service discovery in wireless ad-hoc control networks

8
University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2005 Service discovery in wireless ad-hoc control networks Shengrong Bu University of Wollongong F. Naghdy University of Wollongong, [email protected] Research Online is the open access institutional repository for the University of Wollongong. For further information contact the UOW Library: [email protected] Publication Details is article was originally published as: Bu, S. & Naghdy, F., Service discovery in wireless ad-hoc control networks, Proceedings of the 2005 International Conference on Intelligent Sensors, Sensor Networks and Information Processing, 5-8 December 2005, 157-162. Copyright IEEE 2005.

Upload: others

Post on 19-Mar-2022

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Service discovery in wireless ad-hoc control networks

University of WollongongResearch Online

Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences

2005

Service discovery in wireless ad-hoc controlnetworksShengrong BuUniversity of Wollongong

F. NaghdyUniversity of Wollongong, [email protected]

Research Online is the open access institutional repository for the University of Wollongong. For further information contact the UOW Library:[email protected]

Publication DetailsThis article was originally published as: Bu, S. & Naghdy, F., Service discovery in wireless ad-hoc control networks, Proceedings of the2005 International Conference on Intelligent Sensors, Sensor Networks and Information Processing, 5-8 December 2005, 157-162.Copyright IEEE 2005.

Page 2: Service discovery in wireless ad-hoc control networks

Service discovery in wireless ad-hoc control networks

AbstractA new concept in distributed control systems called Wireless Ad-hoc Control Networks (WACNets) isdeveloped. WACNets is formed by a collection of nodes with the ability to sense, actuate and control. Thenetwork does not have a fixed structure, but evolves and self organises itself according to the controlrequirements of the system. The service discovery developed for WACNets is reported. A review of theexisting Service Discovery Protocol (SDPs) including Jini, Salutation, Universal Plug and Play (UPnP), andBluetooth technology is carried out. An overview of WACNets is provided. The service discovery protocoldeveloped for WACNets is introduced and its characteristics are described. Some results are provided.

DisciplinesPhysical Sciences and Mathematics

Publication DetailsThis article was originally published as: Bu, S. & Naghdy, F., Service discovery in wireless ad-hoc controlnetworks, Proceedings of the 2005 International Conference on Intelligent Sensors, Sensor Networks andInformation Processing, 5-8 December 2005, 157-162. Copyright IEEE 2005.

This conference paper is available at Research Online: http://ro.uow.edu.au/infopapers/233

Page 3: Service discovery in wireless ad-hoc control networks

Service Discovery in Wireless Ad-hoc ControlNetworks

Shengrong Bu, Fazel NaghdySchool ofElectrical, Computer and Telecommunication Engineering,

University of Wollongong, Wollongong, Australia, 2522Email: [email protected], [email protected]

Abstract

A new concept in distributed control systems called WirelessAd-hoc Control Networks (WA CNets) is developed. WACNetsis formed by a collection of nodes with the ability to sense,actuate and control. The network does not have a fixedstructure, but evolves and self organises itself according tothe control requirements of the system. The service discoverydevelopedfor WACNets is reported. A review of the existingService Discovery Protocol (SDPs) including Jini, Salutation,Universal Plug and Play (UPnP), and Bluetooth technologyis carried out. An overview of WACNets is provided. Theservice discovery protocol developed for WACNets isintroduced and its characteristics are described. Some resultsare provided.

1. INTRODUCTION

With the advent of mobile computing and wirelesscommunication, wireless ad-hoc networks are becomingfeasible and attractive. Such systems represent peer to peerwireless communication among intelligent devices withoutany fixed infrastructure. The peers form a network of variousdevices including sensors, actuators, appliances, PDAs,laptops, etc. With the increasing number of services,automatic service discovery plays an essential role in ad hoccommunications, where no fixed infrastructure is present butthe nodes themselves form the network.

This paper reports a service discovery protocol developedfor Wireless Ad-hoc Control Networks, a concept beingdeveloped by the authors for distributed control. WACNets isformed by a collection of nodes with the ability to sense,actuate and control. The network does not have a fixedstructure, but evolves and self organises itself according to thecontrol requirements of the system.WACNet explores a framework for organic, evolutionary

and scalable method of integrating a large number ofintelligent and heterogeneous nodes. Each node consists ofsensing and/or actuation, local intelligence and control, dataprocessing and communication components.The paper is organized into six sections including the

introduction. Section 2 provides a background on servicediscovery protocols. It highlights the characteristics of themost commonly used protocols in industry. Section 3 presentsa general overview of WACNets. Section 4 focuses on theService Discovery Protocol for WACNets. Section 5specifically describes the implementation of WACNet SDP.

Section 6 describes some results obtained from validation ofWACNet SDP. Section 7 draws some conclusion and outlinesfuture work possible.

2. BACKGROUND

Typically, service discovery involves clients, lookup ordirectory servers and service providers. Service DiscoveryProtocol (SDP) enables applications, network devices, andservices to advertise their capabilities to find otherapplications, network devices, and services to completespecified tasks [1]. Service registration and lookup are veryimportant components for most Service Discovery Protocols(SDPs). Currently, the most popular SDPs are SLP (ServiceLocation Protocol), Jini, Salutation, UPnP (Universal Plugand Play), and Bluetooth SDP [2].SLP [2], developed by the IETF SvrLoc working group,

aims to be a vendor-independent standard. It is designed forTCP/IP networks and is scalable up to large enterprisenetworks. The SLP architecture consists of three maincomponents: User Agents (UA), Service Agents (SA) andDirectory Agents (DA), which is not mandatory. In SLP, thefailure of the DA will lead to information loss and breakdownin service discovery.

Jini [2], developed by Sun Microsystems, is an extension ofthe programming language Java. It addresses the issue ofhowdevices connect with each other in order to form a simple adhoc network and how these devices provide services to otherdevices in the network. The fact that Jini is tightly tied to theprogramming language Java makes it dependent on theprogramming environment.

The Salutation [2] architecture is developed by theSalutation Consortium. Service discovery in Salutation isdefined at a higher layer, and the transport layer is notspecified. Salutation is also independent of the networktechnology and the programming language, and may run overmultiple infrastructures. The Salutation architecture consistsof Salutation Managers (SLMs) that have the functionality ofservice brokers. Services register their capabilities with anSLM, and clients query the SLM when they need a service.After discovering a desired service, clients are able to requestthe utilization of the service through the SLM.UPnP [2] is being developed by an industry consortium,

founded and lead by Microsoft. Its usage is proposed forsmall office or home computer networks, where differentdevices are able to automatically discover and utilize eachother. The main drawback of UPnP is that it depends on a

0-7803-9399-6/05/$20.00 © 2005 IEEE ISSNIP 2005157

Page 4: Service discovery in wireless ad-hoc control networks

specific network technology (TCP/UDP and IP). Also, anUPnP entity needs heavy resources to allow support forGENA and SOAP web servers, and XML parsing [2]. It ispurely peer-to-peer architecture and has potential to increasethe network traffic due to extensive use of multicastmessaging.

Bluetooth SDP [3] is based on the Piano platform byMotorola and has been modified to suit the dynamic nature ofan ad hoc network. SDP is used to locate services provided byor available via a Bluetooth device. Bluetooth SDP requiresan SDP server running on any device that is capable ofproviding services. The server maintains a set of servicerecords that contain a list of attributes. A Bluetooth deviceintending to use a service is called an SDP client.The SDPs like SLP, Jini and UPnP are designed with

traditional wired network, which have quite differentcharacteristics from wireless ad-hoc networks. The BluetoothSDP is based on connecting to a specific node and queryingabout its available services. When the network becomeslarger, the protocol of querying every single node in thenetwork about the possibly unavailable service wastes bothtime and resources. Various kinds of Service DiscoveryProtocols should therefore be developed for self-organizingad-hoc networks.

3. WACNETs OVERVIEW

The configuration and type of self-organizing ad-hocnetwork varies based on the characteristics and number ofnodes in the network and the applications of networks. In thispaper, Wireless ad-hoc Control Network is introducedbecause of its importance in application.

Wireless ad-hoc Control Networks (WACNets) aredesigned for distributed and remote monitoring and control.Such systems represent the next stage in the evolution of distributedcontrol and monitoring. Recent advances in mobile computing,wireless communications, MEMS-based sensor technology,low-powered analogue and digital electronics, and low-powerRF design have created opportunities for the introduction ofWACNets.WACNet explores a framework for organic, evolutionary

and scalable method of integrating a large number ofintelligent and heterogeneous nodes. Each node consists ofsensing and/or actuation, local intelligence and control, dataprocessing and communication components. The size, number,density, capabilities and location-dependency of such nodeswill be determined by the specific application for which thenodes are employed. Ideally they are expected to be low-cost,low-power, multi-functional and small in size.

True self-organization of the nodes and collaborationbetween them is a necessity in WACNet. This is determinedbased on the task expected to be carried out by a cluster ofnodes and the interaction they should perform with theirenvironment and other nodes to achieve that task.

In the proposed system, IEEE 1451 standards are employedbecause of their ability to provide self-identification, self-testing and adaptive calibration [4]. A combination of IEEE1451 compliant smart sensor and Bluetooth standard

implements several advanced features such as plug-n-playwhile maintaining minimum hardware overhead at thetransducer nodes.

In the proposed system, STIM uses a Bluetooth tocommunicate with an NCAP module, which is connected tothe network via a wired module. In this kind of network, themonitoring station can exist far away from the Plant (or at anypoint within the Internet.) The structure of wirelessimplementation ofIEEE 1451 in WACNet is shown in Fig. 1.

0

00

4etwork

XDCR: Transducer (Sensor - Actuator) InformationSTIM: Smart XDCR interface module Sink/DisplayNCAP: Network capable applicationTIl: XDCR Independent InterfaceBT: TX/RX Bluetooth transmitter/ receiverFig. 1. The Combining Model of IEEE 1451 and Bluetooth Standard

As illustrated, a STIM communicates with an NCAPmodule over a Bluetooth link. The TII protocol, whichdefines a form of communication between the STIM andNCAP, is implemented via Bluetooth. NCAP nodes areconnected to the local monitor and /or control system. Anoperator can monitor or control the whole system in real timethrough the local monitor system on demand. In order toachieve wide coverage for wireless STIM units over the spaceof a factory area, NCAP units could be distributed across anEthernet backbone.

According to IEEE 1451.2 standard, in each STIM node,TEDS consists of one Meta-TED that includes commoninformation for all the transducers and several channel-TEDSs with information about each transducer [5]. Theparameters of Meta TEDS and Channel-TEDS are redefinedto satisfy the need ofWACNets and provided in [6].

The configuration and type of WACNets varies based onthe number of STIMs and NCAPs present in the system.Accordingly, the structure of WACNets can be classified intothree different categories of one-layer cluster model, two-layer cluster model and multi-layer cluster model.The one-layer cluster model is the direct communication

model as illustrated by an example in Fig. 2. In this model,the nodes organize themselves into local clusters. Each clusterwhich consists of up to seven STIM slave nodes and oneNCAP master node is called a Piconet. NCAP receives datafrom STIMs in the cluster, performs data fusion, andtransmits the aggregated data to its own cluster or otherneighbouring cluster replacing the data.

In the example shown, Piconet 1 can perform a localizedcontrol function. In the piconet, the NCAP reports the localsensing and process information and control status to aremote Monitor when it is required. In Piconet 2, the NCAP

158

Page 5: Service discovery in wireless ad-hoc control networks

receives sensory data from STIM nodes, and then condensesthem before further transmission. Based on the broadcast datareceived from Piconet 2, NCAP in Piconet 3 activate theactuator in the piconet.

Piconet

STIM J* J(Actuatorj.

RemoteControl

STIM(Actuator)

Distributed Control

Monitor

STIM(Sensor)

Remote Sensing

Fig.2. One-Layer Cluster ofWACNets

The second type of WACNet can be employed in asituation where the number of STIM nodes are much largerthat the NCAP. In this mode, the STIMs organize themselvesinto local clusters and communication with NCAPs via theSTIM master nodes.

In the third type of WACNets, STIM nodes might bedistributed widely over a large area, and therefore some nodesmay not fall in the communication range of NCAPs asillustrated in Fig.3. In this example, Piconet 8 cannot directlycommunicate with the NCAPs.

Fig. 3. Piconet 8 has no direct access to NCAPs

In the WACNet, transmission (ETX,) and receiving energycosts ( ERX ) in each node are calculated as follows [7]:

ETX(k, d) = Eeleck + CampkdA (1)ER_, (k) = Eeleck (2)

where k is the length of the message in bits, d the distancebetween transmitter and receiver node and A the path-lossexponent ( Ai . 2 ), a factor that depends on the RFenvironment, and is generally between 2 and 4 for indoorenvironments, Eelec is the energy being dissipated to run the

transmitter or receiver circuitry and camp is the energydissipation of the transmission amplifier.

According to equation 1, transmission of data throughseveral short intermediate hops of data across different nodesis more energy efficient than using a long hop. Because ofthese advantages, the clustering and multi-hop routingalgorithm employed in this work employ data aggregationmethods to greatly reduce energy dissipation.

In this model, there are more a large number of STIMs inthe WACNet. Neighbouring nodes with common orcomplimentary functions form clusters. The clusters satisfydifferent requirements. For example, in a building, lightsensors need to update information back to monitor everyseveral minutes. However, the temperature information doesnot change as fast. Hence, the real time constraint on lightsensors is tighter than temperature sensors.

Another important factor in the operation of WACNet andthe connectivity of the nodes is the amount ofpower availablein the node for its communication and operation. Based onthese factors, an index called Device Grade (DG) is definedwhich determines the quality of the connectivity of the nodes,clusters and NCAPs in WACNet. This index is defined byDG = wp * DeviceLeftPower + w, * Class Re alTime

- wr * Dis tan ceToNCAP (3)

In this relationship, wr, wp,, and w, represent the weightsfor distance between the STIM master node and NCAP node,Power left in the master device, and class of real-timerequirement for the cluster, respectively. The class of real-time is associated with the priority of the cluster in WACNet.In this equation, wr < wp < w,, which indicates that theclass of real-time requirement of tasks in the node is the mostimportant parameter compared to the power left in the device,and distance to the NCAP.

For the multiple clusters in the vicinity of an NCAP, thecluster with higher DG has higher priority to connect to theNCAP than others. Other clusters might be forced to connectto the NCAP via other clusters. Hence, the whole networksystem forms a hierarchical structure of the DGs.

4. ARCHITECTURE OF SERVICE DISCOVERY PROTOCOLFOR WACNETS

Service Discovery Protocol has been found essential forWACNets in implementing automatic discovery ofnetworkeddevices and remote control of one device by another. In theproposed system, the architecture of WACNet servicediscovery is a hybrid of peer-to-peer and client-server

159

5

Page 6: Service discovery in wireless ad-hoc control networks

architecture. In WACNet, master nodes are considered asserver-like devices that reduce communication cost as serviceadvertisement and search messages are addressed to masternodes instead of broadcast to the entire WACNet.

In the proposed system, master nodes and bridge nodes(namely, the nodes connected to more than one piconet) areaware of their piconet members. The slave node first sends arequest to the master node to discover service in the samepiconet. If the requested service is available in the piconet, themaster node will send back a response to the slave node.Otherwise, the master node will forward the inquiry to thenext bridge node.A message from a slave is sent to the master node via the

physical layer. This will require the transfer of the messagefrom the higher layers to the physical layer in the salve andvice-versa in the master, as illustrated in fig. 4. The "lowerlayers" referred to in this diagram are lower layers embeddedin the Bluetooth Module.

Slave NodeService Discovery

Application_

Service Discovery Layer

Lower Layers

Master NodeService Discovery

Application

AService Discovery Layer

Lower Layers

Physical Media

Fig.4 Protocol Model of WACNets

Every Service Discovery Protocol Data Unit (SDP_PDU),generated by the service discovery layer consists of a PDUheader followed by PDU specific parameters. The headercontains three fields: a PDU_ID, a transaction ID and aParameter Length. PDU_specific parameter varies accordingto PDU_ID.

5. IMPLEMENTATION OF WACNET SDP

The WACNet SDP includes two important parts: serviceregistration and service search, which are described in thefollowing subsections.

A. Service RegistrationService registration is an important component of

WACNets SDP. It enables the nodes or users to look for anode with a particular service, and for the WACNet to offerplug and play capability for minimum data transmission. Thissubsection specifically describes the implementation ofservice registration of WACNets.

Initially, each node in the WACNet decides whether tobecome a master and each node has a probability p (O<p<l)of becoming a master. Therefore, the possibility of n mastersin the network with N nodes is determined by equation 4.

Pp(n IN)= N! n(i p)N-n (4)

dPThe probability IP, reaches its maximum when - 0.

dpN

In a WACNet with N nodes, n is chosen as - to, ~~~~8

minimize the number of the piconets (In each piconet, there isone master and up to 7 active slave nodes.). Hence, the

1probability p of each node to become a master is -. This

8decision is made by each node choosing a random integralnumber between 0 and 7. If the number is 0, the nodebecomes a master, otherwise, a slave node.A node which decides to be a slave carries out an Inquiry

process to find the nearby master nodes. It then tries toconnect to one of the found nodes in the identified order, bysending a Create_Connection packet to the node. If the nodeeventually responds with a Connection_Complete Eventpacket (with the status indicating successful establishment ofconnection.), the connection is implemented.

In the proposed system, only neighbouring nodes withcommon or complimentary functions (namely having sameGroup IDs defined in TEDS) can form clusters of nodes.Hence, the slave node sends a JoinClusterRequest messagewith all Group IDs it has in the Channel_TEDSs to theconnected master, requesting permission to join the cluster.The master receiving this message will compare the receivedGroup IDs with all the Group IDs it owns. If there is no equalGroup ID, the master will disconnect this STIM node.Following that, the STIM node will connect to the nextneighbouring master, and will send it anotherJoinClusterRequest message. The process continues until itconnects to one of the masters with the same Group ID.Following that, the master will reply aServiceRegistrationRequest message to the slave node, whichthen sends a serviceRequestReply message containing theservice information the slave can provide back to the master.If the slave node cannot find a master with the same GroupID, it will finally become a master node.

Master

NewNode

(1) JoinClusterRequest

(3) Disconnection

(3) ServiceRegistrationRequest

(4) ServiceRegistrationReply_~~~~~~~~~~~~~b-

Fig. 5 the Service Operations to Join a Cluster

The whole process, as illustrated in Fig. 5, assists in theimplementation of the Plug and Play feature. The numbers inthe brackets shown in the diagram above denote the order inwhich the packet is transferred. All PDU specific parameters

for the SDP_PDUs in this paper are defined in table 1.

160

vNo<(2) Group\

IDs equal?

Yes

Page 7: Service discovery in wireless ad-hoc control networks

Table 1 definition of the PDU specific parametersPDU_ID Description PDU specific parameters [6] [3]

SDP JoinClusterRequest Connection Handle, Group IDsSDP ServiceRegistrationRequest Connection HandleSDP_ServiceRegistrationReply Connection Handle, Number of

Implemented Channel, Eachchannel characteristics (ChannelNo., Transducer Priority, Group ID,Channel Type Key)

SDP_ Connection_Handle,ServiceRegistrationPermissionReq MAC-AddressuestSDP ServiceRegistrationRequest Connection HandleSDP_ Connection Handle, TransducerServiceRegistrationReplyforNCAP Priorities and Channel Type KeysSDP_ServiceSearchRequest Connection_Handle,

MAC Address, Channel Type KeySDP_SearchSearchReply Connection-Handle, piconet ID,

SDP_ReadTEDSRequest Connection-Handle, piconet ID,

SDP_ReadTEDSRespond Connection_Handle, Cluster ID,piconet ID, The TechnicalParameters

After the cluster formation stage, each master node has atable (Table 2) which lists the connection information of allthe slave nodes in the cluster.

Table 2. Connection Information of all slave nodesin the cluster

MAC Piconet Connection Role of the SlaveAddress ID Handle6 Bytes 3 Bits 12 Bits 2 bits

The parameters of this table are defined as follows:* MAC Address: address of all of the slave nodes in the

cluster.* Piconet ID: When a slave node connects to the master,

the master will provide it with a Piconet which is storedin the table. The first connecting device would be allotteda piconet ID of 1, the second one would be allotted apiconet ID of 2, and so on.

* Role of the Slave Node: The role of slave node isassigned by the master as 0: Normal slave; 1: Backupslave; and 2: Bridge slave. Bridge slave is deployed inconnection with different piconets and holds the master'sMAC addresses of these piconets.

After the process of service registration, every master nodeforms a service record for all slaves in the cluster, asillustrated in table 3. The bridge nodes acting as a relaybetween piconets also are supplied with this service recordtable, so the efficiency of inter-piconet communication can besignificantly improved.Table 3 Service Record for one slave node in the cluster [6]Piconet Number of characteristics ... characteristics ofID Implemented of Channel I Channel N

Channels( N)3 Bits I Byte 4 Bytes ... 4 Bytes

Each Channel Characteristics: it describes the maincharacteristics of each channel, as defined in table 4.

Table 4. Definition of Each Channel CharacteristicsCharacteristics ofChannel [6]Channel No. Transducer Group ID Channel Type Key

PriorityI Byte l Byte I Byte l Byte

In each cluster, the service record in the master node willalso be backed up in the backup node. The master will thensend updates to the Backup devices whenever a changeoccurs in the service record. This process is illustrated in Fig.6. The numbers in the brackets shown in the figure denote theorder in which the packet is transferred.

ServiceRecordI - - I Master Copy

/ Reply

TEDSti

6 Service Registration

In the WACNets, all the clusters with common orcomplimentary functions are considered as one group, inwhich all the nodes have at least the same group ID in theChannel_TEDSs, which can represent the whole group. Eachgroup connects with one NCAP node.

In WACNets, after a cluster is formatted, the master nodethen sends the connected NCAP node aServiceRegistrationPermissionRequest message to require apermission of the NCAP node to register the services of allthe nodes in the cluster into it. IfNCAP finds the informationof this cluster in its service table, it will send aServiceRegistrationPermissionDeny message back to themaster. Otherwise, the NCAP node will reply with aServiceRegistrationRequest message to the master. After themaster has received this message, it will send aServiceRegistrationReplyforNCAP to the master node. Thewhole process is illustrated in Fig. 7.

NCAP

Node

(I) ServiceRegistrationPermnissionRequest-..

(2) ServiceRegistrationPermissionDenvor

(2) ServiceRegistrationRequest

(3) ServiceRegistrationReplvforNCAP

Master

Node

Fig.7 Service Registration between Master nodes and NCAP nodes

Each NCAP node has a service record, which lists thecharacteristics of all the clusters connected with this NCAPnode. In the service record, each cluster is described as in theTable 5.

161

Page 8: Service discovery in wireless ad-hoc control networks

Table 5. Description of Each Cluster in NCAP [6]Descnrption of a ClusterField Description Field Length

General Description of Each Cluster1 Cluster No. 5 bits2 The Number of the Slaves 3 bitsService Abilities for the Cluster3 Channel Type Key I I Byte

Transducer Priority I I Byte

Channel Type Key N I ByteTransducer Priority N I Byte

B. Service SearchWhen a user looks for a node with particular service

ability, the monitoring station will send a ServiceQuestmessage with Channel Type Key to the corresponding NCAPnode, and the NCAP will check its service record table. If amatch occurs, the NCAP node will send aServiceSearchRequest message to the corresponding masternode first searched. The master node will send aReadTEDSRequest to the corresponding slave node. Afterreceiving this message, the slave node replies with aReadTEDSReply message to the master node. On receipt ofthis message, the master node sends a ServiceSearchReplymessage to NCAP nodes. This is eventually sent to theMonitor, via which, the user will get the required information.The process is shown in the fig. 8.

NCAP Master nodeMonitor

(1)

(6)ServiceAn.

(2)ServiceSearchRequest

(5) ServiceSearchReply

Slavenode

(3)ReadTEDSRequest

(4) ReadTEDSReply

4~~

Fig. 8 Service Search from a User

To discover a node with particular service ability, the slavenode will first send a ServiceRequest message to thecorresponding master node, and the master node will check itsservice record table. If a match occurs, the master node willsend a ServiceReply message back to the slave node. If therequested service is not available in the piconet, thisServiceRequest message will be forwarded to the bridge nodein the same piconet to check whether the requested service isavailable in the neighbouring piconet (within the scatternet)or not.

In the proposed system, the bridge node can respond withinformation about services of all the piconets connected to it,without questioning the master. This would significantlyimprove the efficiency of the inter-piconet communication inthe network.

6. TEST RESULTS

In the test-bed, there are two STIM nodes, one NCAP nodeand one PC deployed as the Monitor. The first experimentwas undertaken for service registration using the test-bed,where two STIM nodes were set as master nodes in theexperiment. After the process of service registration, theservice table shown in Table 6 was formed in the NCAPnode. This table lists the characteristics of these two STIMnodes.

Table 6 the Result of Service Record in NCAP Node [6]The Number TasueCluster No. of the Slaves Channel Type Key Transducerof the Slaves ~~~~Priority

00001 000 00000001 0000001000002 000 00000001 00000010

In the above table, the Channel Type Key 00000001 andTransducer Priority 00000010 mean that transducer attachedto each STIM is a temperature sensor and real-timerequirement is medium respectively. This table also showsthat two master nodes without salve nodes have registeredtheir services successfully. The corresponding information isalso transmitted and shown on the applet in the monitor.

7. CONCLUSION

The concept of WACNets as the next stage in thedevelopment of distributed control networks was introduced.A review of service discovery protocols, as an importantfeature in self-organizing ad hoc networks was carried out.The result of validation of the service protocol was presented.The current test-bed consists of 3 nodes only. In the secondgeneration of test-bed, a larger number of nodes will beincluded. The SDP will be further validated on the new test-bed which will represent more complex scenarios.

REFERENCES[1] F. Mattern, "State of the Art and Future Trends in

Distributed Systems and Ubiquitous Computing,"Vontobel TeKnoBase, August 2000.

[2] http://www.cs.uno.edu/-golden/Stuff/37_richard_g.pdf.[3] Specification for the Bluetooth System,

http://www.bluetooth.com.[4] Johnson, Robert N. "IEEE-1451.2 Update",

http://www.sensorsmag.com/articles/0 100/1 7/main.shtml[5] IEEE 1451.2 standard,

http://ieeexplore.ieee.org.ezproxy.uow.edu.au:2048/xpl/standardsjsp?findtitle= 1451.2&letter- 1451.2.

[6] S. Bu, F. Naghdy, "Wireless ad hoc control networks",3rdIEEE Conference on Industrial Informatics, August,2005

[7] W. R. Heinzelman, A. Chandrakasan, H. Balakrishnan,"Energy-Efficient Communication Protocol for WirelessMicrosensor Networks," 33rd Hawaii InternationalConference on System Sciences, Vol. 08, No. 8, P.8020.

162