A Taxonomy of Self-configuring Service Discovery Systems

We analyze the fundamental concepts and issues in service discovery. This analysis places service discovery in the context of distributed systems by describing service discovery as a third generation naming system. We also describe the essential architectures and the functionalities in service discovery. We then proceed to show how service discovery fits into a system, by characterizing operational aspects. Subsequently, we describe how existing state of the art performs service discovery, in relation to the operational aspects and functionalities, and identify areas for improvement.

[1]  Michael Nidd,et al.  Service discovery in DEAPspace , 2001, IEEE Wirel. Commun..

[2]  Hari Balakrishnan,et al.  The design and implementation of an intentional naming system , 1999, SOSP.

[3]  Abdelsalam Helal,et al.  Konark - a service discovery and delivery protocol for ad-hoc networks , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[4]  Jun Gao,et al.  Rendezvous Points-Based Scalable Content Discovery with Load Balancing , 2002, Networked Group Communication.

[5]  Ben Y. Zhao,et al.  An architecture for a secure service discovery service , 1999, MobiCom.

[6]  Sean Bechhofer,et al.  OWL: Web Ontology Language , 2009, Encyclopedia of Database Systems.

[7]  Butler W. Lampson,et al.  Designing a global name service , 1986, PODC '86.

[8]  Koen Vanthournout,et al.  A taxonomy for resource discovery , 2004, Personal and Ubiquitous Computing.

[9]  Mahadev Satyanarayanan,et al.  Pervasive computing: vision and challenges , 2001, IEEE Wirel. Commun..

[10]  Henning Schulzrinne,et al.  GloServ: global service discovery architecture , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..

[11]  Larry L. Peterson The profile naming service , 1988, TOCS.

[12]  Thomas A. Corbi,et al.  The dawning of the autonomic computing era , 2003, IBM Syst. J..

[13]  Yaron Goland,et al.  General Event Notification Architecture Base: Client to Arbiter , 1999 .

[14]  Golden G. Richard,et al.  Service Advertisement and Discovery: Enabling Universal Device Cooperation , 2000, IEEE Internet Comput..

[15]  Kevin Mills,et al.  Understanding consistency maintenance in service discovery architectures during communication failure , 2002, WOSP '02.

[16]  Matthew MacDonald,et al.  Web Services Architecture , 2004 .

[17]  Pieter H. Hartel,et al.  On consistency maintenance in service discovery , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[18]  Johan Scholten,et al.  Service Discovery with FRODO , 2004, ICNP 2004.

[19]  Sun Microsystems,et al.  RPC: Remote Procedure Call Protocol specification: Version 2 , 1988, RFC.

[20]  David W. Chadwick Understanding X.500 - the directory , 1994 .

[21]  Pieter H. Hartel,et al.  The Performance of a Second Generation Service Discovery Protocol In Response to Message Loss , 2005 .

[22]  Kevin Mills,et al.  Understanding consistency maintenance in service discovery architectures in response to message loss , 2002, Proceedings of Fourth Annual International Workshop on Active Middleware Services.

[23]  Larry L. Peterson,et al.  Univers: An attribute‐based name server , 1990, Softw. Pract. Exp..

[24]  Jon Whittle,et al.  A Survey of Approaches to Adaptive Application Security , 2007, International Workshop on Software Engineering for Adaptive and Self-Managing Systems (SEAMS '07).

[25]  James H. Aylor,et al.  Computer for the 21st Century , 1999, Computer.

[26]  Sun Microsystems,et al.  RPC: Remote Procedure Call Protocol specification , 1988, RFC.

[27]  Johann van der Merwe,et al.  A survey on peer-to-peer key management for mobile ad hoc networks , 2007, CSUR.

[28]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[29]  Raj Srinivasan,et al.  RPC: Remote Procedure Call Protocol Specification Version 2 , 1995, RFC.

[30]  T. Howes,et al.  Understanding and Deploying LDAP Directory Services , 2003 .

[31]  Roger M. Needham,et al.  Grapevine: an exercise in distributed computing , 1982, CACM.

[32]  M. E. Crandall,et al.  Names , 1924, Living I Was Your Plague.

[33]  Andrew S. Tanenbaum,et al.  Distributed systems: Principles and Paradigms , 2001 .

[34]  Carl E. Landwehr,et al.  Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.

[35]  Guy L. Steele,et al.  The Java Language Specification , 1996 .

[36]  George Coulouris,et al.  Distributed systems - concepts and design , 1988 .

[37]  David M. Booth,et al.  Web Services Architecture , 2004 .

[38]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[39]  Christian Bettstetter,et al.  A COMPARISON OF SERVICE DISCOVERY PROTOCOLS AND IMPLEMENTATION OF THE SERVICE LOCATION PROTOCOL , 2000 .

[40]  Françoise Sailhan,et al.  Scalable Service Discovery for MANET , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[41]  environmet.,et al.  JXTA : A Network Programming Environment , 2022 .

[42]  Sean Bechhofer,et al.  OWL: Web Ontology Language , 2009, Encyclopedia of Database Systems.

[43]  David L. Cohn,et al.  Autonomic Computing , 2003, ISADS.

[44]  David R. Karger,et al.  Chord: a scalable peer-to-peer lookup protocol for internet applications , 2003, TNET.

[45]  Jennifer Bray,et al.  Bluetooth 1.1: Connect Without Cables, Second Edition , 2001 .