• Keine Ergebnisse gefunden

Middleware for Network Eccentric and Mobile Applications

N/A
N/A
Protected

Academic year: 2022

Aktie "Middleware for Network Eccentric and Mobile Applications"

Copied!
5
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Middleware for Network Eccentric and Mobile Applications

Bearbeitet von

Benoît Garbinato, Hugo Miranda, Luís Rodrigues

1. Auflage 2009. Buch. XXI, 463 S. Hardcover ISBN 978 3 540 89706 4

Format (B x L): 15,5 x 23,5 cm Gewicht: 877 g

Weitere Fachgebiete > Technik > Nachrichten- und Kommunikationstechnik >

Drahtlostechnologie

schnell und portofrei erhältlich bei

Die Online-Fachbuchhandlung beck-shop.de ist spezialisiert auf Fachbücher, insbesondere Recht, Steuern und Wirtschaft.

Im Sortiment finden Sie alle Medien (Bücher, Zeitschriften, CDs, eBooks, etc.) aller Verlage. Ergänzt wird das Programm durch Services wie Neuerscheinungsdienst oder Zusammenstellungen von Büchern zu Sonderpreisen. Der Shop führt mehr

als 8 Millionen Produkte.

(2)

Part I Networking and Programming Issues

1 Energy in Wireless Sensor Networks . . . . 3

1.1 Introduction . . . 3

1.2 Energy . . . 4

1.3 Sensor Energy Consumption . . . 6

1.4 Wireless Networking Considering Energy . . . 7

1.5 Summary and Outlook . . . 24

2 Programming Wireless Sensor Networks . . . 25

2.1 Introduction . . . 25

2.2 Hardware and Operating Systems . . . 26

2.3 Programming Languages and Systems . . . 28

2.4 Discussion . . . 38

2.5 Summary and Outlook . . . 41

3 Mobility Models for Systems Evaluation . . . 43

3.1 Introduction . . . 43

3.2 Purely Synthetic Models . . . 45

3.3 Trace-Based Mobility Models . . . 47

3.4 Characterization of Human Connectivity . . . 49

3.5 Social Network Based Mobility Models . . . 50

3.6 From Mobility to Connectivity Models . . . 57

3.7 Testing Tools and Mobility Modeling . . . 59

3.8 Summary and Outlook . . . 60

4 Ad Hoc Routing . . . 63

4.1 Introduction . . . 63

4.2 Topology-Based Routing . . . 65

4.3 Position-Based Routing . . . 74

4.4 Summary and Outlook . . . 92

xv

(3)

Part II Communication Models

5 An Introduction to Population Protocols . . . 97

5.1 Introduction . . . 97

5.2 The Basic Model . . . 99

5.3 Computability . . . 103

5.4 One-Way Communication . . . 108

5.5 Restricted Interaction Graphs . . . 110

5.6 Random Interactions . . . 111

5.7 Self-stabilization and Related Problems . . . 113

5.8 Larger States . . . 114

5.9 Failures . . . 116

5.10 Relations to Other Models . . . 118

5.11 Summary and Outlook . . . 119

6 Routing Issues in Opportunistic Networks . . . 121

6.1 Introduction . . . 121

6.2 Routing in Opportunistic Networks . . . 122

6.3 Haggle and its “Informed” Approach to Routing . . . 126

6.4 Summary and Outlook . . . 146

7 Wireless Mesh Networks . . . 149

7.1 Introduction . . . 149

7.2 Wireless Mesh Networks . . . 149

7.3 Building Wireless Mesh Networks—Research Challenges . . . 154

7.4 Testbeds . . . 161

7.5 Summary and Outlook . . . 165

Part III Middleware Issues 8 Gossip-Based Dissemination . . . 169

8.1 Introduction . . . 169

8.2 Gossip-Based Broadcast Protocols . . . 170

8.3 Gossip-Based Publish/Subscribe in Mobile Ad Hoc Networks . . . 177

8.4 Gossip-Based Data Distribution . . . 184

8.5 Summary and Outlook . . . 189

9 Application Layer Multicast . . . 191

9.1 Introduction . . . 191

9.2 Applicative Viewpoint . . . 193

9.3 Architectural Dimensions . . . 195

9.4 QoS Viewpoint . . . 198

9.5 A Plethora of Protocols . . . 200

9.6 Summary and Outlook . . . 214

(4)

10 Distributed Event Routing in Publish/Subscribe Systems . . . 219

10.1 Introduction . . . 219

10.2 Elements of a Publish/Subscribe System . . . 220

10.3 Subscription Models . . . 221

10.4 Architectural Model . . . 223

10.5 Event Routing . . . 230

10.6 Security . . . 241

10.7 Mobility Support . . . 241

10.8 Summary and Outlook . . . 244

11 Tuple Space Middleware for Wireless Networks . . . 245

11.1 Introduction . . . 245

11.2 Mobile Networks . . . 247

11.3 Wireless Sensor Networks . . . 255

11.4 Summary and Outlook . . . 264

12 Security Middleware for Mobile Applications . . . 265

12.1 Introduction . . . 265

12.2 The Security Landscape for Mobile Devices . . . 266

12.3 Protection for Native Platforms: Memory Protection . . . 271

12.4 Protection for Managed Platforms: Security by Contract . . . 279

12.5 Summary and Outlook . . . 283

13 Dynamic Adaptation . . . 285

13.1 Introduction . . . 285

13.2 Dynamic Adaptation in Action . . . 286

13.3 Reflective Middleware . . . 288

13.4 Policy-Based Middleware . . . 293

13.5 Dynamic Aspect-Oriented Programming (AOP) . . . 297

13.6 Summary and Outlook . . . 301

Part IV Applicative Issues 14 Middleware Support for Context-Aware Applications . . . 305

14.1 Introduction . . . 305

14.2 Context Information . . . 307

14.3 Programming Support . . . 312

14.4 Middleware Architecture . . . 317

14.5 Summary and Outlook . . . 319

15 Autoconfiguration and Service Discovery . . . 323

15.1 Introduction . . . 323

15.2 Autoconfiguration of IP Networking . . . 325

15.3 Service Discovery . . . 332

15.4 Summary and Outlook . . . 346

(5)

16 Dynamic Resource Management and Cyber Foraging . . . 349

16.1 Introduction . . . 349

16.2 Scenarios . . . 350

16.3 The Cyber Foraging Process . . . 351

16.4 Cyber Foraging Approaches . . . 361

16.5 Summary and Outlook . . . 367

17 Vehicular Networks and Applications . . . 369

17.1 Introduction . . . 369

17.2 Applications . . . 371

17.3 Middleware . . . 374

17.4 Internet Connectivity . . . 378

17.5 Summary and Outlook . . . 381

Glossary . . . 383

References . . . 389

Author List . . . 435

Reviewer List . . . 439

Index . . . 441

Referenzen

ÄHNLICHE DOKUMENTE

However, they focus on profiling average power consumption rates for typical application use cases executed on different mobile platforms (e.g., Android and Blackberry).. Our ap-

The proposed scenarios include a navigation problem where a map is used to provide contextual information, because the final target for the particle filter is a mobile robot able

As future work we plan to further improve our implicit rating mechanism by considering the existing explicit ratings on the Android Market, and including time spans

This classification reveals the current gap in speech recognition systems: depending on the type of device being used (e.g., PDA or mobile phone) only constrained speech

This paper presents the management layer of our middleware concept named FAME² (Framework for Applications in Mobile Environments 2), for developing and embedding components

This layer is modal- ity and language independent and as its main result it produces the generic retrieval model (GRM), which models the abstract retrievals of the

Zum anderen wird eine Plattform benötigt, die es mobilen Anwendungen ermöglicht Dienste von anderen Anwendungen zu nutzen, unabhängig davon ob sie auf dem eigenen oder auf

Adaption of Routes: with every update of own position, car wants to know optimal route, in most cases the same as before..