PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Notification methods in wireless systems

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Recently, there has been an increasing need for secure, efficient, and simple notification methods for wireless systems. Such systems are meant to provide users with precise tools best suited for work or leisure environments, and a lot of effort has been put into creating a multitude of applications. At the same time, however, not much research has been made into determining which of the available protocols are best suited for each individual task. A number of basic notification methods are presented here, and tests have been performed for the most-promising ones. An attempt has been made to determine which of the methods have the best throughput, latency, security, and other characteristics. A comprehensive comparison is provided, which can be used to select the right method for each individual project. Finally, conclusions are provided, and the results from all of the tests conducted are discussed.
Wydawca
Czasopismo
Rocznik
Strony
519--539
Opis fizyczny
Bibliogr. 17 poz., rys., wykr., tab.
Twórcy
autor
  • AGH University of Science and Technology
  • AGH University of Science and Technology
autor
  • AGH University of Science and Technology
Bibliografia
  • [1] Brzoza-Woch R., Konieczny M., Kwolek B., Nawrocki P., Szydło T., Zieliński K.: Holistic Approach to Urgent Computing for Flood Decision Support. Procedia Computer Science , vol. 51(0), pp. 2387–2396, 2015, International Conference On Computational Science, ICCS 2015 Computational Science at the Gates of Nature.
  • [2] Duckett C.: Android malware utilising Google Cloud Messaging service. http://www.zdnet.com/android-malware-utilising-google-cloud- messaging-service-7000019427/ , 2013.
  • [3] Ghinamo G., Vadala F., Corbi C., Bettassa P., Risso F., Sisto R.: Vehicle navigation service based on real-time traffic information: A RESTful NetAPI solution with long polling notification. In: Ubiquitous Positioning, Indoor Navigation, and Location Based Service (UPINLBS), 2012 , pp. 1–8, 2012.
  • [4] Hansen J., Grønli T.M., Ghinea G.: Towards cloud to device push messaging on Android: Technologies, possibilities and challenges. International Journal of Communications, Network and System Sciences , vol. 5(12), pp. 839–849, 2012.
  • [5] Kosiński J., Nawrocki P., Radziszowski D., Zieliński K., Zieliński S., Przybylski G., Wnęk P.: SLA Monitoring and Management Framework for Telecommunication Services. In: Fourth International Conference on Networking and Services, ICNS 2008 , pp. 170–175, 2008.
  • [6] Nawrocki P., Jakubowski M., Godzik T.: Analysis of notification methods with respect to mobile system characteristics. In: M. Ganzha, L. Maciaszek, M. Paprzycki, eds., Proceedings of the 2015 Federated Conference on Computer Science and Information Systems , Annals of Computer Science and Information Systems , vol. 5, pp. 1183–1189, IEEE, 2015, http://dx.doi.org/10.15439/2015F6 .
  • [7] Nawrocki P., Soboń M.: Public cloud computing for Software as a Service platforms. Computer Science , vol. 15(1), 2014, http://journals.agh.edu.pl/csci/ article/view/519 .
  • [8] Oldenburg R.: Keeping Google Cloud Messaging For Android Working Relia- bly [Technical Post]. http://blog.pushbullet.com/2014/02/12/keeping- google-cloud-messaging-for-android-working-reliably-techincal- post , 2014.
  • [9] Richards M.: Understanding the Difference Between AMQP and JMS. NFJS Magazine , 2011.
  • [10] Rostanski M., Grochla K., Seman A.: Evaluation of highly available and fault- tolerant middleware clustered architectures using RabbitMQ. In: M. Ganzha, L. Maciaszek, M. Paprzycki, eds., Proceedings of the 2014 Federated Conference on Computer Science and Information Systems , Annals of Computer Science and Information Systems , vol. 2, pp. 879–884, IEEE, 2014, http://dx.doi.org/10. 15439/2014F48 .
  • [11] Schuster D., Koren I., Springer T., Hering D., S ̈ollner B., Endler M., Schill A.: Creating Applications for Real-Time Collaboration with XMPP and Android on Mobile Devices . Handbook of Research on Mobile Software Engineering: Design, Implementation and Emergent Applications, IGI Global, 2012.
  • [12] Szydło T., Nawrocki P., Brzoza-Woch R., Zieliński K.: Power aware MOM for telemetry-oriented applications using GPRS-enabled embedded devices – levee monitoring use case. In: M. Ganzha, L. Maciaszek, M. Paprzycki, eds., Proceedings of the 2014 Federated Conference on Computer Science and Information Systems , Annals of Computer Science and Information Systems , vol. 2, pp. 1059–1064, IEEE, 2014, http://dx.doi.org/10.15439/2014F252 .
  • [13] Tang K., Wang Y., Liu H., Sheng Y., Wang X., Wei Z.: Design and Implementation of Push Notification System Based on the MQTT Protocol. In: 2013 International Conference on Information Science and Computer Applications (ISCA 2013) , Atlantis Press, 2013.
  • [14] Wood D., Robson D.: Message broker technology for flexible signalling control. In: Proceedings ASPECT 2012 Conference , 2012.
  • [15] Wylie K.: REST Requires Asynchronous Notification. http://kirkwylie. blogspot.com/2008/12/rest-requires-asynchronous-notification.html , 2008.
  • [16] Yanfei L., Cheng W., Chengbo Y., Xiaojun Q.: Research on ZigBee Wireless Sensors Network Based on ModBus Protocol. In: IFITA ’09, International Forum on Information Technology and Applications , vol. 1, pp. 487–490, 2009.
  • [17] Zhang L., Tiwana B., Qian Z., Wang Z., Dick R.P., Mao Z.M., Yang L.: Accurate Online Power Estimation and Automatic Battery Behavior Based Power Model Generation for Smartphones. In: Proceedings of the Eighth IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis , CODES/ISSS ’10, pp. 105–114, ACM, New York, NY, USA, 2010, http: //doi.acm.org/10.1145/1878961.1878982 .
Uwagi
Opracowanie ze środków MNiSW w ramach umowy 812/P-DUN/2016 na działalność upowszechniającą naukę.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-13fe6dc1-94e8-4fc0-a8bf-8fd352cb58bc
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.