Skip to main content
Log in

Composable ad hoc location‐based services for heterogeneous mobile clients

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

This paper introduces a comprehensive architecture that supports adapting a client device's functionality to new services it discovers as it moves into a new environment. Users wish to invoke services – such as controlling the lights, printing locally, gaining access to application‐specific proxies, or reconfiguring the location of DNS servers – from their mobile devices. But a priori standardization of interfaces and methods for service invocation is infeasible. Thus, the challenge is to develop a new service architecture that supports heterogeneity in client devices and controlled objects while making minimal assumptions about standard interfaces and control protocols. Four capabilities are needed for a comprehensive solution to this problem: (1) allowing device mobility, (2) augmenting controllable objects to make them network‐accessible, (3) building an underlying discovery architecture, and (4) mapping between exported object interfaces and client device controls. We motivate the need for these capabilities by using an example scenario to derive the design requirements for our mobile services architecture. We then present a prototype implementation of elements of the architecture and some example services using it, including controls to audio/visual equipment, extensible mapping, server autoconfiguration, location tracking, and local printer access.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. E. Amir, S. McCanne and R. Katz, Receiver-driven bandwidth allocation for lightweight sessions, in: Proc. ACM Multimedia '97 (November 1997).

  2. A. Amir, S. McCanne and R. Katz, An active service framework and its application to teal-time multimedia transcoding, in: Proc. ACM SIGCOMM '98 (August 1998).

  3. E. Amir, S. McCanne and H. Zhang, An application-level video gateway, in: Proc. ACM Multimedia '95 (November 1995) 511–522.

  4. T. Anderson, D. Patterson, D. Culler and the NOW Team, A case for networks of workstations: NOW, IEEE Micro (February 1995).

  5. A. Aziz and W. Diffie, Privacy and authentication for wireless local area networks, IEEE Personal Communications (First Quarter 1994) 25–31.

  6. A. Bakre and B. Badrinath, Reworking the RPC paradigm for mobile clients, Mobile Networks and Applications 1(4) (January 1997)371–386.

    Google Scholar 

  7. H. Balakrishnan, V. Padmanabhan, S. Seshan and R. Katz, A comparison of mechanisms for improving TCP performance over wireless links, IEEE/ACM Transactions on Networking (December 1997).

  8. H. Balakrishnan, S. Seshan, E. Amir and R. Katz, Improving TCP/IP performance over wireless networks, in: Proc. 1st ACM Conf. on Mobile Computing and Networking, San Franscisco, CA (November 1995) pp. 2–11.

  9. D. Brown, Techniques for privacy and authentication in personal communications systems, IEEE Personal Communications (August 1995) 6–10.

  10. R. Bukowski and L. Downs, User's guide to the 608–7 computer control system, December 1993, UC Berkeley CS260 class project.

  11. D. Clark, The design philosophy of the DARPA Internet protocols, in: Proceedings of SIGCOMM '88 (August 1988) pp. 195–206.

  12. D. Clark and D. Tennenhouse, Architectural considerations for a new generation of protocols, in: Proceedings of ACM SIGCOMM '90(September 1990) pp. 201–208.

  13. C. Davis, P. Vixie, T. Goodwin and I. Dickinson, A means for expressing location information in the domain name system, RFC-1876 (January 1996).

  14. Extensible Markup language homepage, http://www.w3c.org/xml (1998).

  15. A. Fox, E. Brewer, S. Gribble and E. Amir, Adapting to network and client variability via on-demand dynamic transcoding, ASPLOS (1996).

  16. A. Fox and S.D. Gribble, Security on the move: indirect authentication using Kerberos, in: Proceedings of the 2nd ACM International Conference on Mobile Computing and Networking(1996) pp. 10–12.

  17. I. Goldberg, D.Wagner, R. Thomas and E. Brewer, A secure environment for untrusted Helper applications: confining the Wily Hacker, in: Proc. of the 6th USENIX Security Symposium(1996).

  18. J.D. Guyton and M.F. Schwartz, Experiences with a survey tool for discovering network time protocol servers, in: Proc. of the USENIX Summer Conference(June 1994) pp. 257–265.

  19. M. Handley, SAP: session announcement protocol, draft-ietfmmusic-sap-00.ps, IETF (1996).

  20. M. Handley and V. Jacobson, SDP: session description protocol, draft-ietf-mmusic-sdp-03.ps, IETF (1997).

  21. A. Harter and A. Hopper, A distributed location system for the active office, IEEE Network Magazine 8(1) (January 1994).

  22. J. Ioannidis, D. Duchamp and G. Maguire, IP-based protocols for mobile internetworking, in: ACM SIGCOMM Symposium on Communications, Architecture, and Protocols(1991) pp. 235–245.

  23. A. Joseph, A. deLespinasse, J. Tauber, D. Gifford and M.F. Kaashoek, Rover: a toolkit for mobile information access, in: Proceedings of the Fifteenth Symposium on Operating System Principles(December 1995).

  24. F. Kaashoek, T. Pickney and J. Tauber, Dynamic documents, in: Workshop on Mobile Computing Systems and Applications(December 1994).

  25. R.H. Katz, Wireless overlay networks, in: Proceedings 1996 SPIE Conference on Multimedia and Networking, San Jose, CA (January 1996).

  26. R.H. Katz, E.A. Brewer, E. Amir, H. Balakrishnan, A. Fox, S. Gribble, T. Hodes, D. Jiang, G.T. Nguyen, V. Padmanabhan and M. Stemm, The Bay Area Research Wireless Access Network (BARWAN), in: Proceedings of the Spring COMPCON Conference(1996).

  27. D.A. Kottman, R. Wittmann and M. Posur, Delegating remote operation execution in a mobile computing environment, Mobile Networks and Applications 1(4) (January 1997) 387–398.

    Google Scholar 

  28. G. Liu and G. Maguire Jr., A class of mobile prediction algorithms for wireless mobile computing and communications, Mobile Networks and Applications 1(2) (October 1996) 113–122.

    Google Scholar 

  29. S. Long, R. Kooper, G. Abowd and C. Atkenson, Rapid prototyping of mobile context-aware applications: the CyberGuide case study, in: Proc. 2nd ACM Conf. on Mobile Computing and Networking (November 1996) pp. 97–107.

  30. B. MacIntyre and S. Feiner, Future multimedia user interfaces, Multimedia Systems Journal 4(5) (October 1996) 250–268.

    Google Scholar 

  31. S. McCanne, V. Jacobson and M. Vetterli, Receiver-driven layered multicast, in: ACM SIGCOMM '96 (August 1996) pp. 117–130.

  32. D.L. Mills, Internet time synchronization: the network time protocol, IEEE Transactions on Communications 39(10) (1992) 1482–1493.

    Google Scholar 

  33. P.V. Mockapetris and K. Dunlap, Development of the domain name system, in: ACM SIGCOMM '88 (August 1988).

  34. Object management group homepage,://www.omg.org/ (1998).

  35. C. Perkins, IP mobility support, RFC-2002 (October 1996).

  36. J. Saltzer, D. Reed and D. Clark, End-to-end arguments in system design, ACM Transactions on Computer Systems 2(4) (1984) 195–206.

    Google Scholar 

  37. B.N. Schilit, N. Adams, R. Gold, M. Tso and R. Want, The PARCTAB mobile computing system, in: Proceedings Fourth Workshop on Workstation Operating Systems (WWOS-IV) IEEE (October 1993) pp. 34–39.

  38. B.N. Schilit, N.I. Adams and R. Want, Context-aware computing applications, in: Proceedings of the Workshop on Mobile Computing Systems and Applications, IEEE Computer Society (December 1994) pp. 85–90.

  39. B.N. Schilit and M.M. Theimer, Disseminating active map information to mobile hosts, in: IEEE Network (Sept/Oct 1994) pp. 22–32.

  40. W. Schilit, System architecture for context-aware mobile computing, Ph.D. thesis, Columbia University (1995).

  41. S. Seshan, H. Balakrishnan and R.H. Katz, Handoffs in cellular wireless networks: the Daedalus implementation and experience, Kluwer Journal on Wireless Personal Communications (January 1997).

  42. B. Smith, Eolas Technologies, Inc., Computerized Processes Unlimited, Inc., and M. Roseman, DpTcl.tcl (1996). Obtained as alpha code.

  43. M. Spreitzer and M. Theimer, Providing location information in a ubiquitous computing environment, in: Proceedings of the Fourteenth ACM Symposium on Operating Systems Principles (December 1993).

  44. M. Stemm, P. Gauthier, D. Harada and R.H. Katz, Reducing power consumption of network interfaces in hand-held devices, in: The Third Workshop on Mobile Multimedia Communications (May 1996).

  45. M. Stemm and R.H. Katz, Vertical handoffs in wireless overlay networks, ACM Mobile Networking (MONET), Special Issue on Mobile Networking in the Internet (Fall 1997).

  46. P. Sukaviriya, J. Foley and T. Griffith, A second generation user interface design environment: the model and the runtime architecture, in: Proceedings of Human Factors in Computing Systems '93 (April 1993) pp. 375–382.

  47. D. Tennenhouse, J. Smith, W. Sincoskie, D. Wetherall and G. Minden, A survey of active network research, IEEE Communications Magazine (January 1997) 80–86.

  48. Universal Remote Console Communication Protocol,http://trace.wisc.edu/world/urcc (1997).

  49. J. Veizades, E. Guttman, C. Perkins and S. Kaplan, Service location protocol internet draft #17, draft-ieft-svrloc-protocol-17.txt, IETF (1997).

  50. G. Voelker and B. Bershad, Mobisaic: an information system for a mobile wireless computing environment, in: Workshop on Mobile Computing Systems and Applications (December 1994).

  51. T. Watson, Application design for wireless computing, in: Workshop on Mobile Computing Systems and Applications, IEEE Computer Society (December 1994).

  52. M. Weiser, Some computer science issues in ubiquitous computing, Communication of the ACM 36(7) (July 1993).

  53. K.R. Wood, T. Richardson, F. Bennett, A. Harter and A. Hopper, Global teleporting with Java: toward ubiquitous personalized computing, IEEE Computer 30(2) (1997) 53–59.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Hodes, T.D., Katz, R.H. Composable ad hoc location‐based services for heterogeneous mobile clients. Wireless Networks 5, 411–427 (1999). https://doi.org/10.1023/A:1019171616176

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1019171616176

Keywords

Navigation