By Topic

Communication in Distributed Systems (KiVS), 2007 ITG-GI Conference

Date Feb. 26 2007-March 2 2007

Filter Results

Displaying Results 1 - 25 of 48
  • Composition in Beyond 3G Networks: from Research to Standardization

    Publication Year: 2007 , Page(s): 1 - 2
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (72 KB)  

    Network Composition is a concept for dynamic interworking of heterogeneous networks, particularly on the control plane. Work on Network Composition was started in the 6th Framework Programme (FP) EU Project "Ambient Networks". It has now progressed to a Feasibility Study for the evolution of the Universal Mobile Telecommunications System (UMTS) in the 3rd Generation Partnership Project (3GPP). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Distributed System Approach to Realize Ambient Networks

    Publication Year: 2007 , Page(s): 1 - 4
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (394 KB)  

    The Ambient Networks project develops an integrated prototype that combines all concepts developed across the project. As the development process is highly distributed and the developed functionality is quite diverse, a suitable mechanism was required that can integrate all these components. We describe a solution based on Web Service technologies that enables the interaction of components written in virtually any programming language and running on virtually any operating system. Standardized description mechanisms for the interfaces between the components and corresponding tools significantly ease the integration of the various components. A registration and lookup mechanism enables the resulting control plane to work as a truly distributed system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Media Delivery Based on Service Aware Transport Overlay Networks

    Publication Year: 2007 , Page(s): 1 - 2
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (291 KB)  

    This paper describes a concept for media delivery in future mobile networks that uses service-aware transport overlay networks and network-based media processing nodes in order to optimize media delivery to heterogeneous devices and network access properties. This concept was developed in the context of the European FP6 research project Ambient Networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Autonomic Middleware Solution for Integrated Access Management

    Publication Year: 2007 , Page(s): 1 - 2
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (43 KB)  

    This paper introduces LS/ASAM, the Living Systems Adaptive Service Access Management Suite, an autonomic middleware solution that enables operators to effectively manage connectivity of nomadic end hosts across heterogeneous access networks, while optimizing the way network performance and resource availability are managed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Living Systems(R) Connection Agent: Seamless Mobility at Work

    Publication Year: 2007 , Page(s): 1 - 2
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (65 KB)  

    The Living Systems(R) Connection Agent is a customizable client software that allows mobile operators and wireless Internet service providers to offer data services across different wired and wireless, own and partner networks. The technology offers seamless handover allowing mobile operators to converge different networks and simplifies usage of the software for the end-user. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile TV Services in 3G Networks

    Publication Year: 2007 , Page(s): 1 - 3
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (40 KB)  

    This industrial paper describes concepts for delivery of Mobile TV services in 3G networks. Mobile TV is a key service for mobile devices. One system technology for the delivery of Mobile TV services are 3G cellular networks. Although Mobile TV is often associated with broadcast transmission, unicast technology is sufficient in many cases, especially since mobile users prefer to access content on-demand, rather than following a fixed schedule. In order to further optimize the system, 3GPP has defined a broadcast extension for 3G networks, called Multimedia Broadcast Multicast Service (MBMS). MBMS uses broadcast bearers on the radio transmission and has thus the capabilities of a real broadcast technology. On top of MBMS, additional application and service layer technologies are required, like electronic service guide and service protection. In order to optimize a system for delivery of broadcast services over 3G networks, the advantages of MBMS/broadcast and unicast should be combined, by integrating them into a hybrid delivery system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Autonomic sensor networks for future enterprise services

    Publication Year: 2007 , Page(s): 1 - 2
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (68 KB)  

    As we move towards the "Internet of things", it can be expected that millions of devices of different size and capability will be connected and interact with each other. That in conjunction with the trend towards a service oriented business infrastructures leads to increased complexity that has to be managed. Future enterprise services will interact with this vast number of devices and services that depend on them. Central management is not favoured and maybe even not possible. Intelligence will probably be distributed at several layers between enterprise systems and the devices themselves. Therefore the devices are expected to feature at some level self-features such as self-management, self-healing etc, which in conjunction with cooperation capabilities will lead to self-sustained autonomic sensor-network infra-structures. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Middleware for Real-world Aware PLM Applications

    Publication Year: 2007 , Page(s): 1 - 12
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (646 KB)  

    Up-to-date information on behavior and conditions of technical products is of key importance for numerous business applications, such as optimisation of use and maintenance of products, effective reuse of parts in other products, and ultimately, design improvement for new products. Ubiquitous computing technologies, like Radio Frequency Identification (RFID), embedded computing, sensors and sensor networks, can largely automate the sensing and capturing of product information. Still, it remains the problem to seamlessly integrate them and the captured information in business applications. We have thus developed a middleware system, which allows business applications to communicate with physical products in a uniform and transparent way, regardless of the location of the products and the technology used for data capture. In this paper, the architecture with the design and implementation concepts of the middleware is presented. Further, we describe a first deployment and evaluation of our middleware in a real-world scenario dealing with the maintenance of heavy-load vehicles. The results and experiences are promising and indicate the practicability of our approach. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transforming Inter-Organizational Business Processes into Service-Oriented Architectures Method and Application in the Automotive Industry

    Publication Year: 2007 , Page(s): 1 - 12
    Cited by:  Papers (2)
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (1721 KB)  

    Service-oriented architectures (SOA) promise flexible process integration in heterogeneous environments. Since services encapsulate application functionality according to business processes, the understanding of processes is a prerequisite for implementing an SOA. Existing SOA development approaches tend to foc us on enterprise application integration scenarios rather than on business-to-business scenarios. Due to the increasing heterogeneity of applications in an inter-organizational context, significant benefits can be expected when implementing SOAs for business-to-business integration. However, a systematic approach to analyzing inter-organizational business processes and transforming them into SOAs is still missing. This paper presents a method for modeling inter-organizational processes and deriving business services in three steps. The applicability of this method is shown for a specific business-to-business scenario in the automotive industry. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating IMS Presence Information in a Service Oriented Architecture

    Publication Year: 2007 , Page(s): 1 - 5
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (167 KB)  

    Successful service delivery platforms will need to build on service oriented architectures and provide interoperability with the IP Multimedia Subsystem (IMS). In this extended abstract we describe how presence information that is maintained in IMS can be integrated into a service oriented architecture. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards an information infrastructure for the future Internet of energy

    Publication Year: 2007 , Page(s): 1 - 6
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (392 KB)  

    A deregulated energy market, characterized by the growing use of decentralized energy systems and the increasing range and complexity of interactions between providers and consumers, cannot be realized without an adequate IT infrastructure. The challenges that rely ahead towards realizing this service-based informationdriven Internet of energy are substantial. We offer an industrial insight on how this future energy domain could be, identify research challenges that information and communication technologies (ICT) will have to deal with, and point towards directions that need to be followed in order to effectively support this emerging infrastructure. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security of Microsoft's Identity Metasystem and CardSpace

    Publication Year: 2007 , Page(s): 1 - 12
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (103 KB)  

    Microsoft has designed and proposed an identity metasystem that is user-centric and consistent with open Web services (WS-*) standards. An implementation of the metasystem is, for example, available in the .NET Framework 3.0. It interfaces to the user by providing an identity selector named CardSpace (formerly codenamed InfoCard). Various applications can make use of CardSpace, including, for example, Microsoft Internet Explorer 7. We therefore expect Microsoft¿s identity metasystem and CardSpace to become widely deployed on the Internet and a popular target to attack. In this paper, we elaborate on the security of Microsoft¿s identity metasystem and CardSpace. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing SWITCHaai with Micropayment Functionality for Swiss Universities

    Publication Year: 2007 , Page(s): 1 - 12
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (1257 KB)  

    In the past, many Swiss universities have deployed SWITCHaai, the Shibboleth based infrastructure for authentication and authorization. This white paper extends the concept of Shibboleth by adding (micro-)payment functionality. It shows how the proposed payment infrastructure could settle the usage of services provided by other organizations and how it could be integrated with existing local payment solutions based on electronic student card authentication. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Fluctuation Resilience of Second Generation Distributed Hash Tables

    Publication Year: 2007 , Page(s): 1 - 6
    Cited by:  Papers (1)
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (496 KB)  

    Every Peer-to-Peer system destined for real-world use has to face challenges imposed by peer dynamics, i.e., peers join and leave the system at their own discretion. So any Distributed Hash Table (DHT) design must take precautions against peer population fluctuation (aka. churn) to sustain efficient lookup performance. Although important, an analysis of the influence of varying fluctuation on the performance of 2nd generation DHTs in a unified attempt has not been done yet. An existing analysis by Li et al. aims at finding optimal parameters for those DHTs. However, optimal parameters were found out by simulating merely one fluctuation scenario. In this paper, we analyse second generation DHTs covering many topologies under different fluctuation rates and evaluate their performance in a simulation framework. Overall Kademlia attains the best lookup performance, but its bandwidth consumption goes up significantly when increasing fluctuation rate. With a limited bandwidth budget and high fluctuation rate, Kelips' lookup performance is the best among all examined DHTs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Seamless Integration of Distributed OSGi Bundles into Enterprise Processes using BPEL

    Publication Year: 2007 , Page(s): 1 - 6
    Cited by:  Papers (1)
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (230 KB)  

    OSGi is a component technology, that can be run on a variety of differently equipped computing nodes. It is particularly suitable for resource-constraint nodes, such as product embedded systems. Business processes in application domains like Product Lifecycle Management can be improved by enabling the access of data from products. However, the complexity of OSGi services is typically much lower than enterprise services. Moreover, the services of OSGi bundles are not directly accessible from clients outside of the OSGi container. We present an approach that solves the problem of different service granularities by exposing OSGi services as Web Services. They are combined into a more complex service using the Business Process Execution Language (BPEL). This enables the integration of small, distributed OSGi bundles into enterprise level business processes without a dedicated middleware. Furthermore, the benefits of OSGi are maintained, i.e. the relocation of bundles is transparent to the enterprise system and will not disrupt its operation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimizing sleeping intervals in preamble sampling MAC for WSNs

    Publication Year: 2007 , Page(s): 1 - 6
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (662 KB)  

    Preamble sampling is a popular mechanism in WSN MAC protocols. This paper optimizes the energy consumption by adjusting the preamble length to a known or estimated, possibly varying event rate. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • T-QoMIFA: A Transparent QoS aware Mobility Management Framework in future All-IP networks

    Publication Year: 2007 , Page(s): 1 - 6
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (370 KB)  

    A main issue in all-IP networks is how to support fast mobility coupled with a fast re-reservation of resources during and after the handoff. The Mobile IP Fast Authentication Protocol (MIFA) minimizes the handoff latency and provides seamless mobility. However, it does not support resource reservation. The ReSource reserVation Protocol (RSVP) reserves resources on a certain path of routers. However, it does not support mobility. In this paper we introduce a new proposal to support seamless mobility and QoS in IP networks. Our proposal integrates RSVP and MIFA with each other. A new object called mobility object is added to RSVP messages. MIFA messages are encapsulated in this object. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Change-Point Detection for Voice over IP Denial of Service Attacks

    Publication Year: 2007 , Page(s): 1 - 7
    Cited by:  Papers (2)
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (826 KB)  

    This paper describes the use of the nonparametric Cumulative Sums (CUSUM) algorithm for detecting flooding attacks against SIP infrastructures. The efficiency of this detection mechanism is validated using trace-driven simulations. Using an appropriate function, the nonparametric CUSUM equations are transformed to some parametric CUSUM equations for a Poisson model. This allowed us to verify the accuracy of the results provided by the experiments. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Optimal Replication Group Splits in P2P Data Stores Based on the Hypercube

    Publication Year: 2007 , Page(s): 1 - 8
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (106 KB)  

    P2P data stores excel if availability of inserted data items must be guaranteed. Their inherent mechanisms to counter peer population dynamics make them suitable for a wide range of application domains. This paper presents and analyzes the split maintenance operation of our P2P data store. The operation aims at reorganizing replication groups in case operation of them becomes sub-optimal. To this end, we present a formal cost model that peers use to compute optimal points when to run performance optimizing maintenance. Finally, we present experimental results that validate our cost model by simulating various network conditions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Avoidance of Illegal Nodes in Gnutella-like Pure P2P Networks

    Publication Year: 2007 , Page(s): 1 - 6
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (554 KB)  

    Pure P2P networks like Gnutella do not have a single point of failure. However, it is possible for an illegal (faulty or malicious) node to alter messages it transmits, so as to make the whole network malfunction. This altered message is forwarded by several nodes, thus it is difficult to identify and to eliminate the illegal node. This paper presents a method to avoid the influence of such illegal nodes by adjusting TTL of packets according to the evaluation of neighboring nodes. We show its effects by several simulation experiments. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of a proactive link quality based uni- and multicast routing protocol for MANETs

    Publication Year: 2007 , Page(s): 1 - 6
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (110 KB)  

    Several proposals have been made to achieve efficient routing of unicast and multicast data in wireless mobile ad hoc networks. This paper evaluates a new approach to use link layer parameters to determine a link quality value for route calculation, especially for multicast data dissemination. Simulation results suggest that a shortest path metric is rarely the best choice. Instead, a signal strength based metric yields better results than other common protocols. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context Aware Routing in Sensor Networks

    Publication Year: 2007 , Page(s): 1 - 6
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (287 KB)  

    Sensor networks are a prominent representative of ubiquitous computing technologies. The limited resources of sensor nodes and the low reliability of wireless communication pose special challenges for message routing in sensor networks. This paper discusses how context awareness can enhance routing in sensor networks. Further, we analyze the network properties which influence the benefit of context awareness in the routing process. The presented simulation results allow assessing which networks are best suited for such an approach. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flow-based Worm Detection using Correlated Honeypot Logs

    Publication Year: 2007 , Page(s): 1 - 6
    Cited by:  Papers (4)
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (356 KB)  

    Attack detection in high-speed networks is a hot research topic. While the performance of packet oriented signature-based approaches is questionable, flow-based anomaly detection shows high false positive rates. We tried to combine both techniques. In this paper, we study the applicability of flow-based attack detection. We installed a lab environment consisting of a monitoring infrastructure and a well-controlled honeypot. Using correlated honeypot logs and flow signatures, we created a first set of attack pattern. The evaluation of the approach was done within our university network. On the positive side, we were able to prove the successful detection of worm attacks. Problems can occur if incomplete monitoring data is used. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dealing with Application-specific Knowledge in Context-Aware Systems

    Publication Year: 2007 , Page(s): 1 - 12
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (299 KB)  

    Context¿aware applications provide users with information and services, personalized according to the user¿s context. They are supported by context-aware systems that gather sensor data and build context representations. Then applications use context to adapt their behaviors. But performing adaptation in context-aware systems offers advantages to fulfill the vision of a pervasive computing environment, where users interact with various context-aware applications. It ensures the privacy of user data stored in a central user model that is used to serve several applications. However, adaptation differs for different applications and is governed by application-specific knowledge. This knowledge must be communicated to the systems. In this paper, we present three types of knowledge 1) the description of the application behaviors 2) the context elements, describing the context information relevant for adapting the application and 3) the adaptation knowledge required to infer the adaptation. Also we present examples of the three templates, considering an application we developed, the Call Profile Manager. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Programming for Context-based Adaptability: Lessons learned about OOP, SOA, and AOP

    Publication Year: 2007 , Page(s): 1 - 12
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (1190 KB)  

    Context-sensitive applications are a key issue to exploit the benefits of mobile devices. For many applications planned adaptation starts to become status quo. However, the huge potential of adapting to unanticipated situations still remains a research issue. The general question "how to program for adaptivity" in a reasonable way is not answered yet. Current methods relying on statically typed languages either introduce a high level of complexity, or rely on detailed anticipation, or both. First, we describe how a statically typed Object-Oriented language can with the help of some design patterns to cope with basic requirements of adaptivity. Then, we show how adopting a Service-Oriented Architecture (SOA) can leverage coding. Finally, we present the Aspect-Oriented (AOP) language CSLogicAJ (compatible to AspectJ) which includes a logic notation and direct access to context data. We discuss how AOP on top of SOA can help to reduce the level of anticipation of runtime adaptation. Finally, we discuss which of the main obstacles can be overcome with our approach and what remains to be tackled in the future. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.