Document Type
Conference Proceeding
Language
eng
Format of Original
8 p.
Publication Date
4-2006
Publisher
Institute of Electrical and Electronics Engineers (IEEE)
Source Publication
Second International Conference on Availability, Reliability and Security
Source ISSN
0-7695-2775-2
Original Item ID
doi: 10.1109/ARES.2006.5
Abstract
Distributed applications and middleware services targeted for mobile devices must use device discovery service to provide any kind of service to other devices. Device discovery algorithms developed for wired networks are not suitable for mobile ad-hoc networks of pervasive computing environments. This research proposes a dependable device discovery mechanism for the middleware of the applications consisting of rapidly reconfiguring mobile devices. Our approach offers a comprehensive solution to potential problems that can arise in highly adaptive mobile ad-hoc networks of pervasive computing environments. The approach is robust enough to accommodate the device limitations and rapid changes in the resource strengths of each device in the network. We present three new device discovery algorithms in this paper: a window based broadcasting algorithm, a connectivity based dynamic algorithm, and a policy-based scalable algorithm. The algorithms vary in complexity and efficiency depending upon the pervasive computing applications. We identify the desirable dependability related characteristics of device discovery services and present how our algorithms realize those characteristics. Experimental results are presented to compare and contrast the algorithms.
Recommended Citation
Ahamed, Sheikh Iqbal; Zulkernine, Mohammad; and Anamanamuri, Suresh, "A Dependable Device Discovery Approach for Pervasive Computing Middleware" (2006). Mathematics, Statistics and Computer Science Faculty Research and Publications. 349.
https://epublications.marquette.edu/mscs_fac/349
Comments
Accepted version. Published as part of the proceedings of the conference, Second International Conference on Availability, Reliability and Security, 2006: 66-73. DOI. © 2006 The Institute of Electrical and Electronics Engineers. Used with permission.