WWW.THESES.XLIBX.INFO
FREE ELECTRONIC LIBRARY - Theses, dissertations, documentation
 
<< HOME
CONTACTS



Pages:     | 1 |   ...   | 35 | 36 || 38 | 39 |

«Carles Gómez Josep Paradells José E. Caballero Edita: Fundación Vodafone España Autores: Carles Gómez Montenegro* Universitat Politècnica de ...»

-- [ Page 37 ] --

Middleware research is a well known topic in traditional computing environments. However, it is quite new in the area of WSNs and exhibits several key differences from the traditional middleware. Some of them are as

follows:

Traditional middleware tries to hide context information to make an application independent of the scenario where it is used. WSNs constitute the opposite case, since applications usually require context-awareness.

Mobile computing middleware is focused on facilitating applications running in the terminal, with the aim of maximizing the interests of the user. In WSNs, the objective is to facilitate the development of sensor based applications, which can be consumed anywhere, and from which the generated data need to be collected and processed, so a whole network should be optimised.

Traditional middleware is focused on the end-to-end paradigm of the Internet54. In WSNs, it is assumed that sensor nodes, sink nodes or gateways might have a relevant role in the communication; therefore the middleware needs to adapt the different functions of these nodes.

Middleware in WSNs should be light due to the limited resources of the nodes. This is not the general case in traditional middleware.

According to the end-to end paradigm, communications protocol entities should be placed at the end-points of a communications system.

Chapter 16. Middleware

In the recent years, several researchers have tried to give a general view of middleware for WSNs [1, 2, 3, 4, 5], but they provide only partial views (system architecture, programming paradigms and run-time support, etc.) and hence do not cover all aspects. The problem is probably related with the availability of different middleware proposals for different specific applications, and the close relationship between application, middleware and WSN. This situation makes it difficult to state which components should be present in a middleware solution. The only valid approach is to take a general view, in the knowledge that in a real implementation only the required components and the most efficient approach should be used.

16.2. Components of a generic middleware solution for WSNs

Middleware functions can be located in different places, either individually or in a distributed approach, such as sensor nodes, sink nodes, high level application terminal, etc.

A complete middleware solution should at least include the following

four components:

• Programming abstraction: this defines the interfaces to the middleware for the application programmer.

• System services: implemented functions to enable programming abstractions.

• Run time support: extensions to the embedded operating system to support middleware services.

• QoS mechanisms: they define the QoS constraints of the system.

16.2.1. Programming abstractions A WSN should be offered to the application programmer through the middleware. The way the programmer views the system is referred to as the abstraction level. The model used to program the application is known as

–  –  –

the programming paradigm. Finally, the programming interface used corresponds to the mechanism used by the application to access the middleware functions.

16.2.1.1. Abstraction level The system can be seen at different levels, offering more or less insight

into the WSN, as for example:

Local (i.e. node level abstraction): this allows the individual node to be reached and presents the system as a collection of distributed nodes. This approach is useful for building efficient communications between nodes and is flexible, depending on the application. One disadvantage is that it requires certain knowledge of the sensor node from the programmer.

Global (i.e. system level abstraction): this abstracts the WSN as a single virtual system and allows the single centralized program to be expressed into subprograms that can be executed on local nodes. It also allows the programmer to concentrate on the application, while avoiding the details of the nodes. Applications might prove to be less efficient in terms of resources consumed in the WSN.

16.2.1.2. Programming paradigms

Programming depends on the application to be carried out by the WSN.

Since some of the most widely used applications are related to data collection, the WSN can be seen as a database where sensor data is the information stored in the database, or as a publish/subscribe service where data from sensors generate an event for the application. To cope with the mobility of the WSNs, or with the phenomena the WSN wants to capture, mobile agents are also proposed as a programming paradigm. Another approach is the use of rule-based declarative languages for command execution. On the other hand, because the sensor node operating systems do not provide enough support for middleware services, virtual machines are used to support runtime. Finally, some middleware solutions come with graphical user interfaces, which include a query-builder and result display.

–  –  –

16.2.1.3. Interface type

The way the application relates with the middleware can either be:





i) declarative, providing data about which information is required and ii) imperative, offering commands that should be carried out. The first one may be based on Structured Query Language (SQL) languages or XML, and is used for database programming paradigms. The second is used for publish/subscribe programming paradigms.

16.2.2. System services

WSN middleware is based on a set of functionalities that form the middleware core. They are offered to the application programmer through the abstraction interface and provide the support for application deployment, execution and WSN management. System services, which are the key

middleware services, can be divided into two categories:

• Common services: basic services shared by all WSN applications. A detailed description of the common services is presented in Section 16.3.

• Domain services: services that facilitate the development of an application in a specific domain. They use the common services and add application oriented functions.

It is quite common to define the middleware in two layers. The lower one corresponds to common services, whilethe upper layer has the application specific functionalities.

16.2.3. Run-time support

Run-time support may be regarded as an extension of the functionalities provided by the operating system of the sensor node needed to support the functionalities of the middleware. Some of these functions are: scheduling of tasks, process communication, memory control and power control (with voltage scaling or component activation and deactivation).

–  –  –

16.2.4. QoS mechanisms The QoS for WSNs is an open issue, mainly due to the lack of understanding about the QoS concept in WSNs and how it can be implemented. In addition to the traditional QoS parameters (such as delay, jitter or bandwidth), there exist other QoS parameters in WSN, such as data accuracy, aggregation delay or system lifetime. This fact makes the implementation of QoS techniques even more complex. The positive point of view for supporting QoS is the role of the middleware between the application and the WSN. The middleware can act as a broker by collecting the requirements of applications and status of the WSN and allocating resources to offer the demanded QoS.

16.3. Middleware system common services As mentioned above, the system services are the key functionalities of the middleware. They can be classified into code management, data management, data storage, resource and information discovery, resource management, integration and security.

16.3.1. Code management A distributed WSN uses pieces of code that are allocated to certain nodes and are executed. This code should be installed and updated, and even moved according to the QoS criteria or the location of the phenomena the WSN is monitoring. Code migration can be implemented at OS level, as in some specific OSs such as BertaOS or MagnetOS. However, since WSN OSs do not support code interpretation, this code migration is difficult to implement in a heterogeneous network. Some middleware support task migrations such as in SensorWare (with Tool Command Language (TCL) Scripts), SINA55 (with SQL Scripts) or TinyLime56 (with Java Objects) [4]. Mobile Agent SINA stands for Sensor information networking architecture [6] TinyLime is an extension of Lime for the sensor network environment [7]

–  –  –

is a further approach where the code, the state and the data are encapsulated and moved from one node to another. Code management is offered on top of a virtual machine to hide the sensor node heterogeneity.

16.3.2. Data management As previously mentioned, WSNs are data-oriented and must support the following functions: data acquisition, data processing and data storage.

The first task, data acquisition, implies collecting relevant and accurate data. Most of the WSN middleware proposed solutions use mechanisms that are event based [4], such as TinyDB, DSware, Mires or Impala. Other solutions use a query based model [4] such as TinyDB, Cougar or SensorWare.

Data processing can either be done in a centralised manner (i.e. in a node outside the WSN), at node level, and hence delivering processed data to the rest of the network, or at a network level, also known as distributed processing. There is a compromise between communication costs and computation costs. However, it is well known that processing is much cheaper than communication in terms of power consumption.

Data fusion and data aggregation are interesting functionalities supported in a network level data processing implementation. These functions can be supported at lower layers, but placing them in a middleware layer seems the best solution since data can thereby be fully analysed.

Finally, data from the WSN can be stored externally, either in the sensor node where the data have been generated or in the node where the data have significance.

16.3.3. Discovery of nodes, resources and characteristics

These types of service are responsible for discovering newly joined sensors, resources associated to the nodes and information about the network and nodes (network topology, neighbour nodes and node locations). Some WSNs re-use existing discovery services protocols such as Service Location Protocol (SLP) or Bluetooth Service Discovery Protocol (SDP).

–  –  –

Resource and information discovery middleware provides underlying network information to applications that are required to be adaptive. It also provides information to the underlying network to support the adaptive resource management services.

16.3.4. Resource management Resource management is related to the usage of resources according to applications and lower layer protocols. Resource management is responsible for cluster service (for organizing nodes into groups), schedule service (to decide the order and time for using the network) and data routing service (offering an upper layer or selecting a routing protocol at network layer).

16.3.5. Integration

WSNs do not work in isolation from the rest and require to be connected to other networks, in particular to the Internet. Several approaches are offered through middleware. The most popular one employs a proxy server that translates the protocols between the two networks. A service oriented approach is also possible, based on Web Services Description Language (WSDL) and Simple Object Access Protocol (SOAP).

16.3.6. Security It provides all the security mechanisms not available by the WSN. In particular, key management is one of the more important aspects.

16.4. Examples A significant number of middleware solutions have been proposed. Some of them have been built as a prototype and tested, while others have only been simulated. Tables 16.1 and 16.2 summarize the features of the most relevant solutions.

–  –  –

Note1: SensorSim, TOSSIM, GloMoSim, ZnetSim and Mica2 are general purpose simulation and testing tools Table 16.2. Development status of some of the middleware proposals available for WSNs (adapted from [4])

–  –  –

In general, the different middleware proposals are not yet sufficiently mature. The global objective is too complex and solutions only address one set of requirements. Existing proposals require a bandwidth and a processing power that are currently not available in WSNs. This limitation will tend to disappear in the future as advances are made in processor development.

As technology evolves, better processors with the same power consumption will emerge on the market.

REFERENCES

[1] S. Hadim, N. Mohamed, “Middleware for Wireless WSNs: A survey”, Journal of Computer Science and Technology, 23(3), pp. 305-326, May 2008.

[2] K. Henricksen, R. Robinson, “A survey of Middleware for WSNs: State-ofthe-Art and Future Directions”, in proc. of MidSens’06, Melbourne, Australia, December, 2006.

[3] E. Yoneki, J. Bacon, “A survey of Wireless WSN Technologies: Research Trends and Middleware’s Role”, Technical Report Number 646, University of Cambridge, September 2005.

[4] M. Wang, J. Cao, J. Li, S. K. Das, “Middleware for Wireless WSNs: A Survey”, Journal of Computer Science and Technology. Vol. 23, Nº 3, pp. 305 – 326, May 2008.

[5] I. Chatzigiannakis, G. Mylonas and S. Nikoletseas “50 ways to build your application: A Survey of Middleware and Systems for Wireless Sensor Networks” in proc. of MidSens’06, Melbourne, Australia, December, 2006.

[6] C. Srisathapornphat, C. Jaikaeo, C. Shen; “Sensor information networking architecture”. In Proc. the Int. Workshop Parallel, IEEE CS Press, pp.

23-30, 2000 [7] [http://lime.sourceforge.net/tinyLime/] Future directions in wireless sensor networks Chapter 17. Future directions in wireless sensor networks



Pages:     | 1 |   ...   | 35 | 36 || 38 | 39 |


Similar works:

«http://www.jamesbeard.org/about/press/newsdetails.php?news_id=109 The James Beard Foundation Awards FOR IMMEDIATE RELEASE Press Contacts: James Curich / Jessica Cheng Susan Magrino Agency 212-957-3005 james@smapr.com / cheng@smapr.com 2008 JAMES BEARD FOUNDATION AWARDS RESTAURANT AND CHEF SEMIFINALIST NOMINEES NOW AVAILABLE FINAL NOMINATIONS TO BE ANNOUNCED ON MARCH 24, 2008 New York, NY (28 February 2008) The list of Restaurant and Chef semifinalists for the 2008 James Beard Foundation Awards,...»

«I n the summer of 1937, Bob Graham and his pals were heading home from a swim in the Humptulips River near Copalis Crossing, a wide spot in a two-lane road meandering through the forested hills of Grays Harbor County. When someone offered them a ride, it changed the direction of Graham’s life. He was 16 then. He was 93 when we sat down to talk in 2014. At his home in Olympia, Washington’s former seven-term state auditor flipped through school annuals, tattered clippings and the sepia-toned...»

«Cerdyn Cymru Free Bus Pass Scheme Information The all Wales Concessionary Fare Scheme, funded by the Welsh Government and Local Authorities, entitles people over 60 and people with certain disabilities who are resident in Wales to travel free on valid local bus services throughout Wales. This leaflet explains how to use your new pass, along with other useful information.If you have any enquiries or require an application form, please contact: Traffic and Transport Section Highways, Waste and...»

«Les gens ont quelques chose en commun : ils sont tous différents. Robert Zend (1929-1985) Station de Ramleh. En face, à gauche, l'hôtel Metropole ; à droite, l'hôtel Sofitel Cecil. Photo prise par Olivier Guignard en septembre 2006 SOMMAIRE Pages Echos des sections 2-5 La tempête sur Alexandrie 6 La révolution du 25 janvier 2011 7 Lettres et messages reçus 8-9 Kom-el-Dik 10-11 Hier et Aujourd'hui 12 Publications 13 Divers 14-16 Sandro Manzoni, chemin de Planta 31, 1223 Cologny, Suisse +...»

«Teaching Concurrency Leslie Lamport 26 January 2009 minor correction: 30 November 2009 I am not an academic. I have never even taken a computer science course. However, I have worked with a number of computer engineers (both hardware and software engineers), and I have seen what they knew and what they didn’t know that I felt they should have. So, I have some thoughts about how concurrent computing should be taught. I am not concerned with traditional questions of curriculum—what facts...»

«Tool Support for Enforcing Security Policies on Databases Jenny Abramov2, Omer Anson2, Arnon Sturm1, Peretz Shoval1 Department of Information Systems Engineering Deutsche Telekom Laboratories (T-Labs) Ben-Gurion University of the Negev Beer Sheva 84105, Israel jennyab@bgu.ac.il, oaanson@gmail.com, sturm@bgu.ac.il, shoval@bgu.ac.il Abstract. Security in general and database protection from unauthorized access in particular, are crucial for organizations. It has long been accepted that security...»

«COURSE TITLE: SW531 Foundation Field Seminar TERM: Winter 2015 COURSE TIME: Tuesdays: 12:00 p.m. – 2:00 p.m. SEMINAR DATES FOR MAIZE GROUP: #1 1/13/2015 #2 1/20/2015 #3 2/3/2015 #4 2/17/2015 #5 3/10/2015 #6 3/24/2015 #7 4/7/2015 LOCATION: Room # SSWB 1804 SEMINAR FACILITATORS: G. Warren Clark, Field Faculty clarkw@umich.edu Emily Hellenberg, MSW Candidate ehellenb@umich.edu OFFICE HOURS: By Appointment COURSE DESCRIPTION Foundation Field Seminar (SW531) is a one credit course that must be...»

«Position Paper April Mobile Identity Management www.enisa.europa.eu Mobile Identity Management -2ENISA Position Paper Editor: Maria Papadopouli, University of Crete & FORTH, Heraklion, Greece, mgp@ics.forth.gr Contributors:  André Årnes, Oracle Norway/ NISlab, Gjøvik University College, Norway,  Jorge Aguado Bombin, ISDEFE Madrid, Spain  Elisa Boschi, Hitachi Europe & ETH Zurich, Zurich, Switzerland,  Sonja Buchegger,Technische Universität, Berlin, Germany  Raul Benito...»

«            Excitoxins Aside from eliminating foods that one is truly allergic to, the most vital dietary intervention you can make is in removing excitotoxins. Dr. Russell Blaylock MD, a neurosurgeon and chief authority on excitoxins, defines these chemicals as A group of excitatory amino acids that can cause sensitive neurons to die 5-14. The most commonly used substances include glutamate, aspartate, and cysteine, all of which change your perception of the drink or food’s flavor,...»

«return to updates HELP! Do you want to know a Secret? Paul McCartney is Twins by Miles Mathis First published April 20, 2016 As usual, this is just my personal opinion, based on private research Actually, I had help on this one. “A friend from Colorado”, as he wishes to be called, did some of the initial research on this, and did a great job. I was busy with other papers, and wasn't as interested in this subject as he was, so I gave him the hint and sent him off to look for clues and...»

«Common Problems Identified by the Property and Casualty Market Conduct and Consumer Services Sections The State Corporation Commission’s Bureau of Insurance (Bureau) has developed the following information to assist insurers with compliance problems frequently found in the regulation of the market by the Market Conduct Section and the Consumer Services Section. The purpose of this document is to provide insurer personnel responsible for compliance with a checklist to review their operations...»

«Prognose van het aantal verkeersslachtoffers in 2020 Uitgebreide samenvatting van SWOV-rapport R-2011-12 Inleiding In 2008 is het Strategisch Plan Verkeersveiligheid 2008-2020 (SPV) vastgesteld (Ministerie van Verkeer en Waterstaat, 2008). In het Nationaal Mobiliteitsberaad (NMB, dit heet inmiddels Bestuurlijk Koepeloverleg) is afgesproken om het plan iedere vier jaar te toetsen op actualiteit en indien nodig bij te stellen. Als hulpmiddel bij deze vierjaarlijkse toets heeft de SWOV onlangs...»





 
<<  HOME   |    CONTACTS
2016 www.theses.xlibx.info - Theses, dissertations, documentation

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.