BT Technology Journal

, Volume 23, Issue 3, pp 162–174 | Cite as

Policy-based model-driven engineering of pervasive services and the associated OSS

  • K. Yang
  • S. Ou
  • M. Azmoodeh
  • N. Georgalas


This paper presents our work towards a fully functioning platform for pervasive service engineering in an operational support services (OSS) context for an ICT service provider. The focus of the paper lies in a proof-of-concept for a novel means to develop and execute pervasive services, with simplicity and maintainability as prime drivers. The essence of this approach is the novel integration of the policy-based management (PBM) techniques and the model-driven architecture (MDA) techniques for specifying pervasive services and their behaviour, together with auto-generation of middleware implementation and policy enablement. The presence of policies provides pervasive services with the high flexibility and adaptability needed for dealing with changing environments and resource availabilities, while the introduction of MDA for defining pervasive service information models fundamentally solves the information modelling puzzle of current policy-based approaches. Additionally, MDA’s middleware-neutral feature benefits the smooth evolution of pervasive services as a piece of software artefact in the face of heterogeneous devices and platforms. A preliminary case study has demonstrated the practical feasibility and benefits of this approach. The case study revolves around an ICT service called TEANU — transparent enterprise access for nomadic user. The service provides a means for nomadic users to maintain a secure access to their enterprise network in the presence of multiple access network providers with different service level guarantees.


Software Artefact Heterogeneous Device Level Guarantee Enterprise Access Pervasive Service 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Satyanarayanan M: ‘Pervasive computing: vision and challenges’, IEEE Personal Communications Journal, 8, Issue 4, pp 10–17 (August 2001).CrossRefGoogle Scholar
  2. 2.
    Decasper D, Dittia Z, Parulkar B and Plattner B: ‘Router plugins: a software architecture for next-generation routers’, IEEE/ACM Transactions on Networking, 8, Issue 1, pp 2–15 (February 2000).CrossRefGoogle Scholar
  3. 3.
    Esler M, Hightower J, Anderson T and Borriello G: ‘Next Century Challenges: Data-Centric Networking for Invisible Computing — The Portolano Project at the University of Washington’, Proc of the Fifth ACM/IEEE International Conference on Mobile Networking and Computing, pp 256–262 (August 1999).Google Scholar
  4. 4.
    ‘PS Supporting Middleware’, Special Issue, IEEE Journal of Pervasive Computing, 3, No3 (2004).Google Scholar
  5. 5.
    Sloman M: ‘Policy Driven Management For Distributed Systems’, Journal of Network and System Management, 2, No4, pp 333–60 (December 1994).Google Scholar
  6. 6.
    Yang K, Galis A, Mota T and Gouveris S: ‘Automated Management of IP Networks through Policy and Mobile agents’, Proc of Fourth International Workshop on Mobile Agents for Telecommunication Applications (MATA2002): LNCS-2521, Springer, Barcelona, Spain, pp 249–258 (October 2002).Google Scholar
  7. 7.
    Model Driven Architecture — Scholar
  8. 8.
    IETF Policy Framework Working Group — Scholar
  9. 9.
    Georgalas N, Azmoodeh M, Clark T, Evans A, Sammut P and Willans J: ‘MDA-Driven Development of standard-compliant OSS components: the OSS/J inventory case-study’, Proceedings of the Second European Workshop on Model Driven Architecture with emphasis on Methodologies and Transformations (EWMDA 2004), Canterbury, UK (September 2004).Google Scholar
  10. 10.
    Xactium — Scholar
  11. 11.
    OSGi Alliance — Scholar
  12. 12.
    OSS through Java Initiative — Scholar
  13. 13.
    Dey A K and Abowd G D: ‘Towards a better understanding of context and context awareness’, Proceedings of CHI2000 Workshop on the What, Who, Where, When and How of Context-Awareness, The Hague (April 2000).Google Scholar
  14. 14.
    Schilit B and Theimer M: ‘Disseminating Active Map Information to Mobile Hosts’, IEEE Network, 8, No5, pp 22–32 (1994).CrossRefGoogle Scholar
  15. 15.
    Ryan N S et al: ‘Issues in developing context-aware computing’, in Gellersen H-W (Ed): ‘Handheld and Ubiquitous Computing’, LNCS-1707, pp 208–221, Springer-Verlag (September 1999).Google Scholar
  16. 16.
    Dey A K: ‘Providing Architectural Support for Building Context-Aware Applications’, PhD thesis, Georgia Institute of Technology (November 2000).Google Scholar
  17. 17.
    PoPSiDL grammar —∼kunyang/PoPSiDL/PoPSiDL-BNF.docGoogle Scholar
  18. 18.
    Georgalas N and Bagley C: ‘Using policies in highly configurable component-based NGOSS’, BT Technol J, 23, No3, pp 149–161 (July 2005).Google Scholar
  19. 19.
    Stretch R M: ‘The Parlay API — allowing third party application providers safe and secure access to network capabilities’, BT Technol J, 21, No3, pp 141–159 (July 2003).CrossRefGoogle Scholar
  20. 20.
    Dulay N, Lupu E, Sloman M and Damianou N: ‘A Policy Deployment Model for the Ponder Language’, Proc IEEE/IFIP International Symposium on Integrated Network Management (IM’2001), IEEE Press, Seattle (May 2001).Google Scholar
  21. 21.
    Kagal L, Finin T and Joshi A: ‘A Policy Language for a Pervasive Computing Environment’, Proc IEEE 4th International Workshop on Policies for Distributed Systems and Networks, Lake Como, Italy (June 2003).Google Scholar

Copyright information

© British Telecommunications plc 2005

Authors and Affiliations

  • K. Yang
  • S. Ou
  • M. Azmoodeh
  • N. Georgalas

There are no affiliations available

Personalised recommendations