Advertisement

Personal and Ubiquitous Computing

, Volume 20, Issue 2, pp 229–243 | Cite as

A behavioral reflective architecture for managing the integration of personal ubicomp systems: automatic SNMP-based discovery and management of behavior context in smart-spaces

  • Rui S. Moreira
  • Ricardo S. Morla
  • Luís P. C. Moreira
  • Christophe Soares
Original Article
  • 223 Downloads

Abstract

Context-aware ubiquitous computing systems should be able to introspect the surrounding environment and adapt their behavior according to other existing systems and context changes. Although numerous ubiquitous computing systems have been developed that are aware of different types of context such as location, social situation, and available computational resources, few are aware of their computational behavior. Computational behavior introspection is common in reflective systems and can be used to improve the awareness and autonomy of ubicomp systems. In this paper, we propose a decentralized approach based on Simple Network Management Protocol (SNMP) and Universal Plug and Play (UPnP), and on state transition models to model and expose computational behavior. Typically, SNMP and UPnP are targeted to retrieve raw operational variables from managed network devices and consumer electronic devices, e.g., checking network interface bandwidth and automating device discovery and plug and play operations. We extend the use of these protocols by exposing the state of different ubicomp systems and associated state transitions statistics. This computational behavior may be collected locally or remotely from ubicomp systems that share a physical environment, and sent to a coordinator node or simply shared among ubicomp systems. We describe the implementation of this behavior awareness approach in a home health-care environment equipped with a VoIP Phone and a drug dispenser. We provide the means for exposing and using the behavior context in managing a simple home health-care setting. Our approach relies on a system state specification being provided by manufacturers. In the case where the specification is not provided, we show how it can be automatically discovered. We propose two machine learning approaches for automatic behavior discovery and evaluate them by determining the expected state graphs of our two systems (a VoIP Phone and a drug dispenser). These two approaches are also evaluated regarding the effectiveness of generated behavior graphs.

Keywords

SNMP- and UPnP-based behavioral reflection Automatic state and behavior graph discovery Autonomous management of ubicomp systems 

Notes

Acknowledgments

Christophe Soares thanks FCT—Foundation for Science and Technology, Portugal—for PhD Grant SFRH/BD/64210/2009.

References

  1. 1.
    Abowd G, Dey A, Brown P, Davies N, Smith M, Steggles P (1999) Towards a better understanding of context and context-awareness. In: Gellersen HW (ed) Handheld and ubiquitous computing, vol 1707., lecture notes in computer scienceSpringer, Berlin, pp 304–307CrossRefGoogle Scholar
  2. 2.
    Calder M, Magill EH (eds) (2000) VI feature interactions in telecommunications and software systems. IOS Press, GlasgowGoogle Scholar
  3. 3.
    Calhoun P, Loughney J, Guttman E, Zorn G, Arkko J (1998) Diameter Base Protocol. RFC 3588, Internet Engineering Task ForceGoogle Scholar
  4. 4.
    Chaudhry SA, Song W, Vulla MH, Sreenan CJ (2011) EMP: a protocol for IP-based wireless sensor networks management. JUSPN 2(1):15–22CrossRefGoogle Scholar
  5. 5.
    Chen G, Kotz D (2000) A survey of context-aware mobile computing research. In: Tech. rep. Dartmouth CollegeGoogle Scholar
  6. 6.
    Cheverst K, Byun HE, Fitton D, Sas C, Kray C, Villar N (2005) Exploring issues of user model transparency and proactive behaviour in an office environment control system. User Model User-Adapt Interact 15(3–4):235–273CrossRefGoogle Scholar
  7. 7.
    Choi D, Hongseok J, Kugsang J, Punghyeok K, Soohyung K (2006) Delivery and storage architecture for sensed information using SNMP. In: Kim YT, Takano M (eds) Management of convergence networks and services, lecture notes in computer science, vol 4238. Springer, Berlin, pp 582–585Google Scholar
  8. 8.
    Choi H, Kim N., Cha H (2009) 6LoWPAN-snmp: simple network management protocol for 6LoWPAN. In: 11th IEEE international conference on high performance computing and communications 2009 (HPCC’09), pp 305–313Google Scholar
  9. 9.
    Data Mining Research Group, Data and Information Systems (DAIS) Research Laboratory, University of Illinois at Urbana-Champaign, IlliMine. http://illimine.cs.uiuc.edu/. Accessed 18 Jan 2016
  10. 10.
    Durham D, Boyle J, Cohen R, Herzog S, Rajan R, Sastry A (2000) The COPS (Common Open Policy Service) Protocol. RFC 2748, Internet Engineering Task ForceGoogle Scholar
  11. 11.
    Fischer M (2008) Enhancing the ReMoteCare prototype by adding an SNMP proxy and video surveillance. Master’s thesis, Universitat Koblenz-Landau, Campus KoblenzGoogle Scholar
  12. 12.
    Giladi R (2004) Snmp for home automation. Int J Netw Manag 14(4):231–239CrossRefGoogle Scholar
  13. 13.
    Goncalves P, Oliveira JL, Aguiar R (2012) A study of encoding overhead in network management protocols. Int J Netw Manag 22(6):435–450CrossRefGoogle Scholar
  14. 14.
    Goncalves P, Torres J, Sobral P, Moreira RS (2009) Remote patient monitoring in home environments. In: 1st international workshop MobiHealthInf (BIOSTEC 2009)Google Scholar
  15. 15.
    Henricksen K, Indulska J, McFadden T, Balasubramaniam S (2005) Middleware for distributed context-aware systems. In: International symposium on distributed objects and applications (DOA). Springer, pp 846–863Google Scholar
  16. 16.
    Hipp J, Güntzer U, Nakhaeizadeh G (2000) Algorithms for association rule mining—a general survey and comparison. ACM SIGKDD Explor Newsl 2(1):58–64CrossRefGoogle Scholar
  17. 17.
    Huebscher M, McCann J (2006) An adaptive middleware framework for context-aware applications. Pers Ubiquitous Comput 10(1):12–20CrossRefGoogle Scholar
  18. 18.
    International Telecommunication Union Telecommunication Standardization Sector: Recommendation X.680 – Abstract Syntax Notation One (ASN.1): Specification of Basic Notation (2008)Google Scholar
  19. 19.
    Jain AK, Murty MN, Flynn PJ (1999) Data clustering: a review. ACM Comput Surv 31(3):264–323CrossRefGoogle Scholar
  20. 20.
    Judd G, Steenkiste P (2003) Providing contextual information to pervasive computing applications. In: Proceedings 1st IEEE international conference on pervasive computing and communications 2003 (PerCom 2003), pp 133–142Google Scholar
  21. 21.
    Kuryla S (2010) Implementation and evaluation of the simple network management protocol over ieee 802.15.4 radios under the contiki operating system. Master’s thesis, School of Engineering and Science, Jacobs University Bremen, GermanyGoogle Scholar
  22. 22.
    Lim YY, Messina M, Kargl F, Ganguli L, Fischer M, Tsang T (2008) SNMP proxy for wireless sensor network. In: 5th international conference on information technology: new generations, 2008 (ITNG 2008), pp 738–743Google Scholar
  23. 23.
    Lopez-de Ipina D, Vazquez J, Garcia D, Fernandez J, Garcia I, Sainz D, Almeida A (2006) A middleware for the deployment of ambient intelligent spaces. In: Cai Y, Abascal J (eds) Ambient intelligence in everyday life, lecture notes in computer science, vol 3864. Springer, Berlin, pp 239–255Google Scholar
  24. 24.
    Maulik U, Bandyopadhyay S (2002) Performance evaluation of some clustering algorithms and validity indices. IEEE Trans Pattern Anal Mach Intell 24(12):1650–1654CrossRefGoogle Scholar
  25. 25.
    Moreira LP, Soares C, Moreira RS, Morla R (2012) A decentralized SNMP-based approach for behavior introspection, awareness and discovery in ubiquitous computing. In: 3rd international conference on wireless mobile communication and healthcareGoogle Scholar
  26. 26.
    Murtaza SS, Amin SO, Hong CS (2006) Applications of SNMP in ubiquitous environment. KNOM Review 8(2):14–19Google Scholar
  27. 27.
    Morla R, Davies N (2004) Evaluating a location-based application: a hybrid test and simulation environment. IEEE Pervasive Comput 3(3):48–56CrossRefGoogle Scholar
  28. 28.
    Nakajima T, Satoh I (2006) A software infrastructure for supporting spontaneous and personalized interaction in home computing environments. Pers Ubiquitous Comput 10(6):379–391CrossRefGoogle Scholar
  29. 29.
    Ranganathan A, Campbell RH (2003) An infrastructure for context-awareness based on first order logic. Pers Ubiquitous Comput 7(6):353–364CrossRefGoogle Scholar
  30. 30.
    Salber D, Dey AK, Abowd GD (1999) The context toolkit: aiding the development of context-enabled applications. In: Proceedings SIGCHI conference on human factors in computing systems: the CHI is the limit, CHI’99. ACM, New York, pp 434–441Google Scholar
  31. 31.
    Soares C, Moreira RS, Morla R, Torres J, Sobral P (2012) Interference free integration of pervasive applications. In: 11th IEEE international conference on ubiquitous computing and communications (IUCC 2012). Liverpool, pp 1499–1506Google Scholar
  32. 32.
    Soares C, Moreira RS, Morla R, Torres J, Sobral P (2012) Prognostic of feature interactions between independently developed pervasive systems. In: International conference on prognostics and health management 2012 (PHM 2012). DenverGoogle Scholar
  33. 33.
    Soares C, Moreira RS, Morla R, Torres J, Sobral P (2014) A graph-based approach for interference free integration of commercial off-the-shelf elements in pervasive computing systems. Future Gener Comput Syst 39:3–15CrossRefGoogle Scholar
  34. 34.
    Urnes T, Hatlen AS, Malm PS, Myhre O (2001) Building distributed context-aware applications. Pers Ubiquitous Comput 5(1):38–41CrossRefGoogle Scholar
  35. 35.
    Velasquez C, Soares C, Morla R, Moreira RS, Torres J, Sobral P (2011) A 3D Simulation Framework for Safe Ambient-Assisted Home Care. In: 5th International conference on mobile ubiquitous computing, systems, services and technologies (UBICOMM 2011). Lisboa, pp 61–66Google Scholar
  36. 36.
    Yau S, Karim F, Wang Y, Wang B, Gupta S (2002) Reconfigurable context-sensitive middleware for pervasive computing. IEEE Pervasive Comput 1(3):33–40CrossRefGoogle Scholar

Copyright information

© Springer-Verlag London 2016

Authors and Affiliations

  • Rui S. Moreira
    • 1
    • 3
  • Ricardo S. Morla
    • 2
    • 3
  • Luís P. C. Moreira
    • 1
  • Christophe Soares
    • 1
    • 3
  1. 1.Faculdade de Ciências e TecnologiaUniversidade Fernando PessoaPortoPortugal
  2. 2.Faculdade de EngenhariaUniversidade do PortoPortoPortugal
  3. 3.INESC PortoPortoPortugal

Personalised recommendations