Addressing network heterogeneity in pervasive application environments

Paul Grace*, Geoff Coulson, Gordon S. Blair, Barry Porter

*Corresponding author for this work

Research output: Chapter in Book/Published conference outputConference publication

Abstract

Pervasive computing applications typically involve rich interactions and heterogeneous network types; e.g. involving the collation or data from a sensor network into a replicated repository in a fixed network. Although the middleware approach has been highly successful in supporting application development in networked environments, current middleware technologies cannot handle the accelerating complexity in interaction types, and diversity in networks types, seen in pervasive computing environments. Therefore, we propose a middleware solution (called Gridkit), which uniformly supports an extensible set of middleware interaction types (e.g. RPC, publish-subscribe, streaming, etc.), and handles network heterogeneity by layering itself over virtual overlay networks which it manages and transparently instantiates on demand. We focus in this paper on Gridkit's generalized architecture for the transparent deployment and management of overlay networks. We also consider the application of the Gridkit approach in two application scenarios.

Original languageEnglish
Title of host publicationACM International Conference Proceeding Series - Proceedings of the First International Conference on Integrated Internet Ad hoc and Sensor Networks
PublisherACM
ISBN (Print)1595934278, 9781595934277
DOIs
Publication statusPublished - 1 Dec 2006
Event1st International Conference on Integrated Internet Ad hoc and Sensor Networks - Nice, France
Duration: 30 May 200631 May 2006

Publication series

NameACM International Conference Proceeding Series
Volume138

Conference

Conference1st International Conference on Integrated Internet Ad hoc and Sensor Networks
CountryFrance
CityNice
Period30/05/0631/05/06

Fingerprint

Dive into the research topics of 'Addressing network heterogeneity in pervasive application environments'. Together they form a unique fingerprint.

Cite this