Middleware is a critical foundation needed to leverage the development of a wide range of mobile and ubiquitous applications. Intrinsic challenges when building such middleware require the combination of expertise from areas like distributed systems, networking, software engineering, and application development.
This textbook provides a comprehensive introduction to the main fundamental problems, technologies, paradigms, and solutions of concern to developers of middleware for mobile environments. The contributions are grouped into four parts, on networking and programming issues, communication models, middleware issues, and application issues. Each chapter is structured as a self-contained tutorial, presenting an overview of a specific topic and the state-of-the-art solutions for the related problems. In addition, the book also includes an authoritative reference list. The material has been successfully used in several thematic training schools organized by the ESF MiNEMA (Middleware for Network Eccentric and Mobile Applications) program, and the book's organization and presentation is ideal for an advanced course on middleware.
Author(s): Benoît Garbinato, Hugo Miranda, Luís Rodrigues
Publisher: Springer
Year: 2009
Language: English
Pages: 463
City: Berlin
cover-large.tif......Page 1
front-matter.pdf......Page 2
Organisation......Page 7
Part I Networking and Programming Issues......Page 19
Introduction......Page 21
Energy......Page 22
Sensor Energy Consumption......Page 24
Taxonomy of Energy Saving Techniques......Page 25
No Energy Information......Page 26
Turn off Parts of Sensor Node......Page 27
In-network Processing......Page 29
Local Energy Information......Page 31
The Energy Map......Page 33
Trajectory Based Forwarding (TBF)......Page 35
Trajectory and Energy-based Data Dissemination (TEDD)......Page 37
Finite Energy Budget......Page 39
Summary and Outlook......Page 42
Introduction......Page 43
Hardware and Operating Systems......Page 44
Programming Languages and Systems......Page 46
Low-Level......Page 47
Virtual Machines......Page 48
Middleware......Page 49
High-Level Programming Languages......Page 50
Macroprogramming Systems......Page 52
Communication-Centric......Page 54
Computation-Centric......Page 55
Discussion......Page 56
Acknowledgements......Page 59
Introduction......Page 60
Random Waypoint Mobility Model......Page 62
Other Synthetic Single Node Mobility Models......Page 63
Trace-Based Mobility Models......Page 64
Characterization of Human Connectivity......Page 66
Social Network Based Mobility Models......Page 67
The Community Based Mobility Model......Page 68
Other Social Network Based Mobility Models......Page 73
From Mobility to Connectivity Models......Page 74
Testing Tools and Mobility Modeling......Page 76
Summary and Outlook......Page 77
Introduction......Page 80
Routing Metrics......Page 81
Topology-Based Routing......Page 82
Proactive Routing Protocols......Page 83
Reactive Protocols......Page 85
Discussion on Topology Based Routing Protocols......Page 89
Determining Nodes Positions......Page 91
General Greedy Routing Algorithms......Page 92
Face Routing......Page 96
Hybrid Position-Based Routing Algorithms......Page 99
Pre-processing Algorithms......Page 101
Pitfalls......Page 108
Summary and Outlook......Page 109
Part II Communication Models......Page 111
Introduction......Page 113
The Basic Model......Page 115
Examples of Population Protocols......Page 117
Computability......Page 119
Sketch of the Impossibility Proof......Page 122
One-Way Communication......Page 124
Restricted Interaction Graphs......Page 126
Random Interactions......Page 127
Self-stabilization and Related Problems......Page 129
Larger States......Page 130
Unique Identifiers......Page 131
Crash Failures......Page 132
Byzantine Failures......Page 133
Relations to Other Models......Page 134
Summary and Outlook......Page 135
Acknowledgments......Page 136
Introduction......Page 137
Routing in Opportunistic Networks......Page 138
Context-Oblivious Routing......Page 139
Partially Context-Aware Routing......Page 140
Fully Context-Aware Routing......Page 141
General Presentation of the Non-oblivious Approaches......Page 142
Bubble Rap......Page 144
Introduction to Algorithm......Page 145
Evaluation of Algorithm......Page 146
HiBOp......Page 149
Evaluation Strategy......Page 150
Routing Sensitiveness to Social Mobility Patterns......Page 151
Introduction......Page 155
System Architecture......Page 156
Security Considerations......Page 159
Simulation and Performance Evaluation......Page 160
Summary and Outlook......Page 162
Acknowledgements......Page 163
Wireless Mesh Networks......Page 164
Why Wireless Mesh Networks?......Page 165
Mesh Network Architectures......Page 166
Usage Scenarios......Page 168
Building Wireless Mesh Networks-Research Challenges......Page 169
MAC Layer......Page 170
Network Layer......Page 171
Transport Layer......Page 172
Application Layer......Page 173
Standards Activities......Page 174
Mesh Management......Page 175
Academic Testbeds......Page 176
Commercial Testbeds......Page 179
Summary and Outlook......Page 180
Part III Middleware Issues......Page 182
Introduction......Page 184
Gossip-Based Broadcast Protocols......Page 185
Gossip in MANET......Page 187
On the Benefits and Limitations of Gossip Protocols......Page 189
Combining Pull Based Gossip with Other Approaches......Page 191
Gossip-Based Publish/Subscribe in Mobile Ad Hoc Networks......Page 192
The Publish/Subscribe Paradigm......Page 193
Gossip-Based Approaches to Publish/Subscribe in MANETs......Page 194
Frugal Event Dissemination......Page 195
Autonomous Gossiping......Page 196
Socially-Aware Publish/Subscribe Systems......Page 197
Socio-Aware Overlay for Publish/Subscribe in DTNs......Page 198
Gossip-Based Data Distribution......Page 199
Uniform Geographical Replication......Page 200
Effects of Movement in Data Placement......Page 201
Shuffling Algorithms......Page 202
Illustration......Page 203
Summary and Outlook......Page 204
Acknowledgments......Page 205
Introduction......Page 206
Classifying Protocols......Page 207
Communication Model......Page 208
MANET Suitability......Page 209
Node Identification......Page 210
Overlay Topology......Page 211
Infrastructure Support......Page 212
QoS Viewpoint......Page 213
Reliability......Page 214
Tree-Based Overlay......Page 215
Mesh-Based Overlay......Page 224
Logical ID Overlay......Page 226
Summary and Outlook......Page 229
Acknowledgements......Page 233
Introduction......Page 234
Elements of a Publish/Subscribe System......Page 235
Subscription Models......Page 236
Architectural Model......Page 238
Network Protocols......Page 239
Overlay Infrastructure......Page 241
Matching......Page 244
Event Routing......Page 245
Event/Subscription Flooding......Page 246
Filtering-Based Routing......Page 248
Rendezvous-Based Routing......Page 249
Filter Merging......Page 251
On the Guarantee of Event Delivery......Page 252
Gossip-Based......Page 253
Event Routing for MANETs......Page 254
Event Routing for Sensor Networks......Page 255
Mobility Support......Page 256
Acknowledgements......Page 259
Introduction......Page 260
Representative Systems......Page 262
Discussion......Page 264
Tuple Spaces in Action......Page 267
Wireless Sensor Networks......Page 270
Representative Systems......Page 271
Discussion......Page 273
Tuple Spaces in Action......Page 276
Summary and Outlook......Page 279
Introduction......Page 280
Overview of Mobile Device Platforms......Page 281
Protection of Mobile Platforms......Page 282
Security Issues......Page 283
Protection for Native Platforms: Memory Protection......Page 286
Existing Countermeasures......Page 287
Applicability of Desktop Countermeasures......Page 289
Model-Based Countermeasure Design......Page 293
Policies and Contracts......Page 294
Policy Enforcement......Page 295
The SxC Process......Page 297
Summary and Outlook......Page 298
Acknowledgements......Page 299
Introduction......Page 300
Dynamic Adaptation in Action......Page 301
Reflective Middleware......Page 303
OpenCom and ReMMoC......Page 304
Further State of the Art Reflective Middleware......Page 307
Policy-Based Middleware......Page 308
Adaptation of Micro-protocol Frameworks......Page 309
Further State of the Art Policy Middleware......Page 310
Analysis......Page 311
Dynamic Aspect-Oriented Programming (AOP)......Page 312
State of the Art Dynamic AOP Middleware......Page 313
Summary and Outlook......Page 316
Acknowledgements......Page 317
Part IV Applicative Issues......Page 318
Definition of Context......Page 320
Middleware Classification......Page 321
Individual Context......Page 322
Social Context......Page 324
Programming Support......Page 327
Low-Level Programming Support......Page 328
Mid-Level Programming Support......Page 329
High-Level Programming Support......Page 331
Middleware Architecture......Page 332
Decentralization......Page 333
Summary and Outlook......Page 334
Social Application Support......Page 335
Acknowledgements......Page 337
Introduction......Page 338
IP Autoconfiguration in Fixed Networks......Page 340
IP Configuration in Ad Hoc Networks......Page 342
Routing in Ad Hoc Networks......Page 343
Ad Hoc Network Address Configuration......Page 345
Gateways to External Networks......Page 346
Service Discovery......Page 347
Service Location Protocol......Page 348
Jini......Page 350
UPnP......Page 352
Web Services Dynamic Discovery (WS-Discovery)......Page 353
Summary......Page 354
Bluetooth......Page 355
Distributed Service Discovery......Page 356
Service Discovery and Routing......Page 357
Overlay-Based Service Discovery......Page 358
Probabilistic Dissemination......Page 359
Security Issues Specific to Ad Hoc Networks......Page 360
Summary and Outlook......Page 361
Introduction......Page 363
Scenarios......Page 364
The Cyber Foraging Process......Page 365
Surrogate Discovery......Page 367
Application Partitioning......Page 369
Placement Decision and Cost Assessment......Page 370
Security and Trust......Page 371
Task Execution......Page 372
Summary......Page 374
Cyber Foraging Approaches......Page 375
RPC-Based......Page 377
Mobile Code......Page 378
Summary......Page 380
Summary and Outlook......Page 381
Background......Page 383
A Vehicular Networks Taxonomy......Page 384
Information Dissemination......Page 385
Coordinated Driving......Page 387
Middleware......Page 388
Middleware Requirements......Page 389
Extensions to Existing System Architectures......Page 390
Routing......Page 392
Transport Protocols......Page 394
Summary and Outlook......Page 395
Coordination:......Page 396
Gossip:......Page 397
Pull based protocol:......Page 398
SxC:......Page 399
Type-based Routing:......Page 400
Author List......Page 446
Bart De Win,......Page 449
Index......Page 450