首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Wireless sensor network (WSN) technologies have enabled ubiquitous sensing to intersect many areas of modern day living. The creation of these devices offers the ability to get, gather, exchange, and consume environmental measurement from the physical world in a communicating‐actuating network, called the Internet of Things (IoT). As the number of physical world objects from heterogeneous network environments grows, the data produced by these objects raise uncontrollably, bringing a delicate challenge into scalability management in the IoT networks. Cloud computing is a much more mature technology, offering unlimited virtual capabilities in terms of storage capacity and processing power. Ostensibly, it seems that cloud computing and IoT are evolving independently on their own paths, but in reality, the integration of clouds with IoT will lead to deal with the inability to scale automatically depending on the overload caused by the drastic growth of the number of connected devices and/or by the huge amount of exchanged data in the IoT networks. In this paper, our objective is to promote the scalability management, using hybrid mechanism that will combine traffic‐oriented mechanism and resources‐oriented mechanism, with adaption actions. By the use of autonomic middleware within IoT systems, we seek to improve the monitoring components's architectural design, based on cloud computing‐oriented scalability solution. The intention is to maximize the number of satisfied requests, while maintaining at an acceptable QoS level of the system performances (RTT of the system, RAM, and CPU of the middleware). In order to evaluate our solution performance, we have performed different scenarios testbed experiments. Generally, our proposed results are better than those mentioned as reference.  相似文献   

2.
The need for global‐scale cyber physical system (CPS) is increasing with the evolution of CPS research. A global‐scale CPS requires additional considerations beyond the well‐known CPS requirements, such as security, reliability, and timely delivery, which cannot be easily satisfied when a CPS becomes global scale. Building an entire dedicated network for a global‐scale CPS cannot be a solution, because it requires a large capital outlay in order to be actualized. To overcome these obstacles, we implement a virtual platform named Xebra that includes effective CPS middleware for realizing a global‐scale CPS and isolation techniques based on virtualization. In this paper, we discuss the requirements for realizing global‐scale CPS network, and also, we introduce our implementation as a virtual platform with its performance evaluation. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

3.
The Advanced Resource Connector (ARC) is a light-weight, non-intrusive, simple yet powerful Grid middleware capable of connecting highly heterogeneous computing and storage resources. ARC aims at providing general purpose, flexible, collaborative computing environments suitable for a range of uses, both in science and business. The server side offers the fundamental job execution management, information and data capabilities required for a Grid. Users are provided with an easy to install and use client which provides a basic toolbox for job- and data management. The KnowARC project developed the next-generation ARC middleware, implemented as Web Services with the aim of standard-compliant interoperability.  相似文献   

4.
The US and Japan have successfully demonstrated one of grid computing's long-standing holy grails - dynamic, on-demand provisioning of bandwidth and interoperability between high-performance resources in two national research testbeds. The automated interoperability between Japan's G-lambda project and the US's Enlightened Computing project was demonstrated 11 September at the annual Global LambdaGrid Workshop (http://news.ncsu.edu/releases/2006/sept/documents/global lowbargrid.pdf) in Tokyo. The demonstration featured some of the most advanced research facilities in both nations, highlighting new middleware capable of reliably coordinating both network and computational resources as well as other protocol and interface technologies. Advances in grid computing technology have tended to focus on large-scale research deployments like this one, but smaller deployments are beginning to get headlines as well. This shift could change the way we view this field-as long as grid architects are willing to expand their vision of a grid beyond raw network speed and CPU aggregation  相似文献   

5.
In this paper we present a framework, called Futon, which provides a platform to integrate heterogeneous radio access networks. Futon is a hybrid fibre-radio network that replaces legacy base stations with simple remote antenna units, which are connected to a central unit. As a part of the Futon framework, a generic middleware architecture is discussed in detail, which provides interoperability, cooperative management and service provisioning to both underlying radio access networks (RANs) and IP layer for a heterogeneous network scenario. One of the middleware??s functionality is to provide vertical handover between heterogeneous IP-based radio access technologies and to ensure seamless mobility and service continuity, which is implemented on top of an IPv4/IPv6 Mobile IP (MIP) core. In this paper, the Futon framework and a generic middleware architecture as a part of Futon framework for heterogeneous RANs is discussed. The main modules of the middleware, namely common radio resource management (CRRM), media independent handover, Service/Connection Manager and link selection are explained in detail. Radio over fibre (RoF) Manager is an important part of Central unit, which does performance, fault and security management of network elements. RoF manager helps middleware during handoff, by providing the status of fibre optic links. The implementation of Security management module as a part of RoF manager, and results of authentication with AAA protocol are explained. The CRRM as part of middleware is simulated and the results of experimental evaluation are presented.  相似文献   

6.
This paper proposes a service-oriented middleware to access heterogeneous remote laboratory equipment and experimental settings through the network. The web service paradigm is used to expose the functionality of the instruments and to compose measurement workflows in a multilevel architecture that enables high flexibility, scalability, and interoperability. The proposed architecture has been applied to the development of a remote laboratory for education on electronics, but the middleware can address a broad range of instrumentation and experimental activities in different fields via the same architectural design.   相似文献   

7.
Mobile computing environments are characterized by heterogeneity—systems consisting of different device types, operating systems, network interfaces, and communication protocols. In a realistic scenario of context-aware computing, we should be able to deploy context management middleware throughout the distributed system at every device, despite its resource limitations, and the developer should be able to evolve the context model whenever new context-aware applications or context providers are introduced. This article presents a middleware architecture and design strategies that address these requirements without compromising efficiency.  相似文献   

8.
9.
Mobile users expect a network service, in which seamless handoff occurs while moving on a next generation wireless network. In addition, in smart factories (SFs), communication is required between factory floor and manufacturing zone, as well as connectivity towards office IT, or remote production facilities that are connected via wide area network or internet. For this purpose, interworking between heterogeneous networks is important, but there has been little research on global mobility support. Therefore, this paper proposes Proxy‐LMA technology, a mobile IP‐based global internetworking system, to improve global mobility and interoperability in the SFs network environment. The purpose of the proposed Proxy‐LMA system is to support global mobility by using mobility management protocols such as PMIPv6 and MIPv6 in heterogeneous network environment. As a result of the performance evaluation, Proxy‐LMA system is more efficient than other methods in terms of signaling cost and response delay in heterogeneous network environment. Software‐based networking in SFs enables them to easily adapt the communication network to changing requirements. Similar to cloud‐based systems, such SFs could be seen as production clusters that could be rented and configured as needed. The SF network uses software‐defined networking combined with network functions virtualization, to achieve the required flexibility. Despite the fact that the technology is nowadays not yet ready for deployment in today's manufacturing networks, a novel network architecture for SFs based on software‐defined networking and network virtualization is here proposed, to support smart services, especially for Industrie 4.0.  相似文献   

10.
Ubiquitous computing is revolutionizing the way applications, users, resources, and physical spaces interact. Securing cyber infrastructures for ubiquitous computing environments, such as smart buildings and campuses, can be challenging. A critical cyber infrastructure is necessary that can combine networks, processors, and devices with mechanisms, protocols, and services to offer reliable, fault-tolerant, available, and secure operations. Existing CCI implementations create statically configured, confined networked subsystems that are isolated from the public Internet and are context insensitive. This leads to multiple, incompatible subsystems incapable of interoperating, thus making operations, management, and trust difficult. The Heterogeneous Survivable Trusted Information-Assurance Architecture addresses the problem of securing critical information services in large-scale ubiquitous computing environments. Hestia is a programmable middleware solution implemented as a network of middleboxes. These middleboxes form protective layers that isolate CCI services and mediate authorized access to Hestia’s services. They also provide a programmable, distributed, object-oriented framework that enables the integration of security, privacy, and reliability mechanisms in service-access interfaces and implementations.  相似文献   

11.
12.
With the explosion of global data,centralized cloud computing cannot provide low-latency,high-efficiency video surveillance services.A distributed edge computing model was proposed,which directly processed video data at the edge node to reduce the transmission pressure of the network,eased the computational burden of the central cloud server,and reduced the processing delay of the video surveillance system.Combined with the federated learning algorithm,a lightweight neural network was used,which trained in different scenarios and deployed on edge devices with limited computing power.Experimental results show that,compared with the general neural network model,the detection accuracy of the proposed method is improved by 18%,and the model training time is reduced.  相似文献   

13.
本文探讨了如何实现主流交易中间件平台如CICS与新兴的基于webservice架构的交换平台之间的互操作,实现政府的信息共享和业务协同,对如何在不改变系统原有程序模式的情况下访问和调用WEB服务,实现异构平台之间的互操作的方法进行了研究并在实际项目中进行了实践验证。  相似文献   

14.
This work proposes an environment for testing of heterogeneous embedded systems by means of distributed co-simulation. The test occurs in real-time, co-simulating the system software and hardware platform using the high level architecture (HLA) as a middleware. The novelty of this approach is not only providing support for simulations, but allowing the synchronous integration of heterogeneous simulators with a physical real-time environment. In this work we use the Ptolemy framework as a simulation platform. The approach of co-simulation based on HLA allows different simulators and physical devices to inter-operate, for example robots can operate and be tested with a Ptolemy simulations. Case studies are presented to prove the concept, showing the successful integration between Ptolemy and the HLA and test systems using Robot-in-the-loop. The integration of real-time devices through robot operating system was also presented. The approach proved to be able to detect logical and physical design flaws.  相似文献   

15.
16.
Next generation embedded systems will be composed of large numbers of heterogeneous devices. These will typically be resource-constrained (such as sensor motes), will use different operating systems, and will be connected through different types of network interfaces. Additionally, they may be mobile and/or form ad-hoc networks with their peers, and will need to be adaptive to changing conditions based on context-awareness. Our focus in this paper is on the provision of a middleware framework for such system environments. Our approach is based on a small and efficient ‘middleware kernel’ which supports highly modularised and customisable component-based middleware services that can be tailored for specific embedded environments, and are runtime reconfigurable to support adaptivity. These services are primarily communications-related but also address a range of other concerns including service discovery and logical mobility. In the paper we provide an overview of our approach, focusing in detail on both the middleware kernel and the services. We also discuss an application scenario in which we are currently applying and evaluating our middleware approach.
Stefanos ZachariadisEmail:
  相似文献   

17.
Nowadays, networked embedded systems (NESs) are required to be reconfigurable in order to be customizable to different operating environments and/or adaptable to changes in operating environment. However, reconfigurability acts against security as it introduces new sources of vulnerability. In this paper, we propose a security architecture that integrates, enriches and extends a component-based middleware layer with abstractions and mechanisms for secure reconfiguration and secure communication. The architecture provides a secure communication service that enforces application-specific fine-grained security policy. Furthermore, in order to support secure reconfiguration at the middleware level, the architecture provides a basic mechanism for authenticated downloading from a remote source. Finally, the architecture provides a rekeying service that performs key distribution and revocation. The architecture provides the services as a collection of middleware components that an application developer can instantiate according to the application requirements and constraints. The security architecture extends the middleware by exploiting the decoupling and encapsulation capabilities provided by components. It follows that the architecture results itself reconfigurable and can span heterogeneous devices. The security architecture has been implemented for different platforms including low-end, resource-poor ones such as Tmote Sky sensor devices.  相似文献   

18.
Ontology mapping for the interoperability problem in network management   总被引:9,自引:0,他引:9  
Interoperability between different network management domains, heterogeneous devices, and various management systems is one of the main requirements for managing complex enterprise services. While substantial advances have been made in low-level device and data interoperability using common data formats and specifications such as simple network management protocol's (SNMP's) SMI and TMF's SID, various interoperability issues including semantic interoperability offer interesting research challenges. While semantic interoperability is a difficult problem in its own right, the semantic web that incorporates intelligent agents necessitates an interoperability solution requiring agents to communicate unambiguously and reason intelligently to perform cooperative management tasks. Agents need a formal representation of knowledge; an ontology is capable of modeling the rich semantics of the managed environment (and especially, relationships between managed entities) so that agents can act on them. This paper presents an ontology-driven approach for solving the semantic interoperability problem in the management of enterprise services, illustrated here with a router configuration management application.  相似文献   

19.
Grid computing, the collaboration of distributed resources across institutional borders, is an emerging technology to meet the rising demand on computing power and storage capacity in fields such as high-energy physics, climate modeling, or more recently, life sciences. A secure, reliable, and highly efficient data transport plays an integral role in such grid environments and even more so in medical grids. Unfortunately, many grid middleware distributions, such as the well-known Globus Toolkit, lack the integration of the world-wide medical image communication standard Digital Imaging and Communication in Medicine (DICOM). Currently, the DICOM protocol first needs to be converted to the file transfer protocol (FTP) that is offered by the grid middleware. This effectively reduces most of the advantages and security an integrated network of DICOM devices offers. In this paper, a solution is proposed that adapts the DICOM protocol to the Globus grid security infrastructure and utilizes routers to transparently route traffic to and from DICOM systems. Thus, all legacy DICOM devices can be seamlessly integrated into the grid without modifications. A prototype of the grid routers with the most important DICOM functionality has been developed and successfully tested in the MediGRID test bed, the German grid project for life sciences.  相似文献   

20.
莫佑锟 《移动信息》2023,45(8):55-57
工业互联网由网络、平台、安全三大体系共同构成。其中,网络体系由网络互联、数据互通和标识解析3部分共同构成。网络互联可以让要素之间的数据传输得以进行,数据互通可以让要素之间的传输信息得以相互理解,标识解析可以让要素的标记、管理和定位得以完成。在此过程中,有线网络仍占据很大的比重,实时工业以太网非常适合成为通信主干网,现场总线技术在设备级通信中有着很大的影响,5G等新技术则使无线网络由补充技术向主要组成的方向加快发展。在数据交互方面,加快信息建模技术的发展,推动IT和OT相结合的多源异构数据的共享、传递和交互。在具体实践过程中,建议有关企业根据行业的实际需要,提前建设工业互联网的网络设施,加快对工业互联网关键技术的测试验证,并在实践过程中不断完善工业互联网的网络体系。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号