44
Ubiquitous and Secure Networks and Services: Architectures and Models Ubiquitous and Secure Networks and Services Ubiquitous and Secure Networks and Services Ubiquitous and Secure Networks and Services Ubiquitous and Secure Networks and Services Redes Redes y y Servicios Servicios Ubicuos Ubicuos y y Seguros Seguros Unit 3: Architectures and Models José Fernán Martínez Ortega José Fernán Martínez Ortega [email protected] , [email protected] © José Fernán Martínez Ortega 1

Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

Ubiquitous and Secure Networks and ServicesUbiquitous and Secure Networks and ServicesUbiquitous and Secure Networks and ServicesUbiquitous and Secure Networks and ServicesRedesRedes y y ServiciosServicios UbicuosUbicuos y y SegurosSeguros

Unit 3: Architectures and Models

José Fernán Martínez OrtegaJosé Fernán Martínez [email protected], [email protected]

© José Fernán Martínez Ortega 1

Page 2: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

UNIT 3: Architectures and Models

INTRODUCTIONINTRODUCTIONUNIT 3: Architectures and Models

© José Fernán Martínez Ortega 2

Page 3: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

Evolution to pervasive computingEvolution to pervasive computing

© José Fernán Martínez Ortega 3

Page 4: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

Distributed System FeaturesDistributed System Features

HeterogeneityExtensibilityExtensibilitySecurityScalabilityFault managementFault managementConcurrencyTTransparency

© José Fernán Martínez Ortega 4

Page 5: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

Architectural ModelsArchitectural Models

To identify the functionality of the simple system components.

To manage problems associated to component localization in To manage problems associated to component localization in

the network (distributed patterns, information, workload).

T l l ti hi t ( i ti To analyze relationships among components (communication

patterns),

Starting point:

ServersSe e s

Clients

P t P

© José Fernán Martínez Ortega 5

Peer to Peer …

Page 6: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

General Software LevelsGeneral Software Levels Platform

Hardware Hardware. Operating System. Low level software layers. Low level software layers.

Middleware

“Heterogeneity problem”.

Application and services

© José Fernán Martínez Ortega 6

Page 7: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

Towards a Middleware approachTowards a Middleware approach

¿What is distributed cooperation?

Application/Service Application/Service

© José Fernán Martínez Ortega 7

Page 8: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

Middl S iMiddl S iMiddleware ServicesMiddleware Services

Object Oriented

Message Oriented

Transaction OrientedClustering of ServicesDistributed Processing Distributed Processing

PlatformsPlatforms

DB Oriented

RPC Oriented

© José Fernán Martínez Ortega 8

Oriented

Page 9: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

So WhatSo WhatSo…What So…What about WSN?about WSN?about WSN?about WSN?

© José Fernán Martínez Ortega 9

Page 10: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

UNIT 3: Architectures and Models

PLATFORM LAYERPLATFORM LAYERUNIT 3: Architectures and Models

© José Fernán Martínez Ortega 10

Page 11: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

Bird’s Eye ViewBird’s Eye View

© José Fernán Martínez Ortega 11

Page 12: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

TmoteTmote SkySky Developed in the Berkeley University. Features:USB interfaceUSB interface. Built-in antenna – 125 mts. Flash memory for software installation. Flash memory for software installation.

© José Fernán Martínez Ortega 12

Page 13: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

T tT t SkSkTmoteTmote SkySkyProcessing Unit Interfacesg

Microcontroller MSP430F1611 Digital 6 GPIO

RAM 10 KB RAM Analogical 6 ADC

ROM 48 KB (FLASH) Serial I2C SPI USBROM 48 KB (FLASH) Serial I2C, SPI, USB

Speed 8 MHz Sensors Humidity, light, temperature

Operating TinyOS and Contiki Gateway Ethernet

System

Radiofrequency OthersTransceiver Chipcon CC2420 Power source AA BatteriesTransceiver Chipcon CC2420 Power source AA Batteries

Band 2400 – 2483.5 MHz Power idle 5.1 uA

Bit rate 250 Kbps Power (Rx/Tx) 19.5 mA / 21.8 mA

Modulation O-QPSK Cost Unit 130 $

Range (out-door), (in-door) Gateway Tmote Connect

Protocol 802.15.4 Licence BSD (Op. System)

© José Fernán Martínez Ortega 13

Security 802.15.4 Extras None

Page 14: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

Crossbow FamilyCrossbow Family Monitorization and data acquisition

Radio 916 MHz 2 4 GHz (ZigBee compliant) Radio 916 MHz -2.4 GHz (ZigBee compliant) Different HW and SW platforms Families: Families: First Generation (MICAz, MICA 2, Telos B) Second Generation (Imote 2)

© José Fernán Martínez Ortega 14

Different Crossbow motes. More information at www.xbow.com. Used underCrossbow’s terms of use: http://www.xbow.com/terms-of-use.html.

Page 15: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

ImoteImote 22Processing Unit Interfaces

Microcontroller Intel PXA271 Digital DIO

RAM 256 KB Analogical 8 x ADC

ROM 32 MB (FLASH) Serial 3 UART, 2 I2C, 2 SPI, , SDIO, GPIO( ) , , , , ,

Speed 13-416 MHz Sensors Sensor plug-in interface

Operating System TinyOS Gateway Mini-USB(local) or Ethernet (base station)

Radiofrequency OthersTransceiver CC2420 Power source AA Batteries

Band 2.4 GHz Power idle 31 uA

Bit rate 250 Kbps Power (Rx/Tx) 44 mA / 44 mA

Modulation O-QPSK Cost 404 $ unit

Range 75-(out-door), 20- (in-door) Gateway None

Protocol No specified Licence BSD (op. syst.)

© José Fernán Martínez Ortega 15

Security No specified Extras None

Page 16: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

d f h ld f h lRadiofrequency TechnologiesRadiofrequency TechnologiesBluetooth ZigBee Z-wave WiFi WavenisBluetooth ZigBee Z wave WiFi Wavenis

Frecuency Band2.4 GHz

2.4 GHz/

5.2 GHz

868MHz

915MHz

2.4 GHz/

5.2 GHz

433/868/915MHz

(2,4GHz)

D t dData speed1 Mbps 250 Kbps few Kbps 5.5/11 MHz 4,8 / 19,2 / 250 Kbps

Deployment

Reliability

Low consumption

Range Range

Low cost

Range in-door (10m) (20m) (50m) (50m) (until 200m)

Standard protocol

Availability

© José Fernán Martínez Ortega 16

Page 17: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

Open issuesOpen issuesSi tSize vs. costs.Integration of new functionalities (circuits).N l ti f tNew encapsulation formats.New personalized solutions.P ti (h ti )Power consumption (harvesting).MAC, HW components and software must be

improved.Consumption reduction.Uncorrelated antennas.Reliability (embedding QoS and security).

© José Fernán Martínez Ortega 17

Page 18: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

Operating Operating SytemsSytems

Contiki

MagnetOS

SOS

TinyOS

Squawk© José Fernán Martínez Ortega 18

Squawk

Page 19: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

OSOS k lk lTinyOSTinyOS -- BerkeleyBerkeley Application = scheduler + graph of components.

Compiled into one executable. Event-driven architecture. Single shared stack Single shared stack. No kernel/user space differentiation.

© José Fernán Martínez Ortega 19

Page 20: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

UNIT 3: Architectures and Models

MIDDLEWARE LAYERMIDDLEWARE LAYERUNIT 3: Architectures and Models

© José Fernán Martínez Ortega 20

Page 21: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

WSN Software TechnologiesWSN Software Technologies

Design Analysis for WSN.

Distribution.Data source availability.Bandwidth and resources.Cooperating applications.Quality of Service (QoS). Security.

© José Fernán Martínez Ortega 21

Page 22: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

Middleware at whole!!Middleware at whole!! Middleware must provide: Middleware must provide:

Appropriate interfaces for a wide range of applications.pp

Run-time environment for coordination.Mechanisms to achieve efficient

resource use.

Middleware services:

Independency of network services and Independency of network services and low level layers.

Facilities for interacting with other in-network applicationsnetwork applications.

Increase availability and reliability. Guaranteeing scalability.

© José Fernán Martínez Ortega 22

Page 23: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

WSN Middleware FeaturesWSN Middleware Features

Nodes are small-scale devices.Nodes and sensors (actuators) are limited by power

supply (batteries) – Harvested!Nodes are likely to fail (batteries, environment).Nodes are resource constrained.

© José Fernán Martínez Ortega 23

Page 24: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

WSN Middleware ChallengesWSN Middleware Challenges Supporting the configuration lifecycle Supporting the configuration lifecycle Working in network with thousands of nodes Providing abstraction of the network Fulfilling main requirements: energy efficient, reliability and scalability

Allowing event-based or periodic i ticommunication

Providing self-configuring and self-managementg

Paying attention to the time and localization concepts

Providing application knowledge in the WSN Providing application knowledge in the WSN infrastructure

Supporting real-time applications needs

© José Fernán Martínez Ortega 24

Supporting security issues

Page 25: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

WSN Middleware ApproachesWSN Middleware Approaches

© José Fernán Martínez Ortega 25

Page 26: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

MatéMaté –– Virtual MachineVirtual Machine

Figure 2: Maté Architecture and Execution Model:Capsules, Contexts, and Stacks. [Levis2002] Levis, Pand Culler, D. “Maté: A Tiny Virtual Machine for Sensor

© José Fernán Martínez Ortega 26

Networks”. 10th International Conference onArchitectural Support for Programming Languages(ASPLOS X), 2002.

Page 27: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

SSAgents in WSNAgents in WSNAgents WSN NodesAgents WSN Nodes

AutonomyCapacity of maintain some taskunder control without externalattention.

Capacity to reach objective withoutnetwork intervention.

Asynchronous working capacity

Start to work when the agentsreceive some information.

It senses stimulus and reacts.

Collaboration and The agents exchange data for The nodes need to work togethercoordination achieving a common task. for reducing interactions among

nodes.Communication Capacity to interaction with

th tCapacity to exchange data.

other agents.Objective driven The agents can reach their

objectives with someinformation

The sensed data by the nodes areused in order to reach networkgoalsinformation. goals

Reactivity Capacity to provide a resultwhen something happens.

Capacity to detect and react tounforeseen events.

Mobility Capacity to migrate Capacity to migrate between nodes

© José Fernán Martínez Ortega 27

Mobility Capacity to migrate. Capacity to migrate between nodes.

Page 28: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

UNIT 3: Architectures and Models

USE CASE: AN EVENTUSE CASE: AN EVENT--DRIVEN MIDDLEWARE: DRIVEN MIDDLEWARE: MICRO SUBSCRIPTION MANAGEMENTMICRO SUBSCRIPTION MANAGEMENT

UNIT 3: Architectures and Models

MICRO SUBSCRIPTION MANAGEMENT MICRO SUBSCRIPTION MANAGEMENT SYSTEM (µSMS)SYSTEM (µSMS)

© José Fernán Martínez Ortega 28

Page 29: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

Origin of This Middleware Approach Origin of This Middleware Approach The µSMS Middleware was developed as part of a project of

the 6th Framework Programme: Solving Major Problems in Micro Sensorial WirelessSolving Major Problems in Micro Sensorial Wireless

Networks

µSWN Project was working for 3 years from October 2006 to November 2009.

The µSWN Consortium was composed of 10 partners from The µSWN Consortium was composed of 10 partners from different European countries: Spain, France, Greece and Lithuania.

© José Fernán Martínez Ortega 29

Lithuania.

Page 30: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

Origin of This Middleware Approach Origin of This Middleware Approach µSWN’s project main objectives:To research generic and reusable Software-Hardware

solutions for WSNs that are common to existent andsolutions for WSNs that are common to existent and potential future applications.

To research and develop a Middleware architectureTo research and develop a Middleware architectureenabling a platform for reusable components to ease futuredevelopments regarding similar systems under real-timerestrictions.

To apply WSN technology to three real world scenarios:Surveillance Multi tracking and Critical monitoringSurveillance, Multi-tracking and Critical-monitoring.

© José Fernán Martínez Ortega 30

Page 31: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

The Middleware Architectural ContextThe Middleware Architectural Context Architectural Approach Architectural Approach

© José Fernán Martínez Ortega 31

Page 32: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

Middleware ComponentsMiddleware ComponentsImplements:

µComponent Stereotype for UML • Load• Unload• Run• Destroy

<<use>>S b ib / S b ib

eventProduced

• Subscribe/unSubscribe• Publish/unPublish• publishExternalEvent• listEvents• trownEvent

Communication between receptacles and interfaces can be performed through eventsthrough eventsBasic operations: (Un)Publications and (Un)Subscriptions

Two interaction modes: PUSH and PULL. Direct calls to component methods can be also enable

© José Fernán Martínez Ortega 32

Direct calls to component methods can be also enable

Page 33: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

Middleware Middleware KKernelernel<<I>>µComponent

<< manages >> <<subsystem>>Framework

<< manages >>

<< implements >>

Subscriber <<  instantiates >> Event_t

1 .. * 11 1

ERT ESTEDT EQ

[Martinez2011] J. F. Martínez, M. S. Familiar, I.Corredor, A. B. García, S. Bravo and Lourdes López,“Composition and deployment of e-Health services

© José Fernán Martínez Ortega 33

over Wireless Sensor Networks”. Mathematical andComputer Modelling, Elsevier, vol. 53, num. 3-4, pp.485-503, 2011.

Page 34: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

µOpen Distributed InterµOpen Distributed Inter--Component Communication ProtocolComponent Communication Protocol

Data Unit: Event

EventType key value key valueEventType key value key value

UINT16 UINT8 UINT8UINT16 UINT16

Event Type: Type of event that will be dispatched.E.g. Temperature Threshold

key-value pairs: event’s useful data.E.g. Celsius-38º; Farenheit-100º

[Martinez2011] J. F. Martínez, M. S. Familiar, I.Corredor, A. B. García, S. Bravo and Lourdes López,“Composition and deployment of e-Health services

© José Fernán Martínez Ortega 34

E.g. Celsius 38 ; Farenheit 100over Wireless Sensor Networks”. Mathematical andComputer Modelling, Elsevier, vol. 53, num. 3-4, pp.485-503, 2011.

Page 35: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

µOpen Distributed InterµOpen Distributed Inter--Component Communication ProtocolComponent Communication Protocol

Publications and Subscriptions

Network Agent

A Subscription generates an entry in Event Routing Table

© José Fernán Martínez Ortega 35

A Subscription generates an entry in Event Routing TableEventType, ProducerID, ConsumerID and Event Filter

Page 36: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

O Di t ib t d I tO Di t ib t d I t C t C i ti P t lC t C i ti P t lµOpen Distributed InterµOpen Distributed Inter--Component Communication ProtocolComponent Communication Protocol

Event dispatching (intra-node)

© José Fernán Martínez Ortega 36

Page 37: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

O Di t ib t d I tO Di t ib t d I t C t C i ti P t lC t C i ti P t lµOpen Distributed InterµOpen Distributed Inter--Component Communication ProtocolComponent Communication Protocol

Event dispatching (inter-node)p g ( )

[Martinez2011] J. F. Martínez, M. S. Familiar, I.Corredor, A. B. García, S. Bravo and Lourdes López,“Composition and deployment of e-Health servicesover Wireless Sensor Networks”. Mathematical and

© José Fernán Martínez Ortega 37

over Wireless Sensor Networks . Mathematical andComputer Modelling, Elsevier, vol. 53, num. 3-4, pp.485-503, 2011.

Page 38: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

µOpen Distributed InterµOpen Distributed Inter Component Communication ProtocolComponent Communication ProtocolµOpen Distributed InterµOpen Distributed Inter--Component Communication ProtocolComponent Communication Protocol Event dispatching (inter-node)

External Event StructureEventType key value key value key value

EXTERNAL_EVENT CON_ID PRO_ID

EventType

EVENT

key value key value key value

UINT16 UINT8 UINT8 UINT8

nodeID

µComponent

UINT16 UINT16UINT16 UINT16

nodeID

µComponent

LocalUINT16

EventType key value key value

UINT16

Local Event

EventType key value key value

UINT16 UINT8 UINT8UINT16 UINT16

© José Fernán Martínez Ortega 38

[Martinez2011] J. F. Martínez, M. S. Familiar, I. Corredor, A. B. García, S. Bravo and Lourdes López, “Composition and deployment of e-Health services over Wireless SensorNetworks”. Mathematical and Computer Modelling, Elsevier, vol. 53, num. 3-4, pp. 485-503, 2011.

Page 39: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

V lid ti S iV lid ti S iValidation ScenarioValidation Scenario System deployment at Versme Sanatorium, Birstonas (Lithuania)

Three real world validation scenarios

[Martinez2011] J. F. Martínez, M. S. Familiar, I.Corredor, A. B. García, S. Bravo and Lourdes López,“Composition and deployment of e-Health servicesover Wireless Sensor Networks”. Mathematical andComputer Modelling, Elsevier, vol. 53, num. 3-4, pp.485-503, 2011.

© José Fernán Martínez Ortega 39

Surveillance, Multi-tracking and Critical Monitoring

Page 40: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

Validation ScenarioValidation Scenario Surveillance Scenario

ObjectivesTo detect intruders, patients and medical staff crossing a virtual , p g

perimeter rounding the SanatoriumDeployment

Fixed nodes connected to PIRs S ill A tFixed nodes connected to PIRsBracelet nodes (mobile nodes)

Fixed node with PIRsuSWN CAD

Surveillance Agent

[Martínez2010] J. F. Martínez, S. Bravo, A. B. García,I. Corredor, M.S. Familiar, L. Lopez, V. Hernandez andA. Da Silva, “Pervasive surveillance-agent system

[Martinez2011] J. F. Martínez, M. S. Familiar, I. Corredor, A. B.García, S. Bravo and Lourdes López, “Composition and

© José Fernán Martínez Ortega 40

based on wireless sensor networks: design anddeployment”, Measurement Science andTechnology, vol. 21, num. 12, 2010.

p pdeployment of e-Health services over Wireless SensorNetworks”. Mathematical and Computer Modelling, Elsevier,vol. 53, num. 3-4, pp. 485-503, 2011.

Page 41: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

Validation ScenarioValidation Scenario Multi-tracking scenariog

ObjectivesTo track patients wearing bracelet nodes

DeploymentDeployment Grid of fixed nodes (beacons)Bracelet nodes (mobile nodes)

M lti t ki ti

Multi-tracking Agent

[Mar

Corr

“Com

overC

om485-

Grid deployment

Multi-tracking operation

rtinez2011]J.

F.redor,A

.B.G

arcíam

positionand

der

Wireless

Sensorm

puterM

odelling,-503,2011.

Martínez,

M.

S.a,S.B

ravoand

Loeploym

entof

e-He

rN

etworks”.

Math

Elsevier,vol.53, .Fam

iliar,I.

ourdesLópez,

ealthservices

hematical

andnum

.3-4,pp.

© José Fernán Martínez Ortega 41

Page 42: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

Validation ScenarioValidation Scenario Critical Monitoring Scenario

ObjectivesTo monitor vital signs of patients (heart rate and body temperature)g ( y )To monitor environmental parameters (temperature and humidity)

DeploymentFixed nodes (out-door and in-door deployment) Critical Monitoring Fixed nodes (out door and in door deployment)Bracelet nodes (mobile nodes) with biomedical sensors

Out-door deployment In-door deploymentBracelet node

gAgent

Bracelet node

© José Fernán Martínez Ortega 42

Page 43: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

ReferencesReferences [Fok2006] Fok, C. Roman, G., Lu, C. “Agilla: A Mobile Agent Middleware for Sensor Networks.”

School of Engineering and Applied Science. Washington University, St. Louis. 2006. [Hadim2006] Hadim, S., Mohamed, N. “Middleware Challenges and Approaches for Wireless Sensor

Networks”. IEEE DISTRIBUTED SYSTEMS ONLINE, Vol. 7, No. 3; March 2006., , ; [Levis2002] Levis, P and Culler, D. “Maté: A Tiny Virtual Machine for Sensor Networks”. 10th

International Conference on Architectural Support for Programming Languages (ASPLOS X), 2002. [Liu2003] T. Liu and M. Martonosi. “Impala: A middleware system for managing autonomic, pararell

sensor systems” Symposium on Principles and Practice of Pararell Programming (PpoPP’03) Junesensor systems Symposium on Principles and Practice of Pararell Programming (PpoPP 03), June 2003

[Lu2001] Lu, C. "Berkley Motes and TinyOS”. www.cs.virginia.edu/~cl7v/cs851-talks/tinyos_chenyang.ppt

[Martíne 2010] J F Martíne S Bra o A B García I Corredor M S Familiar L Lope V [Martínez2010] J. F. Martínez, S. Bravo, A. B. García, I. Corredor, M.S. Familiar, L. Lopez, V. Hernandez and A. Da Silva, “Pervasive surveillance-agent system based on wireless sensor networks: design and deployment”, Measurement Science and Technology, vol. 21, num. 12, 2010.

[Martinez2011] J. F. Martínez, M. S. Familiar, I. Corredor, A. B. García, S. Bravo and Lourdes López, “Composition and deployment of e-Health services over Wireless Sensor Networks”. Mathematical and Computer Modelling, Elsevier, vol. 53, num. 3-4, pp. 485-503, 2011.

[Oracle] Oracle. “The Squawk Virtual Machine”. labs.oracle.com/projects/squawk/squawk-rjvm.html [RUNES] “Reconfigurable Ubiquitous Networked Embedded Systems” http://www.ist-runes.org/]

© José Fernán Martínez Ortega 43

[ ] g q y p g ]

Page 44: Ubiquitous and Secure Networks and ServicesUbiquitous and ...ocw.upm.es/pluginfile.php/602/mod_label/intro/RSUS-Unit-3-Slides.pdf · Ubiquitous and Secure Networks and Services: Architectures

Ubiquitous and Secure Networks and Services: Architectures and Models

Bibli hBibli hBibliographyBibliography Analysis and validation of Wireless Sensor Networks Software Technologies. Luis D. Rosado ,

Advisor: José F. Martinez. Final project, ETSIT – UPM January 2008. C iti d d l i f H lth i Wi l S N t k J é F Composition and deploying of e-Health services over Wireless Sensor Networks José F.

Martínez, Miguel S. Familiar, Iván Corredor , Ana B. García, Sury Bravo, Lourdes López, Journal of Mathematical and Computer Modelling, Special issue: Telecommunications Software Engineering: Emerging Methods, Models and Tools, Elsevier, ISSN: 0895-7177, 2010.

Middleware for Self adaptative Environments in Wireless Sensor Networks Iván Corredor Middleware for Self-adaptative Environments in Wireless Sensor Networks, Iván Corredor, Master Thesis Dissertation, Advisor: José-F Martínez, EUITT – UPM, October 2009

Pervasive Surveillance-Agent System based on Wireless Sensor Networks: Design and Deployment. José F Martínez, Sury Bravo, Ana B García, Iván Corredor, Miguel S Familiar, Lourdes López Vicente Hernández and Antonio Da Silva Journal of Measurement Science and TechnologyLópez, Vicente Hernández and Antonio Da Silva, Journal of Measurement Science and Technology, Special Issue on Wireless Sensor Networks, December 2010, IOPscience. ISSN: 0957-0233.

Problem Solving for Wireless Sensor Networks, Ana-B García, José-F Martínez, Juan-M López, Anggliki Prayati, Luis Redóndo., Springer Verlag Series: Computer Communications and Networks, ISBN 978-1-84800-202-9, 2008.S 9 8 8 800 0 9, 008

Reasoning System for Wireless Sensor Networks, Marta Zuazua, Master Thesis Dissertation, Advisor: José-F Martínez, EUITT – UPM, September 2010

Virtualization on Wireless Sensor Networks, Patricia Vicente, Final project, Advisor: José F. Martinez, EUITT – UPM September 2010.p

Wireless Sensor Network Subscription Management System, Miguel S. Familiar, Final project, Advisor: José F. Martinez, EUITT – UPM February 2009.

More WSN resources. http://www.diatel.upm.es/jfmartin/jfmartin_ENG.html

© José Fernán Martínez Ortega 44