{"id":2369,"date":"2020-11-10T15:33:36","date_gmt":"2020-11-10T08:33:36","guid":{"rendered":"http:\/\/international.binus.ac.id\/computer-science\/?p=2369"},"modified":"2020-11-10T15:33:36","modified_gmt":"2020-11-10T08:33:36","slug":"middleware-for-pervasive-computing-systems","status":"publish","type":"post","link":"https:\/\/international.binus.ac.id\/computer-science\/2020\/11\/10\/middleware-for-pervasive-computing-systems\/","title":{"rendered":"Middleware for Pervasive Computing Systems"},"content":{"rendered":"<p>By: Dr. Maria Seraphina Astriani<\/p>\n<p>Pervasive application often relies on some <strong>middleware support<\/strong>.<\/p>\n<p>&nbsp;<\/p>\n<p>It is more desirable to extract the common requirements from different applications and provide the desired functionality from a middleware layer, which <strong>hides the complexity and heterogeneity<\/strong> of underlying hardware and network platforms.<\/p>\n<p>&nbsp;<\/p>\n<p>The pervasive middleware primarily addresses <strong>issues from high-level applications<\/strong> on one hand while dealing <strong>with the complexity of operating<\/strong> underlying devices, networks, and platforms on the other.<\/p>\n<p><a href=\"http:\/\/international.binus.ac.id\/computer-science\/files\/2020\/11\/middleware.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2370\" src=\"http:\/\/international.binus.ac.id\/computer-science\/files\/2020\/11\/middleware.png\" alt=\"\" width=\"531\" height=\"466\" srcset=\"https:\/\/international.binus.ac.id\/computer-science\/files\/2020\/11\/middleware.png 531w, https:\/\/international.binus.ac.id\/computer-science\/files\/2020\/11\/middleware-480x421.png 480w\" sizes=\"(max-width: 531px) 100vw, 531px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><strong>The Five Layer \u2013 IoT Architecture<\/strong><\/p>\n<p style=\"text-align: center\"><em>Source: <\/em><a href=\"https:\/\/www.researchgate.net\/profile\/Philip_Pong\/publication\/309606980\/figure\/fig7\/AS:423812727611393@1478056236103\/The-five-layer-IoT-architecture-114.png\"><em>https:\/\/www.researchgate.net\/profile\/Philip_Pong\/publication\/309606980\/figure\/fig7\/AS:423812727611393@1478056236103\/The-five-layer-IoT-architecture-114.png<\/em><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>The <strong>operations<\/strong> of pervasive middleware are realized by heterogeneous underlying<\/p>\n<ul>\n<li>devices,<\/li>\n<li>networks,<\/li>\n<li>and platforms.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>In practice, these operations are also <strong>constrained by physical resources<\/strong>, such as low computation capability and insufficient battery supply<\/p>\n<p>&nbsp;<\/p>\n<p>There have been a number of pervasive middleware system:<\/p>\n<ul>\n<li>Gaia<\/li>\n<li>Aura<\/li>\n<li>PICO\/SeSCo<\/li>\n<li>CORTEX<\/li>\n<li>Scenes<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>These middlewares provide different abstraction and system support for applications<\/p>\n<ul>\n<li>Example: Gaia provides user authentication and access control as security mechanism<\/li>\n<li>Example: Gaia, Aura, and CORTEX have context management<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>The functionality of the middleware layer:<\/p>\n<ul>\n<li>Resources Management<\/li>\n<li>User Tracking<\/li>\n<li>Context Management<\/li>\n<li>Service Management<\/li>\n<li>Data Management<\/li>\n<li>Security Management<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>References:<\/p>\n<ul>\n<li>Guo, M., Zhou, J., Tang, F., &amp; Shen, Y. (2016). <em>Pervasive computing: concepts, technologies and applications<\/em> (1st ed.). CRC Press<\/li>\n<li>Resmini, A., &amp; Rosati, L. (2011). <em>Pervasive information architecture: designing cross-channel user experiences<\/em> (1st ed.). Elsevier.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>By: Dr. Maria Seraphina Astriani Pervasive application often relies on some middleware support. &nbsp; It is more desirable to extract the common requirements from different applications and provide the desired functionality from a middleware layer, which hides the complexity and heterogeneity of underlying hardware and network platforms. &nbsp; The pervasive middleware primarily addresses issues from [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[112],"tags":[],"class_list":["post-2369","post","type-post","status-publish","format-standard","hentry","category-article"],"_links":{"self":[{"href":"https:\/\/international.binus.ac.id\/computer-science\/wp-json\/wp\/v2\/posts\/2369"}],"collection":[{"href":"https:\/\/international.binus.ac.id\/computer-science\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/international.binus.ac.id\/computer-science\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/international.binus.ac.id\/computer-science\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/international.binus.ac.id\/computer-science\/wp-json\/wp\/v2\/comments?post=2369"}],"version-history":[{"count":1,"href":"https:\/\/international.binus.ac.id\/computer-science\/wp-json\/wp\/v2\/posts\/2369\/revisions"}],"predecessor-version":[{"id":2371,"href":"https:\/\/international.binus.ac.id\/computer-science\/wp-json\/wp\/v2\/posts\/2369\/revisions\/2371"}],"wp:attachment":[{"href":"https:\/\/international.binus.ac.id\/computer-science\/wp-json\/wp\/v2\/media?parent=2369"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/international.binus.ac.id\/computer-science\/wp-json\/wp\/v2\/categories?post=2369"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/international.binus.ac.id\/computer-science\/wp-json\/wp\/v2\/tags?post=2369"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}