Wireless Distributed Systems with JADE*
|
|
- Lesley Boone
- 6 years ago
- Views:
Transcription
1 2004 IEEE International Conference on Systems, Man and Cybernetics Wireless Distributed Systems with JADE* Edward Chen Dorian Sabaz William A. Gruver School of Engineering Science Intelligent Robotics Corporation School of Engineering Science Simon Fraser University North Vancouver, BC, Canada Simon Fraser University Bumaby, BC, Canada Bumaby, BC, Canada Abstrad - Agent platforms such as JALIE, JXTA. FIPA- OS, JACK, and V-NET have been developed to operate with wired network infastructures. With the increase usage ofwireless technolagies, there is a greater need for wireless peer to peer connectbib andfunctionality. This paper presents a novel approach to extend JADE so that it can operate over wireless, peer-to-peer networks. By modeling JALIE over a wired network, we introduce functinnalities that can simulate wireless environments. By these means, we establish the core functionalities for J#E toflnction on a wireless network, thereby avoiding the need to build a wireless infastructure. Keywords: Distributed systems, agents, JADE, peer-topeer connectivi@, virtual wireless environment, agent plotforms 1 Introduction Traditional centralized network topologies are usually implemented with database, file and application servers [l]. The clients connectivity, however, is limited by the physical topology of the wired infrastructure. With the rapid increase in both the size and complexity modem computer networks and the need to roam freely during the exchange of information, centralized approaches fail. A decentralized, peer-to-peer wireless architecture is needed to overcome these issues. Software environments have been developed to facilitate the implementation of a peer-to-peer, distributed systems over wired networks. Examples of these include JADE (Java Agent Development framework) [I], JXTA [2], FIPA-OS [3][4], JACK [5] and V-NET [6]. However, since these software environments are designed for wired infrasmctures, they cannot be directly employed for wireless networks. A Wireless Distributed System (WDS) is a decentralized system that is capable of routing information among its peers. Due to the wireless nature of the system, a node is only aware of other nodes within its signal range. For this node to communicate with peers beyond its signal range, it will require the assistance of nodes between itself and the destination to route infomation, as illustrated in Figure 2. Figure I. Centralized client-server topology This topology is adequate only when the number of clients is unlikely to increase significantly. When such an increase does occur, the central server will be ovenvhelmed with requests which degrade the overall network performance. Figure 2. Wireless distributed system topology In order for an local area network to communicate in the Infrastructure Mode, access points are required to route information to destinations as shown in Figure 3. Using this approach, the sender cannot communicate directly with the recipient. * /04/$ IEEE. 989
2 Access Poim Figure 3. Wireless LAN environment Because all nodes are equal in a WDS, however, a centralized access point is not needed for nodes to communicate. Each node directly communicates with neighboring nodes and each node is independent. The IEEE wireless standard does allow a form of peerto-peer connectivity, called Ad-Hoc Mode. However, the Ad-Hoc Mode only provides point-to-point communication, as illustrated in Figure 4, rather than multi-point-to-multi-point communication. 2 JADE Architecture JADE'S communication system follows the standards developed by FIPA, an international organization producing standards to achieve interoperability of heterogeneous sohare agents [3]. There are three roles that must be present in a FIPA compliant agent platform and their interactions, as shown in Figure 5. Figure 5. FIPA agent model [l] 2.1 Agent Management System (AMs) The AMS is an agent that is responsible for managing the operation of an Agent Platform (AP), such as the creation of agents, the deletion of agents and overseeing the migration of agents to and from the AF' [3]. Figure 4. Multipoint-to-multipoint communication Ideally, we would like to combine the IEEE wireless protocol with the functionality of a peer-to-peer collaborative system environment. Although this type of system is not yet available as a commercial product, we investigate what would be required to do this with JADE. In this paper, the emphasis will be placed on JADE and its role in the implementation of a wireless distributed system. An effective tool for extending JADE for a wireless, peer-to-peer environment is to utilize its current functionality for wired environments and convert it into a virtual wireless environment. A Virtual Wireless Environment (VWE) will be constructed to model any WDS by establishing intelligent links between nodes in a wired network. With such a system, we will be able to create scenarios in a wireless environment, such as signal failure, dynamic link establishment, and data quality over multiple hops. 2.2 Directory The DF is an agent that provides "yellow page" services to other agents. It stores descriptions of the agents and the services they offer. [3] 2.3 Agent Communication Channel (ACC) The ACC is an agent that uses the information provided by the AMs to route messages between agents either within or agents that reside on other platforms. The ACC provides Message Transport Service for FIPA ACL messages [3]. As shown in Figure 6, the AMs and DF are automatically created when the JADE platform is launched. The ACC allows message communication within and toifrom different platforms. The agent platforms can be split among several hosts and only one Java application is executed per host (with one Java V i 1 Machine). The Main Container hosts the AMs and DF, and other containers, which are possibly on other hosts, are connected to the Main Container to provide a complete run-time environment [7]. 990
3 ~ A B C Figure 8. Local area network whereas Node-C can communicate with Node-B and Node-E, as summarized in Table 1. For communication between agents residing in the same platform, JADE uses its Intemal Message Transport Protocols (IMTP) for message delivery. If both the sender and the receiver agents reside in the same container, JADE uses event passing for delivery of the message. When tbe sender and the receiver reside in different containers, JADE uses Remote Method Invocation (RMI) for message delivery [7]. To model this system with a wired network, restrictions are placed on the nodes so that the Sender Node (SN) can only communicate with its list of available Recipient Nodes (RN). Suppose that Node-A wishes to send messages to Node-?, then the message can no longer be routed directly as in a wired network. First, the message will be sent to Node-B, and then to Node-E. This particular scenario models a node in a WDS communicating with a node that is out of range. The SN depends on neighboring nodes to route messages to its RN. ^- MTP Figure 7. JADE messaging architecture [I] 3 Virtual Wireless Environment At the present time, there is no established environment available to properly test a wireless distributed system. Wireless LANs are not fully distributed because access points are required to route information. In a wired network, nodes are physically connected and information is passed directly from sender to recipient without going through intermediate nodes. However, in a wireless environment, each node is not fully aware of the extent of the entire network and with wbom they can communicate directly. As an example, consider a wired network consisting of 5 nodes, shown in Figure S. Suppose that we wish to model the following wireless network consisting of 5 nodes, as shown in Figure 9 where the enclosed circles represent signal range. In this example, Node-A can only communicate with Node-B Figure 9. Example of a Wireless Distributed System The links that are established need not be constantly available. Intelligent links can model different scenarios that may occur in a WDS, such as roaming and dynamic link cougestiodfailure. For example, in the wireless scenario shown in Figure IO, we suppose that Node-A is a roaming node. At f= to, Node-A has only Node-B as its RN. Table 1. Node connectivity r Sender Node I Available Recipients I 991
4 4 JADE in a Virtual Wireless Environment JADE is a software development framework for developing distributed systems and peer-to-peer applications. The major advantage of using JADE is that it simplifies the communication transport and message encoding through the middleware [I]. However, because JADE is designed for a wired network, inodifications are needed before it can be fully implemented with a wireless distributed system. Figure 10. Roaming node with intelligent links at f=to However, at t=ff, the sender (Node-A) will be at a different location, as shown in Figure 11, and a different RN set (Node-D and Node-E). JADE has the facility to communicate with other JADE peers that are withi reach of the wired network. However, in a wireless environment multiple hops may be required. To simulate multiple hops in a virtual wireless environment, the following two agents are added a Broadcusf Agenf that handles broadcasted messages toifram other nodes, and a Send-Receive Agent that senddreceives messages and determines the most efficient route for messages. In the V i 1 Wireless Environment, a SN can only send messages to its list of restricted RN, as determined by a user-defined scenario. This limitation is used to model the wireless nature of the WDS. Figure 11. Roaming nodewith intelligent links at t=ff This situation models a roaming node where its linkages are changing so that the list of RNs on individual nodes within a wired network will also be dynamic. We could also model other scenarios such as dynamic link congestiodfailnre by setting the links between nodes to be deleted or created as a function of time. Such a scenario can also be used to model the uncertainty of wireless transmission. Timing and administrative overhead issues can also be determined with a Virtual Wireless Environment. We can calculate the time required by messages to travel from one end of the network to another and the effects of multiple messages. We can measure the effectiveness of routing algorithms and also peer-to-peer environments. Figure 12. Wireless agent communication channel in an agent framework These two agents allow us to extend the functionality of the ACC to model a wireless environment. This latter feature has been implemented by a model we call the Wireless Agent Communication Channel (WACC), as illustrated in Figure 12. Unlike a wired network in which all nodes are aware of the existence of all other nodes, a wireless system is only aware of nodes within its signal range. When a new node becomes available, that information must be made available to the network by broadcasting its presence to neighboring nodes, which they broadcast to their neighbors. The process is repeated until all nodes become aware of the presence of a new node. 992 We incorporate this multi-hop functionality in JADE by adding a Global Directory Facilitator (GDF) that is
5 responsible for maintaining a current list of all agents and their services within each node's multi-hop signal range. This is an extension of the Directory Facilitator (DF) created by JADE that enables a node to be aware of other agents within its immediate surroundings, see Figure 13. IF- Figure 13. Global directory facilitator in an agent framework In addition, administrative overhead at the network level requires extension of the AMS. The Global Agent Management System (GAMS), which extends the functionalities of the AMs, is in direct communication with the GDF. The modified agent framework for a WDS is illustrated in Figure 14. By extending JADE with three subsystems (WACC, GDF, and GAMS), we have packaged the multi-hop functionality required for wireless communications from the normal JADE operational services. are needed, however, to accommodate their use with wireless systems. By allowing the user to control the connectivity and functionality of JADE peers, any wireless environment can be modeled using a wired network. In addition, since these subsystems are incorporated in JADE, the core functionality to manage a wireless environments is available. This Virtual Wireless Environment (VWE) can then be configured with wireless parameters such as dynamic link failures and latency. By extending the JADE framework so that it has the capability to create virtual environments, wired networks can be employed to allow algorithm and system developers the capability to simulate scenarios that occur in wireless environments. The extension enables JADE to have the functionality to function as a simulation environment for wireless system development and also to operate over wireless networks. References [I] JADE, Java Agent Development framework, [2] JXTA, [3] FIPA -Foundation for Intelligent Physical Agents, [4] FIF'A-OS, hap:// products/announcements/fip~ [5] Agent Oriented Software Group, [6] C. Ng, D. Sabaz and W. A. Gmver, "Distributed Algorithm Simulator for Wireless Peer-to-Peer Networks," Proc. of fhe IEEE Infemational Conference on Sysfem, Man, and Cybernetics. Hague, Netherlands, Figure 14. Modified agent framework for a WDS 5 Conclusions [7] E. Cortese, F. Quarta, and G. Vitaglione, "Scalability and Performance of the JADE Message Transport System," Proc. of the AAMAS Workshop on AgentCifies, Bologna, Italy, July A Wireless Distributed System is a scalable network that decentralizes the system into multiple, independent nodes capable of routing information to recipients. Agent platforms such as JADE, JXTA, FIPA-OS, and V-NET may be used to develop distributed systems. Modifications 993
Scalable Middleware Environment for Agent-Based Internet Applications]
Scalable Middleware Environment for Agent-Based Internet Applications] Benno J. Overeinder and Frances M.T. Brazier Department of Computer Science, Vrije Universiteit Amsterdam De Boelelaan 1081a, 1081
More informationA Mobile Agent Platform for Supporting Ad-hoc Network Environment
International Journal of Grid and Distributed Computing 9 A Mobile Agent Platform for Supporting Ad-hoc Network Environment Jinbae Park, Hyunsang Youn, Eunseok Lee School of Information and Communication
More informationInformation Collection and Survey Infrastructure, APIs, and Software Tools for Agent-based Systems (An Overview of JADE)
Course Number: SENG 609.22 Session: Fall, 2003 Document Name: Infrastructure, APIs, and Software tools for agent-based system (An Overview of JADE) Course Name: Agent-based Software Engineering Department:
More informationJade: Java Agent DEvelopment Framework Overview
Jade: Java Agent DEvelopment Framework Overview Multiagent Systems LM Sistemi Multiagente LM Stefano Mariani revised by Andrea Omicini s.mariani@unibo.it, andrea.omicini@unibo.it Dipartimento di Informatica:
More informationJade: Java Agent DEvelopment Framework Overview
Jade: Java Agent DEvelopment Framework Overview Stefano Mariani s.mariani@unibo.it Dipartimento di Informatica Scienza e Ingegneria (DISI) Alma Mater Studiorum Università di Bologna a Cesena Academic Year
More informationIntroduction. Distributed Systems IT332
Introduction Distributed Systems IT332 2 Outline Definition of A Distributed System Goals of Distributed Systems Types of Distributed Systems 3 Definition of A Distributed System A distributed systems
More informationCHAPTER 7 JAVA AGENT DEVELOPMENT ENVIRONMENT
CHAPTER 7 JAVA AGENT DEVELOPMENT ENVIRONMENT 159 Chapter 7 Java Agent Development Environment For more enhanced information resources it requires that the information system is distributed in a network
More informationLimited-Resource Systems Testing with Microagent Societies
Limited-Resource Systems Testing with Microagent Societies Liviu Miclea, Enyedi Szilárd, Lucian Buoniu, Mihai Abrudean, Ioan Stoian*, Andrei Vancea Technical University of Cluj-Napoca, Cluj-Napoca, Romania
More informationDesign and Implementation of Multimedia Service Management Agent on Home Networks Environment
IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.7B, July 2006 91 Design and Implementation of Multimedia Service Management Agent on Home Networks Environment Won-Joo Hwang,
More informationITEC 3800 Data Communication and Network. Introducing Networks
ITEC 3800 Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You
More informationData Communication and Network. Introducing Networks
Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You can connect
More informationFIPA-OS Feature Overview. Agent Technology Group Nortel Networks February 2000
FIPA-OS Feature Overview Agent Technology Group Nortel Networks February 2000 FIPA-OS - Aims FIPA-OS is a Open Source implementation of FIPA and is available for free. http://www.nort elnetworks.com/ fipa-os
More informationA-GATE: A System of Relay and Translation Gateways for Communication among Heterogeneous Agents in Ad Hoc Wireless Environments
A-GATE: A System of Relay and Translation Gateways for Communication among Heterogeneous Agents in Ad Hoc Wireless Environments Leelani Kumari Wickramasinghe 1, Seng Wai Loke 2, Arkady Zaslavsky 2, and
More informationThe History and the layers of the OSI Model 30 - October
THE OSI MODEL Established in 1947, the International Standards Organization (ISO) is a multinational body dedicated to worldwide agreement on international standards. An ISO standard that covers all aspects
More informationFIPA specification and JADE. Tomáš Poch
FIPA specification and JADE Tomáš Poch Agents System that is situated in some environment, and that is capable of autonomous action in this environment in order to meet its design objectives [Wooldridge
More informationDYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET
DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,
More informationChapter 7 CONCLUSION
97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in
More informationAgent Migration over FIPA ACL Messages
Joan Ametller, Sergi Robles, and Joan Borrell Computer Science Dept. Universitat Autònoma de Barcelona 08193 Bellaterra, Spain Joan.Ametller@uab.es Abstract. In this paper, we present the design and implementation
More informationFigure 1: Ad-Hoc routing protocols.
Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca
More informationPerformance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks
Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks P.Suganthi Research Scholar Mother Teresa Women s University Kodaikanal, TamilNadu, India Dr.A.Tamilarasi
More informationFundamental Issues. System Models and Networking Chapter 2,3. System Models. Architectural Model. Middleware. Bina Ramamurthy
System Models and Networking Chapter 2,3 Bina Ramamurthy Fundamental Issues There is no global time. All communications are by means of messages. Message communication may be affected by network delays
More informationAn Ambient Intelligence Application Integrating Agent and Service-Oriented Technologies
An Ambient Intelligence Application Integrating Agent and -Oriented Technologies Nikolaos Spanoudakis a, b Pavlos Moraitis b a Singular Logic S.A. nspan@singularlogic.eu www.singularlogic.eu b Paris Descartes
More informationA Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile Ad hoc Networks
5th ACM Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN) A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile
More informationPROVIDING MESSAGING INTEROPERABILITY IN FIPA COMMUNICATION ARCHITECTURE
PROVIDING MESSAGING INTEROPERABILITY IN FIPA COMMUNICATION ARCHITECTURE Heikki Helin 1 and Stefano Campadello 2 1 Sonera Corporation P.O.Box 970, FIN-00051 Sonera, Finland Heikki.j.Helin@sonera.com 2 Nokia
More informationThe Open System Interconnect model
The Open System Interconnect model Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 1 Layered network design Data networks are usually
More informationAn Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs
An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs Jin Liu 1, Hongmin Ren 1, Jun Wang 2, Jin Wang 2 1 College of Information Engineering, Shanghai Maritime University,
More informationChapter 16 Networking
Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer
More informationProbabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS
, pp.479-486 http://dx.doi.org/1.14257/astl.217.147.67 Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS G Parimala 1, B Suvarna 2, N Rajeswari 3 and Venkatesulu Dondeti 4 VFSTR University,
More informationComputation of Multiple Node Disjoint Paths
Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes
More informationINTRODUCTION TO ICT.
INTRODUCTION TO ICT. (Introducing Basic Network Concepts) Lecture # 24-25 By: M.Nadeem Akhtar. Department of CS & IT. URL: https://sites.google.com/site/nadeemcsuoliict/home/lectures 1 INTRODUCTION TO
More informationDISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 1. Introduction
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 1 Introduction Definition of a Distributed System (1) A distributed system is: A collection of
More informationChapter 2 Architectures. Software Architectures
Chapter 2 Architectures Software architectures of distributed systems System architectures of distributed systems 1 Software Architectures Software architecture describes how the software components are
More informationSERVICE DISCOVERY IN MOBILE PEER-TO-PEER ENVIRONMENT
SERVICE DISCOVERY IN MOBILE PEER-TO-PEER ENVIRONMENT Arto Hämäläinen Lappeenranta University of Technology P.O. Box 20, 53851 Lappeenranta, Finland arto.hamalainen@lut.fi Jari Porras Lappeenranta University
More informationA Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET
A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET Bhagyashri Thakre 1, Archana Raut 2 1 M.E. Student, Mobile Technology, G H Raisoni College of Engineering, Nagpur, India 2 Assistant
More informationSimulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol
Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-
More informationDEVELOPING A NEW MECHANISM FOR LOCATING AND MANAGING MOBILE AGENTS
Journal of Engineering Science and Technology Vol. 7, No. 5 (2012) 614-622 School of Engineering, Taylor s University DEVELOPING A NEW MECHANISM FOR LOCATING AND MANAGING MOBILE AGENTS AHMED Y. YOUSUF*,
More informationGSM Based Comparative Investigation of Hybrid Routing Protocols in MANETS
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 3, Ver. II (May - Jun. 214), PP 82-86 GSM Based Comparative Investigation of Hybrid
More informationDynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks
Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University
More informationMulti-path Forward Error Correction Control Scheme with Path Interleaving
Multi-path Forward Error Correction Control Scheme with Path Interleaving Ming-Fong Tsai, Chun-Yi Kuo, Chun-Nan Kuo and Ce-Kuen Shieh Department of Electrical Engineering, National Cheng Kung University,
More informationTowards a Sensor Network Architecture: Issues and Challenges. Muneeb Ali LUMS, Pakistan SICS, Sweden
Towards a Sensor Network Architecture: Issues and Challenges Muneeb Ali LUMS, Pakistan SICS, Sweden Talk at Knuth SICS, Sweden, November 2005 Outline Introduction Internet vs Sensor Networks Towards a
More informationOPAX - An Open Peer-to-Peer Architecture for XML Message Exchange
OPAX - An Open Peer-to-Peer Architecture for XML Message Exchange Bernhard Schandl, University of Vienna bernhard.schandl@univie.ac.at Users wishing to find multimedia material about interesting events
More informationPerformance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV
MIT International Journal of Electrical and Instrumentation Engineering, Vol. 3, No. 2, August 2013, pp. 57 61 57 Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through
More informationWZRDnet. A Low-Power Wireless Ad-Hoc Mesh Network for Austere Tactical Environments. February 14, 2018
White Paper TELEGRID Technologies, Inc. WZRDnet A Low-Power Wireless Ad-Hoc Mesh Network for Austere Tactical Environments February 14, 2018 23 Vreeland Road Suite 290 Florham Park, NJ 07932 www.telegrid.com
More informationPart I. Wireless Communication
1 Part I. Wireless Communication 1.5 Topologies of cellular and ad-hoc networks 2 Introduction Cellular telephony has forever changed the way people communicate with one another. Cellular networks enable
More informationTowards developing multi-agent systems in Ada G. Aranda, J. Palanca, A. Espinosa, A. Terrasa, and A. García-Fornes {garanda,jpalanca,aespinos,aterrasa,agarcia}@dsic.upv.es Information Systems and Computation
More informationTowards a FIPA Approach for Mobile Ad hoc Environments
Towards a FIPA Approach for Mobile Ad hoc Environments Michael Berger 1, Michael Watzke 1, Heikki Helin 2 1 Siemens AG, Corporate Technology, Intelligent Autonomous Systems Group, Otto-Hahn-Ring 6, 81739
More informationOutline Multi-agent Platforms. Existing problems. Existing problems (2)
Multi-agent Platforms Cosmin Carabelea Why multi-agent platforms? Examples of multi-agent platforms Cosmin.Carabelea@emse.fr SMA/SIMMO ENS Mines Saint-Etienne September 30 th, 2003 1 2 Existing problems
More informationAnalysis of Black-Hole Attack in MANET using AODV Routing Protocol
Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication
More informationSecuring MANETs using Cluster-based Certificate Revocation Method: An Overview
Securing MANETs using Cluster-based Certificate Revocation Method: An Overview Mrs. Dipti S. Sawant Dept. of Computer Engineering, Sinhgad College of Engineering, Pune, India. 411 041 Prof. J. E. Kamalasekaran
More informationKeywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.
Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Various
More informationIntroduction to Networking
Introduction to Networking The fundamental purpose of data communications is to exchange information between user's computers, terminals and applications programs. Simplified Communications System Block
More informationAnalyzation of Automatic Repeat Request (ARQ) Protocols
RESEARCH ARTICLE OPEN ACCESS Analyzation of Automatic Repeat Request (ARQ) Protocols 1 Jeshvina.S, 2 Sneha.P, 3 Saraanya.S Final year BCA, Dept of Computer Science New Horizon College Kasturinagar, Bangalore
More informationChapter 5 INTRODUCTION TO MOBILE AGENT
Chapter 5 INTRODUCTION TO MOBILE AGENT 135 Chapter 5 Introductions to Mobile Agent 5.1 Mobile agents What is an agent? In fact a software program is containing an intelligence to help users and take action
More informationProtocol for Tetherless Computing
Protocol for Tetherless Computing S. Keshav P. Darragh A. Seth S. Fung School of Computer Science University of Waterloo Waterloo, Canada, N2L 3G1 1. Introduction Tetherless computing involves asynchronous
More informationMobile Computing Introduction
Mobile Computing Introduction UNIT - 1 Prepared By:- NITIN PANDYA Assistant Professor, SVBIT. What is Mobile Computing 2 NTIIN PANDYA 3 NTIIN PANDYA Definitions Mobile Computing What is mobile computing?
More informationPerformance Evaluation of MANET through NS2 Simulation
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation
More informationComputer Networks Prof. Ashok K. Agrawala
CMSC417 Computer Networks Prof. Ashok K. Agrawala 2017 Ashok Agrawala September 25, 2018 Fall 2018 CMSC417 1 Message, Segment, Packet, and Frame Fall 2018 CMSC417 2 Hierarchical Routing Hierarchical routing.
More informationDISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 1. Introduction
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 1 Introduction Modified by: Dr. Ramzi Saifan Definition of a Distributed System (1) A distributed
More informationICMP (Internet Control Message Protocol)
ABSTRACT : ICMP stands for internet control message protocol it is a vital protocol of network layer among the seven layers of OSI(open system interconnection). Here we deal with the several situations
More informationVaibhav Jain 2, Pawan kumar 3 2,3 Assistant Professor, ECE Deptt. Vaish College of Engineering, Rohtak, India. Rohtak, India
Volume 3, Issue 8, August 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Improved OLSR
More informationInfrastructure for Autonomous Mobile Robots Communication and Coordination
90 Work in Progress Session Infrastructure for Autonomous Mobile Robots Communication and Coordination Marcelo M. Sobral, Leandro B. Becker Dept of Automation and Systems Universidade Federal de Santa
More informationStudy and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs
Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Rajneesh Gujral Associate Proffesor (CSE Deptt.) Maharishi Markandeshwar University, Mullana, Ambala Sanjeev Rana Associate
More informationDynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet
African Journal of Basic & Applied Sciences 9 (1): 27-32, 2017 ISSN 2079-2034 IDOSI Publications, 2017 DOI: 10.5829/idosi.ajbas.2017.27.32 Dynamic Search Technique Used for Improving Passive Source Routing
More informationTCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS
TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS Deddy Chandra and Richard J. Harris School of Electrical and Computer System Engineering Royal Melbourne Institute of Technology Melbourne, Australia
More informationPRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS
PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS 1 PRASHANTH JAYAKUMAR, 2 P.S.KHANAGOUDAR, 3 VINAY KAVERI 1,3 Department of CSE, GIT, Belgaum, 2 Assistant Professor, Dept.
More informationEnergy Efficient EE-DSR Protocol for MANET
Energy Efficient EE- Protocol for MANET 1 Mr. Prakash Patel, 2 Ms. Tarulata Chauhan 1 Department of Computer engineering, 1 LJ Institute of Technology, Ahmedabad, India 1 prakashpmp1990@gmail.com, 2 taruchauhan114@gmail.com
More informationA Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols
International Journal of Computer Science & Communication Vol. 1, No. 2, July-December 2010, pp. 185-189 A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols B.V. Manikyala Rao
More informationChapter 2 Network Models 2.1
Chapter 2 Network Models 2.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Network Models n Network Architecture: n A) Hardware: at the core of any network;
More informationPerformance analysis of QoS-Oriented Distributed Routing protocols for wireless networks using NS-2.35
Performance analysis of QoS-Oriented Distributed Routing protocols for wireless networks using NS-2.35 Manpreet Singh Team number 8 Project webpage-http://manpreetensc833.weebly.com/ ENSC 833 : NETWORK
More informationInterface The exit interface a packet will take when destined for a specific network.
The Network Layer The Network layer (also called layer 3) manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that the Network
More informationDetection and Removal of Black Hole Attack in Mobile Ad hoc Network
Detection and Removal of Black Hole Attack in Mobile Ad hoc Network Harmandeep Kaur, Mr. Amarvir Singh Abstract A mobile ad hoc network consists of large number of inexpensive nodes which are geographically
More informationThe OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).
Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication
More informationGuide to Networking Essentials Fifth Edition. Chapter 2 Network Design Essentials
Guide to Networking Essentials Fifth Edition Chapter 2 Network Design Essentials Objectives Explain the basics of a network layout Describe the standard networking topologies Explain the variations on
More informationLightweight Communication Platform for Heterogeneous Multi-context Systems: A Preliminary Report
Lightweight Communication Platform for Heterogeneous Multi-context Systems: A Preliminary Report Vladimír Dziuban, Michal Čertický, Jozef Šiška, and Michal Vince Department of Applied Informatics, Faculty
More informationUNIT II NETWORKING
UNIT II INTRODUCTION TO WIRELESS NETWORKING Wireless Network The cellular telephone system is responsible for providing coverage throughout a particular area known as coverage region or market The interconnection
More informationPerformance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols
www.ijcsi.org 551 Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols Kashif Ibrahim Qazi Javed Ahmed Abdul Qudoos Mirza Aamir Mehmood Department of Computer Science, Balochistan
More informationAPPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE
APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE William Stallings F.1 TCP/IP LAYERS... 2 F.2 TCP AND UDP... 4 F.3 OPERATION OF TCP/IP... 6 F.4 TCP/IP APPLICATIONS... 10 Copyright 2014 Supplement to Computer
More informationDecentralized Architecture for Fault Tolerant Multi Agent System
Decentralized Architecture for Fault Tolerant Multi Agent System Zaheer Abbas Khan, Salman Shahid, H. Farooq Ahmad 2, Arshad Ali, Hiroki Suguri 2 NUST Institute of Information Technology, Chaklala Scheme
More informationMultipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network
1 Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network Nilima Walde, Assistant Professor, Department of Information Technology, Army Institute of Technology, Pune, India Dhananjay
More informationCSMA based Medium Access Control for Wireless Sensor Network
CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because
More informationEnhanced IGRP. Chapter Goals. Enhanced IGRP Capabilities and Attributes CHAPTER
40 CHAPTER Chapter Goals Identify the four key technologies employed by (EIGRP). Understand the Diffusing Update Algorithm (DUAL), and describe how it improves the operational efficiency of EIGRP. Learn
More informationDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES B.Poonguzharselvi 1 and V.Vetriselvi 2 1,2 Department of Computer Science and Engineering, College of Engineering Guindy, Anna University Chennai,
More informationContent. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.
Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management
More informationReplica Distribution Scheme for Location-Dependent Data in Vehicular Ad Hoc Networks using a Small Number of Fixed Nodes
Replica Distribution Scheme for Location-Dependent Data in Vehicular d Hoc Networks using a Small Number of Fixed Nodes Junichiro Okamoto and Susumu Ishihara Graduate School of Engineering, Shizuoka University,
More informationGateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario
Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario K.Gautham 1, Nagajothi A 2 Student, Computer Science and Engineering,
More informationSupporting Nomadic Agent-based Applications in the FIPA Agent Architecture
Supporting Nomadic Agent-based Applications in the FIPA Agent Architecture Heikki Helin (Heikki.j.Helin@teliasonera.com) FDPW 03, Petrozavodsk, June 26 th, 2003 Introduction Multi-agent system implementing
More informationRouting Protocols in MANETs
Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an
More information2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)
2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing
More information3. Evaluation of Selected Tree and Mesh based Routing Protocols
33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in
More informationA SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
Journal homepage: www.mjret.in ISSN:2348-6953 A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Ms. Amruta Kodole 1, Prof. P. M. Agarkar 2 Computer Engineering Dr. D. Y. Patil School Of Engineering
More informationImportance of Interoperability in High Speed Seamless Redundancy (HSR) Communication Networks
Importance of Interoperability in High Speed Seamless Redundancy (HSR) Communication Networks Richard Harada Product Manager RuggedCom Inc. Introduction Reliable and fault tolerant high speed communication
More informationTCP/IP THE TCP/IP ARCHITECTURE
TCP/IP-1 The Internet Protocol (IP) enables communications across a vast and heterogeneous collection of networks that are based on different technologies. Any host computer that is connected to the Internet
More informationEnergy aware geographic routing in wireless sensor networks with anchor nodes. Mircea Cretu Stancu Utrecht University Computing Science May 2013
Energy aware geographic routing in wireless sensor networks with anchor nodes Mircea Cretu Stancu Utrecht University Computing Science May 2013 Overview Introduction Current paradigm EAGR preliminaries
More informationPerformance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s
Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations
More informationWireless technology Principles of Security
Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the
More informationInternational Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET
Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 11, November -2017 Improved OLSR Protocol for VANET Ravi Shrimali
More informationRouting Protocols in Mobile Ad-Hoc Network
International Journal of Computer Science & Management Studies, Vol. 12, Issue 02, April 2012 Protocols in Mobile Ad-Hoc Network Sachin Minocha M. Tech Student, Vaish College of Engineering, Rohtak, Haryana
More informationZonal Rumor Routing for. Wireless Sensor Networks
Tarun Banka Department of Electrical and Computer Engineering tarunb@engr.colostate.edu Zonal Rumor Routing for. Wireless Sensor Networks Gagan Tandon Department of Computer Science gagan@cs.colostate.edu
More informationApplications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs
Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs James T. Yu and Chibiao Liu School of Computer Science, Telecommunications, and Information Systems DePaul University,
More informationPervasive and Mobile Computing. Dr. Atiq Ahmed. Introduction Network Definitions Network Technologies Network Functions 1/38
Department of Computer Science & Information Technology University of Balochistan Course Objectives To discuss the fundamental problems in the emerging area of mobile and pervasive computing, along with
More information