middleware for mobile and pervasive environments - University of ...

jiggerbarnacleMobile - Wireless

Nov 24, 2013 (3 years and 9 months ago)

67 views

Bharathram

Pattabhiraman

Chethana

Paniyadi

Nisha

Aram

What is Pervasive computing and what are its
facets?

How middleware helps

Some classes of middleware


-
Security


-
Context aware


-
Energy Efficient

Conclusion




Ubiquitous Computing


Unobtrusive connectivity for network devices



Mobile Computing


component of pervasive
computing


Independent of location



No suitable software infrastructure for
developing applications for ubiquitous
computing.


To coordinate software entities and
heterogeneous networked devices


Software infrastructure developed takes into
account:


Differing networking capabilities


Battery Life


Secure communication


Context awareness







Needed due to high levels of personal and
private data sharing


Most transactions and operations occur
online and need transmission of data


Need to be protected from malicious and
unintentional attacks


Open wireless connectivity


susceptible
threats


Authentication


identities are verified and
credentials are handled


Messages are protected from unidentified
modification and disclosure


Access control policies are managed


Example:


iDataGuard



provides secure network drive
interface


Fame
-
Permis



Authentication middleware


S
-
Marks


Validates device
discovery
mechanism


Builds a trust based
resource discovery


Handles false
recommendations
when validating a
new device


Handles issues that
arise while sharing

-

Reconfigurable
and
on
-
demand assembled,
security components

-

Components
reside on distributed virtual servers

-

Aggregated
on demand to serve a specific
transaction

-

Consists
of various security services


Trust

Management

-

Builds an active space architecture


confines all
security services in one place



Context sampling and detection


Spontaneous
context
-
aware ad
hoc communication


Ad hoc ephemeral group
establishment



Application
-
specific
context acquisition,
analysis,
and detection


Context
-
triggered
action


Transparent support for ad hoc
communication


Object
-
based
development
framework


Context
-
sensitive object request broker


Application
-
specific
adaptive
object
containers



Directly triggers
the
appropriate actions than
the objects deciding which method to
activate.


Implementation is context independent.


Spontaneous interaction support
in R
-
ORB



-
Reachability
.



-
Existence of context
-
aware
objects



-
Suitability
of activation in the
current


context



-
Compatibility


Why

Energy

Optimization
?


Existing Work in Power
Optimization

Architecture

Architecture

(cpu, memory)

Don’t know the global state and
application
-
specific knowledge


Don’t know component
characteristics, and can’t make
frequent decisions

Network

Network

Interface Card

OS should incorporate
application information in power
management

OS should expose power state
and events to applications for
them to adapt.

Operating System

DVS, DPM, Driver

Interfaces, system calls

OS cant incorporate application information in
power management

OS should expose power state and
events to applications for them to
adapt.

User/Application


Quality of Service


Application/user feedback

Mobile Computing


A Distributed Systems Perspective:
Prof. Nalini Venkatasubramanian,
University of California,
Irvine

Power Management


Limited co
-
ordination between the different system
layers


Address concerns at one or two system levels


Make assumptions about adaptations at other system levels
(lack awareness)


Device Centric



Hardware and firmware don’t know the global state and
application
-
specific knowledge


Users


don’t know component characteristics, and can’t make
frequent decisions


Applications


operate independently and the OS hides machine information
from
them


Power
-
Aware Adaptive
Middleware

Architecture

Architecture

(cpu, memory)

Network



Operating System

Middleware


Distributed Adaptation


Cross
-
Layer Adaptation

Appl. specific Adaptation

User/Application


Quality of Service


Application/user feedback



Target:

Separate low level
resource providers from
applications



Functions:


Process the information
requests


Monitors resources


Control the hardware device


Generates and forwards
events

Target:

Classify

applications into

different

classes

based on :


Resource consumption patterns:


CPU processing load


LOW


HIGH


Memory access mode


STABLE


BURSTY


Network transmission load


LOW


HIGH


Power Estimator


Target:

`

Estimate the power
consumption for the
application


Component
-
level power
modeling
:


Unconcerned about
application details.



Application
-
level modeling
:


Power estimation for each
application



Target
:
Make
different power
policies



Input:
application
classification, network
conditions, platform
settings…



Output:

adaptive operations




Target:



Responsible for
scheduling power
adaptations automatically


The procedure:


1.
Subscribe to the resource
manager for events

2.
Request for application
classification, power
estimation or policy

3.
Execute policy



Target:

1.
Communicate with
other middleware and
OS components

2.
Communicate with
remote entities




References


Xiao, Yu,
Ramya

Sri
Kalyanaraman
, and
Antti

Ylä
-
Jääski
.
"Middleware for energy
-
awareness in mobile devices."
Proceedings of the Fourth international ICST Conference on
Communication System Software and
middlewaRE
. ACM,
2009.


Yau
, Stephen S., et al. "Reconfigurable context
-
sensitive middleware for pervasive
computing."

Pervasive Computing, IEEE

1.3
(2002): 33
-
40.