J. Scholten

J. Scholten
  • University of Twente

About

34
Publications
2,898
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
233
Citations
Current institution
University of Twente

Publications

Publications (34)
Article
This paper presents a new approach to check integrity of cargo trains based on a distributed wireless sensor network (WSN). The WSN is autonomous and gathers information about the composition of the train without outside help or intervention. If the WSN infers from its data that an unexpected change in composition has occurred, it raises an alarm....
Chapter
Service discovery is a platform for network entities, whether hardware or software, to spontaneously self-configure and self-heal in a volatile environment. An in-depth understanding of the fundamentals of service discovery is essential for system architects to effectively execute pervasive and autonomous context-aware applications. We offer this u...
Article
Full-text available
We propose an energy-efficient service discovery protocol for heterogeneous wireless sensor networks that interact with the users in open and dynamic environments. Our solution exploits a cluster overlay, where the clusterhead nodes form a distributed service registry. A service lookup results in visiting only the clusterhead nodes. We aim for mini...
Article
We analyze the fundamental concepts and issues in service discovery. This analysis places service discovery in the context of distributed systems by describing service discovery as a third generation naming system. We also describe the essential architectures and the functionalities in service discovery. We then proceed to show how service discover...
Article
Full-text available
Sensor nodes can autonomously form ad-hoc groups based on their common context. We propose a solution for grouping sensor nodes attached on the same vehicles on wheels. The nodes periodically receive the movement data from their neighbours and calculate the correlation coefficients over a time history. A high correlation coefficient implies that th...
Conference Paper
Communication and node failures degrade the ability of a service discovery protocol to ensure users receive the correct service information when the service changes. We propose that service discovery protocols employ a set of recovery techniques to recover from failures and regain consistency. We use simulations to show that the type of recovery te...
Article
Full-text available
Abstract---This paper evaluates the performance in terms of resource consumption of a service discovery protocol proposed for heterogeneous Wireless Sensor Networks (WSNs). The protocol is based on a clustering structure, which facilitates the construction of a distributed directory. Nodes with higher capabilities are chosen to be clusterheads. We...
Conference Paper
We analyze the behavior of FRODO, a second generation service discovery protocol, in response to message loss in the network. Earlier protocols, like UPnP and Jini rely on underlying network layers to enhance their failure recovery. A comparison with UPnP and Jini shows that FRODO performs more efficiently in maintaining consistency, with shorter l...
Article
Full-text available
Service discovery in heterogeneous Wireless Sensor Networks is a challenging research objective, due to the inherent limitations of sensor nodes and their extensive and dense deployment. The protocols proposed for ad hoc networks are too heavy for sensor environments. This paper presents a resourceaware solution for the service discovery problem, w...
Conference Paper
As Service Discovery Protocols (SDP) are becoming increasingly important for ubiquitous computing, they must behave according to predefined principles. We present the functional Principles of Service Discovery for robust, registry-based service discovery. A methodology to guarantee adherence to these principles is provided and illustrated by formal...
Article
We analyze the behavior of FRODO, a second generation service discovery protocol, in response to message loss in the network. Earlier protocols, like UPnP and Jini rely on underlying network layers to enhance their failure recovery. A comparison with UPnP and Jini shows that FRODO performs more efficiently in maintaining consistency, with shorter l...
Article
Full-text available
Service discovery is an emerging field in the area of ubiquitous computing. There are various techniques and protocols (proposed or/and already implemented) particularly tailored to specific sets of objectives. This paper analyses the current state of the art and presents a taxonomy of service discovery protocols. Along with design issues, the dive...
Article
The real-time token-based RTnet network protocol has been implemented on a standard Ethernet network to investigate the possibility to use cheap components with strict resource limitations while preserving Quality of Service guarantees. It will be shown that the proposed implementation is feasible on a small network. For larger networks a different...
Article
Full-text available
Ambient systems are networked embedded systems integrated with everyday environments and supporting people in their activities. These systems will create a Smart Surrounding for people to facilitate and enrich daily life and increase productivity at work. Such systems will be quite different from current computer systems, as they will be based on a...
Article
This paper focuses on communication in personal area networks. A personal area networks (PAN) is characterized as an informal collection, or community, of connected small, lightweight, and resource-lean devices, or gadgets. Two basic concepts are visible in the development of PANs, the distributed and the centralized concept. The paper introduces a...
Article
This paper describes a medium access protocol for real-time communication in wireless networks. Medium access is controlled by a scheduler, which utilizes a pre-emptive earliest deadline first (PEDF) scheduling algorithm. The scheduler prevents collisions in the network, where normally only collisions are avoided. PEDF is the scheduler of choice, b...
Article
We present a distributed clock synchronization algorithm. It performs clock synchronization on an Ethernet-based real-time token local area network, without the use of an external clock source. It is used to enable the token schedulers in each node to agree upon a common time. Its intended use is in resource-lean systems, where heavyweight protocol...
Article
This paper describes a new token-based medium access protocol for real-time networks and its implementation on a wireless network. Originally, the protocol is developed for use in low cost domestic or home networks that are based on Ethernet hardware. In contrast to existing protocols the token is assigned to network nodes on basis of a pre-emptive...
Article
RTN is a network access protocol that uses a token scheduling mechanism to enable real-time multimedia streaming on Ethernet-like networks. Unlike other token based protocols, RTNs token mechanism is based on pre-emptive earliest deadline first (PEDF) scheduling. PEDF has interesting characteristics, such as one hundred percent bandwidth utilizatio...
Conference Paper
This paper shows the current state of our research into a home network which provides both real-time and non-real-time capabilities for one coherent, distributed architecture. It is based on a new type of real-time token protocol that uses scheduling to achieve optimal token-routing in the network. Depending on the scheduling algorithm, bandwidth u...
Conference Paper
This paper proposes a home network which integrates both real-time and non-real-time capabilities for one coherent, distributed architecture. Such a network is not yet available. Our network will support inexpensive, small appliances as well as more expensive, large appliances. The network is based on a new type of real-time token protocol that use...
Conference Paper
As part of a multimedia project research is being done in the area of monitoring and debugging. The monitor to be discussed in this paper is intended for use in distributed systems, in particular in a network of multimedia workstations. The monitor is the first phase in the development of a multimedia debugger. It taps (selected) information stream...
Conference Paper
A description is given of a partly implemented parallel debugger for the Twente University multicomputer (TUMUKT). The system's basic method for exchange of data is message passing. Experience indicates that most programming errors in application software are made in calls to the kernel and the interprocess communication. The debugger is intended t...
Conference Paper
A description is given of Tumult (Twente university multicomputer) and its operating system, along with considerations about parallel debugging, examples of parallel debuggers, and the proposed debugger for Tumult. Problems related to debugging distributed systems and solutions found in other distributed debuggers are discussed. The following are t...
Conference Paper
TUMULT, (Twente University multiprocessor) is described. Its aim is the design and implementation of a modular extendable multiprocessor system. Up to 15 processing elements are connected through an interprocessor communication network, using message-passing for the exchange of data. The hardware is controlled by a distributed real-time operating s...
Article
Service discovery enables a highly dynamic infrastructure where client devices are able to seek particular services of interest provided by devices in the network. This paper presents FRODO, a robust and resource aware service discovery mechanism for the home environment.
Article
An iterative quality-based algorithm for location discovery is presented which can be used in wireless ad hoc sensor networks. The algorithm will take the reliability of measurements into account and will produce a reliability index for every estimated location using a statistical approach. The algorithm can also work in a hybrid network with diffe...

Network

Cited By