient. The prototype uses WBAN body sensors to be worn by the individual and an android
smart phone as a personal server. Physiological data is collected and uploaded to a Medical Health
Server (MHS) via GPRS/internet to be analysed. Our implemented prototype monitors the activity, location
and physiological data such as SpO2 and Heart Rate (HR) of the elderly and patients in rehabilitation. The
uploaded information can be accessed in real time by medical practitioners through a web application.
Provisioning Quality of Service of Wireless Telemedicine for E-Health Service...Mustafa Algaet
This review paper is that e-health technologies and wireless telemedicine systems are car-
ried out and some open survey constraints are detected. A proposal on QoS provisioning
in wireless e-health, handoff schemes for QoS support in wireless networks, as well as a
proposed scheme of priority for telemedicine/e-health services and techniques/methods for
IEEE 802.11 to ensure QoS. And important factor that is studied in this paper is quick deliv-
ery of a patient’s measurements and mobility support is another important issue for wireless
e-health applications.
Security Issues in Biomedical Wireless Sensor Networks Applications: A SurveyIJARTES
Abstract The use of wireless sensor networks in healthcare
applications is growing in a fast pace. Numerous applications
such as heart rate monitor, blood pressure monitor and
endoscopic capsule are already in use. To address the growing
use of sensor technology in this area, a new field known as
wireless body area networks has emerged. As most devices
and their applications are wireless in nature, security and
privacy concerns are among major areas of concern. Body
area networks can collect information about an individual’s
health, fitness and energy expenditure. Comprising body
sensors that communicate wirelessly with the patients
control device for monitoring and external communication.
This paper provides the challenges of using the wireless
sensor network in biomedical field and how to solve most of
these issues. To analyze the different security strategies in
Wireless Sensor Networks and propose this system to give
highest quality medical care with full security in their
reliability
Security Requirements, Counterattacks and Projects in Healthcare Applications...arpublication
Healthcare applications are well thought-out as interesting fields for WSN where patients can be examine using wireless medical sensor networks. Inside the hospital or extensive care surroundings there is a tempting need for steady monitoring of essential body functions and support for patient mobility. Recent research cantered on patient reliable communication, mobility, and energy-efficient routing. Yet deploying new expertise in healthcare applications presents some understandable security concerns which are the important concern in the inclusive deployment of wireless patient monitoring systems. This manuscript presents a survey of the security features, its counter attacks in healthcare applications including some proposed projects which have been done recently.
MHealth or Mobile Health is an emerging and an innovative of medication in India, by doctors can communicate and treat their patients very conveniently even from far distances.
Real-time Heart Pulse Monitoring Technique Using Wireless Sensor Network and ...IJECEIAES
Wireless Sensor Networks (WSNs) for healthcare have emerged in the recent years. Wireless technology has been developed and used widely for different medical fields. This technology provides healthcare services for patients, especially who suffer from chronic diseases. Services such as catering continuous medical monitoring and get rid of disturbance caused by the sensor of instruments. Sensors are connected to a patient by wires and become bed-bound that less from the mobility of the patient. In this paper, proposed a real-time heart pulse monitoring system via conducted an electronic circuit architecture to measure Heart Pulse (HP) for patients and display heart pulse measuring via smartphone and computer over the network in real-time settings. In HP measuring application standpoint, using sensor technology to observe heart pulse by bringing the fingerprint to the sensor via used Arduino microcontroller with Ethernet shield to connect heart pulse circuit to the internet and send results to the web server and receive it anywhere. The proposed system provided the usability by the user (userfriendly) not only by the specialist. Also, it offered speed andresults accuracy, the highest availability with the user on an ongoing basis, and few cost.
This paper aims to provide an overview of the
contents and design of the all newspapers. Majority of the
newspapers use Blog, RSS and Facebook to connect with
their readers. An online newspaper service providing project.
In this software system users may register as users to read
newspapers online. Once they register they may pay via
dummy credit cards and get access to reading newspapers
online for a month
Io t and cloud based computational framework, evolutionary approach in health...owatheowais
The new Internet of Things paradigm allows for small devices with sensing, processing and communication capabilities to be designed, which enable the development of sensors, embedded devices and other ‘things’ ready to understand the environment. In this paper, a distributed framework based on the internet of things paradigm is proposed for monitoring human biomedical signals in activities involving physical exertion. The main advantages and novelties of the proposed system is the flexibility in computing the health application by using resources from available devices inside the body area network of the user. This proposed framework can be applied to other mobile environments, especially those where intensive data acquisition and high processing needs take place. Finally, we present a case study in order to validate our proposal that consists in monitoring footballers’ heart rates during a football match. The real-time data acquired by these devices presents a clear social objective of being able to predict not only situations of sudden death but also possible injuries.
Selecting implementing and teaching a web scale discovery toolChris Sweet
In the fall of 2010, Illinois Wesleyan University reviewed all the major web-scale discovery tools available to libraries. We chose to be a beta-test site for EBSCO’s Discovery Service (EDS) and conducted usability testing with students. We eventually purchased EDS and did a full roll-out this past fall semester.
This presentation will address the philosophy behind web-scale discovery along with our experiences regarding selection, testing, implementation, evaluation, and teaching. The presentation will also include live search demonstrations using Wesleyan’s EDS interface.
How discovery impacts of users' experiencesKatherine Rose
In the 21st century the academic library supports both research activities and teaching outcomes of faculty members and students through web-scale discovery services. These discovery services embrace new technologies to provide deep discovery of vast scholarly collections from a one-stop access interface, relying on a central index of pre-harvested data. With unified indexing of full-text library content, users’ experience of search and retrieval is greatly improved.
Discovery is changing the way that library users find and access library materials, especially electronic resources. In the opening part of this presentation, I will share my experiences of using different discovery systems – Summon, Primo and Enterprise – in my current and previous roles, in term of differences, strengths and common areas among these tools. Relevant findings from the literature and latest research reports will be sketched. I will also speak of how technical services teams can support the next generation of discovery systems that will help the progress of the digital library field. The presentation will conclude with the approach of technical services towards future discovery.
Security Requirements, Counterattacks and Projects in Healthcare Applications...arpublication
Healthcare applications are well thought-out as interesting fields for WSN where patients can be examine using wireless medical sensor networks. Inside the hospital or extensive care surroundings there is a tempting need for steady monitoring of essential body functions and support for patient mobility. Recent research cantered on patient reliable communication, mobility, and energy-efficient routing. Yet deploying new expertise in healthcare applications presents some understandable security concerns which are the important concern in the inclusive deployment of wireless patient monitoring systems. This manuscript presents a survey of the security features, its counter attacks in healthcare applications including some proposed projects which have been done recently.
MHealth or Mobile Health is an emerging and an innovative of medication in India, by doctors can communicate and treat their patients very conveniently even from far distances.
Real-time Heart Pulse Monitoring Technique Using Wireless Sensor Network and ...IJECEIAES
Wireless Sensor Networks (WSNs) for healthcare have emerged in the recent years. Wireless technology has been developed and used widely for different medical fields. This technology provides healthcare services for patients, especially who suffer from chronic diseases. Services such as catering continuous medical monitoring and get rid of disturbance caused by the sensor of instruments. Sensors are connected to a patient by wires and become bed-bound that less from the mobility of the patient. In this paper, proposed a real-time heart pulse monitoring system via conducted an electronic circuit architecture to measure Heart Pulse (HP) for patients and display heart pulse measuring via smartphone and computer over the network in real-time settings. In HP measuring application standpoint, using sensor technology to observe heart pulse by bringing the fingerprint to the sensor via used Arduino microcontroller with Ethernet shield to connect heart pulse circuit to the internet and send results to the web server and receive it anywhere. The proposed system provided the usability by the user (userfriendly) not only by the specialist. Also, it offered speed andresults accuracy, the highest availability with the user on an ongoing basis, and few cost.
This paper aims to provide an overview of the
contents and design of the all newspapers. Majority of the
newspapers use Blog, RSS and Facebook to connect with
their readers. An online newspaper service providing project.
In this software system users may register as users to read
newspapers online. Once they register they may pay via
dummy credit cards and get access to reading newspapers
online for a month
Io t and cloud based computational framework, evolutionary approach in health...owatheowais
The new Internet of Things paradigm allows for small devices with sensing, processing and communication capabilities to be designed, which enable the development of sensors, embedded devices and other ‘things’ ready to understand the environment. In this paper, a distributed framework based on the internet of things paradigm is proposed for monitoring human biomedical signals in activities involving physical exertion. The main advantages and novelties of the proposed system is the flexibility in computing the health application by using resources from available devices inside the body area network of the user. This proposed framework can be applied to other mobile environments, especially those where intensive data acquisition and high processing needs take place. Finally, we present a case study in order to validate our proposal that consists in monitoring footballers’ heart rates during a football match. The real-time data acquired by these devices presents a clear social objective of being able to predict not only situations of sudden death but also possible injuries.
Selecting implementing and teaching a web scale discovery toolChris Sweet
In the fall of 2010, Illinois Wesleyan University reviewed all the major web-scale discovery tools available to libraries. We chose to be a beta-test site for EBSCO’s Discovery Service (EDS) and conducted usability testing with students. We eventually purchased EDS and did a full roll-out this past fall semester.
This presentation will address the philosophy behind web-scale discovery along with our experiences regarding selection, testing, implementation, evaluation, and teaching. The presentation will also include live search demonstrations using Wesleyan’s EDS interface.
How discovery impacts of users' experiencesKatherine Rose
In the 21st century the academic library supports both research activities and teaching outcomes of faculty members and students through web-scale discovery services. These discovery services embrace new technologies to provide deep discovery of vast scholarly collections from a one-stop access interface, relying on a central index of pre-harvested data. With unified indexing of full-text library content, users’ experience of search and retrieval is greatly improved.
Discovery is changing the way that library users find and access library materials, especially electronic resources. In the opening part of this presentation, I will share my experiences of using different discovery systems – Summon, Primo and Enterprise – in my current and previous roles, in term of differences, strengths and common areas among these tools. Relevant findings from the literature and latest research reports will be sketched. I will also speak of how technical services teams can support the next generation of discovery systems that will help the progress of the digital library field. The presentation will conclude with the approach of technical services towards future discovery.
Discovery tools that can be customized for your library can be a powerful alternative to Web search engines like Google. Dee Ann Allison, University of Nebraska - Lincoln, will show you how libraries can customize these tools to provide an Information Portal that brings together the best resources for our communities.
NCompass Live - Jan. 18, 2012.
EBSCO Discovery Services: update and roadmapKatherine Rose
EBSCO Discovery Service is significant in its ability to expose relevant results to your library users. Its means of doing this is unique, but EBSCO recognises that the requirements of libraries and demands of library users evolves rapidly.
Richard will share road map items for EBSCO Discovery Service, highlighting how changing research habits are impacting upcoming user interface features. In addition, Richard will share details of the Holdings and Link Management (HLM) administration area and how it is evolving into a tool that does so much more than managing your holdings for EDS and Full Text Finder – from consolidating COUNTER statistics to providing Cost per Use analysis to Collection Analysis to tracking licenses and other key resource details.
The Future of Finding: Resource Discovery @ The University of OxfordChristine Madsen
The report is the culmination of a one-year multi-strand research project, and examines how users of the museums and libraries at the University of Oxford find the information they need (known as “resource discovery”), current practices among other institutions, and trends and possibilities for resource discovery in the future.
Athenaeum21 led the end-user research and needs assessment portion of the project, and then led the synthesis and analysis of the data across all of the research strands, making the recommendations and writing the final report. The report defines the resource discovery strategy for the University for the next 5 years.
A talk by Simon Inger at the STM Digital Publishing Seminar, London, 6th December 2016. This talk looks at the state of discovery of journals and books online through a range of discovery options, some issues facing hybrid open access publishing, and why complex and incomplete discovery and authentication is driving readers to simpler, pirate sites, such as SciHub.
A HEURISTIC APPROACH FOR WEB-SERVICE DISCOVERY AND SELECTIONijcsit
In today’s businesses, service-oriented architectures represent the main paradigm for IT infrastructures.
Indeed, the emergence of Internet made it possible to set up an exploitable environment to distribute applications on a large scale, and this, by adapting the notion of “service”. With the integration of this paradigm in Business to Business Domain (B2B), the number of web services becomes very significant. Due to
this increase, the discovery and selection of web services meeting customer requirement become a very
difficult operation. Further, QoS properties must be taking into account in the web service selection. Moreover, with the significant number of web service, necessary time for the discovery of a service will be rather
long. In this paper, we propose an approach based on a new heuristic method called “Bees Algorithm”
inspired from honey bees behavior. We use this technique of optimization in order to discover appropriate
web services, meeting customer requirements, in least time and taking into account the QoS properties
Cluster based approach for Service Discovery using Pattern RecognitionYogesh Santhan
Abstract— Web services that are appropriate to a user specific request are usually not considered in discovering the exact service since they are present without explicit related semantic descriptions. In our approach, we deal with the issue of service discovery provided non-explicit service description semantics that match a particular service request. We propose a system that involves semantic-based service categorization which is performed at the UDDI with a key for achieving the service categorization at functional level based on an ontology skeleton. Also, clustering is used for literally systemizing the web services based on functionality which is achieved by using analytic algorithm. An efficient matching for the relevant services is achieved by the enhancing the service request semantically and involves expanding the additional functionality (obtained from ontology) that are related for the requested service. The pattern recognition algorithm is used to select appropriate service from the cluster formation of related (grouped) web services.
Performance Prediction of Service-Oriented Architecture - A surveyEditor IJCATR
Performance prediction and evaluation for SOA based applications assist software consumers to estimate their applications
based on service specifications created by service developers. Incorporating traditional performance models such as Stochastic Petri
Nets, Queuing Networks, and Simulation present drawbacks of SOA based applications due to special characteristics of SOA such as
lose coupling, self-contained and interoperability. Although, researchers have suggested many methods in this area during last decade,
none of them has obtained popular industrial use. Based on this, we have conducted a comprehensive survey on these methods to
estimate their applicability. This survey classified these approaches according to their performance metrics analyzed, performance
models used, and applicable project stage. Our survey helps SOA architects to select the appropriate approach based on target
performance metric and researchers to identify the SOA state-of-art performance prediction
FUZZY-BASED ARCHITECTURE TO IMPLEMENT SERVICE SELECTION ADAPTATION STRATEGYijwscjournal
One of the main requirements in service based applications is runtime adaptation to changes that occur in
business, user, environment, and computational contexts. Changes in contexts lead to QOS degrade.
Continues adaptation mechanism and strategies are required to stay service based applications(SBA) in
safe state. In this paper a framework for runtime adaptation in service based application isintroduced. It
checks user requirements change continuously and dynamically adopts architecture model. Also it checks
providers QOS attributes continuously and if adaptation requirement is triggered, runs service selection
adaptation strategy to satisfy user preferences. Thusit is a context aware and automatically adaptable
framework for SBA applications. Wehave implemented a fuzzy based system for web service selection unit.
Due to ambiguity of context’s data and cross-cutting effects of quality of services, using fuzzy would result
an optimised decision. Finally we illustrated that using of it has a good performance for web service based
applications.
FUZZY-BASED ARCHITECTURE TO IMPLEMENT SERVICE SELECTION ADAPTATION STRATEGYijwscjournal
One of the main requirements in service based applications is runtime adaptation to changes that occur in business, user, environment, and computational contexts. Changes in contexts lead to QOS degrade. Continues adaptation mechanism and strategies are required to stay service based applications(SBA) in safe state. In this paper a framework for runtime adaptation in service based application isintroduced. It checks user requirements change continuously and dynamically adopts architecture model. Also it checks providers QOS attributes continuously and if adaptation requirement is triggered, runs service selection adaptation strategy to satisfy user preferences. Thusit is a context aware and automatically adaptable
framework for SBA applications. Wehave implemented a fuzzy based system for web service selection unit. Due to ambiguity of context’s data and cross-cutting effects of quality of services, using fuzzy would result an optimised decision. Finally we illustrated that using of it has a good performance for web service based applications.
Study on Use Case Model for Service Oriented Architecture Developmentijbuiiir1
The recent trends in the computer industry are the one and only thing i.e., web services. Because of the common availability and open technologies web services are relevant to all. Service-oriented architecture (SOA) helps organizations to transform their business processes for high performance by simplifying the underlying information systems. The most challenging aspect of building successful software applications is clearly understanding and specifying the requirements that an application must satisfy. Use case modeling is an increasingly popular approach for identifying and defining requirements for software applications of all types. Use cases describe the behavior of the system as its users interact with it. This approach helps to place the software requirements in the framework of a user doing some useful work with the system. This type of approach helps to map software requirements to the relevant enduser business processes, a very powerful concept. This paper presents how the relationship between use case model and Service oriented architecture
Study on Use Case Model for Service Oriented Architecture Developmentijwtiir
The recent trends in the computer industry are the one
and only thing i.e., web services. Because of the common
availability and open technologies web services are relevant to
all. Service-oriented architecture (SOA) helps organizations to
transform their business processes for high performance by
simplifying the underlying information systems. The most
challenging aspect of building successful software applications is
clearly understanding and specifying the requirements that an
application must satisfy. Use case modeling is an increasingly
popular approach for identifying and defining requirements for
software applications of all types. Use cases describe the
behavior of the system as its users interact with it. This approach
helps to place the software requirements in the framework of a
user doing some useful work with the system. This type of
approach helps to map software requirements to the relevant enduser business processes, a very powerful concept. This paper
presents how the relationship between use case model and
Service oriented architecture.
Service-oriented computing is meant to support loose relationships between organizations; Serviceoriented
architectures often have the goal to integrate various distributed services of one or more
organizations in a flexible way to be able to quickly react on business changes.
Distributed services provided a new way of distributed computing that achieve the interoperability between
heterogonous application through platform and language independent interfaces. The creation of value
added services by composition of existing ones is gaining a significant momentum. Distributed service
composition is meant to support loose relationships between implemented services in order to provide new
functions. A composite service is the one resulting from the integration, coordination and synchronization
of different service components. In this paper, we generated A Services Composition Model (SCM) that
provides a general solution for the services composition problem by realizing the requirements of a new
service using the requirements of the already existing service. We explained in details all the steps of the
composition process; services registration, services discovery, services selection, services invoking, and
services integration. Although the SCM is not bounded to one particular algorithm to compose services, we
generated an application as an example to test our Service Composition Model.
We also generated the Services Composition Language (SCL) as a simple text-based language which
allows the user to express the requirements of his request, the inserted request will then be analyzed using
our Parsing Algorithm to determine the name of the requested services, after that our Service Composition
Algorithm will execute all the steps of the composition process and return the result of the composition to
the user.
In recent years there has been an exponential growth of e-Governance in India. It is growing to such a
scale that requires full attention of the Government to ensure collaboration among different government
departments, private sectors and Non-Governmental Organisations(NGOs). In order to achieve successful
e-Governance, Government has to facilitate delivery of services to citizens, business houses and other
public or private organisations according to their requirements. In this paper, we have proposed
integration of different government departments using a Service Oriented e-Governance(SOeGov)
approach with web services technology and Service Oriented Architecture(SOA). The proposed approach
can be effectively used for achieving integration and interoperability in an e-Governance system.We have
demonstrated the working of our approach through a case study where integration of several departments
of the provincial Government of Odisha (India) has been made possible.
Testing of web services Based on Ontology Management ServiceIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
A New Mechanism for Service Recovery Technology by using Recovering Service’s...ijfcstjournal
Service recovery technology is an important constituent part of the emergency response technologies. The service recovery goal is to build a technology system of service recovery focusing on the survival of information system services. By analyzing the relationship between service and data, we present a service recovery mechanism by recovering service’s data. We introduce a third party service monitor to monitor the state changes of the service, design the data recovery model, and give an example of quick data recovery. At Last we present a prototype system of service recovery; the experimental results toward the prototype system show that the mechanism which designed by us can greatly improve the service recovery efficiency and it can meet the timeliness requirements of the information service
A Novel Approach: A Hybrid Semantic Matchmaker For Service Discovery In Servi...IJNSA Journal
Since service-oriented architectures make the commercial systems more reliable and reusable, they have gained more popularity in industry and scientific community in recent decades. Service-oriented architectures bring flexibility and reusability to software design. Due to the increasing number of services on the Web, finding a service which is suited to user requirements is crucial. The process of finding suitable services to user request is one of the main purposes of service-oriented architectures. Many methods have been proposed for service discovery in service-oriented architectures that try to fulfil user requirements and offer suitable services to user request; however the proposed methods do not have enough precision for discovering suitable services. In this paper, we propose a method for service discovery which offers more accurate services according to user request. The proposed method is a hybrid semantic matchmaker for service discovery in service oriented architecture. By providing accurate services suitable to user requests, we have greatly increased the reusability rate and reduced the time and cost of software development.
Dynamic Interface Adaptability in Service Oriented SoftwareMadjid KETFI
Dynamic Interface Adaptability in Service Oriented Software
M. Ketfi and N. Belkhatir
8th International Workshop on Component-Oriented Programming (WCOP'03),
Darmstadt, Germany, July 2003.
Root Cause Detection in a Service-Oriented ArchitectureSam Shah
[This paper was presented at SIGMETRICS 2013.]
Large-scale websites are predominantly built as a service-oriented architecture. Here, services are specialized for a certain task, run on multiple machines, and communicate with each other to serve a user’s request. An anomalous change in a metric of one service can propagate to other services during this communication, resulting in overall degradation of the request. As any such degradation is revenue impacting, maintaining correct functionality is of paramount concern: it is important to find the root cause of any anomaly as quickly as possible. This is challenging because there are numerous metrics or sensors for a given service, and a modern website is usually composed of hundreds of services running on thousands of machines in multiple data centers.
This paper introduces MonitorRank, an algorithm that can reduce the time, domain knowledge, and human effort required to find the root causes of anomalies in such service-oriented architectures. In the event of an anomaly, MonitorRank provides a ranked order list of possible root causes for monitoring teams to investigate. MonitorRank uses the historical and current time-series metrics of each sensor as its input, along with the call graph generated between sensors to build an unsupervised model for ranking. Experiments on real production outage data from LinkedIn, one of the largest online social networks, shows a 26% to 51% improvement in mean average precision in finding root causes compared to baseline and current state-of-the-art methods.
Study on Use Case Model for Service Oriented Architecture Developmentijcnes
The recent trends in the computer industry are the one and only thing i.e., web services. Because of the common availability and open technologies web services are relevant to all. Service-oriented architecture (SOA) helps organizations to transform their business processes for high performance by simplifying the underlying information systems. The most challenging aspect of building successful software applications is clearly understanding and specifying the requirements that an application must satisfy. Use case modeling is an increasingly popular approach for identifying and defining requirements for software applications of all types. Use cases describe the behavior of the system as its users interact with it. This approach helps to place the software requirements in the framework of a user doing some useful work with the system. This type of approach helps to map software requirements to the relevant endures business processes, a very powerful concept. This paper presents how the relationship between use case model and Service oriented architecture.
2 ieee nui cone-13 soa testing perspective model for regression testingAbhishek Srivastava
Service-Oriented Architecture (SOA) supports loose-coupling and interoperability, where services communicate with each-other through message exchanging protocol and interfaces. SOA supports vendor diversity. In order to full-fill the vendor need, service composition is considered as a key process. Regression testing is inevitable to assure the quality of SOA based applications during their evolution. This paper defines a regression testing process which helps us in regression testing of complex SOA based applications. We also propose an SOA testing perspective model. Here we divide SOA testing perspective model into three parts: Service developer perspective, Service tester perspective and Service provider perspective. The Proposed model also focuses on service validity when the service is going to register in the Universal Description and Discovery Integration (UDDI).
Since service-oriented architectures make the commercial systems more reliable and reusable, they have
gained more popularity in industry and scientific community in recent decades. Service-oriented
architectures bring flexibility and reusability to software design. Due to the increasing number of services
on the Web, finding a service which is suited to user requirements is crucial. The process of finding suitable
services to user request is one of the main purposes of service-oriented architectures. Many methods have
been proposed for service discovery in service-oriented architectures that try to fulfil user requirements
and offer suitable services to user request; however the proposed methods do not have enough precision for
discovering suitable services. In this paper, we propose a method for service discovery which offers more
accurate services according to user request. The proposed method is a hybrid semantic matchmaker for
service discovery in service oriented architecture. By providing accurate services suitable to user requests,
we have greatly increased the reusability rate and reduced the time and cost of software development
Similar to Service Discovery – A Survey and Comparison (20)
Users Approach on Providing Feedback for Smart Home Devices – Phase IIijujournal
Smart Home technology has accomplished extraordinary success in making individuals' lives more straightforward and relaxing. Technology has recently brought about numerous savvy and refined frame works that advanced clever living innovation. In this paper, we will investigate the behavioral intention of user's approach to providing feedback for smart home devices. We will conduct an online survey for a sample of three to five students selected by simple random sampling to study the user's motto for giving feedback on smart home devices and their expectations. We have observed that most users are ready to actively share their input on smart home devices to improve the product's service and quality to fulfill the user’s needs and make their lives easier.
Users Approach on Providing Feedback for Smart Home Devices – Phase IIijujournal
Smart Home technology has accomplished extraordinary success in making individuals' lives more
straightforward and relaxing. Technology has recently brought about numerous savvy and refined frame
works that advanced clever living innovation. In this paper, we will investigate the behavioral intention of
user's approach to providing feedback for smart home devices. We will conduct an online survey for a
sample of three to five students selected by simple random sampling to study the user's motto for giving
feedback on smart home devices and their expectations. We have observed that most users are ready to
actively share their input on smart home devices to improve the product's service and quality to fulfill the
user’s needs and make their lives easier.
October 2023-Top Cited Articles in IJU.pdfijujournal
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERSijujournal
In order to avoid unnecessary applications of Miller-Rabin algorithm to the number in question, we resort
to trial division by a few initial prime numbers, since such a division take less time. How far we should go
with such a division is the that we are trying to answer in this paper?For the theory of the matter is fully
resolved. However, that in practice we do not have much use.Therefore, we present a solution that is
probably irrelevant to theorists, but it is very useful to people who have spent many nights to produce
large (probably) prime numbers using its own software.
A novel integrated approach for handling anomalies in RFID dataijujournal
Radio Frequency Identification (RFID) is a convenient technology employed in various applications. The
success of these RFID applications depends heavily on the quality of the data stream generated by RFID
readers. Due to various anomalies found predominantly in RFID data it limits the widespread adoption of
this technology. Our work is to eliminate the anomalies present in RFID data in an effective manner so that
it can be applied for high end applications. Our approach is a hybrid approach of middleware and
deferred because it is not always possible to remove all anomalies and redundancies in middleware. The
processing of other anomalies is deferred until the query time and cleaned by business rules. Experimental
results show that the proposed approach performs the cleaning in an effective manner compared to the
existing approaches.
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...ijujournal
Ubiquitous healthcare has become one of the prominent areas of research inorder to address the
challenges encountered in healthcare environment. In contribution to this area, this study developed a
system prototype that recommends diagonostic services based on physiological data collected in real time
from a distant patient. The prototype uses WBAN body sensors to be worn by the individual and an android
smart phone as a personal server. Physiological data is collected and uploaded to a Medical Health
Server (MHS) via GPRS/internet to be analysed. Our implemented prototype monitors the activity, location
and physiological data such as SpO2 and Heart Rate (HR) of the elderly and patients in rehabilitation. The
uploaded information can be accessed in real time by medical practitioners through a web application.
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIESijujournal
The population of elderly folks is ballooning worldwide as people live longer. But getting older often
means declining health and trouble living solo. Smart home tech could keep an eye on old folks and get
help quickly when needed so they can stay independent. This paper looks at a system combining wireless
sensors, video watches, automation, resident monitoring, emergency detection, and remote access. Sensors
track health signs, activities, appliance use. Video analytics spot odd stuff like falls. Sensor fusion and
machine learning find normal patterns so wonks can see unhealthy changes and send alerts. Multi-channel
alerts reach caregivers and emergency folks. A LabVIEW can integrate devices and enables local and
remote oversight and can control and handle emergency responses. Benefits seem to be early illness clues,
quick help, less burden on caregivers, and optimized home settings. But will old folks use all this tech? Can
we prove it really helps folks live longer and better? More research on maximizing reliability and
evaluating real-world impacts is needed. But designed thoughtfully, smart homes could may profoundly
improve the aging experience.
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCEijujournal
In today’s Internet world, log file analysis is becoming a necessary task for analyzing the customer’s
behavior in order to improve advertising and sales as well as for datasets like environment, medical,
banking system it is important to analyze the log data to get required knowledge from it. Web mining is the
process of discovering the knowledge from the web data. Log files are getting generated very fast at the
rate of 1-10 Mb/s per machine, a single data center can generate tens of terabytes of log data in a day.
These datasets are huge. In order to analyze such large datasets we need parallel processing system and
reliable data storage mechanism. Virtual database system is an effective solution for integrating the data
but it becomes inefficient for large datasets. The Hadoop framework provides reliable data storage by
Hadoop Distributed File System and MapReduce programming model which is a parallel processing
system for large datasets. Hadoop distributed file system breaks up input data and sends fractions of the
original data to several machines in hadoop cluster to hold blocks of data. This mechanism helps to
process log data in parallel using all the machines in the hadoop cluster and computes result efficiently.
The dominant approach provided by hadoop to “Store first query later”, loads the data to the Hadoop
Distributed File System and then executes queries written in Pig Latin. This approach reduces the response
time as well as the load on to the end system. This paper proposes a log analysis system using Hadoop
MapReduce which will provide accurate results in minimum response time.
SERVICE DISCOVERY – A SURVEY AND COMPARISONijujournal
With the increasing number of services in the internet, companies’ intranets, and home networks: service
discovery becomes an integral part of modern networked system. This paper provides a comprehensive
survey of major solutions for service discovery. We cover techniques and features used in existing systems.
Although a few survey articles have been published on this object, our contribution focuses on comparing
and analyzing surveyed solutions according eight prime criteria, which we have defined before. This
comparison will be helpful to determine limits of existing discovery protocols and identify future research
opportunities in service discovery.
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKSijujournal
Opportunistic Networks are able to exploit social behavior to create connectivity opportunities. This
paradigm uses pair-wise contacts for routing messages between nodes. In this context we investigated if the
“six degrees of separation” conjecture of small-world networks can be used as a basis to route messages in
Opportunistic Networks. We propose a simple approach for routing that outperforms some popular
protocols in simulations that are carried out with real world traces using ONE simulator. We conclude that
static graph models are not suitable for underlay routing approaches in highly dynamic networks like
Opportunistic Networks without taking account of temporal factors such as time, duration and frequency of
previous encounters.
International Journal of Ubiquitous Computing (IJU)ijujournal
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...ijujournal
The aging population and the consequent increase in the incidence of dementias is causing many
challenges to health systems, mainly related to infrastructure, low services quality and high costs. One
solution is to provide the care at house of the patient, through of home care services. However, it is not a
trivial task, since a patient with dementia requires constant care and monitoring from a caregiver, who
suffers physical and emotional overload. In this context, this work presents an modelling for development of
pervasive systems aimed at helping the care of these patients in order to lessen the burden of the caregiver
while the patient continue to receive the necessary care.
A proposed Novel Approach for Sentiment Analysis and Opinion Miningijujournal
as the people are being dependent on internet the requirement of user view analysis is increasing
exponentially. Customer posts their experience and opinion about the product policy and services. But,
because of the massive volume of reviews, customers can’t read all reviews. In order to solve this problem,
a lot of research is being carried out in Opinion Mining. In order to solve this problem, a lot of research is
being carried out in Opinion Mining. Through the Opinion Mining, we can know about contents of whole
product reviews, Blogs are websites that allow one or more individuals to write about things they want to
share with other The valuable data contained in posts from a large number of users across geographic,
demographic and cultural boundaries provide a rich data source not only for commercial exploitation but
also for psychological & sociopolitical research. This paper tries to demonstrate the plausibility of the idea
through our clustering and classifying opinion mining experiment on analysis of blog posts on recent
product policy and services reviews. We are proposing a Nobel approach for analyzing the Review for the
customer opinion
International Journal of Ubiquitous Computing (IJU)ijujournal
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...ijujournal
Usability engineering and usability testing are concepts that continue to evolve. Interesting research studies
and new ideas come up every now and then. This paper tests the hypothesis of using an EDA-based
physiological measurements as a usability testing tool by considering three measures; which are observers‟
opinions, self-reported data and EDA-based physiological sensor data. These data were analyzed
comparatively and statistically. It concludes by discussing the findings that has been obtained from those
subjective and objective measures, which partially supports the hypothesis.
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCSijujournal
Ubiquitous Computing uses mobile phones or tiny devices for application development with sensors
embedded in mobile phones. The information generated by these devices is a big task in collection and
storage. For further, the data transmission to the intended destination is delay tolerant. In this paper, we
made an attempt to propose a new security algorithm for providing security to Pervasive Computing
Environment (PCE) system using Public-key Encryption (PKE) algorithm, Biometric Security (BS)
algorithm and Visual Cryptography Scheme (VCS) algorithm. In the proposed PCE monitoring system it
automates various home appliances using VCS and also provides security against intrusion using Zigbee
IEEE 802.15.4 based Sensor Network, GSM and Wi-Fi networks are embedded through a standard Home
gateway.
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijujournal
Routing protocols have an important role in any Mobile Ad Hoc Network (MANET). Researchers have
elaborated several routing protocols that possess different performance levels. In this paper we give a
performance evaluation of AODV, DSR, DSDV, OLSR and DYMO routing protocols in Mobile Ad Hoc
Networks (MANETS) to determine the best in different scenarios. We analyse these MANET routing
protocols by using NS-2 simulator. We specify how the Number of Nodes parameter influences their
performance. In this study, performance is calculated in terms of Packet Delivery Ratio, Average End to
End Delay, Normalised Routing Load and Average Throughput.
Optical Character Recognition (OCR) is a technique, used to convert scanned image into editable text
format. Many different types of Optical Character Recognition (OCR) tools are commercially available
today; it is a useful and popular method for different types of applications. OCR can predict the accurate
result depends on text pre-processing and segmentation algorithms. Image quality is one of the most
important factors that improve quality of recognition in performing OCR tools. Images can be processed
independently (.png, .jpg, and .gif files) or in multi-page PDF documents (.pdf). The primary objective of
this work is to provide the overview of various Optical Character Recognition (OCR) tools and analyses of
their performance by applying the two factors of OCR tool performance i.e. accuracy and error rate.
Optical Character Recognition (OCR) is a technique, used to convert scanned image into editable text
format. Many different types of Optical Character Recognition (OCR) tools are commercially available
today; it is a useful and popular method for different types of applications. OCR can predict the accurate
result depends on text pre-processing and segmentation algorithms. Image quality is one of the most
important factors that improve quality of recognition in performing OCR tools. Images can be processed
independently (.png, .jpg, and .gif files) or in multi-page PDF documents (.pdf). The primary objective of
this work is to provide the overview of various Optical Character Recognition (OCR) tools and analyses of
their performance by applying the two factors of OCR tool performance i.e. accuracy and error rate.
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
In multi-radio wireless mesh networks, one node is eligible to transmit packets over multiple channels to
different destination nodes simultaneously. This feature of multi-radio wireless mesh network makes high
throughput for the network and increase the chance for multi path routing. This is because the multiple
channel availability for transmission decreases the probability of the most elegant problem called as
interference problem which is either of interflow and intraflow type. For avoiding the problem like
interference and maintaining the constant network performance or increasing the performance the WMN
need to consider the packet aggregation and packet forwarding. Packet aggregation is process of collecting
several packets ready for transmission and sending them to the intended recipient through the channel,
while the packet forwarding holds the hop-by-hop routing. But choosing the correct path among different
available multiple paths is most the important factor in the both case for a routing algorithm. Hence the
most challenging factor is to determine a forwarding strategy which will provide the schedule for each
node for transmission within the channel. In this research work we have tried to implement two forwarding
strategies for the multi path multi radio WMN as the approximate solution for the above said problem. We
have implemented Global State Routing (GSR) which will consider the packet forwarding concept and
Aggregation Aware Layer 2 Routing (AAL2R) which considers the both concept i.e. both packet forwarding
and packet aggregation. After the successful implementation the network performance has been measured
by means of simulation study.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 3
Service Discovery – A Survey and Comparison
1. International Journal of UbiComp (IJU), Vol.4, No.3, July 2013
DOI:10.5121/iju.2013.4303 23
SERVICE DISCOVERY – A SURVEY AND COMPARISON
Bendaoud Karim Talal1
and Merzougui Rachid2
1
STIC Laboratory, Department of Telecommunication, University of Tlemcen, Algeria
bendaoud.talal@gmail.com
2
STIC Laboratory, Department of Telecommunication, University of Tlemcen, Algeria
merzrachid@yahoo.fr
ABSTRACT
With the increasing number of services in the internet, companies’ intranets, and home networks: service
discovery becomes an integral part of modern networked system. This paper provides a comprehensive
survey of major solutions for service discovery. We cover techniques and features used in existing systems.
Although a few survey articles have been published on this object, our contribution focuses on comparing
and analyzing surveyed solutions according eight prime criteria, which we have defined before. This
comparison will be helpful to determine limits of existing discovery protocols and identify future research
opportunities in service discovery.
KEYWORDS
Service Discovery, Comparison, Jini, UPnP, SLP, Salutation, Bluetooth SDP.
1. INTRODUCTION
With the increasing number of services in the internet, companies’ intranets, and home networks
service discovery becomes an integral part of modern networked system. This process is simple if
the user and service provider know each other at run time [1], so what is needed is an efficient
mechanism which ensures high availability of services to users and applications, and high
utilization of services. In this article we survey a number of service discovery approaches.
Despite the existence of a number of survey papers regarding service discovery protocols [2-5],
we believe that a comprehensive overview of techniques and open issues for service discovery is
useful. The purpose of this article is to provide a comprehensive review on service discovery
approaches and to compare and analyze surveyed solutions according eight prime criteria. In this
manner, we use the work both as a survey and as a guide for the design of a service discovery
system.
The structure of the paper is as follow: section 1 defines the objective, features and techniques of
existing service discovery. Based on that, section 2 provides a comprehensive survey for leading
technologies in this area. Service discovery protocols discussed in section 2 will be then
compared taking various criteria in section 3. Section 4 concludes this paper with a list of future
research opportunities in service discovery. In Appendix 1, we present the summary of our
comparison
1.1. Service Discovery Definition [6]:
Service discovery provides a mechanism which allows automatic detection of services offered by
any node in the network. In other words, service discovery is the action of finding a service
provider for a requested service. When the location of the demanded service is retrieved, the user
may further access and use it.
2. International Journal of UbiComp (IJU), Vol.4, No.3, July 2013
24
1.2. Service Discovery: Objectives, Features, and Techniques:
According to[6][7], the objective of a service discovery mechanism is to develop a highly
dynamic infrastructure where users would be able to seek particular services of interest, and
service providers offering those services would be able to announce and advertise their
capabilities to the network . Furthermore, service discovery minimize human intervention and
allows the network to be self-healing by automatic detection of services which have become
unavailable. Once services have been discovered, devices in the network could remotely control
each other by adhering to some standard of communication.
In what follows we define the service discovery features and techniques that have been specified
to achieve these objectives. A summary of service discovery features is given in figure 1.
Figure-1- Service Discovery Features
1.2.1. Service Description:
In order to facilitate the service discovery process, each protocol has a description language to
define the vocabulary and syntax used to describe the service and its properties [8]. The available
methods for this task vary according to the degree of expressiveness: key/value, template-based
and semantic description [1]. In the key/value approach, services are characterized using a set of
Attribute-value pairs. The template-based approach: uses the same technique as in the first
approach, in addition it offers predefined set of common attributes which are frequently used. The
semantic description relies on the use of ontology. It has richer expressive power than the first
two approaches.
12.2. Service Discovery Architecture:
Architecture used by service discovery protocols can be classified as directory and non-directory
based models [4], according to how the service descriptions are stored.
The directory based model has a dedicated directory which maintains the whole service
descriptions. In this case, the directory takes care of registering service descriptions and
processing user requests. The directory can be logically centralized but physically distributed over
the network. Therefore, service descriptions are stored at different locations (directories).
3. International Journal of UbiComp (IJU), Vol.4, No.3, July 2013
25
The non-directory based model: has no dedicated directory, every service provider maintains its
service descriptions. When a query arrives, every service provider processes it and replies if it
matches the query.
1.2.3. Service Announcement and Query:
Service announcement and query are the two basic mechanisms for clients, service providers, and
directories to exchange information about available services.
Service Announcement: allows service providers to indicate to all potential users that a set of
new services is active and ready for use. This will be accomplished by registering the appropriate
service descriptions with the directory if it exists, or multicast service advertisements.
Query approach: allows users to discover services that satisfy their requirement. To do this,
users initiates (a) unicast query to the directory, or (b) multicast query [7]. The query is expressed
using the description language [6], and specifies the details about service it is looking for. The
directory or service provider that holds the matching service description replies to the query.
When a directory exists, service providers and users will first discover the directory location
before services can be registered and queried. In this case, the directory can be seen as any service
in the network and makes advertisement to advertise its existence.
1.2.4. Service Usage (Service invocation):
After retrieving the desired services information, the next step is to access. However, apart from
performing service discovery, most protocols offer methods for using the services [6]. An
example is Simple Object Access Protocol (SOAP) used in Universal Plug and Play (UPnP).
1.2.5. Configuration Update (management dynamicity)
Service discovery protocol must preserve a consistent view of the network and deliver valid
information about available services while network is dynamic. Therefore, the management of
such dynamicity is required. Configuration update allows users to monitor the services, their
availability and changes in their attributes. There are two sub functions in Configuration Update:
• Configuration Purge Allows detection of disconnected entities through (a) leasing and (b)
advertisement time-to-live (TTL) [7]. In leasing, the service provider requests and maintains a
lease with the directory, and refreshes it periodically. The directory assumes that the service
provider who fails to refresh its lease has left the system, and purges its information. With
TTL, the user monitors the TTL on the advertisement of discovered services and assumes that
the service has left the system if the service provider fails to re-advertise before its TTL
expires.
• Consistency Maintenance: Allows users to be aware when services change their
characteristics. Updates can be propagated using (a) push-based update notification, where
users and directories receive notifications from the service provider, or (b) pull-based polling
for updates by the user to the directory or service provider for a fresher service description
[7].
It is important to note that the features and techniques mentioned before representing the pillars
around which an autonomic service discovery protocol is based. But, depending on characteristics
of each protocol other functions have been already proposed in diverse approaches (e.g. service
selection, security, scalability).
4. International Journal of UbiComp (IJU), Vol.4, No.3, July 2013
26
2. Various Service Discovery Approaches Adopted by Industry
Over the past years, many organizations and major software vendors have designed and
developed a large number of service discovery protocols. This section provides a comprehensive
survey for leading technologies in this area and examines functional issue defined in the previous
section for each protocol.
2.1. SLP:
Service location Protocol (SLP) [9] is an open, simple, extensible, and scalable standard for
service discovery [10] developed by the IETF (Internet Engineering Task Force). It was intended
to function within IP network. SLP addresses only service discovery and leaves service
invocation unspecified [11]. The SLP architecture consists of three main components:
•User Agent (UA): software entity that sends service discovery request on a user application’s
behalf.
•Service Agent (SA): advertises the location and characteristics of services on behalf of services.
•Directory Agent (DA): a central directory collects service descriptions received from SAs in its
database and process discovery queries from UAs.
Figure -2- SLP agents and their transactions for service discovery and registration.
As shown in figure 2, when a new service connects to the network, the SA contacts the DA to
advertise its existence (Service Registration). Registration message contains: service lifetime,
URL for the service, and set of descriptive attributes for the service. Both URL schemas and
attributes are defined in [12]. Registration should be refreshed periodically by the SA to indicate
its continuous existence. The same when the user needs a certain service, the UA sends request
message to the DA which in turn responds with message containing URLs for all services
matched against the UA needs. The client can access one of the services pointed to by the
returned URL. The protocol used between the client and the service is outside the scope of the
SLP specification [13].
To perform their respective roles UA and SA have first to discover DA location. SLP provides
three methods for DA discovery: static, active, and passive.
In static approach: SLP agents obtain the address of the DA using DHCP; the necessary DHCP
options for SLP are defined in [14]. With active approach: SLP agent (UA/SA) sends service
request to the SLP multicast group address, a DA listening on this address will respond via
unicast to the requesting agent. In passive approach: DA multicasts advertisements periodically,
UAs and SAs learn the DA address from the received advertisements.
5. International Journal of UbiComp (IJU), Vol.4, No.3, July 2013
27
It is important to note that the DA is not mandatory; it is used especially in large networks to
enhance scalability. In smaller network (e.g. home network, office network) there may be no real
need for DA, SLP is deployed without DA. In this case, UAs send their service requests to the
SLP multicast address. The SAs announcing the service will send a unicast response to the UA.
Moreover, SAs announce their presence via multicast
SLP provides a powerful filter that allows UAs to select the most appropriate service from among
services on the network. The UA can formulate expressive queries using operators such as AND,
OR, comparators (<, =,>, <=,>=) and substring [2].
SLP is an open source; it does not depend on any programming language and scales well in large
networks. The scalability is supported by various features such as scope concept, and multiple
DAs.
2.2. Jini
Jini [15] is a distributed service discovery system developed by Sun-Microsystems in java. The
goal of the system is the federation of groups of clients/services within a dynamic computing
system [1]. A Jini federation is a collection of autonomous devices which can become aware of
one another and cooperate if need be.
To achieve this goal, Jini uses a set of lookup services to maintain dynamic information about
available services and specifies how service discovery and service invocation is to be performed
among Java-enabled devices [13]. The Jini discovery architecture is similar to that of SLP:
Client: requests Lookup Service for available service.
Service provider: registers its services and their descriptions with Lookup Service.
Lookup Service (LS): Directory which collects service descriptions and process match queries in
manner analogous to DA in SLP. Unlike SLP, where DA is optional, Jini operates only as a
directory based service discovery and requires the presence of one or more Lookup Services in
the network.
Figure-3- Jini Architecture
The heart of Jini is a trio protocols called: discovery, join, and lookup. Discovery occurs when a
service provider or client is looking for Lookup Service. Join occurs when a service provider has
located a LS and wishes to join it. Lookup occurs when the client needs to locate and invoke a
service.
6. International Journal of UbiComp (IJU), Vol.4, No.3, July 2013
28
Discovery:
At startup, service providers and clients have first to discover one or more LSs in the network.
This may be done either through the multicast announcement protocol, i.e. by listening to the
multicasted LSs advertisements, or through multicast request protocol, i.e.by sending multicast
requests for lookup services. Once LS is discovered, clients and service providers can use Unicast
Discovery Protocol to directly communicate with the discovered LS.
Join:
Once an LS has been discovered, the service provider can advertise its service by registering a
service object (proxy) and its attributes with the LS. The registration is lease based and service
provider has to renew the lease to maintain its listing in the LS. The proxy contains the java
interface for the service, and invocation methods that users will invoke to execute the service.
This object can be the service itself or a smart object that offer direct access to the service over
the network [2].
Lookup:
The Jini client requests the discovered LS for a particular service by its attributes. Whereas a
service request in SLP returns the service URL, the LS returns one or more matching proxy
objects. The client downloads a copy of the proxy, and then interacts directly with the service.
The location of the service is unimportant from the client side, because the proxy object
encapsulates the location and the protocol necessary to operate it.
Jini uses Java’s remote method invocation (RMI) facility for all interactions between either a
client or a service and the lookup server (after the initial discovery of the lookup server) [3]. It
allows data as well as objects to be passed through the network.
In Jini, evaluation of requests is based on equality and exact correspondence between request
parameters and attributes of services. Jini does not allow the evaluation of complex queries with
Boolean operators or comparators such as SLP.
Configuration Update in Jini is guaranteed by using the two following concepts: Leasing and
remote events.
Leasing: The service provider maintains a lease with the LS, where it periodically refreshed.
Leasing ensures that failing services get recognized and automatically removed from the Jini
Lookup Service.
Remote Events: allows Jini clients to register their interests in events of another object and can be
notified whenever these events happen.
2.3. UPnP
UPnP [16] is a Microsoft-developed service discovery technology aimed at enabling the
advertisement, discovery, and control of networked devices and services. It is built upon IP that is
used for communication between devices, and uses standard protocols like HTTP, XML, and
SOAP for discovery, description, and control of devices. The architecture of UPnP network is as
follow:
7. International Journal of UbiComp (IJU), Vol.4, No.3, July 2013
29
Figure-4- The UPnP architecture components.
Device: can be any entity on the network that contains services or any embedded devices. A
service is the smallest unit of control in UPnP and it consists of:
• State table: models the state of the services at run time through state variable.
• Control server: receives requests, executes them; updates the state table and returns
responses.
• Event server: publishes events to interested clients when service state changes.
Control point: any entity in the network that is able to discover, retrieve service descriptions, and
control the features offered by a device.
The UPnP features can be epitomized as the following five steps:
Addressing: When a device is connected to the network, it tries to get an IP address. UPnP
defines two methods for that. The first method is requesting an IP address via DHCP. If no DHCP
server is available, the IP address is determined by AUTO-IP. The device claims an address by
randomly choosing an address in the reserved range and then making an ARP request to see if
anyone else has already claimed that address.
Description: UPnP uses a non-directory based approach for service discovery where each device
hosts a device description document. This document is expressed in XML and includes device
information (e.g. manufacturer, model, serial number ...), list of any embedded devices or
services, as well as URLs for the service description, control, and eventing. For each service, the
description contains the service type, service ID, state table, and list of the actions that a service
can perform.
Discovery: The UPnP discovery process is based on the Simple Service Discovery Protocol
(SSDP). This protocol allows UPnP devices to announce their presence to others and discover
other devices and services. When a device comes on-line, it sends advertisement (ssdp: alive) via
multicast to announce its presence. The advertisement message is associated with a lifetime and
contains typically the type of the advertised service, and URL to the description. An UPnP device
may send out many presence announcements. When the device wish to disconnect from the
network, it should send an advertisement (ssdp:bye-bye) to notify control points that its services
are no longer available. Any control point that comes on-line after the UPnP device has
announced its presence sends out discovery request (ssdp: discover) via multicast. Devices
listening for this multicast respond via unicast if they match the service. Control points can search
8. International Journal of UbiComp (IJU), Vol.4, No.3, July 2013
30
only for: all services, specific service type, or specific device type since SSDP does not support
attribute-based querying for services [13].
Control: Having retrieved the description of the device from the URL provided in the response
message, the control point can invoke the service. To do this, the control point sends a suitable
control message to the control URL for the service. Control messages are expressed in XML
using the Simple Object Access Protocol.
Eventing: Similarly to Jini, UPnP allows control points to register for and receive notifications of
device state changes using eventing feature. The service publishes updates by sending event
messages which contains list of state variable and their current values. These messages are also
expressed in XML and formatted using the General Event Notification Architecture (GENA).
2.4. SALUTATION
Salutation [17] is another major cooperation architecture developed by the salutation consortium.
It is an open standard independent of operating systems, physical platforms and communication
protocols which addresses the problems of service discovery. One important difference of
Salutation from other service discovery technologies is that it is transport-protocol independent.
As shown in figure-5-, Salutation architecture consists of two main components: Salutation
Manager (SLM) and Transport Manager (TM). Each salutation-enabled device implements a
local SLM which stores descriptions of local services. An SLM can find other SLMs in the
network and discover services they offer. Communication between SLMs is based on remote
procedure call (RPC). The Transport Manger (TM) acts as an interface between the SLM and the
communication technology. The TM is introduced to isolate the implementation of the SLM from
particular transport-layer protocols and thereby gives Salutation network transport independence
[3]. One SLM may have many TMs in order to operate over different network technologies (e.g.
IR, Bluetooth..)[13].
Salutation defines a specific format for describing services called: Functional Unit Description
Record (FUDR). This record consists on the service type and set of Attribute Records. Each
Attribute Record contains identifier of the attribute, an identifier of the comparison function to be
used to compare the value of the attribute in the event of request and finally the value of the
attribute.
Figure-5- Salutation Architecture
9. International Journal of UbiComp (IJU), Vol.4, No.3, July 2013
31
A summary of the main tasks of the SLM follows:
Service Registry: Similar to SLP, Salutation can also function as both directory and non-
directory discovery mechanism. The SLM contains a registry to hold information about services.
The minimum requirement for the registry is to store information about services connected to its
SLM. Optionally, the SLM registry may store information about services that are registered in
other SLM. In this case this SLM would be designed as the central directory (in the case of local
networks).
Service Discovery: A client can discover services by sending a request (Query Capability Call)
to the local SLM which cooperates with others SLMs to interchange information about registered
services and responds with a list of all matched FUDRs in reply. This cooperation among
Salutation Managers forms a conceptually similar lookup service to Jini [2]. Remote services are
discovered by matching type and set of attributes specified by local SLM.
Service Session Management: When a user wants to use a discovered service, it requests its
SLM to establish a session with the service. Communication between clients and services can be
in a number of ways:
Native mode: messages are exchanged through a native protocol. In this case, Salutation
Manager is used solely to discover services of other network.
Emulated mode: Salutation Manger is used to carry message exchange but does not
inspect the contents. This is useful when common messaging protocol does not exist
between clients and discovered services.
Salutation mode: message format and exchange protocol are defined by salutation
Manager.
Service Availability: The Salutation Manager does not implement the mechanism of leasing or
notification to control the availability of a service, but a client can periodically check the
availability of a service by asking its local Salutation Manager. The local Salutation Manager
requests the appropriate Salutation Manager to perform an Availability Check. The period of the
Availability Check is specifiable.
2.5. Bluetooth SDP
Bluetooth [5] is a new short range wireless transmission technology, developed by the Bluetooth
Special Interest Group. This technology allows Bluetooth-enabled devices to communicate via
short-ranged radio links with low power and low cost. Bluetooth devices organize themselves into
a personal area network called piconet. A piconet can at most consist of eight active devices
whereas the member that initiates the communication becomes the master of the piconets. Groups
of piconets communicating with each other are called scatternet.
Bluetooth Service Discovery Protocol (SDP) is service discovery protocol that is local to a single
piconet [8]. It is used to locate services provided by Bluetooth devices. Contrary to other service
discovery protocols, Bluetooth SDP offer limited functionality and addresses only discovery (It
does not provide service advertisement, service usage, and there is no configuration purge
mechanism) [13].
10. International Journal of UbiComp (IJU), Vol.4, No.3, July 2013
32
Figure-6- SDP client-server interaction
In Bluetooth, a service is any entity that can provide information or perform an action. Each
service is described by a service record consisting of a set of attribute-value pairs. Information
about services is stored in SDP servers. A Bluetooth device wanting to use a service is called SDP
client. The Bluetooth SDP defines two modes for discovery: searching and browsing. In the first
mode the SDP client can discover services by type and attributes, while browsing allows SDP
client allows SDP client to get list of all services.
2.6. SECURE SERVICE DISCOVERY SERVICE (SSDS)
The Ninja project by the University of California, Berkeley developed the Service Discovery
Service (SSDS) [18]. SSDS is a directory based mechanism for service deployment and
discovery. It is similar in many respects to other service discovery protocols discussed. Like Jini,
SSDS is implemented in Java and depends on Java RMI. Regarding service description, SSDS is
based on XML like UPnP. This is a powerful combination given the expressiveness of XML and
portability of Java. One important difference of SSDS from other service discovery technologies
is that it features much stronger security and scalability than those discussed so far.
Besides services and clients, the SSDS architecture is composed of:
SSDS server: acts as Directory Agent in SLP, it maintains service description about available
services and processes clients’ queries. For the purpose of scalability, SSDS servers are organized
into multiple shared hierarchies, so that tasks can be shared among several servers.
Certificate Authority (CA): the SSDS server uses certificates signed by the CA for the
authenticity between the components of the systems.
Capability Manager (CM): the SSDS server uses capabilities (access rights) as a mechanism for
controlling access to service descriptions. In other word, a capability proves that a particular
client is allowed to access a particular service. The capability manager generates and distributes
capabilities for all users who are entitled to use particular service.
11. International Journal of UbiComp (IJU), Vol.4, No.3, July 2013
33
Figure-7- SSDS Architecture
In SSDS, the service discovery is handled as follows:
SSDS servers periodically announce their existence on a globally known multicast channel. These
announcements include the necessary information to contact SDS server, CA, and CM. Services
and clients listening for can join the system. A service can advertise itself by registering its
service description with the SSDS server. A typical service description is expressed in XML and
includes service location, service lifetime, and other descriptive attributes. Queries discovery are
also expressed using XML and assessment is achieved by the SSDS server by comparing XML
tags of queries with those included in service description. SSDS uses Authenticated RMI (Remote
Invocation Method) for all communications.
Regarding Configuration Update, SSDS does not implement the mechanism of leasing or
notification to control the availability of a service. During the announcement process, the service
indicates to SSDS server period of time for which the service is still valid. After the expiry of this
period, the service is considered unavailable by the server SSDS.
3. Comparison:
Service Discovery Protocols discussed above in this paper are compared taking various criteria as
service description, architecture, search filter, service usage, operation without directory,
configuration purge, programming language, and interoperability between protocols. Note that
Bluetooth SDP may be omitted in some parts of this comparison. This is mainly due to its limited
functionality (addresses only searching or browsing for service). A summary of the comparisons
is presented in Appendix A.
3.1. Service Description:
Services first of all, need to be described in term of their main functions and capabilities before
getting involved into service discovery procedure. All the aforementioned protocols adopt the
Key-Value approach for service description using various formats (java object and assistant
attribute in Jini, XML in UPnP...). The key-value approach is much simple technique which helps
users to make more informed decisions upon selecting among similar services. On the other side,
12. International Journal of UbiComp (IJU), Vol.4, No.3, July 2013
34
it implies that service providers and users have to agree on the exact keywords before the service
can be recognized while different key- words can offer the same functionality. This conflict can
be solved if an ontology has been adopted, so that semantic matching is possible and keyword
similarity can be taken into account when searching for services [13].
In future, heterogeneity will occur in various aspects (hardware, software platforms, network
protocols….) so using a common format for service description will be essential to preserve
interoperability between service discovery protocols and heterogeneous nodes involved in the
discovery process.
3.2. Service Discovery Architecture:
Depending on how service descriptions are stored, architecture adopted by service discovery
protocols can be classified into two models:
Directory based architecture: adopted by SLP, Jini, Salutation, and SSDS. This architecture is
more suited for large network since a directory increases performance and facilitate discovery.
However, using central directory can make the system susceptible to a single point of failure [6].
One partial solution, is to deploy a distributed directory as Jini does (the information is portioned
and stored at different LSs) therefore the failure of one LS leads to unavailability to a part of the
directory.
Non-directory based model: adopted by UPnP and SDP. This architecture does not require any
directory; the information is always up-to-date since services respond directly to queries.
However, this architecture does not scale and becomes less attractive when number of services
growth in the network [4] due to the extensive use of multicast and broadcast for
communications.
3.3. Operation without central directory:
Except Jini which needs its lookup Service in order to operate and SSDS which requires the
presence of the SSDS server, the other architectures can manage without directory. SLP and
Salutation provide more flexible solution, since they support both architectures. This feature
allows SLP and Salutation to operate in different environments and taking the advantages of both
architectures.
3.4 Service Matching (Discovery Filter)
Service matching is also an important component in service discovery, as it determines the
relevance of the service on the user’s request and then concludes whether it should be returned as
a result. The effectiveness of service matching depends on the expressiveness of the information
needs (query). Regarding the surveyed protocols, when a query language is adopted, the query is
more expressive and attributes can be compared using operators and comparators (that is SLP and
Salutation). Otherwise, evaluation of requests is based on exact correspondence between request
parameters and service type and attributes (Jini, SSDS, UPnP, and SDP). Note that UPnP
supports only service type matching [16].
3.5. Service Invocation:
After the discovery stage, the user invokes selected service. Service invocation involves the
service network address and an underlying communication mechanism [4] between the client and
13. International Journal of UbiComp (IJU), Vol.4, No.3, July 2013
35
invoked service. Aforementioned service discovery protocols provide two different support
levels:
At the first level, protocols provide only service location (that is SLP). Applications are
responsible for defining the communication mechanism. At the second level, in addition to
service location, a protocol defines the underlying communication mechanisms. For example: in
Salutation communications can be done through RPC. In Jini and SSDS, clients use java Remote
Method Invocation, and UPnP uses SOAP protocol based on XML and HTTP to control services.
3.6. Configuration Update (management dynamicity)
All presented service discovery protocols allow automatic detection of disconnected services
using leasing or TTL except Salutation, where the user has explicitly to ask its local SLM to
check availability of the desired service.
Jini and UPnP implement also an event notification system to inform users about service state
changes. In this case, users have to register their interest in receiving service state updates.
3.7. Programming Language and Network independence:
All of the examined approaches are designed for IP networks and do not depend on any
programming language, except Jini and SSDS which are implemented with java. Note that
Salutation is transport independent and can operate over different network not only in IP network.
This transport independence is the strongest feature of Salutation.
3.8. Interoperability between service discovery protocols
All the examined protocols do not interoperate with each other due to the variety of service
description formats and communication protocols. UPnP on his side uses standard technologies
such as: XML, HTTP, and SOAP which make easy for other discovery mechanisms to interwork
with it.
There is a number of works bridging Jini-UPnP [19], SDP-UPnP [20], Jini-SLP [21], and
Salutation-SDP [22]. It is beyond the scope of this article to analyze approaches proposed for
service discovery protocol interoperability. However, one can judge that these works still remain
partial solutions and try to enhance interworking between protocols by only implementing of
certain low-level function of service discovery [3]. This is mainly due to some mappings simply
are not achievable (e.g. UPnP eventing cannot be mapped to any SLP function or SDP function).
4. Conclusion
This paper surveys five of the leading technologies in service discovery. In particular we clarify
service discovery features and techniques, so that the reader can have an overall picture of the
service discovery system. We discussed the fundamental architectures for service discovery,
explaining the basic ideas for each architecture, and describing how each one ensure the
functionalities of an autonomic service discovery protocol. Then, we make a comparison between
them and commenting the advantages and disadvantages for each one. This comparison is based
on eight prime criteria for autonomic service discovery, which we have defined before.
As a conclusion, all the surveyed protocols constitute a good solution for service discovery. There
is no clear dominance of one solution over the others, since each one has its advantages and
14. International Journal of UbiComp (IJU), Vol.4, No.3, July 2013
36
drawbacks. By analyzing the characteristics of examined approaches, a future service discovery
protocols should have the following characteristics:
• Ontology for service description: Service description should define the functionality
and intention of a service in unambiguous way. This can be accomplished only if an
ontology has been adopted, so that semantic matching is possible and keyword similarity
can be taken into account when searching for services.
• Context awareness: Another important consideration for service discovery is context
awareness. It plays key feature for providing more suitable services to clients by taking
into account different information in the discovery stage (such as: user preference,
terminal capabilities, QoS…).
• Service selection: after submitting a query for certain service, there may be several
services meet the criteria. Service discovery protocol should incorporate an automatic
service selection mechanism based on a set of metrics to define the best service offer.
• Robustness: A discovery mechanism should be capable to cope with faults and network
changes without considerable performance or function losses. An example is recovery
from errors or the structural re-stabilization of multiple sites.
• Interoperability: Considering the multitude of service discovery standards, architectures
and protocols and taking also into account the heterogeneity nature of future
environments, interoperability in service discovery will be a major issue requiring
attention.
References
[1] Mehdi Khouja, Carlos Juiz, Ramon Puigjaner, and Farouk Kamoun. (2011)” Models for Service and
Resource Discovery in Pervasive Computing”, 27-36. Pervasive Computing and Networking. John Wiley &
Sons.
[2] Helal, S., (2002)"Standards for service discovery and delivery". IEEE Pervasive Computing, Volume 1,
Issue 3, pp. 95-100.
[3]G.G. Richard, (2000) "Service advertisement and discovery: enabling universal device cooperation",
IEEE Internet Computing, Volume 4, Issue 5, pp. 18-26.
[4] F. Zhu, M. Mutka, L. M. Ni, (2005) "Service Discovery in Pervasive Computing Environments",
Pervasive Computing, IEEE Volume 4, Issue 4, , pp. 81–90.
[5] Blerta Bishaj, (2007) ”Comparison of Service Discovery Protocols”, Helsinki University of
Technology.
[6] Raluca Marin-Perianu, Pieter Hartel, Hans Scholten,(2005) "A Classification of Service Discovery
Protocols", Technical Report TR-CTIT-05-25 Centre for Telematics and Information Technology,
University of Twente, Enschede.
[7] Sundramoorthy, V. and Hartel, P.H. and Scholten, J., (2009) “A Taxonomy of Service Discovery
Systems”. In: Context-Aware Computing and Self-Managing Systems. CRC Studies in Informatics.
Chapman and Hall, Boca Raton, pp. 43-77.
[8] Paul Wisner, Franklin Reynolds, Linda Kallstrom, SannaSuoranta, Tommi Mikkonen, and Jussi
Saarinen,(2008) "Device and Service Discovery in Home Networks". 153-182. in Technologies for Home
Networking. John Wiley & Sons
[9] E. Guttman, C. Perkins, J. Veizades and M. Day, "Service Location Protocol, Version 2," IETF, RFC
2608, June 1999.
[10] Silvano Mignanti, Carmine Di Menna “Enhancing Multiprotocol Service Discovery Framework in
Pervasive Computing Networks” IST Mobile & Wireless Communications Summit 2007.
16. International Journal of UbiComp (IJU), Vol.4, No.3, July 2013
38
Appendix A - Comparative Table on Service Discovery Protocols
Criteria SLP JINI Bluetooth SDP
Mains entities
User Agent
Service Agent
Directory Agent
Lookup Service
Service ,Client
Service
Client
Architecture
both architectures
(can be Directory
or Non- directory)
Directory based Non-directory
Service Description Service URL +
Service Template
Java Object (proxy)
+ Attributes
Service Record
Storage for Service
Description
On Directory
Agent / On every
SA
On Lookup Service on every SDP
server
Service Announcement Registration with
DA / Multicast
Announcement
Registration with
Lookup service
--
Service Discovery Query the DA/
Multicast to SAs
Query the Lookup
Service
Query the SDP
server
Service Matching Powerful
Exact
correspondence
with service
attributes
Exact
correspondence
with service
attributes
Operation without
Directory
Yes Lookup Service
required
Yes
Service Usage Provide only
service location
Java RMI via proxy
Object
--
Configuration Update Service
registration life
time
Leasing + remote
events
--
Programming Language
&Network independence
Independent Java
independent
IP IP independent
Interoperability Possible, e.g. Jini, Possible, e.g.,
UPnP.
Possible, e.g.,
Salutation
17. International Journal of UbiComp (IJU), Vol.4, No.3, July 2013
39
Criteria Salutation UPnP SSDS
Mains entities
Salutation Manager
Transport Manager
Client and Service
Devices
Control points
SDS server
Certificate Authority
Capability Manager
Architecture both architectures
(can be Directory or
Non- directory)
Non-directory Directory based
Service Description Functional Unit Service
Record
XML for description XML for description
Storage for Service
Description
Service Registry on
every SLM
On every UPnP
device
SSDS required
Service Announcement Registration with local
SLM
Multicast
advertisement
(ssdp:alive)
On every SSDS
server
Service Discovery Query the local SLM Listen to
advertisement /
Multicast the devices
Query the SSDS
server
Service Matching Powerful Limited to service
type or ID
Exact correspondence
with service attributes
Operation without
Directory
Yes Yes SSDS server required
Service Usage Usage through RPC SOAP Protocol Usage through RMI
Configuration Update Check availability with
local SLM
Advertisement life
time + event
notification
Service registration
life time
Programming Language
and Network
independence
Independent Independent Java
Independent IP IP
Interoperability Possible, e.g., SDP Possible, e.g., Jini and
SDP
--