Learning distributed deployment and configuration trade-offs for context-aware applications in Intelligent Environments
نویسندگان
چکیده
The Internet of Things (IoT) is rapidly gaining ground as can be witnessed by the pervasive presence of the many things or objects around us that turn our surroundings into intelligent environments. These objects interact on a large scale in wired and wireless sensor and actuator networks using advanced communication protocols. Hence, IoT is an open ended and highly dynamic ecosystem with heterogeneous workloads and fluctuating resource availability. Distributed intelligence for smart objects and platforms is a vital enabling factor for IoT, but finding the best strategy to deploy and configure applications − especially those that require contextual intelligence − in a smart environment with dynamic and heterogeneous resource availability is far from straightforward. Our experiments using context-aware applications for intelligent environments show that many resource and performance trade-offs exist and that current deployment schemes for these kind of applications are rough around the edges. We illustrate how a modular design philosophy for smart IoT applications enables a more optimal deployments. Furthermore, we present a methodology to inspect and learn the trade-offs of different deployment schemes of IoT applications in order to autonomously optimize their configuration. We validated our methodology on different use cases and scenarios, and the results demonstrate the feasibility of our approach to automate the efficient deployment of IoT applications in the presence of multiple conflicting Quality of Service (QoS) objectives and varying runtime circumstances.
منابع مشابه
Context-Aware Distributed Deployment of Component-Based Applications
Software deployment refers to all the activities performed after the development of a software in order to make it available to users. These activities mainly consist of installation, configuration, activation of the software but also of reconfiguration, update and de-installation of the software [1]. With recent advances in wireless networking technologies and mobile computing devices, making ...
متن کاملDefining Pathways and Trade-offs Toward Universal Health Coverage; Comment on “Ethical Perspective: Five Unacceptable Trade-offs on the Path to Universal Health Coverage”
The World Health Organization’s (WHO’s) World Health Report 2010, “Health systems financing, the path to universal coverage,” promoted universal health coverage (UHC) as an aspirational objective for country health systems. Yet, in addition to the dimensions of services and coverage, distribution of coverage in the population, and financial risk protection highlighted by the report, the conside...
متن کاملA Web-Based Framework for Lightweight Context-Aware Mobile Applications
As more and more intelligent sensors and sensing applications are equipped with, smartphones are becoming smarter and play a greater role in people's lives. However, due to mobile platform diversity, the development and deployment of a context-aware application for different mobile devices are time-consuming and expensive, which in fact limits the large-scale application of context-aware techno...
متن کاملAn Architecture for Distributed Spatial Configuration of Context Aware Applications
This paper discusses an architecture for spatially distributed storage of contextual configuration information in ubiquitous computing environments. Based on the assumption that we want to integrate arbitrary mobile clients in ubiquitous computing environments, we derive the requirements for the spatial distribution of data, transparent access to context aware configuration data, and separation...
متن کاملA semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JAISE
دوره 6 شماره
صفحات -
تاریخ انتشار 2014