International Journal of Advanced Studies in Computer Science and Engineering IJASCSE, Volume 3, Issue 5, 2014

Total Page:16

File Type:pdf, Size:1020Kb

International Journal of Advanced Studies in Computer Science and Engineering IJASCSE, Volume 3, Issue 5, 2014 May 31 International Journal of advanced studies in Computer Science and Engineering IJASCSE, Volume 3, Issue 5, 2014 CONTEXT MANAGEMENT STRATEGIES IN WIRELESS NETWORK Giadom, Vigale Leelanubari Dr. E. E. Williams M.Sc Student, Department of Computer Science Department of Computer Science University of Port Harcourt University of Calabar Rivers State, Nigeria Cross River, Nigeria Abstract—Context management strategies in wireless technology are information. These information forms a key component of any dependent upon the collection of accurate information from the pervasive computing. HE FURTHER CATEGORIZES CONTEXT individual nodes. This information (called context information) can MANAGEMENT INTO: be exploited by administrators or automated systems in order to decide on specific management concerns. While traditional A. MOBILE ENVIRONMENT approaches for fixed networks are more or less centralized, more complex management strategies have been proposed for wireless B. HOME/OFFICE ENVIRONMENT networks, such as hierarchical, fully distributed and hybrid ones. The reason for the introduction of new strategies is based on the dynamic C. ADHOC ENVIRONMENT and unpredictable nature of wireless networks and their (usually) Ilka (2001) stated that Context management at the access limited resources, which do not support centralized management solutions. In this work, efforts is being made to uncovered some Reuters is considered to support establishment, updating and specific strategies that can be used to managed context information deleting of the mobile nodes context information for a that reaches the centre of decision making, the work is concluded particular service, aimed for instance at multicast listening, with a detail comparison of the strategies to enable context Quality of Service (QoS), reservation, accounting and application developers make right choice of strategy to be employed security. in a specific situation. In all these works, Context Management Strategies in Wireless Keywords— Context Management, Centralized Strategy, Technology was not really captured. The dearth of materials, Hierarchical Strategy, Distributed Strategy, Hybrid Strategy (key research works and active research groups on Context words) Management Strategies in Wireless Technology have I. INTRODUCTION necessitated this project. This project captures a practicable area of computing called networking, specifically wireless Researches in context-aware computing have given rise to technology. A research on Context Management Strategies in several application models, theories, principles, prototype, wireless technology is necessary as the world is gradually frameworks and middleware systems for describing context moving away from wired network to a more reliable, cable but the development of context-aware programs and less network. This cable less network is convenient, flexible, applications is still a difficult task [13]. This stems from the fast, dynamic, secured and has a wider coverage. fact that there is a limited or no knowledge on the set of strategies to be employed for optimal performance and to II. CONTEXT ANALYSIS enhance the efficiency of a context application. Also current middleware applications require a global knowledge of the context-aware infrastructures in order to establish context A. CONTEXT IN NETWORK ENVIRONMENT based interactions [13]. This project seeks to explore Context Schilit et al, 1994, the pioneers of context-aware computing, Management Strategies in wireless Technology. regard context to be location, identities of nearby people and object, and changes to those objects. They consider where you A handful of research has been done on context management, are, whom you are with, and what resources are nearby to be although most of these works center on context management the important aspects of context. Abowd et al.’s more recent in mobile and distributed network but little or no work has classification of context (Abowd et al, 1997) expands the being done on the strategies to be employed in managing the Schilit et al, 1997 definition. They define context as: “…any context information that comes into a context manager. information that can be used to characterize the situation of an Christine (2004) revealed that a context management system is entity. An entity is a person, place or object that is considered a distributed system that enables applications to obtain context relevant to the interaction between a user and an application, www.ijascse.org Page 7 May 31 International Journal of advanced studies in Computer Science and Engineering IJASCSE, Volume 3, Issue 5, 2014 including the user and application themselves.” This means context-aware applications. The main task of a context that any information that depicts the situation of a user can be management system is to match consumer’s interests with entitled context. The temperature, the presence of another probed context information. The complexity of context person, the nearby devices, the devices a user has at hand and management in a distributed scenario is defined by the the orientation of the user are examples. wideness of an interest, i.e. the number of context management systems that should be involved in an interest matching. If a distributed scenario is also open, heterogeneous B. CONTEXT MANAGENENT and dynamic then the wideness of an interest is variable, as a Context management encompasses all the processes involved result of characteristics such as dynamic introduction of new in the collection, exchange and processing of context sensors and evolution of context models. The support of information. This is necessary because: context interest of variable wideness imposes challenging The context information can be distributed in both requirements for context management systems [16]. network and mobile terminal. Therefore, it is difficult to E. CONTEXT AWARE PROGRAMS collect and need to be exchanged. Wireless link is a bottle neck for context exchange. Hence These are set of instructions, commands and applications that the information exchange between the mobile node and can adapt and perform tasks on ambient conditions in the networks should be minimized. physical or the virtual world. In context-aware applications, The context information can be either dynamic or static. adaptations are triggered by changes of certain context The dynamic information needs to be updated frequently. information. For example, smart applications designed to Moreover, the amount of context information can be support meetings may automatically transfer a presentation to enormous. For a specific service, some context information is a projector as soon as the presenter enters the meeting room. relevant, some is not relevant. Therefore, we need a data In this case, both the location of the presenter and his/her role structure to compile the context information effectively. in the meeting room are basic pieces of context information used to trigger the transfer of the presentation. Basically, the C. CONTEXT INFORMATION development of a context-aware application, as in this Context information is data that describes the state of a certain example, involves the description of the actions to be triggered entity at a specific moment. Context information makes according to a set of contextual conditions. A same piece of applications and networks aware of their situation and context information may be used for different purposes. The improves certain functions in a network or applications, but is location of the presenter, for example, may also be used by typically not critical in the sense that functionality cannot be another application to disseminate his availability status for an provided at all if the context information is not available. instant communicator. Moreover, this context information However, context information is expected to play a vital role may be provided by different sensors, such as a proximity in supporting autonomic decision making and is regarded as a sensor to identify if the user is inside the classroom and using necessity for self-organization [3]. a microphone connected to voice recognition software to Basically, there are two classifications of context information identify specific users in the classroom [16]. which are Static Context Information and Dynamic Context Information. III. CONTEXT IN A WIRELESS NETWORK D. CONTEXT MANAGEMENT SYSTEMS Various contexts can be observable in a wireless network A context management system is either a centralized system configuration; information that depicts the situation of a that enables applications to obtain context information about user can be entitled context. These context among others (mobile) users and forms a key component of any pervasive include: WI-FI signal availability, signal intensity, network traffic, geography of WI-FI users, surrounding buildings, computing environment (Christine, 2004). Context structures and vegetations, wireless access points, management systems are however very environment-specific coverage areas, devices used such as PDAs, mobile (e.g., specific for home environments) and therefore do not phones, laptops, desktops, tablets etc, others include the interoperate very well. This limits the operation of context- amount of data transferred, capacity, performance etc. aware applications because they cannot get context These and many more are set of measurable characteristics information on users that reside in an environment served by a used in defining the state of a given entity. These
Recommended publications
  • International Comparative Research on Iot-Based Supply Chain Risk Management
    International Comparative Research on IoT-based Supply Chain Risk Management A/Prof. Yu Cui Graduate School of Business Administration and Economics, Otemon Gakuin University, Osaka, Japan Email: [email protected] Prof. Hiroki Idota Faculty of Economics, Kindai University Prof. Masaharu Ota Graduate School of Business, Osaka City University International Comparative Research on IoT-based Supply Chain Risk Management ABSTRACT In this paper, we firstly discuss current status and problems of food supply chain, which has been attached more importance in supply chain studies in recent years. And then, a review and analysis of the research on traceability systems for IoT-based food supply chains will be conducted. In the latter part, we introduce and explain the establishment of food supply chains in Thailand and China and their respective traceability systems with case studies. Moreover, we conduct a systematic analysis regarding the changes and effects the blockchain made on supply chains. Furthermore, through a case analysis of Japan, explicit speculation and forecast would be made on how blockchain affects the development of traceability systems of IoT- based food supply chain. Keywords: Food Supply Chain, Risk Management, IoT-based Traceability System, Blockchain INTRODUCTION In 2011, Thailand suffered a severe flooding which occurs once in 50 years. Its traditional industrial base - Ayutthaya Industrial Park was flooded and nearly 200 factories were closed down. In the same year, Japan’s 311 Kanto Earthquake also caused serious losses to the manufacturing industry and numerous supply chain companies in Japan. And recently, scandals involving data falsification in automotive, steel and carbon fiber have caused great impact on a large number of related supply chain companies and they are faced with the dilemma of supply chain disruption.
    [Show full text]
  • Design Issues in Distributed Management Information Systems
    DESIGN ISSUES IN DISTRIBUTED MANAGEMENT INFORMATION SYSTEMS by JACOB AKOKA B.S., Faculte des Sciences-Paris (1970) S.M., University of Paris VI (1971) Doctorat 3eme Cycle, University of Paris VI (1975) SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE .OF DOCTOR OF PHILOSOPHY at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY May 4, 1978 Signature of Author .................................................. Sloan School of Management, May 4, 1978 Certified by ......................................................... Thesis Supervisor Accepted by ......................................................... Chairman, Department Committee DESIGN ISSUES IN DISTRIBUTED MANAGEMENT INFORMATION SYSTEMS by Jacob Akoka Submitted to the Department of Management on May 4, 1978 in partial fulfillment of the requirements for the Degree of Doctor of Philosophy ABSTRACT Due to the advances in computer network technology and the steadily decreasing cost of hardware, distributed information systems have become a potential alternative to centralized information systems.' This thesis analyzes issues related to the design of distributed information systems. Most of the research done in the past can be characterized by a piece- meal approach since it tends to consider the computer network design issue and the distributed data base design issue separately. The critical survey presented in Chapter 2 points out the need to integrate both issues in an overall design approach. In an attempt to incorporate most of the factors that compose distributed information systems, we present a global model in which network topology, communication channels capacity, size of computer hardware, pricing schemes, and routing dis- ciplines are interrelated in an optimal design. In addition, we show how to derive from the global model a design model for distributed database systems.
    [Show full text]
  • Self-Management for Large-Scale Distributed Systems
    Self-Management for Large-Scale Distributed Systems AHMAD AL-SHISHTAWY PhD Thesis Stockholm, Sweden 2012 TRITA-ICT/ECS AVH 12:04 KTH School of Information and ISSN 1653-6363 Communication Technology ISRN KTH/ICT/ECS/AVH-12/04-SE SE-164 40 Kista ISBN 978-91-7501-437-1 SWEDEN Akademisk avhandling som med tillstånd av Kungl Tekniska högskolan framlägges till offentlig granskning för avläggande av teknologie doktorsexamen i elektronik och datorsystem onsdagen den 26 september 2012 klockan 14.00 i sal E i Forum IT-Universitetet, Kungl Tekniska högskolan, Isajordsgatan 39, Kista. Swedish Institute of Computer Science SICS Dissertation Series 57 ISRN SICS-D–57–SE ISSN 1101-1335. © Ahmad Al-Shishtawy, September 2012 Tryck: Universitetsservice US AB iii Abstract Autonomic computing aims at making computing systems self-managing by using autonomic managers in order to reduce obstacles caused by manage- ment complexity. This thesis presents results of research on self-management for large-scale distributed systems. This research was motivated by the in- creasing complexity of computing systems and their management. In the first part, we present our platform, called Niche, for program- ming self-managing component-based distributed applications. In our work on Niche, we have faced and addressed the following four challenges in achiev- ing self-management in a dynamic environment characterized by volatile re- sources and high churn: resource discovery, robust and efficient sensing and actuation, management bottleneck, and scale. We present results of our re- search on addressing the above challenges. Niche implements the autonomic computing architecture, proposed by IBM, in a fully decentralized way.
    [Show full text]
  • Enterprise Architecture Techniques for SAP Customers
    October 2007 Enterprise Architecture Techniques for SAP Customers by Derek Prior Enterprise architecture has rapidly matured in recent years as a business-driven technique to provide companies with the big picture needed to optimize long-term IT investments. Some of the leading SAP customers have been quietly deploying enterprise architecture techniques to transform their business and prepare for SOA. Why haven’t you? Enterprise Strategies Report Acronyms and Initialisms ADM Architecture development method ERP Enterprise resource planning BPM Business process management ISV Independent software vendor CMDB Configuration management database ITIL IT infrastructure library CRM Customer relationship management PPM Project portfolio management DMTF Distributed Management Task Force SOA Service-oriented architecture EA Enterprise architecture TOGAF The Open Group Architecture Framework EAF Enterprise architecture framework © Copyright 2007 by AMR Research, Inc. AMR Research® is a registered trademark of AMR Research, Inc. No portion of this report may be reproduced in whole or in part without the prior written permission of AMR Research. Any written materials are protected by United States copyright laws and international treaty provisions. AMR Research offers no specific guarantee regarding the accuracy or completeness of the information presented, but the professional staff of AMR Research makes every reasonable effort to present the most reliable information available to it and to meet or exceed any applicable industry standards. AMR Research is not a registered investment advisor, and it is not the intent of this document to recommend specific companies for investment, acquisition, or other financial considerations. This is printed on 100% post-consumer recycled fiber. It is manufactured entirely with wind-generated electricity and in accordance with a Forest Stewardship Council (FSC) pilot program that certifies products made with high percentages of post-consumer reclaimed materials.
    [Show full text]
  • Distributed Management System for Infocommunication Networks Based on TM Forum Framework
    Distributed management system for infocommunication networks based on TM Forum Framework Valery P. Mochalov Natalya Yu. Bratchenko Sergey V. Yakovlev [email protected] [email protected] [email protected] Darya V. Gosteva [email protected] Department of Infocommunications, North-Caucasus University, Stavropol, Russian Federation Abstract The existing management systems for networks and communication ser- vices do not guarantee in full an efficient rendering of next-generation infocommunication services. The Open Digital Architecture (ODA) is expected to simplify dramatically and automate main business pro- cesses. A key principle of the ODA is using the component approach with the logic of microservices and Open APIs. The concept of Frame- worx gives an exact description for the components of business pro- cesses in terms of their functions, associated information and other characteristics. The performance of a distributed operational manage- ment system depends on the quality of solving several tasks as follows: the distribution of program components among processor modules; the prioritization of business processes with parallel execution; the elim- ination of dead states and interlocks during execution; the reduction of system cost to integrate separate components of business processes. The deadlocks of parallel business processes are eliminated using an interpretation of the classical file sharing example with two processes and also the methodology of colored Petri nets, with implementation in CPN Tools. This paper develops a model of a distributed operational management system for next-generation communication networks that assesses the efficiency of operational activities for a communication company. 1 Introduction Due to high competition in the field of telecommunications, network convergence processes and the need for new business models, it is important to develop methods of operational cost reduction and risk decrease in digital business management.
    [Show full text]
  • Software Project Management
    MG6088 - Software Project Management Department of CSE / IT UNIT I PROJECT EVALUATION AND PROJECT PLANNING Importance of Software Project Management – Activities Methodologies – Categorization of Software Projects – Setting objectives – Management Principles – Management Control – Project portfolio Management – Cost-benefit evaluation technology – Risk evaluation – Strategic program Management – Stepwise Project Planning. PART-A 1 What is a project? The dictionary definitions put a clear emphasis on the project being a planned activity. The other definitions include A Specific plan or design A planned undertaking A large undertaking 2 Define software project management.(May 14) Software project management is the art and science of planning and leading software projects. It is a sub-discipline of project management in which software projects are planned, implemented, monitored and controlled. 3 What are the characteristics of a project? (Dec 12, 13) Non-routine tasks are involved Planning is required Specific objectives are to be met The project has a predetermined time span Work is carried out for someone other than yourself Work involves several specialism People are formed into temporary work group Work is carried out in several phases Resources available are constrained The project is large and complex. 4 What are the characteristics that make software projects different from other projects? (Dec 14, May 12,15) Invisibility - When a physical artifact is being constructed the progress being made can actually be seen. With Software, progress is not immediately visible. Complexity - software products contain more complexity than other engineered artifacts. Conformity - The ‘traditional’ engineer is usually working with physical. These physical systems can have some complexity, but are governed by physical laws that are consistent.
    [Show full text]
  • Distributed Coordination of Mobile Agent Teams: the Advantage of Planning Ahead
    Distributed Coordination of Mobile Agent Teams: The Advantage of Planning Ahead Laura Barbulescu, Zachary B. Rubinstein, Stephen F. Smith, and Terry L. Zimmerman The Robotics Institute Carnegie Mellon University 5000 Forbes Avenue Pittsburgh PA 15024 {laurabar,zbr,sfs,wizim}@cs.cmu.edu ABSTRACT 1. INTRODUCTION We consider the problem of coordinating a team of agents In many practical domains, a team of agents is faced with engaged in executing a set of inter-dependent, geographically the problem of carrying out geographically dispersed tasks dispersed tasks in an oversubscribed and uncertain environ- under evolving execution circumstances in a manner that ment. In such domains, where there are sequence-dependent maximizes global payoff. Consider the situation following setup activities (e.g., travel), we argue that there is inher- a natural disaster such as an earthquake or hurricane in a ent leverage to having agents maintain advance schedules. remote region. A recovery team is charged with surveying In the distributed problem solving setting we consider, each various sites, rescuing injured, determining what damage agent begins with a task itinerary, and, as execution un- there is to the infrastructure (power, gas, water) and effect- folds and dynamics ensue (e.g., tasks fail, new tasks are dis- ing repairs. The tasks that must be performed entail various covered, etc.), agents must coordinate to extend and revise dependencies; some rescues cannot be safely completed un- their plans accordingly. The team objective is to maximize til infrastructure is stabilized, certain repairs require parts the utility accrued from executed actions over a given time that must be brought on site or prerequisite repairs to other horizon.
    [Show full text]
  • Architecture of Network Management Tools for Heterogeneous System
    (IJCSIS) International Journal of Computer Science and Information Security, Vol. 6, No. 3, 2009 Architecture of Network Management Tools for Heterogeneous System Rosilah Hassan, Rozilawati Razali, Shima Mohseni, Ola Mohamad and Zahian Ismail Department of Computer Science, Faculty of Information Science and Technology Universiti Kebangsaan Malaysia, Bangi, Selangor, Malaysia . Human: where human manager defines the policy and organization approaches. Abstract— Managing heterogeneous network systems is Methodology: defines the architectural a difficult task because each of these networks has its own curious management system. These networks framework and the functions to be usually are constructed on independent management performed. protocols which are not compatible with each other. Instrumentation: the actual operational This results in the coexistence of many management aspects that establish the procedures, systems with different managing functions and services methods and algorithms for data collection, across enterprises. Incompatibility of different processing and reporting, and analysis of management systems makes management of whole problems, their repair, prediction or system a very complex and often complicated job. forecasting of service levels and probable Ideally, it is necessary to implement centralized meta- level management across distributed heterogeneous improvements to enhance performance. systems and their underlying supporting network systems where the information flow and guidance is S&NM aims to provide network
    [Show full text]
  • Customer Relationship Management
    CustomerCustomer RelationshipRelationship ManagementManagement HowHow toto turnturn aa goodgood businessbusiness intointo aa greatgreat one!one! GrahamGraham Roberts-PhelpsRoberts-Phelps Blank page Customer Relationship Management How to turn a good business into a great one! Graham Roberts-Phelps Reprinted by Thorogood 2003 10-12 Rivington Street, London EC2A 3DU Telephone: 020 7749 4748 Fax: 020 7729 6110 Email: [email protected] Web: www.thorogood.ws © Graham Roberts-Phelps 2001 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, photocopying, recording or otherwise, without the prior permission of the publisher. This book is sold subject to the condition that it shall not, by way of trade or otherwise, be lent, re-sold, hired out or otherwise circulated without the publisher’s prior consent in any form of binding or cover other than in which it is published and without a similar condition including this condition being imposed upon the subsequent purchaser. No responsibility for loss occasioned to any person acting or refraining from action as a result of any material in this publication can be Special discounts for bulk accepted by the author or publisher. quantities of Thorogood books are available to corporations, institutions, associations and A CIP catalogue record for this book is available other organisations. For more from the British Library. information contact Thorogood by telephone on 020 7749 4748, by ISBN 1 85418 119 X fax on 020 7729 6110, or e-mail us: [email protected] Printed in India by Replika Press.
    [Show full text]
  • TS 102 672 V1.1.1 (2009-11) Technical Specification
    ETSI TS 102 672 V1.1.1 (2009-11) Technical Specification Satellite Earth Stations and Systems (SES); Broadband Satellite Multimedia (BSM); Management Functional Architecture 2 ETSI TS 102 672 V1.1.1 (2009-11) Reference DTS/SES-00289 Keywords architecture, broadband, management, multimedia, satellite ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http://portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media.
    [Show full text]
  • Web Services Distributed Management
    September 12-15, 2004 • Philadelphia Marriott • Philadelphia, Pennsylvania Web Services Distributed Management Heather Kreger – IBM Igor Sedukhin – CA William Vambenepe - HP September 12-15, 2004 • Philadelphia Marriott • Philadelphia, Pennsylvania Agenda • History and Members • Web Services Platform • WSDM Management Using Web Services – Foundations – Capabilities • WSDM Management Of Web Services • Specification Roadmap • Relationship to other standards organizations September 12-15, 2004 • Philadelphia Marriott • Philadelphia, Pennsylvania Membership and History • WSDM was chartered in Feb 2003 – Management Protocol TC was chartered in 2002 and then rechartered as WSDM with a broader charter • CoChairs: Heather Kreger, IBM Winston Bumpus, Dell, DMTF President • Broad representation by member companies – Management –Amberpoint, BMC, CA, HP, IBM, … – Devices – Cisco, Dell, HP, IBM, SUN, … – Application Servers –BEA, IBM, Oracle, SUN... – Customers – Mitre, … September 12-15, 2004 • Philadelphia Marriott • Philadelphia, Pennsylvania Web Services Distributed Management: Missions • Management USING Web Services (MUWS) – Web services to describe and access manageability of resources – Management applications use Web services just like other applications use Web services • Management OF Web Services (MOWS) – An application of Management Using Web Services for the Web Service as the IT resource • Use Web Services as the distributed computing platform to enable interoperability between managers and manageable resources September 12-15, 2004
    [Show full text]
  • Business Architecture
    FRONT MATTER FM 1 – TABLE OF CONTENTS Front Matter Front Matter– Table of Contents Table of Contents FRONT MATTER TABLE OF CONTENTS ....................................................................................................... FM1 ABSTRACT .......................................................................................................................... FM2 MITA AT A GLANCE ............................................................................................................ FM3 Introduction .................................................................................................................... 4 Front Matter .................................................................................................................... 5 Part I Business Architecture .......................................................................................... 6 Part II Information Architecture ..................................................................................... 9 Part III Technical Architecture ....................................................................................... 11 State Self-Assessment ................................................................................................... 13 ACRONYMS AND TERMS ................................................................................................... FM4 OVERVIEW OF THE MITA INITIATIVE ................................................................................ FM5 Introduction ...................................................................................................................
    [Show full text]