Font Size: a A A

Directory-Based Resource Management Model (DRMM) In Pervasive Computing Environment

Posted on:2008-10-03Degree:MasterType:Thesis
Country:ChinaCandidate:K WuFull Text:PDF
GTID:2178360212990600Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Since the concept of Pervasive Computing was brought forward in the 1990s, its fundamental techniques, which covered a wide range of research fields including Mobile Computing, Middleware, Wireless Sensor Network, User Machine Interaction, Artificial Intelligence, Machine Learning, Mobile Positioning, Semantic Web and Networking, had been developing at spurting speed. The evolution and revolution of technology has made Pervasive Computing a pure concept — no more. However, while heading towards bringing the concept to greater commercial applicable scale, researchers of Pervasive Computing Systems got to realize that Pervasive Computing is not a mere combination and gluing of technologies at hand together. How to endow Pervasive Computing applications with highly developed security policies, centralized management over user identity and access permissions, and uniform management interface of inherent resources at a logical view, has become the main concern.This thesis focuses on the designing process of an effective model of static organization and runtime management of resources in a Pervasive Computing Environment. The model also develops methodologies of providing users with cross-domain migration services, session maintenance, and system failure handling.The author of the thesis, did research into previously proposed theories on resource management and user access control strategies under a pervasive computing environment, extracted effective and applicable experience in other industries, and on that basis brought forward the Directory-based Resource Management Model (DRMM), which is a resource management model specifically tailored for a Pervasive Computing Environment. During its implementation process, the work the author has done to enable the model to fulfill its tasks mainly includes: 1) DRMM provides an integrated formalized definition of Pervasive Computing Environment (including the domain, object, property, role and operation), and definition of the core transactions of PVC service providing course, which endows the system with reasonable ways of verification and validation; 2) DRMM adopts an directory-based way of organizing resources in a Pervasive Computing Environment, which is known to have been successfully applied in the organization of documents and files in Operation Systems. DRMM takes its advantage to form a legible expressive architecture of resource definition, and further more provides a runtime resource management strategy which made up for the incompetence of a traditional directory model to manage resource dynamically; 3) On carrying out the analysis of core transactions in a pervasive computing environment, DRMM adopts a transaction handling model which works in mixed pattern of transaction execution, known as the Workflow-based Event Driven Transaction Execution Model (WEDTEM). The model embodies advantages of both types of transaction execution yet complied with the features of a Pervasive Computing Environment. 4) DRMM takes into account the possibility of the pervasive system' s management module failure, and works out a solution to fulfill working status supervising of management servers and databases, and a strategy called 'Failover' is adopted to enable servers in a Domain Cluster to takeover the endangered tasks for one another once a server or database is detected of failure. This helps to effectively reduce the loss of customer data, session information and time when a server or database failure happens.Based on experimental results drawn from our executable wireless-positioning system WLES, DRMM under Pervasive Computing Environment is applicable, realizable, yet verifiable, which further more is able to provide an efficient and accurate resource and access management during system runtime.
Keywords/Search Tags:Ubiquitous Computing, Pervasive Computing, Resource Access, Resource Management, Directory Service, Domain Server Cluster, Domain, Role, Access Control, Authentication, Authorization, Role-Based Access Control, Session Management, Session Resume
PDF Full Text Request
Related items