Wireless Distributed Systems with JADE*

Size: px
Start display at page:

Download "Wireless Distributed Systems with JADE*"

Transcription

1 2004 IEEE International Conference on Systems, Man and Cybernetics Wireless Distributed Systems with JADE* Edward Chen Dorian Sabaz William A. Gruver School of Engineering Science Intelligent Robotics Corporation School of Engineering Science Simon Fraser University North Vancouver, BC, Canada Simon Fraser University Bumaby, BC, Canada Bumaby, BC, Canada Abstrad - Agent platforms such as JALIE, JXTA. FIPA- OS, JACK, and V-NET have been developed to operate with wired network infastructures. With the increase usage ofwireless technolagies, there is a greater need for wireless peer to peer connectbib andfunctionality. This paper presents a novel approach to extend JADE so that it can operate over wireless, peer-to-peer networks. By modeling JALIE over a wired network, we introduce functinnalities that can simulate wireless environments. By these means, we establish the core functionalities for J#E toflnction on a wireless network, thereby avoiding the need to build a wireless infastructure. Keywords: Distributed systems, agents, JADE, peer-topeer connectivi@, virtual wireless environment, agent plotforms 1 Introduction Traditional centralized network topologies are usually implemented with database, file and application servers [l]. The clients connectivity, however, is limited by the physical topology of the wired infrastructure. With the rapid increase in both the size and complexity modem computer networks and the need to roam freely during the exchange of information, centralized approaches fail. A decentralized, peer-to-peer wireless architecture is needed to overcome these issues. Software environments have been developed to facilitate the implementation of a peer-to-peer, distributed systems over wired networks. Examples of these include JADE (Java Agent Development framework) [I], JXTA [2], FIPA-OS [3][4], JACK [5] and V-NET [6]. However, since these software environments are designed for wired infrasmctures, they cannot be directly employed for wireless networks. A Wireless Distributed System (WDS) is a decentralized system that is capable of routing information among its peers. Due to the wireless nature of the system, a node is only aware of other nodes within its signal range. For this node to communicate with peers beyond its signal range, it will require the assistance of nodes between itself and the destination to route infomation, as illustrated in Figure 2. Figure I. Centralized client-server topology This topology is adequate only when the number of clients is unlikely to increase significantly. When such an increase does occur, the central server will be ovenvhelmed with requests which degrade the overall network performance. Figure 2. Wireless distributed system topology In order for an local area network to communicate in the Infrastructure Mode, access points are required to route information to destinations as shown in Figure 3. Using this approach, the sender cannot communicate directly with the recipient. * /04/$ IEEE. 989

2 Access Poim Figure 3. Wireless LAN environment Because all nodes are equal in a WDS, however, a centralized access point is not needed for nodes to communicate. Each node directly communicates with neighboring nodes and each node is independent. The IEEE wireless standard does allow a form of peerto-peer connectivity, called Ad-Hoc Mode. However, the Ad-Hoc Mode only provides point-to-point communication, as illustrated in Figure 4, rather than multi-point-to-multi-point communication. 2 JADE Architecture JADE'S communication system follows the standards developed by FIPA, an international organization producing standards to achieve interoperability of heterogeneous sohare agents [3]. There are three roles that must be present in a FIPA compliant agent platform and their interactions, as shown in Figure 5. Figure 5. FIPA agent model [l] 2.1 Agent Management System (AMs) The AMS is an agent that is responsible for managing the operation of an Agent Platform (AP), such as the creation of agents, the deletion of agents and overseeing the migration of agents to and from the AF' [3]. Figure 4. Multipoint-to-multipoint communication Ideally, we would like to combine the IEEE wireless protocol with the functionality of a peer-to-peer collaborative system environment. Although this type of system is not yet available as a commercial product, we investigate what would be required to do this with JADE. In this paper, the emphasis will be placed on JADE and its role in the implementation of a wireless distributed system. An effective tool for extending JADE for a wireless, peer-to-peer environment is to utilize its current functionality for wired environments and convert it into a virtual wireless environment. A Virtual Wireless Environment (VWE) will be constructed to model any WDS by establishing intelligent links between nodes in a wired network. With such a system, we will be able to create scenarios in a wireless environment, such as signal failure, dynamic link establishment, and data quality over multiple hops. 2.2 Directory The DF is an agent that provides "yellow page" services to other agents. It stores descriptions of the agents and the services they offer. [3] 2.3 Agent Communication Channel (ACC) The ACC is an agent that uses the information provided by the AMs to route messages between agents either within or agents that reside on other platforms. The ACC provides Message Transport Service for FIPA ACL messages [3]. As shown in Figure 6, the AMs and DF are automatically created when the JADE platform is launched. The ACC allows message communication within and toifrom different platforms. The agent platforms can be split among several hosts and only one Java application is executed per host (with one Java V i 1 Machine). The Main Container hosts the AMs and DF, and other containers, which are possibly on other hosts, are connected to the Main Container to provide a complete run-time environment [7]. 990

3 ~ A B C Figure 8. Local area network whereas Node-C can communicate with Node-B and Node-E, as summarized in Table 1. For communication between agents residing in the same platform, JADE uses its Intemal Message Transport Protocols (IMTP) for message delivery. If both the sender and the receiver agents reside in the same container, JADE uses event passing for delivery of the message. When tbe sender and the receiver reside in different containers, JADE uses Remote Method Invocation (RMI) for message delivery [7]. To model this system with a wired network, restrictions are placed on the nodes so that the Sender Node (SN) can only communicate with its list of available Recipient Nodes (RN). Suppose that Node-A wishes to send messages to Node-?, then the message can no longer be routed directly as in a wired network. First, the message will be sent to Node-B, and then to Node-E. This particular scenario models a node in a WDS communicating with a node that is out of range. The SN depends on neighboring nodes to route messages to its RN. ^- MTP Figure 7. JADE messaging architecture [I] 3 Virtual Wireless Environment At the present time, there is no established environment available to properly test a wireless distributed system. Wireless LANs are not fully distributed because access points are required to route information. In a wired network, nodes are physically connected and information is passed directly from sender to recipient without going through intermediate nodes. However, in a wireless environment, each node is not fully aware of the extent of the entire network and with wbom they can communicate directly. As an example, consider a wired network consisting of 5 nodes, shown in Figure S. Suppose that we wish to model the following wireless network consisting of 5 nodes, as shown in Figure 9 where the enclosed circles represent signal range. In this example, Node-A can only communicate with Node-B Figure 9. Example of a Wireless Distributed System The links that are established need not be constantly available. Intelligent links can model different scenarios that may occur in a WDS, such as roaming and dynamic link cougestiodfailure. For example, in the wireless scenario shown in Figure IO, we suppose that Node-A is a roaming node. At f= to, Node-A has only Node-B as its RN. Table 1. Node connectivity r Sender Node I Available Recipients I 991

4 4 JADE in a Virtual Wireless Environment JADE is a software development framework for developing distributed systems and peer-to-peer applications. The major advantage of using JADE is that it simplifies the communication transport and message encoding through the middleware [I]. However, because JADE is designed for a wired network, inodifications are needed before it can be fully implemented with a wireless distributed system. Figure 10. Roaming node with intelligent links at f=to However, at t=ff, the sender (Node-A) will be at a different location, as shown in Figure 11, and a different RN set (Node-D and Node-E). JADE has the facility to communicate with other JADE peers that are withi reach of the wired network. However, in a wireless environment multiple hops may be required. To simulate multiple hops in a virtual wireless environment, the following two agents are added a Broadcusf Agenf that handles broadcasted messages toifram other nodes, and a Send-Receive Agent that senddreceives messages and determines the most efficient route for messages. In the V i 1 Wireless Environment, a SN can only send messages to its list of restricted RN, as determined by a user-defined scenario. This limitation is used to model the wireless nature of the WDS. Figure 11. Roaming nodewith intelligent links at t=ff This situation models a roaming node where its linkages are changing so that the list of RNs on individual nodes within a wired network will also be dynamic. We could also model other scenarios such as dynamic link congestiodfailnre by setting the links between nodes to be deleted or created as a function of time. Such a scenario can also be used to model the uncertainty of wireless transmission. Timing and administrative overhead issues can also be determined with a Virtual Wireless Environment. We can calculate the time required by messages to travel from one end of the network to another and the effects of multiple messages. We can measure the effectiveness of routing algorithms and also peer-to-peer environments. Figure 12. Wireless agent communication channel in an agent framework These two agents allow us to extend the functionality of the ACC to model a wireless environment. This latter feature has been implemented by a model we call the Wireless Agent Communication Channel (WACC), as illustrated in Figure 12. Unlike a wired network in which all nodes are aware of the existence of all other nodes, a wireless system is only aware of nodes within its signal range. When a new node becomes available, that information must be made available to the network by broadcasting its presence to neighboring nodes, which they broadcast to their neighbors. The process is repeated until all nodes become aware of the presence of a new node. 992 We incorporate this multi-hop functionality in JADE by adding a Global Directory Facilitator (GDF) that is

5 responsible for maintaining a current list of all agents and their services within each node's multi-hop signal range. This is an extension of the Directory Facilitator (DF) created by JADE that enables a node to be aware of other agents within its immediate surroundings, see Figure 13. IF- Figure 13. Global directory facilitator in an agent framework In addition, administrative overhead at the network level requires extension of the AMS. The Global Agent Management System (GAMS), which extends the functionalities of the AMs, is in direct communication with the GDF. The modified agent framework for a WDS is illustrated in Figure 14. By extending JADE with three subsystems (WACC, GDF, and GAMS), we have packaged the multi-hop functionality required for wireless communications from the normal JADE operational services. are needed, however, to accommodate their use with wireless systems. By allowing the user to control the connectivity and functionality of JADE peers, any wireless environment can be modeled using a wired network. In addition, since these subsystems are incorporated in JADE, the core functionality to manage a wireless environments is available. This Virtual Wireless Environment (VWE) can then be configured with wireless parameters such as dynamic link failures and latency. By extending the JADE framework so that it has the capability to create virtual environments, wired networks can be employed to allow algorithm and system developers the capability to simulate scenarios that occur in wireless environments. The extension enables JADE to have the functionality to function as a simulation environment for wireless system development and also to operate over wireless networks. References [I] JADE, Java Agent Development framework, [2] JXTA, [3] FIPA -Foundation for Intelligent Physical Agents, [4] FIF'A-OS, hap:// products/announcements/fip~ [5] Agent Oriented Software Group, [6] C. Ng, D. Sabaz and W. A. Gmver, "Distributed Algorithm Simulator for Wireless Peer-to-Peer Networks," Proc. of fhe IEEE Infemational Conference on Sysfem, Man, and Cybernetics. Hague, Netherlands, Figure 14. Modified agent framework for a WDS 5 Conclusions [7] E. Cortese, F. Quarta, and G. Vitaglione, "Scalability and Performance of the JADE Message Transport System," Proc. of the AAMAS Workshop on AgentCifies, Bologna, Italy, July A Wireless Distributed System is a scalable network that decentralizes the system into multiple, independent nodes capable of routing information to recipients. Agent platforms such as JADE, JXTA, FIPA-OS, and V-NET may be used to develop distributed systems. Modifications 993

Scalable Middleware Environment for Agent-Based Internet Applications]

Scalable Middleware Environment for Agent-Based Internet Applications] Scalable Middleware Environment for Agent-Based Internet Applications] Benno J. Overeinder and Frances M.T. Brazier Department of Computer Science, Vrije Universiteit Amsterdam De Boelelaan 1081a, 1081

More information

A Mobile Agent Platform for Supporting Ad-hoc Network Environment

A Mobile Agent Platform for Supporting Ad-hoc Network Environment International Journal of Grid and Distributed Computing 9 A Mobile Agent Platform for Supporting Ad-hoc Network Environment Jinbae Park, Hyunsang Youn, Eunseok Lee School of Information and Communication

More information

Information Collection and Survey Infrastructure, APIs, and Software Tools for Agent-based Systems (An Overview of JADE)

Information Collection and Survey Infrastructure, APIs, and Software Tools for Agent-based Systems (An Overview of JADE) Course Number: SENG 609.22 Session: Fall, 2003 Document Name: Infrastructure, APIs, and Software tools for agent-based system (An Overview of JADE) Course Name: Agent-based Software Engineering Department:

More information

Jade: Java Agent DEvelopment Framework Overview

Jade: Java Agent DEvelopment Framework Overview Jade: Java Agent DEvelopment Framework Overview Multiagent Systems LM Sistemi Multiagente LM Stefano Mariani revised by Andrea Omicini s.mariani@unibo.it, andrea.omicini@unibo.it Dipartimento di Informatica:

More information

Jade: Java Agent DEvelopment Framework Overview

Jade: Java Agent DEvelopment Framework Overview Jade: Java Agent DEvelopment Framework Overview Stefano Mariani s.mariani@unibo.it Dipartimento di Informatica Scienza e Ingegneria (DISI) Alma Mater Studiorum Università di Bologna a Cesena Academic Year

More information

Introduction. Distributed Systems IT332

Introduction. Distributed Systems IT332 Introduction Distributed Systems IT332 2 Outline Definition of A Distributed System Goals of Distributed Systems Types of Distributed Systems 3 Definition of A Distributed System A distributed systems

More information

CHAPTER 7 JAVA AGENT DEVELOPMENT ENVIRONMENT

CHAPTER 7 JAVA AGENT DEVELOPMENT ENVIRONMENT CHAPTER 7 JAVA AGENT DEVELOPMENT ENVIRONMENT 159 Chapter 7 Java Agent Development Environment For more enhanced information resources it requires that the information system is distributed in a network

More information

Limited-Resource Systems Testing with Microagent Societies

Limited-Resource Systems Testing with Microagent Societies Limited-Resource Systems Testing with Microagent Societies Liviu Miclea, Enyedi Szilárd, Lucian Buoniu, Mihai Abrudean, Ioan Stoian*, Andrei Vancea Technical University of Cluj-Napoca, Cluj-Napoca, Romania

More information

Design and Implementation of Multimedia Service Management Agent on Home Networks Environment

Design and Implementation of Multimedia Service Management Agent on Home Networks Environment IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.7B, July 2006 91 Design and Implementation of Multimedia Service Management Agent on Home Networks Environment Won-Joo Hwang,

More information

ITEC 3800 Data Communication and Network. Introducing Networks

ITEC 3800 Data Communication and Network. Introducing Networks ITEC 3800 Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You

More information

Data Communication and Network. Introducing Networks

Data Communication and Network. Introducing Networks Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You can connect

More information

FIPA-OS Feature Overview. Agent Technology Group Nortel Networks February 2000

FIPA-OS Feature Overview. Agent Technology Group Nortel Networks February 2000 FIPA-OS Feature Overview Agent Technology Group Nortel Networks February 2000 FIPA-OS - Aims FIPA-OS is a Open Source implementation of FIPA and is available for free. http://www.nort elnetworks.com/ fipa-os

More information

A-GATE: A System of Relay and Translation Gateways for Communication among Heterogeneous Agents in Ad Hoc Wireless Environments

A-GATE: A System of Relay and Translation Gateways for Communication among Heterogeneous Agents in Ad Hoc Wireless Environments A-GATE: A System of Relay and Translation Gateways for Communication among Heterogeneous Agents in Ad Hoc Wireless Environments Leelani Kumari Wickramasinghe 1, Seng Wai Loke 2, Arkady Zaslavsky 2, and

More information

The History and the layers of the OSI Model 30 - October

The History and the layers of the OSI Model 30 - October THE OSI MODEL Established in 1947, the International Standards Organization (ISO) is a multinational body dedicated to worldwide agreement on international standards. An ISO standard that covers all aspects

More information

FIPA specification and JADE. Tomáš Poch

FIPA specification and JADE. Tomáš Poch FIPA specification and JADE Tomáš Poch Agents System that is situated in some environment, and that is capable of autonomous action in this environment in order to meet its design objectives [Wooldridge

More information

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

Agent Migration over FIPA ACL Messages

Agent Migration over FIPA ACL Messages Joan Ametller, Sergi Robles, and Joan Borrell Computer Science Dept. Universitat Autònoma de Barcelona 08193 Bellaterra, Spain Joan.Ametller@uab.es Abstract. In this paper, we present the design and implementation

More information

Figure 1: Ad-Hoc routing protocols.

Figure 1: Ad-Hoc routing protocols. Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca

More information

Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks

Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks P.Suganthi Research Scholar Mother Teresa Women s University Kodaikanal, TamilNadu, India Dr.A.Tamilarasi

More information

Fundamental Issues. System Models and Networking Chapter 2,3. System Models. Architectural Model. Middleware. Bina Ramamurthy

Fundamental Issues. System Models and Networking Chapter 2,3. System Models. Architectural Model. Middleware. Bina Ramamurthy System Models and Networking Chapter 2,3 Bina Ramamurthy Fundamental Issues There is no global time. All communications are by means of messages. Message communication may be affected by network delays

More information

An Ambient Intelligence Application Integrating Agent and Service-Oriented Technologies

An Ambient Intelligence Application Integrating Agent and Service-Oriented Technologies An Ambient Intelligence Application Integrating Agent and -Oriented Technologies Nikolaos Spanoudakis a, b Pavlos Moraitis b a Singular Logic S.A. nspan@singularlogic.eu www.singularlogic.eu b Paris Descartes

More information

A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile Ad hoc Networks

A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile Ad hoc Networks 5th ACM Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN) A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile

More information

PROVIDING MESSAGING INTEROPERABILITY IN FIPA COMMUNICATION ARCHITECTURE

PROVIDING MESSAGING INTEROPERABILITY IN FIPA COMMUNICATION ARCHITECTURE PROVIDING MESSAGING INTEROPERABILITY IN FIPA COMMUNICATION ARCHITECTURE Heikki Helin 1 and Stefano Campadello 2 1 Sonera Corporation P.O.Box 970, FIN-00051 Sonera, Finland Heikki.j.Helin@sonera.com 2 Nokia

More information

The Open System Interconnect model

The Open System Interconnect model The Open System Interconnect model Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 1 Layered network design Data networks are usually

More information

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs Jin Liu 1, Hongmin Ren 1, Jun Wang 2, Jin Wang 2 1 College of Information Engineering, Shanghai Maritime University,

More information

Chapter 16 Networking

Chapter 16 Networking Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer

More information

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS , pp.479-486 http://dx.doi.org/1.14257/astl.217.147.67 Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS G Parimala 1, B Suvarna 2, N Rajeswari 3 and Venkatesulu Dondeti 4 VFSTR University,

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

INTRODUCTION TO ICT.

INTRODUCTION TO ICT. INTRODUCTION TO ICT. (Introducing Basic Network Concepts) Lecture # 24-25 By: M.Nadeem Akhtar. Department of CS & IT. URL: https://sites.google.com/site/nadeemcsuoliict/home/lectures 1 INTRODUCTION TO

More information

DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 1. Introduction

DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 1. Introduction DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 1 Introduction Definition of a Distributed System (1) A distributed system is: A collection of

More information

Chapter 2 Architectures. Software Architectures

Chapter 2 Architectures. Software Architectures Chapter 2 Architectures Software architectures of distributed systems System architectures of distributed systems 1 Software Architectures Software architecture describes how the software components are

More information

SERVICE DISCOVERY IN MOBILE PEER-TO-PEER ENVIRONMENT

SERVICE DISCOVERY IN MOBILE PEER-TO-PEER ENVIRONMENT SERVICE DISCOVERY IN MOBILE PEER-TO-PEER ENVIRONMENT Arto Hämäläinen Lappeenranta University of Technology P.O. Box 20, 53851 Lappeenranta, Finland arto.hamalainen@lut.fi Jari Porras Lappeenranta University

More information

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET Bhagyashri Thakre 1, Archana Raut 2 1 M.E. Student, Mobile Technology, G H Raisoni College of Engineering, Nagpur, India 2 Assistant

More information

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-

More information

DEVELOPING A NEW MECHANISM FOR LOCATING AND MANAGING MOBILE AGENTS

DEVELOPING A NEW MECHANISM FOR LOCATING AND MANAGING MOBILE AGENTS Journal of Engineering Science and Technology Vol. 7, No. 5 (2012) 614-622 School of Engineering, Taylor s University DEVELOPING A NEW MECHANISM FOR LOCATING AND MANAGING MOBILE AGENTS AHMED Y. YOUSUF*,

More information

GSM Based Comparative Investigation of Hybrid Routing Protocols in MANETS

GSM Based Comparative Investigation of Hybrid Routing Protocols in MANETS IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 3, Ver. II (May - Jun. 214), PP 82-86 GSM Based Comparative Investigation of Hybrid

More information

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University

More information

Multi-path Forward Error Correction Control Scheme with Path Interleaving

Multi-path Forward Error Correction Control Scheme with Path Interleaving Multi-path Forward Error Correction Control Scheme with Path Interleaving Ming-Fong Tsai, Chun-Yi Kuo, Chun-Nan Kuo and Ce-Kuen Shieh Department of Electrical Engineering, National Cheng Kung University,

More information

Towards a Sensor Network Architecture: Issues and Challenges. Muneeb Ali LUMS, Pakistan SICS, Sweden

Towards a Sensor Network Architecture: Issues and Challenges. Muneeb Ali LUMS, Pakistan SICS, Sweden Towards a Sensor Network Architecture: Issues and Challenges Muneeb Ali LUMS, Pakistan SICS, Sweden Talk at Knuth SICS, Sweden, November 2005 Outline Introduction Internet vs Sensor Networks Towards a

More information

OPAX - An Open Peer-to-Peer Architecture for XML Message Exchange

OPAX - An Open Peer-to-Peer Architecture for XML Message Exchange OPAX - An Open Peer-to-Peer Architecture for XML Message Exchange Bernhard Schandl, University of Vienna bernhard.schandl@univie.ac.at Users wishing to find multimedia material about interesting events

More information

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV MIT International Journal of Electrical and Instrumentation Engineering, Vol. 3, No. 2, August 2013, pp. 57 61 57 Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through

More information

WZRDnet. A Low-Power Wireless Ad-Hoc Mesh Network for Austere Tactical Environments. February 14, 2018

WZRDnet. A Low-Power Wireless Ad-Hoc Mesh Network for Austere Tactical Environments. February 14, 2018 White Paper TELEGRID Technologies, Inc. WZRDnet A Low-Power Wireless Ad-Hoc Mesh Network for Austere Tactical Environments February 14, 2018 23 Vreeland Road Suite 290 Florham Park, NJ 07932 www.telegrid.com

More information

Part I. Wireless Communication

Part I. Wireless Communication 1 Part I. Wireless Communication 1.5 Topologies of cellular and ad-hoc networks 2 Introduction Cellular telephony has forever changed the way people communicate with one another. Cellular networks enable

More information

Towards developing multi-agent systems in Ada G. Aranda, J. Palanca, A. Espinosa, A. Terrasa, and A. García-Fornes {garanda,jpalanca,aespinos,aterrasa,agarcia}@dsic.upv.es Information Systems and Computation

More information

Towards a FIPA Approach for Mobile Ad hoc Environments

Towards a FIPA Approach for Mobile Ad hoc Environments Towards a FIPA Approach for Mobile Ad hoc Environments Michael Berger 1, Michael Watzke 1, Heikki Helin 2 1 Siemens AG, Corporate Technology, Intelligent Autonomous Systems Group, Otto-Hahn-Ring 6, 81739

More information

Outline Multi-agent Platforms. Existing problems. Existing problems (2)

Outline Multi-agent Platforms. Existing problems. Existing problems (2) Multi-agent Platforms Cosmin Carabelea Why multi-agent platforms? Examples of multi-agent platforms Cosmin.Carabelea@emse.fr SMA/SIMMO ENS Mines Saint-Etienne September 30 th, 2003 1 2 Existing problems

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

Securing MANETs using Cluster-based Certificate Revocation Method: An Overview

Securing MANETs using Cluster-based Certificate Revocation Method: An Overview Securing MANETs using Cluster-based Certificate Revocation Method: An Overview Mrs. Dipti S. Sawant Dept. of Computer Engineering, Sinhgad College of Engineering, Pune, India. 411 041 Prof. J. E. Kamalasekaran

More information

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing. Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Various

More information

Introduction to Networking

Introduction to Networking Introduction to Networking The fundamental purpose of data communications is to exchange information between user's computers, terminals and applications programs. Simplified Communications System Block

More information

Analyzation of Automatic Repeat Request (ARQ) Protocols

Analyzation of Automatic Repeat Request (ARQ) Protocols RESEARCH ARTICLE OPEN ACCESS Analyzation of Automatic Repeat Request (ARQ) Protocols 1 Jeshvina.S, 2 Sneha.P, 3 Saraanya.S Final year BCA, Dept of Computer Science New Horizon College Kasturinagar, Bangalore

More information

Chapter 5 INTRODUCTION TO MOBILE AGENT

Chapter 5 INTRODUCTION TO MOBILE AGENT Chapter 5 INTRODUCTION TO MOBILE AGENT 135 Chapter 5 Introductions to Mobile Agent 5.1 Mobile agents What is an agent? In fact a software program is containing an intelligence to help users and take action

More information

Protocol for Tetherless Computing

Protocol for Tetherless Computing Protocol for Tetherless Computing S. Keshav P. Darragh A. Seth S. Fung School of Computer Science University of Waterloo Waterloo, Canada, N2L 3G1 1. Introduction Tetherless computing involves asynchronous

More information

Mobile Computing Introduction

Mobile Computing Introduction Mobile Computing Introduction UNIT - 1 Prepared By:- NITIN PANDYA Assistant Professor, SVBIT. What is Mobile Computing 2 NTIIN PANDYA 3 NTIIN PANDYA Definitions Mobile Computing What is mobile computing?

More information

Performance Evaluation of MANET through NS2 Simulation

Performance Evaluation of MANET through NS2 Simulation International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation

More information

Computer Networks Prof. Ashok K. Agrawala

Computer Networks Prof. Ashok K. Agrawala CMSC417 Computer Networks Prof. Ashok K. Agrawala 2017 Ashok Agrawala September 25, 2018 Fall 2018 CMSC417 1 Message, Segment, Packet, and Frame Fall 2018 CMSC417 2 Hierarchical Routing Hierarchical routing.

More information

DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 1. Introduction

DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 1. Introduction DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 1 Introduction Modified by: Dr. Ramzi Saifan Definition of a Distributed System (1) A distributed

More information

ICMP (Internet Control Message Protocol)

ICMP (Internet Control Message Protocol) ABSTRACT : ICMP stands for internet control message protocol it is a vital protocol of network layer among the seven layers of OSI(open system interconnection). Here we deal with the several situations

More information

Vaibhav Jain 2, Pawan kumar 3 2,3 Assistant Professor, ECE Deptt. Vaish College of Engineering, Rohtak, India. Rohtak, India

Vaibhav Jain 2, Pawan kumar 3 2,3 Assistant Professor, ECE Deptt. Vaish College of Engineering, Rohtak, India. Rohtak, India Volume 3, Issue 8, August 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Improved OLSR

More information

Infrastructure for Autonomous Mobile Robots Communication and Coordination

Infrastructure for Autonomous Mobile Robots Communication and Coordination 90 Work in Progress Session Infrastructure for Autonomous Mobile Robots Communication and Coordination Marcelo M. Sobral, Leandro B. Becker Dept of Automation and Systems Universidade Federal de Santa

More information

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Rajneesh Gujral Associate Proffesor (CSE Deptt.) Maharishi Markandeshwar University, Mullana, Ambala Sanjeev Rana Associate

More information

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet African Journal of Basic & Applied Sciences 9 (1): 27-32, 2017 ISSN 2079-2034 IDOSI Publications, 2017 DOI: 10.5829/idosi.ajbas.2017.27.32 Dynamic Search Technique Used for Improving Passive Source Routing

More information

TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS

TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS Deddy Chandra and Richard J. Harris School of Electrical and Computer System Engineering Royal Melbourne Institute of Technology Melbourne, Australia

More information

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS 1 PRASHANTH JAYAKUMAR, 2 P.S.KHANAGOUDAR, 3 VINAY KAVERI 1,3 Department of CSE, GIT, Belgaum, 2 Assistant Professor, Dept.

More information

Energy Efficient EE-DSR Protocol for MANET

Energy Efficient EE-DSR Protocol for MANET Energy Efficient EE- Protocol for MANET 1 Mr. Prakash Patel, 2 Ms. Tarulata Chauhan 1 Department of Computer engineering, 1 LJ Institute of Technology, Ahmedabad, India 1 prakashpmp1990@gmail.com, 2 taruchauhan114@gmail.com

More information

A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols

A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols International Journal of Computer Science & Communication Vol. 1, No. 2, July-December 2010, pp. 185-189 A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols B.V. Manikyala Rao

More information

Chapter 2 Network Models 2.1

Chapter 2 Network Models 2.1 Chapter 2 Network Models 2.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Network Models n Network Architecture: n A) Hardware: at the core of any network;

More information

Performance analysis of QoS-Oriented Distributed Routing protocols for wireless networks using NS-2.35

Performance analysis of QoS-Oriented Distributed Routing protocols for wireless networks using NS-2.35 Performance analysis of QoS-Oriented Distributed Routing protocols for wireless networks using NS-2.35 Manpreet Singh Team number 8 Project webpage-http://manpreetensc833.weebly.com/ ENSC 833 : NETWORK

More information

Interface The exit interface a packet will take when destined for a specific network.

Interface The exit interface a packet will take when destined for a specific network. The Network Layer The Network layer (also called layer 3) manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that the Network

More information

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network Detection and Removal of Black Hole Attack in Mobile Ad hoc Network Harmandeep Kaur, Mr. Amarvir Singh Abstract A mobile ad hoc network consists of large number of inexpensive nodes which are geographically

More information

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication

More information

Guide to Networking Essentials Fifth Edition. Chapter 2 Network Design Essentials

Guide to Networking Essentials Fifth Edition. Chapter 2 Network Design Essentials Guide to Networking Essentials Fifth Edition Chapter 2 Network Design Essentials Objectives Explain the basics of a network layout Describe the standard networking topologies Explain the variations on

More information

Lightweight Communication Platform for Heterogeneous Multi-context Systems: A Preliminary Report

Lightweight Communication Platform for Heterogeneous Multi-context Systems: A Preliminary Report Lightweight Communication Platform for Heterogeneous Multi-context Systems: A Preliminary Report Vladimír Dziuban, Michal Čertický, Jozef Šiška, and Michal Vince Department of Applied Informatics, Faculty

More information

UNIT II NETWORKING

UNIT II NETWORKING UNIT II INTRODUCTION TO WIRELESS NETWORKING Wireless Network The cellular telephone system is responsible for providing coverage throughout a particular area known as coverage region or market The interconnection

More information

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols www.ijcsi.org 551 Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols Kashif Ibrahim Qazi Javed Ahmed Abdul Qudoos Mirza Aamir Mehmood Department of Computer Science, Balochistan

More information

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE William Stallings F.1 TCP/IP LAYERS... 2 F.2 TCP AND UDP... 4 F.3 OPERATION OF TCP/IP... 6 F.4 TCP/IP APPLICATIONS... 10 Copyright 2014 Supplement to Computer

More information

Decentralized Architecture for Fault Tolerant Multi Agent System

Decentralized Architecture for Fault Tolerant Multi Agent System Decentralized Architecture for Fault Tolerant Multi Agent System Zaheer Abbas Khan, Salman Shahid, H. Farooq Ahmad 2, Arshad Ali, Hiroki Suguri 2 NUST Institute of Information Technology, Chaklala Scheme

More information

Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network

Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network 1 Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network Nilima Walde, Assistant Professor, Department of Information Technology, Army Institute of Technology, Pune, India Dhananjay

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Enhanced IGRP. Chapter Goals. Enhanced IGRP Capabilities and Attributes CHAPTER

Enhanced IGRP. Chapter Goals. Enhanced IGRP Capabilities and Attributes CHAPTER 40 CHAPTER Chapter Goals Identify the four key technologies employed by (EIGRP). Understand the Diffusing Update Algorithm (DUAL), and describe how it improves the operational efficiency of EIGRP. Learn

More information

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES B.Poonguzharselvi 1 and V.Vetriselvi 2 1,2 Department of Computer Science and Engineering, College of Engineering Guindy, Anna University Chennai,

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

Replica Distribution Scheme for Location-Dependent Data in Vehicular Ad Hoc Networks using a Small Number of Fixed Nodes

Replica Distribution Scheme for Location-Dependent Data in Vehicular Ad Hoc Networks using a Small Number of Fixed Nodes Replica Distribution Scheme for Location-Dependent Data in Vehicular d Hoc Networks using a Small Number of Fixed Nodes Junichiro Okamoto and Susumu Ishihara Graduate School of Engineering, Shizuoka University,

More information

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario K.Gautham 1, Nagajothi A 2 Student, Computer Science and Engineering,

More information

Supporting Nomadic Agent-based Applications in the FIPA Agent Architecture

Supporting Nomadic Agent-based Applications in the FIPA Agent Architecture Supporting Nomadic Agent-based Applications in the FIPA Agent Architecture Heikki Helin (Heikki.j.Helin@teliasonera.com) FDPW 03, Petrozavodsk, June 26 th, 2003 Introduction Multi-agent system implementing

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service) 2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Journal homepage: www.mjret.in ISSN:2348-6953 A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Ms. Amruta Kodole 1, Prof. P. M. Agarkar 2 Computer Engineering Dr. D. Y. Patil School Of Engineering

More information

Importance of Interoperability in High Speed Seamless Redundancy (HSR) Communication Networks

Importance of Interoperability in High Speed Seamless Redundancy (HSR) Communication Networks Importance of Interoperability in High Speed Seamless Redundancy (HSR) Communication Networks Richard Harada Product Manager RuggedCom Inc. Introduction Reliable and fault tolerant high speed communication

More information

TCP/IP THE TCP/IP ARCHITECTURE

TCP/IP THE TCP/IP ARCHITECTURE TCP/IP-1 The Internet Protocol (IP) enables communications across a vast and heterogeneous collection of networks that are based on different technologies. Any host computer that is connected to the Internet

More information

Energy aware geographic routing in wireless sensor networks with anchor nodes. Mircea Cretu Stancu Utrecht University Computing Science May 2013

Energy aware geographic routing in wireless sensor networks with anchor nodes. Mircea Cretu Stancu Utrecht University Computing Science May 2013 Energy aware geographic routing in wireless sensor networks with anchor nodes Mircea Cretu Stancu Utrecht University Computing Science May 2013 Overview Introduction Current paradigm EAGR preliminaries

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

Wireless technology Principles of Security

Wireless technology Principles of Security Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the

More information

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 11, November -2017 Improved OLSR Protocol for VANET Ravi Shrimali

More information

Routing Protocols in Mobile Ad-Hoc Network

Routing Protocols in Mobile Ad-Hoc Network International Journal of Computer Science & Management Studies, Vol. 12, Issue 02, April 2012 Protocols in Mobile Ad-Hoc Network Sachin Minocha M. Tech Student, Vaish College of Engineering, Rohtak, Haryana

More information

Zonal Rumor Routing for. Wireless Sensor Networks

Zonal Rumor Routing for. Wireless Sensor Networks Tarun Banka Department of Electrical and Computer Engineering tarunb@engr.colostate.edu Zonal Rumor Routing for. Wireless Sensor Networks Gagan Tandon Department of Computer Science gagan@cs.colostate.edu

More information

Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs

Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs James T. Yu and Chibiao Liu School of Computer Science, Telecommunications, and Information Systems DePaul University,

More information

Pervasive and Mobile Computing. Dr. Atiq Ahmed. Introduction Network Definitions Network Technologies Network Functions 1/38

Pervasive and Mobile Computing. Dr. Atiq Ahmed. Introduction Network Definitions Network Technologies Network Functions 1/38 Department of Computer Science & Information Technology University of Balochistan Course Objectives To discuss the fundamental problems in the emerging area of mobile and pervasive computing, along with

More information