scholarly journals Integrated Service Composition Approach Based on Transparent Access to Heterogeneous IoT Networks Using Multiple Service Providers

2021 ◽  
Vol 2021 ◽  
pp. 1-19
Author(s):  
Wenquan Jin ◽  
Rongxu Xu ◽  
Sunhwan Lim ◽  
Dong-Hwan Park ◽  
Chanwon Park ◽  
...  

The Internet of Things (IoT) enables the number of connected devices to be increased rapidly based on heterogeneous technologies such as platforms, frameworks, libraries, protocols, and standard specifications. Based on the connected devices, various applications can be developed by integrating domain-specific contents using the service composition for providing improved services. The management of the information including devices, contents, and composite objects is necessary to represent the physical objects on the Internet for accessing the IoT services transparently. In this paper, we propose an integrated service composition approach based on multiple service providers to provide improved IoT services by combining various service objects in heterogeneous IoT networks. In the proposed IoT architecture, each service provider provides web services based on Representational State Transfer (REST) Application Programming Interface (API) that delivers information to the clients as well as other providers for integrating the information to provide new services. Through the REST APIs, the integration management provider combines the service result of the IoT service provider to other contents to provide improved services. Moreover, the interworking proxy is proposed to bridge heterogeneous IoT networks for enabling transparent access in the integrated services through proving protocol translating on the entry of the device networks. Therefore, the interworking proxy is deployed between the IoT service provider and device networks to enable clients to access heterogeneous IoT devices through the composited services transparently.

Sensors ◽  
2020 ◽  
Vol 20 (23) ◽  
pp. 6761
Author(s):  
Anjan Bandyopadhyay ◽  
Vikash Kumar Singh ◽  
Sajal Mukhopadhyay ◽  
Ujjwal Rai ◽  
Fatos Xhafa ◽  
...  

In the Internet of Things (IoT) + Fog + Cloud architecture, with the unprecedented growth of IoT devices, one of the challenging issues that needs to be tackled is to allocate Fog service providers (FSPs) to IoT devices, especially in a game-theoretic environment. Here, the issue of allocation of FSPs to the IoT devices is sifted with game-theoretic idea so that utility maximizing agents may be benign. In this scenario, we have multiple IoT devices and multiple FSPs, and the IoT devices give preference ordering over the subset of FSPs. Given such a scenario, the goal is to allocate at most one FSP to each of the IoT devices. We propose mechanisms based on the theory of mechanism design without money to allocate FSPs to the IoT devices. The proposed mechanisms have been designed in a flexible manner to address the long and short duration access of the FSPs to the IoT devices. For analytical results, we have proved the economic robustness, and probabilistic analyses have been carried out for allocation of IoT devices to the FSPs. In simulation, mechanism efficiency is laid out under different scenarios with an implementation in Python.


2015 ◽  
Vol 21 (4) ◽  
pp. 648-651
Author(s):  
Lukas Tanutama ◽  
Gerrard Polla ◽  
Raymond Kosala ◽  
Richard Kumaradjaja

The competitive nature of Internet access service business drives Service Providers to find innovative revenue generators within their core competencies. Internet connection is the essential infrastructure in the current business environment. Service Providers provide the Internet connections to corporate networks. It processes network data to enable the Internet business communications and transactions. Mining the network data of a particular corporate network resulted in its business traffic profile or characteristics. Based on the discovered characteristics, this research proposes novel generic Value Added Services (VAS). The VAS becomes the innovative and competitive revenue generators. The VAS is competitive as only the Service Provider and its customer know the traffic profile. The knowledge becomes the barrier of entry for competitors. To offer the VAS, a Service Provider must build close relationship with its customer for acceptance.


Author(s):  
Martin Stusek ◽  
Pavel Masek ◽  
Krystof Zeman ◽  
Dominik Kovac ◽  
Petr Cika ◽  
...  

The aggressive expansion of emerging smart devices connected to the Internet infrastructure is nowadays considered as one of the most challenging components of the Internet of Things (IoT) vision. As a particular segment of IoT, the smart home gateways, also named Machine-Type Communication Gateway (MTCG), become an important direction for industry including telecommunication operators. In most cases, the MTCG acts as a bridge between connected smart objects and the public network (Internet). As a consequence of the IoT domain expansion, the separate configuration of each individual Machine-to-Machine (M2M) device is not feasible anymore due to steadily growing numbers of M2M nodes. To perform this task, several novel technologies have recently been introduced. However, legacy protocols and mechanisms for remote network management still retain a certain application potential for IoT. Accordingly, we have investigated the protocol TR-069 with a particular focus on its usability for MTCG. To this end, the software module (bundle) based on the TR-069 for remote configuration and management of MTCG, as well as for controlling the end smart devices, has been developed. We believe that our implementation (available as open source on GitHub) can serve as an important building block for efficient management of future IoT devices. Therefore, TR-069 protocol constitutes a proven and standardized technology and could be easily deployed by most of the network and service providers today. Authors would like to recall that this paper represents extended version of their previously published work at TSP 2016 conference.


2021 ◽  
Vol 33 (3) ◽  
pp. 50-68
Author(s):  
Baili Zhang ◽  
Kejie Wen ◽  
Jianhua Lu ◽  
Mingjun Zhong

With the development of internet of things (IoT) technology, servitization of IoT device functions has become a trend. The cooperation between IoT devices can be equivalent to web service composition. However, current service composition approaches applied in the internet cannot work well in IoT environments due to weak adaptability, low accuracy, and poor time performance. This paper, based on service dependency graph, proposes a top-k QoS-optimal service composition approach suitable for IoT. It aims to construct the relationship between services by applying the service dependency model and to reduce the traversal space through effective filtering strategies. On the basis of a composition path traversal sequence, the generated service composition can be represented directly to avoid backtracking search. Meanwhile, the redundant services can be removed from the service composition with the help of dynamic programming. Experiments show that the approach can obtain the top-k QoS-optimal service composition and better time performance.


2011 ◽  
Vol 60 (2) ◽  
Author(s):  
Hubertus Gersdorf

AbstractIn principle, all data on the Internet have so far been transmitted on the basis of best-effort, i.e. equally and without change, regardless of content, service, application, origin or destination. Quality of Service (QoS) has not been excluded, but has instead generally been limited to the access network of the Internet Service Provider (access-ISP) (IPTV, VoIP etc.). Now, the ISPs plan to offer such a QoS on the Internet as well by means of various prioritised transport groups. These QoS transport groups are not supposed to displace, but rather to complement the best effort area (QoS and best effort). Hereby the ISP first expect to participate more in the added value of the Internet. Secondly, the problems caused by the bottleneck for timecritical services and other forms of QoS (IPTV, VoIP, gaming etc.) are to be eliminated. Thirdly, various transport groups and various groups of products (IPTV, VOD, interactive services such as gaming etc.) characterised by specific technical features of performance and features of quality are to be composed and marketed by the ISP to the content provider, to the service provider and to the consumer. In order to guarantee such QoS on the Internet, the ISP have to agree on cross-network technical standards for QoS.Both the European Commission and the German legislator, being competent for transposing the EU directives on telecommunications into national law, take a careful approach to the issue of network neutrality. For the case that ISP limit the access or the use of services the directives provide for transparency rules aimed at guaranteeing the comsumer’s freedom of choice. Beyond that, minimum requirements for the quality of service can be set in order to prevent impairment of services and hindrance or slowdown of data traffic in the nets. Hereby consumers are protected comprehensively. As it stands more regulation is not necessary. The risk of discrimination coming from vertical integration can be addressed by means of sector-specific regulatory law (cf. § 42 German Telecommunications Act - TKG) and by means of general competition law (cf. §§ 19, 20 Act Against Restraints of Competition - GWB, Article 102 Treaty on the Functioning of the European Union - AEUV). The composition of the various QoS transport groups and marketing to the content provider, to the service provider and to the consumer do not as such give rise to a need for regulation. In fact, the formation of (cross-network) QoS transport groups constitutes a pre-condition for consumers booking such QoS on the Internet. However, all content providers and service providers seeking access to QoS transport groups must have such access according to non-discriminatory terms. Such non-discriminatory access can be adequately guaranteed by sector-specific regulatory law and general competition law. At present, subject to the condition of there being a robust and dynamically developing best effort area in addition to QoS transport groups, more regulation is not necessary. However, it cannot be predicted whether the different QoS transport groups will emerge or not. Regulation „at random“ is as pointless as „symbolic regulation“.


Sensors ◽  
2021 ◽  
Vol 21 (2) ◽  
pp. 630
Author(s):  
Wenquan Jin ◽  
Rongxu Xu ◽  
Sunhwan Lim ◽  
Dong-Hwan Park ◽  
Chanwon Park ◽  
...  

Computation offloading enables intensive computational tasks in edge computing to be separated into multiple computing resources of the server to overcome hardware limitations. Deep learning derives the inference approach based on the learning approach with a volume of data using a sufficient computing resource. However, deploying the domain-specific inference approaches to edge computing provides intelligent services close to the edge of the networks. In this paper, we propose intelligent edge computing by providing a dynamic inference approach for building environment control. The dynamic inference approach is provided based on the rules engine that is deployed on the edge gateway to select an inference function by the triggered rule. The edge gateway is deployed in the entry of a network edge and provides comprehensive functions, including device management, device proxy, client service, intelligent service and rules engine. The functions are provided by microservices provider modules that enable flexibility, extensibility and light weight for offloading domain-specific solutions to the edge gateway. Additionally, the intelligent services can be updated through offloading the microservices provider module with the inference models. Then, using the rules engine, the edge gateway operates an intelligent scenario based on the deployed rule profile by requesting the inference model of the intelligent service provider. The inference models are derived by training the building user data with the deep learning model using the edge server, which provides a high-performance computing resource. The intelligent service provider includes inference models and provides intelligent functions in the edge gateway using a constrained hardware resource based on microservices. Moreover, for bridging the Internet of Things (IoT) device network to the Internet, the gateway provides device management and proxy to enable device access to web clients.


2013 ◽  
Vol 2 (2) ◽  
pp. 59-78
Author(s):  
Angshuman Hazarika

The concept of E-commerce has existed since the inception of the internet, but it has acquired significance in the recent years. India being one of the fastest growing E-commerce markets in the world has no specific legislation to protect the interests of the buyers and sellers of goods and services over the electronic medium. The situation is further complicated by the fact that a typical transaction over the internet or phone needs the involvement of many service providers including a payment gateway, the main website, the bank or card verification website, the security certification website and the final service provider, which includes the shipping agent who delivers the goods. Separate laws are required to regulate the functioning of all these intermediaries. The paper examines the existing provisions available for the protection of the buyers and sellers who conduct transactions through the electronic medium. Further, the customer protection policies of four dominant E- commerce websites in India being flipkart.com, irctc.co.in, makemytrip.com and groupon.co.in are evaluated. A few cases of consumer disputes arising over transactions conducted over the electronic medium are also discussed. Lastly, the paper analyses the measures which needs to be taken to provide protection to buyers and sellers on the internet.


JURTEKSI ◽  
2019 ◽  
Vol 3 (2) ◽  
pp. 70-75
Author(s):  
Mohd Siddik

AbstrakPenggunaan internet saat ini semakin meluas, dengan mudah berbagai informasi kita temukandi internet, mulai dari ilmu pengetahuan, bisnis, komunitas sampai informasi yang menjurus kepadakonten negatifpun sering di jumpai. Tidak semua informasi yang ada di internet positif, tak jaranginformasi negatif banyak ditemukan, bahkan informasi yang berkonten negatif terkadang merugikanpengguna internet. Untuk bisa terkoneksi ke internet ada banyak layanan internet yang bisa digunakan,pastinya layanan tersebut sudah terhubung dengan ISP (internet service provider) atau jasa penyedialayanan internet. Jaringan LAN adalah konsep jenis jaringan yang banyak digunakan dalampendistribusian layanan internet. Saat ini pendistribusian layanan internet sudah semakin meluas, mulaidari instansi pemerintah, perusahaan, sekolah bahkan sampai café untuk sekedar minum kopi pun takluput dari layanan internet, untuk itu perlu melakukan filterisasi terhadap situs web yang berkontennegatif. Dalam penelitian ini penulis menjelaskan bagaimana proses blok situs dengan menggunakanhardware Mikrotik Routerboar 750 yang digunakan sebagai firewall, yang nantinya dimplementasikanpada jaringan LAN.Kata Kunci: Blok Situs Web, Internet, Jaringan LAN, MikrotikAbstractTh e use of the Internet today is widespread, with easy information we find on the internet,ranging from science, business, community to information that leads to negative content is oftenencountered. Not all of the information on the internet is positive, there is not enough negativeinformation to be found, even negative content information is sometimes detrimental to internet users. Tobe connected to the internet there are many internet services that can be used, of course the service isalready connected with the ISP (internet service provider) or service providers internet. LAN network is aconcept of network type that is widely used in the distribution of internet services. Currently thedistribution of Internet services has been increasingly widespread, ranging from government agencies,companies, schools and even the café to just drink coffee did not escape the internet service, for it needsto do the filtering of websites that berkonten negative. In this study the authors explain how the site blockprocess using Mikrotik Routerboar 750 hardware used as a firewall, which will be implemented on theLAN network.Keywords: Internet, LAN Network, Mikrotik, Web Site Block


Sensors ◽  
2020 ◽  
Vol 20 (11) ◽  
pp. 3328 ◽  
Author(s):  
Óscar Blanco-Novoa ◽  
Paula Fraga-Lamas ◽  
Miguel A. Vilar-Montesinos ◽  
Tiago M. Fernández-Caramés

Augmented Reality (AR) and Mixed Reality (MR) devices have evolved significantly in the last years, providing immersive AR/MR experiences that allow users to interact with virtual elements placed on the real-world. However, to make AR/MR devices reach their full potential, it is necessary to go further and let them collaborate with the physical elements around them, including the objects that belong to the Internet of Things (IoT). Unfortunately, AR/MR and IoT devices usually make use of heterogeneous technologies that complicate their intercommunication. Moreover, the implementation of the intercommunication mechanisms requires involving specialized developers with have experience on the necessary technologies. To tackle such problems, this article proposes the use of a framework that makes it easy to integrate AR/MR and IoT devices, allowing them to communicate dynamically and in real time. The presented AR/MR-IoT framework makes use of standard and open-source protocols and tools like MQTT, HTTPS or Node-RED. After detailing the inner workings of the framework, it is illustrated its potential through a practical use case: a smart power socket that can be monitored and controlled through Microsoft HoloLens AR/MR glasses. The performance of such a practical use case is evaluated and it is demonstrated that the proposed framework, under normal operation conditions, enables to respond in less than 100 ms to interaction and data update requests.


2020 ◽  
Vol 9 (2) ◽  
pp. 30 ◽  
Author(s):  
Riku Ala-Laurinaho ◽  
Juuso Autiosalo ◽  
Kari Tammi

Data collection in an industrial environment enables several benefits: processes and machinery can be monitored; the performance can be optimized; and the machinery can be proactively maintained. To collect data from machines or production lines, numerous sensors are required, which necessitates a management system. The management of constrained IoT devices such as sensor nodes is extensively studied. However, the previous studies focused only on the remote software updating or configuration of sensor nodes. This paper presents a holistic Open Sensor Manager (OSEMA), which addresses also generating software for different sensor models based on the configuration. In addition, it offers a user-friendly web interface, as well as a REST API (Representational State Transfer Application Programming Interface) for the management. The manager is built with the Django web framework, and sensor nodes rely on ESP32-based microcontrollers. OSEMA enables secure remote software updates of sensor nodes via encryption and hash-based message authentication code. The collected data can be transmitted using the Hypertext Transfer Protocol (HTTP) and Message Queuing Telemetry Transport (MQTT). The use of OSEMA is demonstrated in an industrial domain with applications estimating the usage roughness of an overhead crane and tracking its location. OSEMA enables retrofitting different sensors to existing machinery and processes, allowing additional data collection.


Sign in / Sign up

Export Citation Format

Share Document