Advertisement

The Journal of Supercomputing

, Volume 72, Issue 7, pp 2471–2487 | Cite as

Android RMI: a user-level remote method invocation mechanism between Android devices

  • HeeEun Kang
  • Kihyun Jeong
  • Kwonyong Lee
  • Sungyong ParkEmail author
  • Youngjae Kim
Article

Abstract

This paper presents the design and implementation of a user-level remote method invocation (RMI) mechanism between Android devices called Android RMI, which extends the original Binder mechanism. Android RMI is developed as a user-level program so that it can easily be ported into other devices running Android. Since Android RMI provides similar programming abstractions to those used to invoke local services, existing applications need little modifications when they run over multiple devices. Furthermore, unlike previous approaches where only application services can be invoked, Android RMI allows users to invoke system services as well as application services between devices using remote parcel format. By reducing the number of marshalling and unmarshalling steps, the time taken for remote method invocation is shortened by 148 % in 4 KBytes and by up to 432 % in 100 KBytes compared to distributed intent where additional marshalling and unmarshalling steps are needed.

Keywords

Android Binder Remote method invocation Internet of Things Inter-process communication 

References

  1. 1.
    Xia F, Yang LT, Wang L, Vinel A (2012) Internet of things. Int J Commun Syst 25(9):1101CrossRefGoogle Scholar
  2. 2.
    Middleton P, Kjeldsen P,Tully J (2013) Forecast: the internet of things, Worldwide, 2013, GartnerGoogle Scholar
  3. 3.
    Lee EJ, Kim CH, Jung IY (2014) An intelligent green service in internet of things. J Converg vol 5(3)Google Scholar
  4. 4.
    Yoon M, Kim YK, Chang JW (2013) An energy-efficient routing protocol using message success rate in wireless sensor networks. J Converg 4(1):15–22Google Scholar
  5. 5.
    Hwang KI, Nam SW (2014) Near real-time M2M communication for bidirectional AMR systems. J Converg 5(2)Google Scholar
  6. 6.
    Feese S, Burscher MJ, Jonas K, Trster G (2014) Sensing spatial and temporal coordination in teams using the smartphone. Human-centric Comp Inform Sci 4(1):1–18CrossRefGoogle Scholar
  7. 7.
    Vanus J, Kucera P, Martinek R, Koziorek J (2014) Development and testing of a visualization application software, implemented with wireless control system in smart home care. Human-centric Comp Inform Sci 4(1):1–19CrossRefGoogle Scholar
  8. 8.
    Ibrahim N, Mohammad M, Alagar V (2013) Publishing and discovering context-dependent services. Human-centric Comp Inform Sci 3(1):1–22CrossRefGoogle Scholar
  9. 9.
    Hwang KI, Jang I (2014) Ultra low power data aggregation for request oriented sensor networks. J Inform Process Syst 10(3)Google Scholar
  10. 10.
    Dubey T (2013) Self-localized packet forwarding in wireless sensor networks. J Inform Process Syst 9(3):477–488CrossRefGoogle Scholar
  11. 11.
    Peng K (2013) A secure network for mobile wireless service. J Inform Process Syst 9(2):247–258CrossRefGoogle Scholar
  12. 12.
    Llamas R, Reith R, Chau M, Shirer M (2014) Worldwide smartphone shipments edge past 300 million units in the second quarter; android and iOS devices account for 96 % of the Global Market, IDC, http://www.idc.com/getdoc.jsp?containerId=prUS25037214. Accessed 14 Aug 2014
  13. 13.
    Huang D, Houacine F, Li L, Bouzefrane S (2013) MCC-OSGi: An OSGi-based mobile cloud service model. In: 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS), pp 1–8Google Scholar
  14. 14.
    Nagahara Y, Oyama H, Azumi T, Nishio N (2013) Distributed intent: Android framework for networked devices pperation. In: IEEE 16th International Conference on CSE, pp 651–658Google Scholar
  15. 15.
    Nakao K, Nakamoto M (2012) Toward remote service invocation in Android. In: 9th International Conference on UIC/ATC, pp 612–617Google Scholar
  16. 16.
  17. 17.
    Brady P (2008) Anatomy and physiology of an android. In: Google I/O Developer ConferenceGoogle Scholar
  18. 18.
    Davi L, Dmitrienko A, Sadeghi AR, Winandy M (2011) Privilege escalation attacks on android. In: Information Security, Springer Berlin Heidelberg, pp 346–360Google Scholar
  19. 19.
    Google, Andoid developer guide, http://developer.android.com/index.html
  20. 20.
    Schreiber T (2011) Android binder. A shorter, more general work, but good for an overview of Binder, http://www.nds.rub.de/media/attachments/files/2012/03/binder
  21. 21.
  22. 22.
    Gargenta A (2013) Deep Dive into Android IPC/Binder Framework at Android Builders Summit 2013, Marakana Inc, http://events.linuxfoundation.org/images/stories/slides/abs2013_gargentas

Copyright information

© Springer Science+Business Media New York 2015

Authors and Affiliations

  • HeeEun Kang
    • 1
  • Kihyun Jeong
    • 1
  • Kwonyong Lee
    • 1
  • Sungyong Park
    • 1
    Email author
  • Youngjae Kim
    • 2
  1. 1.Department of Computer Science and EngineeringSogang UniversitySeoulKorea
  2. 2.Oak Ridge National LaboratoryOak RidgeUSA

Personalised recommendations