UbiSrvInt: A Context-Aware Fault-Tolerance Approach for WP2P Service Provision

UbiSrvInt: A Context-Aware Fault-Tolerance Approach for WP2P Service Provision

Soe-Tsyr Yuan (National Chengchi University, Taiwan) and Fang-Yu Chen (AsusTeK Computer Inc., Taiwan)
Copyright: © 2009 |Pages: 37
DOI: 10.4018/978-1-60566-366-1.ch009
OnDemand PDF Download:
$37.50

Abstract

Peer-to-Peer applications harness sharing between free resources (storage, contents, services, human presence, etc.). Most existing wireless P2P applications concern merely the sharing of a variety of contents. For magnifying the sharing extent for wireless service provision in the vicinity (i.e., the wireless P2P environments), this chapter presents a novel approach (briefly named UbiSrvInt) that is an attempt to enable a pure P2P solution that is context aware and fault tolerant for ad-hoc wireless service provision. This approach empowers an autonomous peer to propel distributed problem solving (e.g., in the travel domain) through service sharing and execution in an intelligent P2P way. This approach of ad-hoc wireless service provision is not only highly robust to failure (based on a specific clustering analysis of failure correlation among peers) but also capable of inferring a user’s service needs (through a BDI reasoning mechanism utilizing the surrounding context) in ad-hoc wireless environments. The authors have implemented UbiSrvInt into a system platform with P-JXTA that shows good performance results on fault tolerance and context awareness.
Chapter Preview
Top

Introduction

In recent years, new services have mushroomed all over the web world, and people can easily attain a great number of services from the Internet. A service usually performs in the role of computation facility or information provider. Popular examples include search services, agent services, entertainment services, transaction services, etc. Service composition then refers to the technique of creating complex services with the help of smaller, simpler and easily executable lightweight services or components (Chakraborty, 2001). That is, we can handily create novel, interesting and customized services by bundling existing services together to meet the demands of our customers.

On the other hand, mobile devices are in widespread use now, and myriad mobile ad hoc networking technologies (e.g., Bluetooth, IEEE 802.11) unfold dramatically. Clever design of mobile devices includes dramatically reduced size, enlarged storage, economic power consumption and accelerated CPU speed. This design not only improved the performance but also advanced the functionality of the mobile devices. The overwhelming majority of mobile devices launched recently are all capable of supporting wireless Internet access as one of their key features. The next era of network enables the integration of various heterogeneous networks and makes it possible for people to surf between them through different kinds of wireless device anytime, anywhere and anyway. People are striding forward to a completely new Wireless Age.

Accordingly, it can be envisioned that in the forthcoming future everyone (who is walking on the street, dining in the restaurant or working in the office) outfits with hand-held or wearable mobile devices as the standard equipments to access any nearby available network for wanted services. As you move around, a software agent residing in your wireless devices autonomously searches and collects information about what is available from your current location. You may carry with you some useful lightweight services downloaded from the Internet or any wayside provisioning server. You may provide services on hand for nearby people who need them and equally attain desired services from nearby people who possess them. You may, moreover, compose those available wireless services to form an aggregated service tailoring to your contextualized needs, exhibiting moment of values of the services. In other words, the demand to create novel functionalities out of composing wireless services in the vicinity is extremely indispensable.

The aforementioned envisions manifest the significance of the problem of wireless service provision that aims for providing contextualized customized services to meet the concrete needs or requirements of a given client who is equipped with wireless mobile devices by utilizing resources available in its vicinity.

Wireless service provision in the vicinity requires a certain service platform installed at the side of mobile devices. Most existing service platforms (Casati et. Al., 2002) (Mao et. al., 2001) (Mennie et. Al., 2000) (Schuster et. al., 2000) (Gribble et. al., 1999) have been designed on a wired environment that is of high stability and bandwidth, performing against the nature of ad hoc networks. Furthermore, their centralized approaches exerted for service provision have their innate drawback while transplanting them to the wireless environment. The drawback is three-fold:

  • Fault-tolerance: In centralized architectures, if the server shuts down, everything else does as the server is the central point of failure.

  • Scalability: The scalability is limited to the capacity of the central server. Should a large amount of requests be addressed to the server, the server easily becomes the bottleneck of traffic.

  • Extensibility: Centralized architectures are also often hard to expand owing to the limited resources of the central server.

There have been a few published researches (Benatallah et. al., 2002) (Chakraborty et. al., 2002) (Sheng et. al., 2002) addressing the problem using decentralized P2P approach recently. However, when applied to wireless service provision they encountered certain problems mainly resting on the employment of the mediator (broker or coordinator) technique. This hybrid P2P architecture has drawbacks similar to centralized architectures. Exemplars of the hybrid P2P drawback primarily rest on existence of centralized nodes:

Complete Chapter List

Search this Book:
Reset
Editorial Advisory Board
Table of Contents
Preface
Milena Head, Eldon Y. Li
Acknowledgment
Milena Head, Eldon Y. Li
Chapter 1
Jan H. Kietzmann
The recent evolution of mobile auto-identification technologies invites firms to connect to mobile work in altogether new ways. By strategically... Sample PDF
For Those About to Tag
$37.50
Chapter 2
Adrian Lawrence, Jane Williams
As commercial interest in LBS increases, legal and regulatory bodies are becoming increasingly interested in the extent to which use of LBS may... Sample PDF
Privacy and Location-Based Mobile Services: Finding a Balance
$37.50
Chapter 3
Dietmar G. Wiedemann, Wolfgang Palka, Key Pousttchi
A sizeable body of research on mobile payment evolved in recent years. Researchers analyzed success factors and acceptance criteria as well as... Sample PDF
Business Models for Mobile Payment Service Provision and Enabling
$37.50
Chapter 4
Mikko Pynnonen, Jukka Hallikas, Petri Savolainen, Karri Mikkonen
In a digital home a so-called multi-play system integrates networked entertainment and communications systems. Using a mobile phone, all those... Sample PDF
Ubiquitous Communication: where is the Value Created in the Multi-Play Value Network?
$37.50
Chapter 5
Adam Vrechopoulos, Michail Batikas
Mobile government transform many of the traditional governance practices. The citizens’ adoption of M-Government services (e.g. voting, tax... Sample PDF
Predicting the Adoption of Mobile Government Services
$37.50
Chapter 6
Katarzyna Wac, Richard Bults, Bert-Jan van Beijnum, Hong Chen, Dimitri Konstantas
Mobile service providers (MoSPs) emerge, driven by the ubiquitous availability of mobile devices and wireless communication infrastructures. MoSPs’... Sample PDF
Towards Mobile Web 2.0-Based Business Methods: Collaborative QoS-Information Sharing for Mobile Service Users
$37.50
Chapter 7
Giangluigi Me, Daniele Pirro, Roberto Sarrecchia
Currently the most popular attacks to the E-Banking Web applications target the authentication systems relying on the single-side client... Sample PDF
Strong Authentication for Financial Services: PTDs as a Compromise Between Security and Usability
$37.50
Chapter 8
Antonio Ruiz-Martinez, Daniel Sanchez-Martinez, Maria Martinez-Montesinos, Antonio Gomez-Skarmeta
Non-repudiation is an important issue in mobile business and mobile commerce in order to provide the necessary evidences to prove whether some party... Sample PDF
Mobile Signature Solutions for Guaranteeing Non-Repudiation in Mobile Business and Mobile Commerce
$37.50
Chapter 9
Soe-Tsyr Yuan, Fang-Yu Chen
Peer-to-Peer applications harness sharing between free resources (storage, contents, services, human presence, etc.). Most existing wireless P2P... Sample PDF
UbiSrvInt: A Context-Aware Fault-Tolerance Approach for WP2P Service Provision
$37.50
Chapter 10
Dianne Cyr, Milena Head, Alex Ivanov
Anytime anywhere services offered through mobile commerce hold great potential to serve customers in wireless environments. However, there is... Sample PDF
Perceptions of Mobile Device Website Design: Culture, Gender and Age Comparisons
$37.50
Chapter 11
Douglass J. Scott, Constantinos K. Coursaris, Yuuki Kato, Shogo Kato
This study compared the exchange of emotional content in PC and mobile e-mail in business-related discussions. Forty American business people were... Sample PDF
The Exchange of Emotional Content in Business Communications: A Comparison of PC and Mobile E-Mail Users
$37.50
Chapter 12
Carla Ruiz-Mafe, Silvia Sanz-Blas, Adrian Broz-Lofiego, Daniel Marchuet
The chapter aims to present an in-depth study of the factors influencing Mobile Internet adoption. The authors analyse the influence of Internet use... Sample PDF
Mobile Internet Adoption by Spanish Consumers
$37.50
Chapter 13
Mahil Carr
This chapter introduces concepts, frameworks and possible models for introducing mobile payments in India. The introductory section defines mobile... Sample PDF
Framework for Mobile Payment Systems in India
$37.50
Chapter 14
E.S. Samundeeswari, F. Mary Magdalene Jane
Over the years computer systems have evolved from centralized monolithic computing devices supporting static applications, into client-server... Sample PDF
Mobile Code and Security Issues
$37.50
Chapter 15
Tommi Pelkonen
This chapter describes the Finnish mobile telecommunications industry trends and prospects. In addition, it presents two theoretical frameworks... Sample PDF
Finland: Internationalization as the key to Growth and M-Commerce Success
$37.50
Chapter 16
Dickson K.W. Chiu, S.C. Cheun, Ho-Fung Leung
In a service-oriented enterprise, the professional workforce such as salespersons and support staff tends to be mobile with the recent advances in... Sample PDF
Mobile Workforce Management in a Service-Oriented Enterprise: Capturing Concepts and Requirements in a Multi-Agent Infrastructure
$37.50
Chapter 17
Dawn-Marie Turner, Sunil Hazari
Wireless technology has broad implications for the healthcare environment. Despite its promise, this new technology has raised questions about... Sample PDF
Bringing Secure Wireless Technology to the Bedside: A Case Study of Two Canadian Healthcare Organizations
$37.50
About the Contributors