Next Article in Journal
Multilingual Transformer-Based Personality Traits Estimation
Previous Article in Journal
Dynamic Estimation of Saturation Flow Rate at Information-Rich Signalized Intersections
Previous Article in Special Issue
Opportunistic Multi-Technology Cooperative Scheme and UAV Relaying for Network Disaster Recovery
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Multi-Strategy Dynamic Service Composition in Opportunistic Networks

IRISA, Université Bretagne Sud, 56100 Lorient, France
*
Authors to whom correspondence should be addressed.
Information 2020, 11(4), 180; https://doi.org/10.3390/info11040180
Submission received: 21 February 2020 / Revised: 23 March 2020 / Accepted: 23 March 2020 / Published: 26 March 2020
(This article belongs to the Special Issue Applications in Opportunistic Networking)

Abstract

:
Distributed computing pervasiveness is nowadays undeniable, and will continue to grow as the usage of device-to-device communications and the number of connected things populating our daily environment increase. Due to the connectivity disruptions induced by the mobility of devices communicating through short-range wireless interfaces and by the sleep phases of devices, it is often difficult to exploit the resources offered by the connected things forming these pervasive environments through the services they provide, and even harder to compose these services together so as to provide users with more useful and sophisticated services. This paper presents a service composition system adapted to opportunistic networks. This composition system relies on a service provision platform that exploits opportunistic networking and computing techniques to cope with connectivity disruptions. Service composition is performed dynamically, according to users’ interests. A multi-strategy scheme is used for the invocation of composite services, and a recovery mechanism is possible through partial invocation. This paper also presents the evaluation of the proposed composition system on two different scenarios: one involving people roaming in an open area, and another one involving spectators of a running event.

1. Introduction

Nowadays, wireless networks are composed of a variety of heterogeneous devices that can communicate directly with one another, ranging from resource-constrained sensors to mobile devices and smart home appliances. After being neglected for many years, especially in cellular networks, device-to-device communication (D2D) is receiving more attention as direct communication between proximate devices can help to perform peer-to-peer data exchanges between user equipment, to offload data traffic in cellular networks, to support machine-to-machine communications needed by the Internet of Things, to efficiently provide local services, etc. Progress in exploiting D2D data exchanges for enabling network-wide communication has been possible as techniques such as Opportunistic Networking or DTN emerged to cope with the connectivity disruptions and the additional delays introduced by device mobility, short network interface radio range, and frequent and unpredictable periods of sleep mode to save energy. Indeed, during the last decade, numerous disruption/delay tolerant and opportunistic networking techniques, implementing the “store, carry and forward” principle, have been proposed to address the issues posed by connectivity disruptions and by multi-hop communication [1]. These techniques allow to transfer messages between devices even if there is no end-to-end path between them.
Furthermore, with the objective of providing a higher-level programming paradigm, several service delivery protocols relying on these networking techniques have also been studied. These protocols allow a device to discover the services provided by other devices in the network, and to invoke the remote services it has selected among them so as to exploit the resources accessible through these services. A global concern in these protocols is to cope with the fact that network-wide exchanges may face long delays or simply fail. Cross-layering, caching, or location awareness have been explored in order to reduce and optimize the network traffic [2,3,4].
In many scenarios and applications relying on opportunistic communications, the network is composed of a set of wireless resource-constrained devices that can collect raw measurement data from the environment (e.g., opportunistic sensing), and of portable mobile devices used by people to produce, to exchange and to process data. Due to the limited network bandwidth, and to the limited local resources (processor, memory, storage and battery), applications are generally distributed over a collection of devices in these networks. Each device typically provides basic functionalities for collecting, generating or processing data, and the end-user is provided with a composite service, formed by a combination of these basic functionalities. In practice, a sequential chain of services is employed. More sophisticated combinations, expressed with a process algebra, could be imagined, but are out of the scope of this paper. Even in its simplest form, the composition of services in opportunistic networks is a challenging task, studied in a limited number of works [5,6,7,8] so far. Indeed, composition strategies dedicated to conventional Internet contexts are likely to cause prohibitive delays, and to suffer from transmission failures. In Internet, these transmissions are more or less considered always possible and efficient. In opportunistic networks, this assumption no longer holds. Service composition multiplies the constraints because fulfilling a composite service request involves the invocation of multiple services, any of these service being susceptible to be out of reach at any moment.
If there is no latitude in the choice of the actual providers of the services present in the composition, the performance of the invocation of a composite service will rely solely on the opportunistic networking layer, and any failure in reaching an elementary service provider will inevitably leads to the failure of the whole process. However, it is commonly assumed that a certain redundancy exists in service provision, that is, a same service may be offered by several providers in the network. In this context, there is much room for optimization when designing the composition execution process because choosing the right provider at one step of a composition may significantly reduce invocation time. Additionally, service redundancy allows in theory the execution of the composite service to continue even when an unsuccessful partial invocation occurs, as it should be possible to dynamically fall back on an alternative provider. In other words, there is a need for a composition strategy that takes into account the reachability of service providers and implements a form of recovery in composite service invocation.
In this paper, we present a composition system designed for opportunitistic networks. This composition system relies on a service provision system that supports the discovery, the selection, the invocation of services in opportunistic networks. We assume that each device in the network can play the role both of service provider and of service client and that a same service may be offered by several providers in the network. New composite services are automatically built on each device from discovered services, according to the user’s interests. The key contribution of this paper consists of the definition and the implementation of two service composition strategies, based respectively on choreography and on orchestration, that take into account the reachability of service providers. These strategies can be parameterized with a utility function that makes it possible to estimate the delay and the success of a transmission between a service client and a service provider, and to select the providers according to these values. Two implementations of the utility function are considered and evaluated. The first one is based on location, and the second one is based on the reception times of the service advertisements emitted by service providers. In this paper, we also compare the success ratio and the execution time provided by the composition strategies and the utility functions in two different scenarios. The first scenario involves people moving around in an open area. The second scenario involves the spectators of a running race who move along predetermined paths.
The rest of this paper is organized as follows. Section 2 presents research works addressing service composition issues, especially in opportunistic networks. Section 3 presents the main features of the service composition system we have implemented in a service-oriented middleware platform. Section 4 details and formalizes the processes of discovery, selection and composition of the services. Section 5 presents the evaluation results we obtained for our system on the two above-mentioned scenarios. Section 6 summarizes our contribution.

2. Related Work

Composition of services and invocation of composite services have been widely studied in the past, mainly considering Web services in stable Internet legacy networks [9,10]. They also have been considered in networks composed of resource-constrained devices in the Internet of Things context [11,12,13,14], as well as in more challenged networks, such as in dynamic pervasive environments formed by mobile ad hoc networks [15,16,17]. Most of solutions proposed for these kinds of networks do not tolerate the connectivity disruptions that can unpredictably occur between devices, and that can introduce additional delays and failures in the invocation processes. For instance in [16], Barakat et al. have proposed an adaptive service composition algorithm that triggers an adaptation process as soon as service changes occur in the environment, without interfering with the initial execution process, unless necessary. This adaptation process applies only a minimal number of modifications to the initial composition graph to avoid a service re-selection from scratch. The new composition graph resulting from this service re-selection is executed in a parallel process in order to maximize the chances of a successful recovery and to reduce the execution time of the composite service. This work does not describe the service selection criteria, and only considers the selection problem from a high level point of view, which does not make it possible to determine whether the proposed approach is suitable or not for dynamic network environments that are subject to frequent and unpredictable connectivity disruptions.
In [18], Capra et al. present a service composition framework for mobile environments that allows to improve the service composition reliability by considering the mobility pattern of devices and their colocation duration (the probability of service access is related to the colocation duration). The work described in [19] also tries to improve service composition dependability by characterizing the service providers’ mobility and by tolerating uncertainty in this mobility. Like in [18], SeSCo (Seamless Service Composition) [20] exploits the nodes’ colocation property to find, in the vicinity users, new providers offering the services that become unreachable following the users’ movement. It also supports the execution of partial compositions and implements a simple recovery strategy. This colocation property is also considered in [21] through virtual communities of mobile users who are geographically close. By defining such communities, the authors try to minimize as much as possible the delays and failures arising during the delivery of composite services in mobile environments. These works only consider direct connections with service providers, and do not support communications relying on the “store, carry and forward” principle, which is the basic principle on which opportunistic and delay/disruption tolerant networking techniques rely on. Such a communication principle should, however, greatly help enhance the delivery of composite services by allowing to discover, to select and to invoke services that are not in the direct vicinity of users, but that can be reached through intermediate nodes even if there is not existing end-to-end links between service clients and providers. Furthermore, these works, except SeSCo, do not implement recovery strategies. Consequently if a service provider becomes unavailable, the partially executed composition remains in an inconsistent state.
The work presented in [22] is one of the few that addresses issues introduced by frequent wireless link failures on the provision of (composite) services. Jiang and al. investigate service composition and two levels of recovery: a network level and a service level. For the network-level recovery, the service providers involved in the provision of a composite services remain the same, and only the network path between them is subject to a recovery process. This process consists of discovering an alternative route to replace the broken link/path and restarting the data delivery. The service-level recovery process involves three operations: (1) finding alternative service providers, (2) finding a network path inter-connecting the new providers, (3) restoring the service states to recover the invocation process of the composite service. Service-level recovery thus takes much more time than network-level recovery. To provide an effective service composition and recovery solution, the authors additionally propose a heuristic to predict the service link lifetime based on node location and velocity using a linear regression.
By supporting, like [22], partial compositions and a recovery process, and by additionally integrating the execution phase into the composition phase, [8] tries to reduce the overall execution time of composite services in opportunistic networks. The advantage of this solution is that it addresses each selected service provider only once, and requires less data exchanges than a traditional consecutive approach that runs in two phases: a binding phase to select the providers, then a phase to invoke them. In [23], the authors propose an extension of the solution they described in [8,24]. This extension makes it possible to invoke several providers in parallel, thus creating several branches in the service composition graph. The branches can be split and merged, and the results of the composition process can be combined using semantic features. In [25], Clarke and al. present a goal-driven service composition model to dynamically compose services in mobile and pervasive computing environments. This model extends both the opportunistic resource allocation scheme and the service composition model proposed respectively in [23,26]. This new model (1) defines a heuristic to prevent the flooding of service requests in the network, (2) implements a dynamic adaptation and selection of execution paths, based on path reliability, in order to accomplish service execution with less failure, and finally (3) makes it possible to automatically merge new discovered services into existing service-flows. In [23], “directions” with the best quality value are chosen for the next-hop invocation. The quality value is calculated from the service execution times and an estimation of the remaining execution path’s reliability. This estimation is derived from both the length of the remaining execution path and a value reflecting the network’s dynamism. This value is computed from the node density, the transmission range and the nodes’ average speed. In [5], Sadic et al. propose an approach close to that of Clarke and al. Indeed, in order to reduce as much as possible the composition delay, and thus to provide users with a certain quality of service, they propose to select the service providers to invoke following two metrics: the shortest temporal distance, which is the minimum time needed to send data from one node to another one, and the service load,which reflects the workload of a given service. Nevertheless unlike some of previous presented works, Sadic et al. do not consider partial invocations of composite services and recovery of invocation processes.
The above-mentioned works only consider—implicitly or not—a choreography-based invocation strategy of composite services. This strategy consists of repeatedly choosing a device for the first elementary service execution and delegating to this device the execution of the rest of the composition. An alternative strategy, called orchestration-based invocation strategy, also deserves to be studied in order to verify if it proves to be more suitable in some situations. In this strategy, the providers are selected and invoked by the very device that has initiated the invocation of a composite service. So, the composition is never transmitted to the service providers enrolled in the invocation process of a composite service, and invocations of next services are never delegated to them.
In the next two sections, we present the main features of a service composition system that supports the choreography- and the orchestration-based strategies, the partial invocation of composite services, the recovery of partial invocation processes and the creation of service compositions driven by the users’ interests. This platform furthermore selects the providers that must be enrolled in an invocation process using a utility function. Two implementations of this function are currently provided by the platform: one is based on location and another one based on the reception times of the service advertisements emitted by service providers.

3. Design of a Dynamic Service Composition System for Opportunistic Networks

The design of service composition is strongly related to the way the basic functionalities of service provision (namely service discovery, selection and invocation) are offered, as well as the service model itself. Although this paper focuses on service composition, we will also briefly explain the characteristics of the other components of the service-oriented middleware platform we consider (depicted in Figure 1). Thus, this section first presents the service model and the service discovery scheme implemented in the provision system we rely on, which has been developed upon the opportunistic communication middleware C3PO [27]. We then show how users’ interests are used to create interest-driven composition graphs automatically. The selection of service providers and the execution/invocation of composite services are shortly introduced in this section and further detailed in the next one.

3.1. Service Model

In this work, we assume that services provided in the opportunistic networks are REST services, that it may exist several instances of a same service in the network, and that each service is described by a 5-uplet S = N , D , K , I , O , Q , where N is the service name, D is a user comprehensible textual description of the service, K is a set of key words semantically characterizing the service, I is the set of input parameters, O is the set of output results and Q is a set of quality of service parameters. Each input parameter I p of set I is defined as I P = P , T P , C P , L P , where P is the name of the parameter, T P is the type of parameter P, C P are the pre-conditions applied on parameter P and L p is a label providing semantic information about parameter P. Each output result O R of set O is defined as O R = T R , C R , L R , where T R , L R and C R are respectively the type, the semantic label and the post-conditions of the output result. Finally, Q is a set of quality of service parameters. These parameters are notably used, as we will see later in this paper, to specify an estimation of the success ratio and of the invocation time of a composite service. This service description is compatible with the one that connected things could expose in a Web of Things (WoT) context, where WoT platforms dynamically instantiate REST services from the description exhibited by connected things [28], so that the resources offered by these things could be exploited by other devices. Like in the Thing Description [28], ontologies, such as SAREF (Smart Appliances REFerence) [29] or OM (Ontology of Units of Measure and Related Concepts) [30], can be used to semantically characterized the services and their parameters.

3.2. Service Discovery

In our service provision system, service discovery is performed following a peer-to-peer distributed discovery scheme. Each instance of this system maintains in is own service registry an up-to-date list of its local services and of the remote services it has discovered. A triplet E = H , T , R is associated to each service description in the service registry, where H is the C3PO identifier of the device providing the service, T is the date of the last update of the entry in the registry, and R is the result returned by the utility function implemented in the system to estimate the service reachability considering two parameters: the success ratio and the invocation time of the service. To provide an efficient service discovery and to minimize as much as possible the network overhead related to the broadcast of service advertisements, the above-presented service descriptions have been piggybacked into the beacon messages that are exchanged by instances of C3PO to build their 2-hops neighborhood. When a beacon message is received from a given provider, the pieces of information related to this provider (i.e., the service descriptions S and the triplets E) are added in the local service registry, or updated if they already exist, in order to take into account the network topology changes. If a service registry entry has not been updated for a certain time, this entry is automatically removed by the service registry itself. The expiration period is a configuration parameter of the service registry. Cross-layering techniques are implemented in the C3PO communication middleware and in the service provision system so that the platform can compute, from message properties (emission date, sender location, etc.), information that can help select appropriated service providers such as for example the propagation time of messages and the distance between the providers and the local device.
It must be noticed that in opportunistic networks, which are intrinsically dynamic, a distributed peer-to-peer discovery scheme is more suited than a discovery scheme relying on a centralized registry that indexes and locates service providers in the network. Indeed, a centralized discovery scheme introduces additional delays in the discovery process because two messages (a service discovery request and the service advertisement returned in response) must be exchanged using opportunistic communication techniques to find a service.

3.3. Interest-Driven Service Composition

Service compositions are modeled as directed acyclic graphs. A graph represents a chain of services that must be invoked successively, the result of the execution of a service being passed as parameter for the invocation of the next service. Compositions are triggered by the discovery of new elementary or composite services. When a new composition is created, the resulting composite service is added into the local service registry in order, on the one hand, to enable the discovery of this new service by the local applications and by the remote devices, and, on the other hand, to trigger the composition of another service with this composite service. All feasible compositions are not considered, but only those involving services that are compatible with the user’s interests, defined as a set of keywords. The way these keywords can be created is out of the scope of this paper. They can for instance be derived from the description of the applications used by people.
The algorithm executed upon the discovery of a new (elementary or composite) service is presented in Algorithm 1. This algorithm makes it possible to compose services two by two, avoiding cycling compositions (line 3: a service cannot be composed with a composite service that already integrates it). Compositions such as those illustrated in Figure 2 can be created using this algorithm (lines from 4 to 10 make it possible to obtain the composition 1, while lines from 12 to 18 produce the composition 2). Compositions are built independently of the service providers. The providers are selected when the composite services are executed/invoked. In this work, two strategies (orchestration and choreography) are considered to invoke the composite services. These strategies are detailed in Section 4.
When a provider is considered as unreachable, the (composite and elementary) services it provides are removed from the local service registry. The local device will also removed from its registry the composite services it provides itself, and that rely on those offered by the missing provider, if it no longer has references on similar (elementary or composite) services offered by alternative providers. We recall that it can exist, in the networks we consider, several instances of a same service (i.e., a same service can be delivered by different devices).
Algorithm 1: Algorithm triggering service composition upon discovery of new services.
Data:
    S n = N n , D n , K n , I n , O n , Q n : the new discovered service
   R: the service registry
   U: User’interests
    S c : The new service to compose
   ≈: semantic compatibility test
    φ : Utility function 
1:
if (∃iU / i S n . K n ) then
2:
for all S r Rdo
3:
  if ( S n S r ) then
4:
   if (∃p S r . I r & ∃o S n . O n / ( p . L p o. L o ) & (p. T p = o. T o ) & (o. C o p. C p )) then
5:
     S c . N c ← "( S n . N n , S r . N r )"
6:
     S c . I c S n . I n S r . I r - { p } / p S r . I r & ∃ o S n . O n / ( p . L p o . L o ) & ( p . T p = o . T o ) & ( o . C o p . C p )
7:
     S c . O c S r . O r S n . O n - { o } / o S n . O n & p S r . I r / ( o . L o p . L p ) & ( o . T o = p . T p ) & ( o . C o p . C p )
8:
     S c . D ← "Composite service formed by S n . N n and S r . N r . S n . D n . S r . D r "
9:
     S c . K c S n . K n S r . K r
10:
     S c . Q c ← { q 1 , q 2 , q 3 , q 4 } / q 1 S n . Q n & q 1 S r . Q r , q 2 S n . Q n & q 2 S r . Q r , q 3 = min( q 3 S n , q 3 S r ) / q 3 S n S n & q 3 S r S r , q 4 = φ ( S r )
11:
   else
12:
    if (∃p S n . I n & ∃o S r . O r / ( p . L p o. L o ) & (p. T p = o. T o ) & (o. C o p. C p )) then
13:
      S c . N c ← "( S r . N r , S n . N n )"
14:
      S c . I c S r . I r S n . I n - { p } / p S n . I n & ∃ o S r . O r / ( p . L p o . L o ) & ( p . T p = o . T o ) & ( o . C o p . C p )
15:
      S c . O c S n . O n S r . O r - { o } / o S r . O r & p S n . I n / ( o . L o p . L p ) & ( o . T o = p . T p ) & ( o . C o p . C p )
16:
      S c . D ← "Composite service formed by S r . N r and S n . N n . S r . D r . S n . D n "
17:
      S c . K c S r . K r S n . K n
18:
      S c . Q c ← { q 1 , q 2 , q 3 , q 4 } / q 1 S n . Q n & q 1 S r . Q r , q 2 S n . Q n & q 2 S r . Q r ,
 
       q 3 = min( q 3 S n , q 3 S r ) / q 3 S n S n & q 3 S r S r , q 4 = φ ( S n )
19:
    end if
20:
   end if
21:
  end if
22:
 end for
23:
end if
24:
RR∪ { S n }
25:
if ( S c ≠⌽) then
26:
RR∪ { S c }
27:
end if

3.4. Provider Selection

The selection of service providers is a key feature in a service composition system, especially in a system that relies on multi-hop communications. Indeed, it aims at choosing, among the providers that have been discovered, the provider that should be the fastest and the most reliable one to reply to a given request. In the type of networks we consider, the selection of the intermediate devices is a preponderant aspect regarding the execution time and the success of a service invocation and of a service composition. Many disruption-tolerant and opportunistic protocols have been proposed over the last decade [1], devising routing strategies based on different criteria. As shown in [2,3], information about the reachability of devices should also be used at the service management level so as to select the most relevant providers. That is why cross-layering techniques are implemented in the system. In our composition system, the service provider selection relies on a utility function. Two implementations of this function are considered. These implementations are detailed in Section 4.

3.5. Invocation of Composite Services

Invoking a composite service mainly consists of successively calling the (elementary or the composite) services that form this one, following the direct acyclic graph representing the sequence of services and their interconnections. Such a graph, which is a part of a composite request (the invocation parameters completing this graph), can be processed following two approaches: the choreography and the orchestration approaches. The choreography-based invocation of a composite service consists of transmitting the composite request to the first selected service provider, and in delegating to this one both the execution of the first service and the selection of the provider of the next service. When the execution is completed, the provider of this service passes the results of the service execution and the composite request to the next provider. In the end, the last provider returns the results to the device that has initiated the composite request. In contrast, in the orchestration-based invocation of a composite service, the composite request is never transmitted to other service providers, and there is no delegation of service invocation: the providers are selected and invoked only by the very device that has initiated the invocation of the composite service. These two approaches, which can be complementary according to the network topology and to the distribution of services on the devices forming the network, are detailed in the Section 4 considering two parameters, namely the execution time and the success ratio of an invocation request of a composite service.

3.6. Partial Execution of Composite Services and Recovery

Executions of composite services are subject to unpredictable and frequent failures due to the mobility and the volatility of the devices forming the opportunistic networks. A failure is detected when a device responsible for the execution of a composite service has no longer reference to an elementary service that is a part of the composite service. The reference/description of this service may have indeed been removed from the local service registry because the device has no longer information about the device providing this service. This deletion can be done during the execution of the composite service. When the failure is detected, the composite service is removed from the local registry in order to no longer be advertised and considered as available. Moreover, the result of the partial execution of the composite service is returned to the device responsible for the execution of the parent composite service, or to the client that has invoked the “main” composite service. This propagation of the failure and of the partial results are done recursively until finding a device able to recover the execution or until reaching the service client, thus backtracking the execution of composite services one after the other. A recovery is triggered, and the propagation of the failures and of the intermediate results are stopped, when a device involved in the composition process can substitute a faulty service by another one. The partial results make it possible for a device to invoke the alternative service with the results that have been previously computed, thus avoiding to restart the invocation of a composite service from the beginning. Figure 3 illustrates a composite service invocation failure and recovery situation. In this figure, we consider a scenario in which device D 1 is invoking a composite service provided by device D 2 . This composite service is composed of both an elementary service provided by D 2 itself and by a composite service provided by device D 3 . The composite service provided by D 3 is composed of two elementary services: one provided by D 3 itself and another one provided by device D 4 . In this scenario, we also suppose that D 4 has moved and D 3 has remained stationary, and that the description related to the service provided by D 4 has been removed from the registry of D 3 while this one was executing the service, thus causing a failure in the execution of the composite service. As shown in Figure 3, this failure is propagated to the parent composite service provided by D 2 with the partial execution result of the composite service provided by D 3 (i.e., with the result of the execution of the elementary service provided by D 3 ). In the scenario depicted in Figure 3, D 4 appears in the neighborhood of D 2 and the service provided by D 4 is added in the registry of D 2 . Thanks to the partial result it has obtained from D 3 , D 2 can recover the invocation by invoking the service provided by D 4 . Doing so, it can return the result to the client service on D 1 . It must be noticed that in this scenario we have considered that the recovery is done using the service provided by D 4 , but another instance of the same service provided by another device could be used, as we assume a certain service redundancy in the opportunistic network.

4. Composite Service Execution: A Multi-Strategy Solution

The composition system we have designed dynamically selects the most efficient and reliable invocation strategy of composite services (i.e., the choreography-based or the orchestration-based strategy) according to two criteria of quality of service: the success ratio of a composite request, and its execution time. These two criteria are transposed to the selection of service providers that must be enrolled in an invocation process of a composite service. Providers are thus selected according to an estimation of the time needed to reach them, and to an estimation of the ratio of successful transmissions. These estimations are computed by a utility function. In the rest of this section, we present two implementations of this function, and how they are used.

4.1. Selection of Providers

Service providers are selected by the utility function φ defined as follows:
φ ( S i ) = P j , f ( P j ) = m a x ( f ( P l ) ) , P l R [ S i ] f ( x ) = μ t ( x ) + ( 1 μ ) × s ( x )
In this formula, P j is the provider having the highest value calculated by the sub-function f among the providers that offer service S i (identified by R [ S i ] in the above formula, where R stands for the local registry). Function f computes a value based on the estimation of the time needed to reach a provider and on the estimation to reach that provider successfully. These estimations are respectively noted t ( x ) and s ( x ) for provider x. Parameter μ makes it possible to promote one quality of service parameter to the detriment of the other. t ( x ) and s ( x ) are computed either from temporal or geographical information. Hereafter, we show how these values are calculated.
Moreover, if the computed value of f for a given provider is lower than a certain threshold, the entry, in the service registry that corresponds to this provider, is removed. Likewise, we only consider providers that are relevant.

4.1.1. Time-Based Implementation of the Utility Function

The time needed to send a service request to a provider is estimated on the basis of the average of the transmission delays of the service advertisements broadcast by the provider. The success ratio of a transmission is the proportion of advertisements received by the local host among the advertisements emitted by a provider. To estimate this ratio, we assume that all devices send service advertisements with the same period of time (noted δ in the formulas hereafter). The time-based utility function we have defined operates on a sliding window of k values (i.e., we only consider the last k advertisements that are received by the local host). The estimated time t and the success ratio s for provider P are therefore formally defined by:
t ( P ) = i = 1 k ( β i P α i P ) k
s ( P ) = k 1 + i = 2 k ( ( β i P β i 1 P ) / δ ) = k 1 + ( ( β k P β 1 P ) / δ )
where α i p and β i p are respectively the emission time and the reception time of the i t h advertisement received from provider P. By computing an average of the transmission delays instead of considering only the last one, we promote, to the detriment of the providers that are met in fleeting way, those that are reached the most frequently with a minimum of delay either directly or via intermediate devices.

4.1.2. Location-Based Implementation of the Utility Function

When sending an advertisement, the composition system includes in this advertisement the location of the local host. Doing so, the devices receiving this advertisement can compare their own location with that of the provider. Similarly to the previous utility function, this function operates on the last k advertisements received from a given provider. This function computes an estimation of the transmission delay considering the average of the distances between a provider and the local host. By computing the average of the distances between the local host and a provider instead of considering only the last advertisement of that provider, we promote the providers that are the closest to the local host during a given period of time instead of those that are briefly close. The estimation of the time needed to reach service provider P is equal to the reception delay of advertisement i, such that the distance d i P between the local host and the provider is the closest to the average of the distances traveled by the k advertisements received by the local host:
t ( P ) = ( β i P α i P ) , d i P l = 1 k d l k , i [ 1 , k ]
To estimate the success ratio of a transmission between a client and a provider, we consider the k last advertisements received by a (local) client from a provider, and we compute the average of the distances between them based on their respective location at emission time and at reception time. The probability of reaching a provider usually decreases when the distance between the local device and the provider increases. That is why we have defined the success estimation function as a multiplicative inverse function, shifted to the left by -1, which takes d P as a parameter. This function returns a value close to 1 when d P is small and a value close to 0 when d P is big. It is defined as follow:
s ( p ) = 1 1 + d p , d P = j = 1 k d j p k

4.2. Invocation of Composite Services

Hereafter, we present both the estimations of the execution time and of the success ratio of an invocation of a composite service for the two strategies implemented in our composition system. For that, let us consider a composite request C of n services identified respectively by S i , i [ 1 , n ] , a set of m providers that offer one or several services. Let us also consider that composite request C is emitted by a requester Λ .

4.2.1. Estimation of the Execution Time

The invocation/execution time of a composite service C is defined for the orchestration-based strategy by:
τ ( C ) = i = 1 n 2 t Λ ( P l ) , P l = φ Λ ( S i )
where P l is the provider of the service S i that has been selected by the utility function φ . In the orchestration-based strategy, the response must be returned to the device Λ that has initiated the composite request. Thus, the time t Λ ( P l ) is multiplied by 2 to consider this round trip.
Concerning the choreography-based strategy, the estimation of the execution time of a composite request is defined by:
τ ( C ) = t Λ ( P 1 ) + i = 1 n 1 t P i ( P i + 1 ) + t P n ( Λ ) P 1 = φ Λ ( S 1 ) P i + 1 = φ P i ( S i + 1 )
where t Λ ( P 1 ) is the estimation of the time needed to send the composite request from the requester Λ to the first provider, t P n ( Λ ) is the estimation of the time needed to send the result of the composite request from the provider P n of the last service S n to the composite requester Λ . The rest of the formula τ ( C ) is the sum of the estimations of intermediate execution times, where t P i ( P i + 1 ) is the estimation of the time needed to send the composite request from the provider P i to the next provider P i + 1 .
It must be noticed that these estimations are in practice computed recursively and set as a quality of service parameter in the description of each composite service (the parameter is stored in the set of parameters Q, see Section 3.1).

4.2.2. Estimation of the Success Ratio

As mentioned before, in the orchestration-based strategy, the response of each service invocation is returned to the requester Λ . Thus, the estimation of the success of an orchestration-based invocation of a composite request is defined as the product of the square of the transmission success estimation of a request from the requester Λ to the providers enrolled in the invocation process. This estimation is defined by:
γ ( C ) = i = 1 n s Λ ( P l ) 2 , P l = φ Λ ( S i )
Regarding the choreography-based strategy, the estimation of the success of an execution is defined as the product of the transmission success estimation of a request from the requester Λ to the first provider ( P 1 ) with the transmission success estimation of the execution result from the last provider ( P n ) to the requester Λ , and with the intermediate transmission success estimations.
γ ( C ) = s Λ ( P 1 ) × s P n ( Λ ) × i = 1 n 1 s P i ( P i + 1 ) P 1 = φ Λ ( S 1 ) P n = φ P n 1 ( S n ) P i + 1 = φ P i ( S i + 1 )

5. Evaluation of the Composition System

5.1. Rationale

The entire service-oriented platform described in this paper has been implemented on smartphones running Android and allowed us to run a few field experiments, at a small scale. These experiments give us confidence on the actual feasibility of our approach but cannot be easily reproduced nor parameterized in order to properly evaluate the service composition system we propose.
Our main objective is to evaluate the two implementations of the utility function that is at the basis of the provider selections, and the advantage of having a system capable of dynamically choosing the most suitable strategy (choreography or orchestration) according to the network topology. Evaluating this is not an easy task as the composition system is obviously dependent on the other components of the service-oriented middleware platform.
Our approach for this evaluation is based on emulation: the largest part of real code that implement our system is used and the rest of the system is simulated. We use the LEPTON emulator [31] for conducting the evaluation (see [31] for a detailed description of the advantages of the emulation approach in opportunistic computing). This allows us to run the same code as the one we deployed on Android mobile devices for almost all the service middleware platform (the C3PO opportunistic networking layer as well as the service provision layer and the service composition layer), while remaining simulated the mobility of nodes, the D2D radio communication, and the application behavior.
We tried to be reasonably realistic when applying simulation. Although there are multiple situations in which our service platform could be used, we focused our evaluation on handheld devices powerful enough to run the platform (typically smartphones or nano computers), namely for practical reasons, and because there are generic enough to encompass a wide range of applications in which opportunistic networking is a necessity and the volume of data exchanged could be high (of the order of mega-bytes per transmission). Admittedly, some interesting networks and applications, such as networks of low-power devices communicating with Bluetooth LE or LoRa for monitoring purposes are de facto excluded, but they often involve few mobility and consequently comes less down to opportunistic computing. As far as the mobility of nodes is concerned, we considered a synthetic mobility model as well as traces reflecting a real scenario. Several applicative behaviors were chosen, associated with some randomization, with a number of services that is, in our opinion, significant at least on a medium scale. As for D2D communication, we did not choose to be very abstract, as it is often done for example with many evaluations with The One simulator [32], but rather strive to simulate as closely as possible a D2D communication that proved to be effective in the field. As Wifi-Direct and Bluetooth are the two available technologies in off-the-shelf mobile devices, we have carried out preliminary experiments to compare them and select the one we would simulate. The results we have obtained are given in Table 1. Connection time with Wi-Fi Direct is higher but this is compensated by the fact that the radio range with Wi-Fi Direct is significantly greater than with Bluetooth (at a speed of 2 m/s, a mobile node travels 20 m during the 10 s separating the difference of connection times, which does not reach the 110 m that separates the two radio ranges). So, and a fortiori if we consider throughput, Wifi-Direct is a better choice (as far far as energy consumption is not a prior concern).
So we have developed a module in LEPTON that simulates communication according to the distance between devices, and that respects the behavior of Wi-Fi direct communication entities, taking into account latencies in group formations. Indeed, Wi-Fi Direct organizes devices in communication groups. Each group is managed by a group owner (GO) that plays the role of a soft access point. A given device can only communicate with its group members and two GOs cannot be connected together. Thus, in order to exchange data with a device of another group, a device must leave its current group and join the group of the other device.

5.2. Evaluation Setup

Two different scenarios involving 200 people have been considered. The people either move around according to the Levy walk mobility model in an open area of 500 × 500 m, or attend a running event in the city of Vannes in France, moving in this case along predetermined paths.
The applicative behavior is the following. A fixed number of distinct services G is considered in an experiment. On each device are deployed L instances of services chosen randomly among the G ones. As N = 200 devices participate in the experiment, a service is provided redundantly by L × N / G instances in average. All along the experiment, compositions are automatically computed according to the discovery of services, considering that the user is interested in all the G services. Repeatedly, a composition that comprises C services is chosen randomly among the current computed ones, and the device launches the corresponding composite service request.
The evaluation is based on two metrics: the composition success ratio (that is, the ratio of composite service executions that have successfully ended) and the composition time (that is, the time between the launching of the composite service execution and the reception of the result of the last service in the composition). Each experiment has been repeated at least 10 times with the parameters specified in Table 2. The performances of the utility functions and of the invocation strategies are evaluated by varying the maximum number of hops between the service client and service provider (evaluation E 1 in Table 3), the number of services per experiment G (evaluation E 2 in Table 3) and the number of services per composition C (evaluation E 3 in Table 3).

5.3. Success Ratio of Composite Request Execution

Figure 4 shows the success ratio against the maximum number of hops between the service clients and the service providers for both utility functions and both invocation strategies. When the maximum number of hops increases, the success ratio decreases regardless of the strategy and the utility function. This is the result of the additional disruptions occurring between intermediate devices when the number of hops increases. We can observe that the executions relying on the location-based utility function (LUF) are less affected than the executions performed with the time-based utility function (TUF). This can be explained by the fact that closer providers are selected and enrolled in the invocation process. Indeed, disruptions between closer devices occur more rarely than between devices that are at the limit of their radio range. Moreover, closer mobile devices can meet together and can recover execution of composite services more quickly, thus increasing the success ratio of invocations. For example, in the open area scenario, the orchestration-based strategy (OS) relying on the LUF has an invocation success ratio between 72% and 76% against between 60% and 74% for the TUF. The choreography-based strategy (CS) provides an invocation success ratio between 64% and 71% with the LUF against between 54% and 63% with the TUF. Moreover, we notice that the success ratio is better in the sport event scenario, because the mobility of people is constrained as they move along the running path.
Figure 5 shows the success ratio against the number of services per composite request. The invocation success ratio decreases when the number of services to compose increases, because the number of failures (or interruptions) in the invocation processes increases with the number of services. In our scenarios, the failures or the interruptions are mainly induced by the mobility of the devices. Like in the first evaluations, the configuration that provides the better success ratio is the orchestration-based strategy with the LUF. The reasons are the same as those related to the variation of the number of hops. For example in the open area scenario, the orchestration–based strategy provides an invocation success ratio between 35% and 71% with the LUF, and between 25% and 64% with the TUF. In the sport event scenario, the gap between the two strategies and the two utility functions is reduced, and the ratio is better than in the open area scenario, due to the mobility of people being constrained by the running path, as mentioned before. Therefore it is easier to meet service providers.
Figure 6 shows the success ratio against the number of services per experiment. Both strategies and both utility functions present the same trend. Indeed, the invocation success ratio stays fairly constant until the number of services per experiment reaches 25 services. Beyond this value, the ratio decreases in a substantial way. For instance in the sport event scenario, the orchestration-based strategy combined with the TUF provides an invocation success ratio of approximately 80% when the number of services per experiment is between 10 and 20. This ratio falls drastically between 40% and 50% when the number of services exceeds 20 services. This decrease is explained by the fact that the number of instances of a same service is lower in the network since the number of services deployed in the devices remains constant and the number of types of services increases. The probability of invoking a service provider successfully is consequently lower. It must be noticed that, once again, the LUF offers a greater invocation success ratio than the TUF regardless of the invocation strategy. With the LUF, the success ratio is between 34% and 70%, whereas with the TUF the success ratio is between 23% and 61%.

5.4. Execution Time of Composite Request

Figure 7 shows the median value of the execution time against the maximum number of hops between the clients and the providers. The CS outperforms the OS regardless of the utility function and the scenario. This important gap between the two strategies is mainly due to their running principle, but also to the process of formation of groups in Wi-Fi Direct. Indeed as mentioned previously in this paper, with the OS, the composite request remains on the device that has produced this request, and this one selects and invokes the service providers it has discovered and that must be enlisted in an invocation. As shown in [6], with the OS and the communication technology we consider, the providers enrolled in an invocation are mainly one hop neighbors (i.e., by the Wi-Fi Direct group owners). This difference between the CS and the OS, is more significant when the maximum number of hops of messages is limited to one, because the device that has produced the composite request can only access its local services and those offered by its group owner in its Wi-Fi Direct group. Thus to complete an invocation, this device must often leave a group and join another one in order to invoke the rest of services. The CS does not have such limitations, even with a maximum number of hops equal to one, since the composite request is transmitted from one provider to another until the invocation is completed. For instance, with a maximum number of hops equal to one, a requester, which is a client of a group owner, can delegate the invocation to its group owner, and this one can delegate, in turn, the rest of the invocation to one of the providers hosted by its clients. Moreover, with the CS, intermediate responses are not returned to the requester, thus reducing the number of exchanges and the time between two successive invocations of services. Figure 7 also shows that when the maximum number of hops increases, the execution time of an invocation increases too. Indeed, when services to invoke are not available in the current communication group, the requester or the current provider should leave and joins another group where the next service is available. The process of leaving, traveling, and joining another group introduces additional delays.
Figure 8 shows the median of execution time of an invocation against the number of services per composite request. The median of the invocation time increases logically and inevitably as the number of services listed in a service composite request increases. We can also observe that this median grows significantly for 6 services per composition. The explanation of this variation resides in the fact that is more difficult to find the sixth service locally or on the close devices, especially for the OS. Indeed, 6 different services are chosen among the 20 existing ones to define the composite requests, knowing that 5 services among the 20 ones are deployed on each devices. Like in Figure 7, we can see that the CS offers better execution times than the OS regardless the number of services per composition and the utility function. The reasons are the same as those detailed in the previous paragraph.
Figure 9 presents the average of invocation time against the number of services per experiment. The number of instances of a same service available in the network decreases, as the number of types of services increases while the number of services deployed on the devices remains the same. The probability of discovering and invoking a required service is therefore lower, and the invocation time higher. Moreover, with the OS, the difference between the execution time of the invocation obtained with the TUF and the LUF seems to not be significant, whereas with the CS the difference is observable. CS combined with the TUF provides better performances than if it is combined with the LUF, because with LUF we select the service providers that are on average close to the service clients. These providers do not necessarily provide on average the best service invocation time.
We conclude that the location information helps make composite service invocations more reliable, but it does not help select the providers that offer the shortest invocation times. Moreover, the OS guarantees a higher success ratio than the CS, whereas, from the invocation time perspective, the CS proved to be significantly faster than the OS.

6. Conclusions

Device-to-device communication (D2D) is receiving more attention as direct communication between nearby devices through short-range wireless interfaces offers new data exchange schemes, which could help supporting the ever-growing data traffic, while simultaneously increasing the computing pervasiveness of our physical environment. This kind of communication allows users to exploit directly, or through intermediate devices, the resources offered by the devices populating this environment, resources that are usually made exploitable through services. Due to the limited resources of the devices, applications designed to be used in such environments are generally developed as a combination of basic services that are distributed over a collection of devices. But the connectivity disruptions induced by device mobility and sleep phases hinder end-to-end communications, and therefore jeopardize the reliable overall execution of applications. Opportunistic networking techniques make it possible to cope with these connection disruptions, but they introduce, in return, delays in the exchange of data. In such a context, and assuming that a same service may be offered by several providers in the network, it is important to select the right providers enrolled in the execution of a composite service so as to reduce as much as possible the invocation time, while keeping a certain level of execution reliability.
In this paper, we have presented a service composition system that leverages service redundancy to improve the execution of applications designed as an assembly of composites services in opportunistic networks. This system implements an automatic composition of services from discovered services, according to the users’ interests. In contrast to related works presented in Section 2, which only consider choreography-based invocations of composite services, the invocation process of a composite service in our system can follow two different strategies, based on orchestration or choreography. Like in [8,20,22,23], invocations of composite services can be recovered from partial failures. A key feature of the composite service invocation process is the ability to select the best provider at each step. To do so, [18,19,20] consider the mobility pattern of devices and their colocation duration. In [23], the service execution times and an estimation of the remaining execution path’s reliability help select providers, while in [5] this is the minimum time needed to send data from one node to another and the service load. In this paper, we have investigated two alternative implementations of a utility function at the basis of this service selection: one based on location and the other based on the reception times of the service advertisements emitted by service providers. These two implementations make it possible to take into account the nodes’ colocation property, an estimation of the time needed to invoke a remote service provider and an estimation of the success rate of a service invocation. These two implementations can serve both the orchestration and the choreography invocation strategies.
The evaluation of the composition system shows that there is no better invocation strategy than the other, and that both have their advantages and their drawbacks according to the network topology and service distribution. For instance, the choreography strategy combined with the time-based implementation provides a shorter execution time, while the orchestration strategy combined with the location-based implementation offers the best success ratio of composition. Thus, these results show that a relevant future work would be to weave the orchestration and the choreography invocation strategies when invoking a composite service, so that, at each step of a composition, the more efficient strategy could be applied.

Author Contributions

Conceptualization, N.L.S., F.B.; Software, F.B., N.L.S., Y.M.; Data curation, F.B.; Investigation, F.B., N.L.S., Y.M.; Supervision, N.L.S., Y.M.; Validation, N.L.S., Y.M.; Writing—original draft, N.L.S., Y.M.; Writing—review & editing, N.L.S., Y.M.; Funding Acquisition, N.L.S., Y.M. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Mota, V.F.S.; Cunha, F.D.; Macedo, D.F.; Nogueira, J.M.S.; Loureiro, A.A.F. Protocols, Mobility Models and Tools in Opportunistic Networks: A Survey. Comput. Commun. 2014, 48, 5–19. [Google Scholar] [CrossRef]
  2. Makke, A.; Mahéo, Y.; Le Sommer, N. Towards Opportunistic Service Provisoning in Intermittently Connected Hybrid Networks. In Proceedings of the 4th International Conference on Networking and Distributed Computing (ICNDC 2013), Honk Kong, China, 21–24 December 2013; IEEE: Piscataway, NJ, USA, 2013; pp. 28–32. [Google Scholar]
  3. Le Sommer, N.; Ben Sassi, S. Location-based Service Discovery and Delivery in Opportunistic Networks. In Proceedings of the 9th International Conference on Networks (ICN 2010), Les Ménuires, France, 11–16 April 2010; IEEE: Piscataway, NJ, USA, 2010; pp. 179–184. [Google Scholar]
  4. Le Sommer, N.; Said, R.; Mahéo, Y. A Proxy-based Model for Service Provision in Opportunistic Networks. In Proceedings of the 6th International Workshop on Middleware for Pervasive and Ad-hoc Computing (MPAC’08), Louvain, Belgium; ACM: New York, NY, USA, 2008. [Google Scholar]
  5. Sadiq, U.; Kumar, M.; Passarella, A.; Conti, M. Service Composition in Opportunistic Networks: A Load and Mobility Aware Solution. IEEE Trans. Comput. 2015, 84, 2308–2322. [Google Scholar] [CrossRef]
  6. Baklouti, F.; Le Sommer, N.; Mahéo, Y. Choreography-based vs Orchestration-based Service Composition in Opportunistic Networks. In Proceedings of the 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2017), Rome, Italy, 9–11 October 2017; IEEE: Piscataway, NJ, USA, 2017. [Google Scholar]
  7. Conti, M.; Marzini, E.; Mascitti, D.; Passarella, A.; Ricci, L. Service Selection and Composition in Opportunistic Networks. In Proceedings of the 9th International Wireless Communications and Mobile Computing Conference (IWCMC 2013), Cagliari, Italy, 1–5 July 2013; IEEE: Piscataway, NJ, USA, 2013; pp. 1565–1572. [Google Scholar]
  8. Groba, C.; Clarke, S. Opportunistic Composition of Sequentially-Connected Services in Mobile Computing Environments. In Proceedings of the International Conference on Web Services (ICWS 2011), Washington, DC, USA, 4–9 July 2011; IEEE: Piscataway, NJ, USA, 2011; pp. 17–24. [Google Scholar]
  9. Lemos, A.L.; Daniel, F.; Benatallah, B. Web Service Composition: A Survey of Techniques and Tools. ACM Comput. Surv. 2016, 48, 1–41. [Google Scholar] [CrossRef] [Green Version]
  10. Garriga, M.; Mateos, C.; Flores, A.; Cechich, A.; Zunino, A. RESTful service composition at a glance: A survey. J. Netw. Comput. Appl. 2016, 60, 32–53. [Google Scholar] [CrossRef]
  11. Aoudia, I.; Benharzallah, S.; Kahloul, L.; Kazar, O. Service composition approaches for Internet of Things: A review. Int. J. Commun. Netw. Distrib. Syst. 2019, 23, 194–230. [Google Scholar]
  12. Deng, S.; Xiang, Z.; Yin, J.; Taheri, J.; Zomaya, A.Y. Composition-Driven IoT Service Provisioning in Distributed Edges. IEEE Access 2018, 6, 54258–54269. [Google Scholar] [CrossRef]
  13. Hamzei, M.; Jafari Navimipour, N. Toward Efficient Service Composition Techniques in the Internet of Things. IEEE Internet Things J. 2018, 5, 3774–3787. [Google Scholar] [CrossRef]
  14. Ben-Sassi, N.; Dang, X.T.; Fähndrich, J.; Görür, O.C.; Kuster, C.; Sivrikaya, F. Service Discovery and Composition in Smart Cities. In Proceedings of the 30th International Conference on Advanced Information Systems Engineering (CAiSE 2018), Tallinn, Estonia, 11–15 July 2018; Springer: Berlin/Heidelberg, Germany, 2018; Volume 317, pp. 39–48. [Google Scholar]
  15. Ibrahim, N.; Le Mouël, F. A Survey on Service Composition Middleware in Pervasive Environments. Int. J. Comput. Sci. Issues 2009, 1, 1–12. [Google Scholar]
  16. Barakat, L.; Miles, S.; Luck, M. Adaptive composition in dynamic service environments. Future Gener. Comput. Syst. 2018, 80, 215–228. [Google Scholar] [CrossRef] [Green Version]
  17. Younes, W.; Trouilhet, S.; Adreit, F.; Arcangeli, J.P. Towards an Intelligent User-Oriented Middleware for Opportunistic Composition of Services in Ambient Spaces. In Proceedings of the 5th Workshop on Middleware and Applications for the Internet of Things (M4IoT 2018), Rennes, France, 10–14 December 2018; ACM: New York, NY, USA, 2018; pp. 25–30. [Google Scholar]
  18. Del Prete, L.; Capra, L. Reliable Discovery and Selection of Composite Services in Mobile Environments. In Proceedings of the 12th Enterprise Distributed Object Computing Conference (EDOC’08), Munich, Germany, NJ, USA, 15–19 September 2008; IEEE: Piscataway, NJ, USA, 2008; pp. 171–180. [Google Scholar]
  19. Wang, J. Exploiting Mobility Prediction for Dependable Service Composition in Wireless Mobile Ad Hoc Networks. IEEE Trans. Serv. Comput. 2011, 4, 44–55. [Google Scholar] [CrossRef]
  20. Kalasapur, S.; Kumar, M.; Shirazi, B. Seamless Service Composition (SeSCo) in Pervasive Environments. In Proceedings of the 1st International Workshop on Multimedia Service Composition (MSC’05), Hilton, Singapore; ACM: New York, NY, USA, 2005; pp. 11–20. [Google Scholar]
  21. Deng, S.; Huang, L.; Taheri, J.; Yin, J.; Zhou, M.; Zomaya, A.Y. Mobility-Aware Service Composition in Mobile Communities. IEEE Trans. Syst. Man, Cybern. Syst. 2017, 47, 555–568. [Google Scholar] [CrossRef]
  22. Jiang, S.; Xue, Y.; Schmidt, D.C. Minimum disruption service composition and recovery in mobile ad hoc networks. Comput. Netw. 2009, 53, 1649–1665. [Google Scholar] [CrossRef] [Green Version]
  23. Groba, C.; Clarke, S. Opportunistic Service Composition in Dynamic Ad Hoc Environments. IEEE Trans. Serv. Comput. 2014, 7, 642–653. [Google Scholar] [CrossRef]
  24. Groba, C.; Clarke, S. Synchronising Service Compositions in Dynamic Ad Hoc Environments. In Proceedings of the 1st International Conference on Mobile Services (MS’12), San Francisco, HI, USA, 21–24 September 2012; IEEE: Piscataway, NJ, USA, 2012; pp. 56–63. [Google Scholar]
  25. Chen, N.; Cardozo, N.; Clarke, S. Goal-Driven Service Composition in Mobile and Pervasive Computing. IEEE Trans. Serv. Comput. 2018, 11, 49–62. [Google Scholar] [CrossRef] [Green Version]
  26. Chen, N.; Clarke, S. A Dynamic Service Composition Model for Adaptive Systems in Mobile Computing Environments. In Proceedings of the 12th International Conference on Service-Oriented Computing (ISCOC 2014), Paris, France, 3–6 November 2014; Springer: Berlin/Heidelberg, Germany, 2014; pp. 93–107. [Google Scholar]
  27. Le Sommer, N.; Launay, P.; Mahéo, Y. A Framework for Opportunistic Networking in Spontaneous and Ephemeral Social Networks. In Proceedings of the 10th MobiCom Workshop on Challenged Networks (CHANTS 2015), Paris, France, 11 September 2015; ACM: New York, NY, USA, 2015; pp. 1–4. [Google Scholar]
  28. W3C. Web of Things (WoT) Thing Description. In W3C Candidate Recommendation; MIT Press: Cambridge, MA, USA, 2019. [Google Scholar]
  29. ETSI. ETSI Technical Specification 103 264 v1.1.1. 2015. Available online: https://www.etsi.org/deliver/etsi_ts/103200_103299/103264/01.01.01_60/ts_103264v010101p.pdf (accessed on 24 March 2020).
  30. Rijgersberg, H.; Van Assem, M.; Top, J. Ontology of Units of Measure and Related Concepts. Semant. Web J. 2013, 4, 3–13. [Google Scholar] [CrossRef]
  31. Sánchez-Carmona, A.; Guidec, F.; Launay, P.; Mahéo, Y.; Robles, S. Filling in the missing link between simulation and application in opportunistic networking. J. Syst. Softw. 2018, 142, 57–72. [Google Scholar] [CrossRef] [Green Version]
  32. Keränen, A.; Ott, J.; Kärkkäinen, T. The ONE simulator for DTN protocol evaluation. In Proceedings of the 2nd International Conference on Simulation Tools and Techniques (SIMUTools’09), Rome, Italy, 2–6 March 2009. Number 55. [Google Scholar]
Figure 1. Overall architecture of the service-oriented middleware platform.
Figure 1. Overall architecture of the service-oriented middleware platform.
Information 11 00180 g001
Figure 2. Example of service compositions.
Figure 2. Example of service compositions.
Information 11 00180 g002
Figure 3. Illustration of a recovery situation.
Figure 3. Illustration of a recovery situation.
Information 11 00180 g003
Figure 4. Success ratio against the maximum number of hops between service clients and service providers.
Figure 4. Success ratio against the maximum number of hops between service clients and service providers.
Information 11 00180 g004
Figure 5. Success ratio against the number of services per composition.
Figure 5. Success ratio against the number of services per composition.
Information 11 00180 g005
Figure 6. Success ratio against number of services per experiment.
Figure 6. Success ratio against number of services per experiment.
Information 11 00180 g006
Figure 7. Median of invocation time against the number of hops between service clients and service providers.
Figure 7. Median of invocation time against the number of hops between service clients and service providers.
Information 11 00180 g007
Figure 8. Median of invocation time against the number of services per composition.
Figure 8. Median of invocation time against the number of services per composition.
Information 11 00180 g008
Figure 9. Average of invocation time against number of services per experiment.
Figure 9. Average of invocation time against number of services per experiment.
Information 11 00180 g009
Table 1. Measured performance of Wifi-Direct and Bluetooth using Motorola G4 mobile phones.
Table 1. Measured performance of Wifi-Direct and Bluetooth using Motorola G4 mobile phones.
Wifi-DirectBluetooth
Discovering time (average/median)4.1 s/4.5 s5.5 s/2.9 s
Connection time (average/median)15.6 s/13.2 s5.7 s/2.9 s
Max throughput54 Mb/s2 Mbit/s
Max radio range (in open area)180 m70 m
Radio range average (in presence of obstacles: buildings, cars, ...)52 m15 m
Table 2. Parameters common to all evaluations.
Table 2. Parameters common to all evaluations.
ParameterValue(s)
Open area size500 m × 500 m
%hline Interval between composite service requestsbetween 2 and 5 min
Evaluation duration1 h
Number of nodes (N)200
Radio range80 m
Service advertisement period10 s
Speed rangebetween 0.5 and 2 m/s
Table 3. Parameters varying according to the evaluations.
Table 3. Parameters varying according to the evaluations.
ParameterValue(s)
E 1 E 2 E 3
Maximum number of hops1, 2, 322
Number of local service instances (L)555
Number of services per request (C)443,4,5,6
Number of services per experiment (G)2010, 15, 20, 25, 3020

Share and Cite

MDPI and ACS Style

Le Sommer, N.; Mahéo, Y.; Baklouti, F. Multi-Strategy Dynamic Service Composition in Opportunistic Networks. Information 2020, 11, 180. https://doi.org/10.3390/info11040180

AMA Style

Le Sommer N, Mahéo Y, Baklouti F. Multi-Strategy Dynamic Service Composition in Opportunistic Networks. Information. 2020; 11(4):180. https://doi.org/10.3390/info11040180

Chicago/Turabian Style

Le Sommer, Nicolas, Yves Mahéo, and Fadhlallah Baklouti. 2020. "Multi-Strategy Dynamic Service Composition in Opportunistic Networks" Information 11, no. 4: 180. https://doi.org/10.3390/info11040180

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop