博客
关于我
强烈建议你试试无所不能的chatGPT,快点击我
Realizing the Internet of Things in Service-Centric Environments
阅读量:5268 次
发布时间:2019-06-14

本文共 3761 字,大约阅读时间需要 12 分钟。

1.Info: ICSOC PhD Symposium 2008

2.Abstract:This paper proposes a methodology to realize the Internet of Things in the Service-Centric environments.

3.Concepts

      Internet of Things(IoT): was first mentioned in an article of Forbes in . It was depicted as a world in which objects or people are equipped with a sensor which can report host’s location, identity or some other information via a wireless network.

      RFID: Radio-Frequency IDentification ; 

      SOC: Service-Oriented Computing

      EPC: Electronic Product Code ;  

      PML: Physical Markup Laguage ; 

      ONS: Object Naming Service

4.Problem Statement:

     The author proposes one of most important field of realization of the IoT is: software architecture design.  

     But there are some crucial chanllenges: lack of a common software fabric underlying, i.e.,  lack of how the softwares in the different environments can be combined to build larger, composite system.

     To successfully realize the “Internetof Things”, the following factors should be taken into consideration :

  • Scalability
  • Heterogeneity
  • Manageability
  • Openness(Interoperability)

    To  provide  the  above  features,  the  system  realizing  “Internet  of  Things” should be:

  • a single, open architecture system
  • require a minimum of performance from the tag technology embedded in the objects
  • be flexible and adaptable to changes

Then the author suggest that SOA(Service-Oriented Architecture) is suitable for the solution level design for the "IoT".

     Because SOC is the computing paradigm that utilizes Web services as fundamental elements for developing applications and solutions. The services are self-described, platform-agnostic and loosely coupled. Then the service-centric environment composed by the services is naturally open, platform independent, flexible and adaptable..This architecture does not require the modules of the system to be isomorphic. 

5.Proposed Method:

    Proposed Architecture is:

2011030217321388.png

1).There are four types services in the architecture:

  • Provider Service(PS):it provides the collected RFID data. And it can specify the data accesslevel and format using the standard service description protocol.
  • Object Naming Service(ONS): It is a service to get the required object information. It is used to answer intra-service queries.
  • Discovery Service(DS): It is a service to break the query into sub-queries and find corresponding provider services to answer each sub-query, and then compose the answers together for the inter-service queries.
  • Query Analyzing Service(QAS):It is a service to analyze a query, classifying the query as either intra-service or inter-service query.

2).The service in "IoT" has some unique characteristics:

  • PS are software modules that offer read-only interfaces.
  • each service represents an abstract location entity.

3).two query types:

  • intra-service query: The queries  can be answered by the computations within one single service instance.
  • inter-service query: The queries need two or more service instances involved in order to answer them. Use P2P technology to  realize interactions between individual service instances.

4).Data Model:

     The most challenging part of the design is what kind of data should be published and  how  should  it  be  stored  in  the  ONS  and  DS  so  that  the  query  can  be efficiently processed.  The author suggest a probabilistic data model such as Markov chain.

6.Conclusion:

     The research proposed an initial architecture design to realize the “IoT” in the service-centric environments And discussed the technical challenges and investigated the possibility of combining SOC and the RFID technology for this purpose. The author advocate that a P2P, Web service-based architecture could achieve the scalability of large-scale applications such as the “IoT".

转载于:https://www.cnblogs.com/Leon-Wei/archive/2011/03/02/1969167.html

你可能感兴趣的文章
什么是异常?解释“抛出”和“捕获”的含义
查看>>
java是如何处理异常的?
查看>>
声明变量和定义变量的区别是什么?
查看>>
java-基础算法题1-利用for求和
查看>>
微信小程序云函数中管理短信验证码的完整SDK工具
查看>>
微信小程序云开发,快速生成短信验证码
查看>>
微信小程序注册、登录小功能都在这
查看>>
教你实现3种常用验证码功能,附源码
查看>>
如何在网站中添加手机短信验证码注册功能?
查看>>
教你三分钟开发开发java短信验证码
查看>>
Interceptor
查看>>
修改docker下mysql配置
查看>>
enum简单使用
查看>>
自定义异常和异常处理
查看>>
swagger2简单使用
查看>>
docker 安装mysql
查看>>
docker redis
查看>>
在windows操作系统中,查询端口占用和清除端口占用的程序
查看>>
idea 2018.1 创建springboot开启找回Run Dashboard
查看>>
spring boot oauth2
查看>>