An affinity-driven clustering approach for service discovery and composition for pervasive computing J. Gaber and M.Bakhouya Laboratoire SeT Université.

Slides:



Advertisements
Similar presentations
Research Issues in Web Services CS 4244 Lecture Zaki Malik Department of Computer Science Virginia Tech
Advertisements

1 Mobile IPv6-Based Ad Hoc Networks: Its Development and Application Advisor: Dr. Kai-Wei Ke Speaker: Wei-Ying Huang.
Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
MPAC 2004Rae Harbird 1 RUBI Adaptive Resource Discovery for Ubiquitous Computing Rae Harbird Stephen Hailes
University of Cincinnati1 Towards A Content-Based Aggregation Network By Shagun Kakkar May 29, 2002.
Modeling and Analysis of Random Walk Search Algorithms in P2P Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE, Rensselaer Polytechnic Institute.
Technion –Israel Institute of Technology Computer Networks Laboratory A Comparison of Peer-to-Peer systems by Gomon Dmitri and Kritsmer Ilya under Roi.
Search and Replication in Unstructured Peer-to-Peer Networks Pei Cao, Christine Lv., Edith Cohen, Kai Li and Scott Shenker ICS 2002.
Small-world Overlay P2P Network
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Spotlighting Decentralized P2P File Sharing Archie Kuo and Ethan Le Department of Computer Science San Jose State University.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
1 AINA 2006 Wien, April th 2006 DiVES: A DISTRIBUTED SUPPORT FOR NETWORKED VIRTUAL ENVIRONMENTS The IEEE 20th International Conference on Advanced.
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Vassilios V. Dimakopoulos and Evaggelia Pitoura Distributed Data Management Lab Dept. of Computer Science, Univ. of Ioannina, Greece
Object Naming & Content based Object Search 2/3/2003.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
SensIT PI Meeting, April 17-20, Distributed Services for Self-Organizing Sensor Networks Alvin S. Lim Computer Science and Software Engineering.
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Algorithms for Self-Organization and Adaptive Service Placement in Dynamic Distributed Systems Artur Andrzejak, Sven Graupner,Vadim Kotov, Holger Trinks.
© 2005, it - instituto de telecomunicações. Todos os direitos reservados. System Level Resource Discovery and Management for Multi Core Environment Javad.
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
Roger ZimmermannCOMPSAC 2004, September 30 Spatial Data Query Support in Peer-to-Peer Systems Roger Zimmermann, Wei-Shinn Ku, and Haojun Wang Computer.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Self-Organizing Agents for Grid Load Balancing Junwei Cao Fifth IEEE/ACM International Workshop on Grid Computing (GRID'04)
SensIT PI Meeting, January 15-17, Self-Organizing Sensor Networks: Efficient Distributed Mechanisms Alvin S. Lim Computer Science and Software Engineering.
1 Adaptive QoS Framework for Wireless Sensor Networks Lucy He Honeywell Technology & Solutions Lab No. 430 Guo Li Bin Road, Pudong New Area, Shanghai,
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
Jonathan Walpole CSE515 - Distributed Computing Systems 1 Teaching Assistant for CSE515 Rahul Dubey.
UbiStore: Ubiquitous and Opportunistic Backup Architecture. Feiselia Tan, Sebastien Ardon, Max Ott Presented by: Zainab Aljazzaf.
Content-Based Routing in Mobile Ad Hoc Networks Milenko Petrovic, Vinod Muthusamy, Hans-Arno Jacobsen University of Toronto July 18, 2005 MobiQuitous 2005.
BitTorrent enabled Ad Hoc Group 1  Garvit Singh( )  Nitin Sharma( )  Aashna Goyal( )  Radhika Medury( )
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Enabling Peer-to-Peer SDP in an Agent Environment University of Maryland Baltimore County USA.
Freelib: A Self-sustainable Digital Library for Education Community Ashraf Amrou, Kurt Maly, Mohammad Zubair Computer Science Dept., Old Dominion University.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Service Service metadata what Service is who responsible for service constraints service creation service maintenance service deployment rules rules processing.
MobiQuitous 2007 Towards Scalable and Robust Service Discovery in Ubiquitous Computing Environments via Multi-hop Clustering Wei Gao.
1 Service Sharing with Trust in Pervasive Environment: Now it’s Time to Break the Jinx Sheikh I. Ahamed, Munirul M. Haque and Nilothpal Talukder Ubicomp.
Vehicular Cloud Networking: Architecture and Design Principles
BARD / April BARD: Bayesian-Assisted Resource Discovery Fred Stann (USC/ISI) Joint Work With John Heidemann (USC/ISI) April 9, 2004.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks.
Plethora: Infrastructure and System Design. Introduction Peer-to-Peer (P2P) networks: –Self-organizing distributed systems –Nodes receive and provide.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Distributed Data Analysis & Dissemination System (D-DADS ) Special Interest Group on Data Integration June 2000.
Peer to Peer Network Design Discovery and Routing algorithms
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
第 1 讲 分布式系统概述 §1.1 分布式系统的定义 §1.2 分布式系统分类 §1.3 分布式系统体系结构.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
An overlay for latency gradated multicasting Anwitaman Datta SCE, NTU Singapore Ion Stoica, Mike Franklin EECS, UC Berkeley
Malugo – a scalable peer-to-peer storage system..
CMSC 691B Multi-Agent System A Scalable Architecture for Peer to Peer Agent by Naveen Srinivasan.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
Distributed Caching and Adaptive Search in Multilayer P2P Networks Chen Wang, Li Xiao, Yunhao Liu, Pei Zheng The 24th International Conference on Distributed.
A Presentation on Adaptive Neuro-Fuzzy Inference System using Particle Swarm Optimization and it’s Application By Sumanta Kundu (En.R.No.
CS Spring 2010 CS 414 – Multimedia Systems Design Lecture 24 – Introduction to Peer-to-Peer (P2P) Systems Klara Nahrstedt (presented by Long Vu)
The Biologically Inspired Distributed File System: An Emergent Thinker Instantiation Presented by Dr. Ying Lu.
Service Oriented Architecture (SOA) Prof. Wenwen Li School of Geographical Sciences and Urban Planning 5644 Coor Hall
Presented by Edith Ngai MPhil Term 3 Presentation
Presented by: Saurav Kumar Bengani
Peer-to-Peer Data Management
CHAPTER 3 Architectures for Distributed Systems
Paraskevi Raftopoulou, Euripides G.M. Petrakis
A Semantic Peer-to-Peer Overlay for Web Services Discovery
Presentation transcript:

An affinity-driven clustering approach for service discovery and composition for pervasive computing J. Gaber and M.Bakhouya Laboratoire SeT Université de Technologie de Belfort-Montbéliard (UTBM) Belfort, France

2 OUTLINE Context and Objectives Related work Self-Organization Approach to the Design of Emergent Pervasive Services Simulation results Conclusion and future work

3 CONTEXT (1/2) Ubiquitous computing (UC) and Pervasive computing (PC), what’s the difference ? in UC, the objective is to provide users the ability to access services and resources all the time and irrespective to their location. in PC, the main objective is to provide spontaneous services created on the fly by mobiles that interact by ad hoc connections.

4 CONTEXT (2/2) Two new paradigms have been proposed as alternatives to the traditional Client/Server paradigm (CSP) in [GAB00], [GAB06] the Adaptive Servers/Client Paradigm (SCP). the Spontaneous Service Emergence Paradigm (SEP).

5 OBJECTIVES A Self-Organization Approach for service discovery and composition for pervasive applications SDS : Service discovery is the process of locating available nearby services. SCS : Service composition process concentrates in combining different available services discovered by a SDS.

6 RELATED WORK (1/5) Service discovery systems Structured systems Unstructured systems Flooding Random walk Distributed hash tables Indexation Centralized systems Decentralized systems PushPull Parallel random walk Agent cloning

7 RELATED WORK (2/5) Service discovery systems Structured systems Unstructured systems Flooding Random walk Distributed hash tables Indexation Centralized systems Decentralized systems PushPull Parallel random walk Agent cloning Brokers that maintain a repository of published services Hierarchical architecture consisting of multiple repositories that synchronize periodically Cannot meet the requirements of both scalability and adaptability simultaneously The risk of bottlenecks and the difficulty of repositories updating

8 RELATED WORK (3/5) Service discovery systems Structured systems Unstructured systems Flooding Random walk Distributed hash tables Indexation Centralized systems Decentralized systems PushPull Parallel random walk Agent cloning Permits to implement a direct search algorithm to efficiently locate services. Global Overlay network between nodes are generally hard to maintain.

9 RELATED WORK (4/5) Service discovery systems Structured systems Unstructured systems Flooding Random walk Distributed hash tables Indexation Centralized systems Decentralized systems PushPull Parallel random walk Agent cloning Allow nodes to enter and leave the systems without overheads It is not possible to guarantee the success or failure of a query with a constant TTL The mechanism of dynamic TTL or expanding ring is proposed to overcome this problem Generate large loads on the network

10 RELATED WORK (5/5) Service discovery systems Structured systems Unstructured systems Flooding Random walk Distributed hash tables Indexation Centralized systems Decentralized systems PushPull Parallel random walk Agent cloning It is difficult to determine a priori the number of parallel Random walks Agent cloning approach can overcome this problem but need a regulation algorithm

11 SELF-ORGANIZATION APPROACH Service discovery systems Structured systems Unstructured systems Flooding Random walk Distributed hash tables Indexation Centralized systems Decentralized systems PushPull Parallel random walk Agent cloning Self-organization systems Affinity networks

12 SELF-ORGANIZATION APPROACH Objectives: Scalability nodes can establish relationships between them based on their affinity Adaptability affinity relationships between nodes are dynamic; the affinity values can be adjusted at run-time to cope with changes in the environment

13 AFFINITY NETWORKS To build affinity networks, nodes establish affinity relationships between them based on their provided services. Affinity corresponds to the adequacy which two services to bind Adequacy could be implemented based on keywords or objects in common describing a capabilities provided by services. To determine this affinity, services can be expressively described by a language description in order to obtain effective matches between their capabilities (e.g., WSDL).

14 Building and leaving affinity networks let consider D(S i ) a description of the service offered by an Sagent that want to create an affinity relationship with a nearby Sagents. Let us consider also MATSH(D(S i ),D(S j )) a function that return an affinity measure m ij which indicates if the service description of S i matches with the service description of the agent S j. m ij can be calculated as the ratio of keywords that are in common between S i and S i. If m ij is above a certain threshold, agent S i creates an affinity relationship with the agent and S i creates an affinity relationship with S i. An affinity relationship between S i and S i is considered valid if, otherwise, it is discarded and could be removed from the affinity relationship set of S i.

15 AFFINITY ADJUSTMENTS The affinity between two agents is adjusted or reinforced based on two level of satisfaction. local satisfaction: described by services offered by neighboring agents and resources needed to run services (i.e. computing context) global satisfaction: described by the user satisfaction (i.e. user context)

16 SIMULATION RESULTS Simulation using NS2 A network of 100 nodes is generated randomly. Each node provides one service of ten kinds of elementary services that is described by a single of keyword. Each node has no knowledge of services provided by other nodes and the service discovery and composition performs poorly At the beginning of the simulation, there are no relationships, and service discovery and composition performs poorly. As more simulator time elapses, nodes create many affinity relationships with adjustment learning that improve the overall performance

17 CONCLUSION AND FUTURE WORK Decentralized approach for service discovery and composition for pervasive environment is presented. In this approach, the mechanism of establishing affinity relationships is very simple. Other mechanisms can be introduced to increase the rate at which the nodes acquire the relationships that meet the desired and required services. Future work will address the integration of context-awareness parameters in the equations described above together with additional simulations with ns2.