Service Access Point. Service Access point. Lieu A. Lieu B. Service Access Point. Lieu C
|
|
- Brent McKenzie
- 5 years ago
- Views:
Transcription
1 Mobile Agents for Enabling Mobile User Aware Applications Akhil Sahai, Christine Morin INRIA-IRISA Campus de beaulieu 3542, Rennes CEDEX, France Abstract Mobile agents based computing has been propounded as the possible approach to next generation computing. The approach has been shown to be eective in dierent domains, especially in the area of mobile and partially connected computing. We describe the design and implementation details of MAGENTA (Mobile AGENT environment for distributed Applications) and the mechanisms it provides for enabling applications supporting mobile users. MAGENTA is a generic mobile agent environment and provides the agents the capabilities of autonomy, reactivity, proactivity and communication. In order to demonstrate the functionalities provided by MAGENTA to mobile users we have applied it in the domain of network management in order to implement a Mobile Network Manager (MNM). We also present the performance evaluation results of MAGENTA. Keywords: 1 Introduction mobile agents, mobile computing, Java. Mobile users pose a new problem to the applications catering to static users. The mobile user aware applications must thus utilize special mechanisms in order to be useful to mobile users. Mobile users are characterized by the costly and fallible link they utilize and the resource constrained computer they operate on. In order to support mobile users the mobile agent paradigm can be used as it is ideally suited to the partially connected mode of computing. Mobile agents are autonomous programs that can move through a network from host to host under their own control, interacting with resources and other agents. The motivation behind MAGENTA was to adapt it to real-world situations. As the networks are becoming more and more complex and mobile user coexist with the static users, it is necessary to support a variety ofusers in realworld applications. MAGENTA environment was developed to provide support services for intermittently connected computing. MAGENTA is a generic mobile agent environment which satises weaker notion of agency i.e the agents exhibit autonomy, reactivity, proactivity and social ability. The agents perform goal-directed behaviour, interact with the system as well as the other agents, move and perceive the changes in the environment toachieve a predened goal. MAGENTA also provides easy extensibility, fault-tolerance, dynamic adaptability tochanges in the environment, exibility in the location of code, remote execution and simultaneous execution which go a long way inproviding support to mobile users. MAGENTA environment has been developed in Java and has been utilized for implementation of a Mobile Network Manager (MNM) which isanetwork manager executing on a portable computer. The rest of the paper is structured as follows. The subsequent section provides details about the characteristics of mobile computing. This, is followed by a brief overview of mobile agents and their utilization in the domain of mobile computing. We present the support features of the MA- GENTA environment which make it capable of providing for mobile users in the subsequent section. Section 5 details the application of MAGENTA in a mobile user aware application. Section 6 provides the performance results before concluding. 2 Characteristics of a mobile computing environment Mobile computing as the name suggests, is a domain encompassing the mobility aspects of computing. The mobility could be one of the following types: Only the users are mobile while the computers are stationary. Although the user and the computer are both mobile within the network, they are both stationary while working. The users while working on their computers are mobile. In this case the problems of locating mobile entities as well as message routing and connection management are to be dealt with. Mobile computing is characterized by the resource constrained portable computer and the communication. The mobile computer need to be small and light-weight. Thus such devices are decient in memory and processing power. As a result they are capable of supporting only those programs which donot take uplotof resources. The mobile computers being battery powered are also prone to frequent disconnections which might beentailed because of battery discharge. The power sources of typical palmtops range from
2 8 AA batteries (each AA battery has 9 mah at 1.2V) to rechargeable NiCd batteries (2.4Ah at 1.8 V) which gives a low battery life of typically between 3 to 8 hours. The IBM ThinkPad 76EL we used for experimentation has a capacity of (3. Ah at 1.8V cc) which limits its battery life to approximately 3 hours. The mobile computer can either connect to the wired network permanently or on a temporary basis. The permanent connection can be achieved by radio links whereas temporary connections are made through telephone lines and modems. The temporary connections are usually made using telephone lines and the PPP or SLIP protocol. In such a case no movement is possible during the communication and the bandwidth oered by the telephone networks is poor. Permanent connection requires the additional overhead of mobility management and routing. In [9] [1] various approaches towards the mobility management insuch cases have been proposed. The permanent connections are made using wireless techniques. The wireless networks that are available for usage are cellular networks, wireless LANs, wide area wireless networks and paging networks. These wireless networks do not have a large bandwidth available to them as compared to their wired counterparts. Some of the wireless LANs that are available are NCR's wavelan, Motorola's ALTAIR, Proxims Range LAN and Telesystem's ARLAN. They operate in the MHz (ISM) band and the specications ranges from 25bps to 2 Mbps with a range of 5 to 1 meters, indoors and a range of few kilometers outdoors [13]. 3 Mobile agents for mobile computing In a wired network, the machines interact over the network through a logical connection. They exchange messages in order to carry out this interaction. The client-server paradigm although being highly prevalent in a wired network and in spite of attempts to utilise this technology in the domain of mobile computing has been found to have unsatisfactory performance. The client-server paradigm assumes a tight coupling between the machines and assumes the presence and reliability of the machines as well as the bandwidth in case of a prolonged interaction between them. However in the domain of mobile computing, the link is highly fallible, has serious bandwidth constraints and has high latency and is prone to sudden failures such as when a signal from a cellular modem is blocked by an obstacle. The mobile devices are inherently short of energy due to the limited acceptable weight of their batteries. The mobile agent approach decouples the interacting partners. The mobile agent approach provides a means of asynchronous and remote execution and thus does not necessitate the presence of the partners. This approach also removes the constraints of message passing and constant bandwidth requirement. Mobile agents have been used for mobile computing in AgentTCL [14]. Adocking mechanism has been used to provide for the disconnected mode of operation of the portable computer. However, this scheme diers from the scheme we propose in the paper. Concordia [15] agents provides support for mobile computing as well as oine processing in a manner transparent to the user. Telescript one of the premier mobile agent systems from General Magic which supported mobile devices like PDAs is being replaced by Odyssey [4]. The design and implementation details of Odyssey are not clear. There are several other projects which are developing agent environments and few of them are Tacoma [16], Ara [18], Mole [17]. However, the few projects mentioned above have not considered mobile platforms as yet. Some distributed le systems provide support for disconnected operation, as in Coda[1] and Ficus [2]. In the Rover system [3] queued RPC and relocatable dynamic objects are used. These relocatable dynamic objects are incapable of moving halfway through their execution and thus cannot be classied as mobile agents. 4 MAGENTA for mobile users The architecture of MAGENTA comprises of lieus and agents as shown in Figure 1. A lieu is a place or location where an agent can originate, reside, execute and interact with the system as well as with other agents. An agent is a program which moves between the lieus and utilises the lieu to perform it's functions. The agents have globally unique name, have apurpose which denes its type and behave autonomously. Theymove between the lieus carrying with them their data and program state. They have afolder to carry their results and can meet with other agents and exchange notes. A meet operation is enabled by the lieu to enable local communication between the agents. They also carry a history which stores all the tasks performed by the agent and knowledge which stores the information it gathers about the failed sites as it traverses its itinerary. s have unique names. A lieu provides the execution environment for the incoming agents. The incoming agents are rst authenticated to determine their suitability for execution. After the agent passes the security requirements of the lieu, the agent is allowed to access the services available at the lieu through the service access point. The lieu facilitates the agents to communicate with other agents and to move to other sites. They also allow the agents to reside. This becomes important in the case when lieus running on mobile devices disappear either in a planned or in an unplanned manner. The agents destined for such lieus reside at the last lieus of their itinerary waiting for such lieusto reappear. It is also important in the case of meet operation where an agent might have towait at a lieu to meet another agent. Each lieu has a repository of all the agents created and dispatched by it and of the agents executing on it and so it keeps the trace of the agents. A lieu also maintains information about all the executing agents. They maintain the backup copies of agents absent locally as long as they do not get the instruction from another lieu to delete the copy. The architecture of MAGENTA in addition to general features provides support mechanisms for mobile users. Some of the important mechanisms are as follows: 4.1 Remote Execution A lieu can be requested by a remote site to launch anagent on its behalf and can collect the results of the computation performed by the agent remotely. The requesting site could be a lieu or a non MAGENTA site. On request, the agents are launched by the lieu after authenticating the remote site. MAGENTA thus provides extremely resource constrained devices like Personal Digital Assistants(PDAs) the facility to utilise the mobile agent functionalities and obtain the results of the computation without executing a lieu. Portable computers executing a non-java capable OS can also request a MAGENTA lieu to launch agents on its behalf.
3 A Service Access Point C B Service Access Point Figure 1: An overview of MAGENTA 4.2 Appearance and disappearance of lieus Service Access point The mobile computers are characterized by their intermittently connected mode of operation. They usually disconnect a short while after connection which is most of the times preplanned and sometimes unplanned (because of break in connection). They are also likely to connect randomly. MA- GENTA provides for such likelihoods. In MAGENTA the lieus can appear dynamically and disappear dynamically. This disappearance can be planned or unplanned. In case of planned disappearance a mechanism of exit is provided to the lieus. The lieu informs all the other lieus about its imminent disappearance and then quits gracefully. When the lieu reappears subsequently all the lieus in the environment are informed about the appearance of the new lieu. Adis- tributed update of information is thus carried out. In case of abrupt disappearance of the lieu, fault-tolerance mechanisms are provided for detecting such disappearances. To communicate with other lieus, every lieu maintains information about all other lieus in the system. To update this information and to detect abrupt disappearances of lieus, the following mechanism is used. Each agent, moving from a lieu to another avoids the unavailable lieus found during its travel, dynamically changing its itinerary and keeping track of the failed lieus in its variable knowledge. When the agent arrives at the last destination of its itinerary, itprovides the lieu information about the unavailable lieus, if there are such failed lieus, then the destination lieu informs all other lieus about the disappeared lieus. On receiving this information, all other lieus update their local information. So the failure of a lieu running on a mobile computer which disconnects abruptly can be discovered by an agent not launched by it but having it in its itinerary. A lieu executing on a portable computer might disappear abruptly after launching an agent. The agent after nishing its itinerary moves to the last destination lieu on the wired network. It tries to move to the mobile lieu but it fails in its attempt. It informs the lieu of residence about its failure which in turn informs all other present lieus about the abrupt disappearance of the mobile lieu. Thus a failed lieu is also discovered by the agents launched by it when they try to come back to it at the end of itinerary. The agent in this case waits on the last static lieu for the mobile lieu to connect back. 4.3 Flexible choice of location of the code to be executed The code of an agent moving from a sending lieu to a receiving lieu can exist on the receiving lieu or on the sending lieu. In the latter case the agent brings its code of execution to the receiving lieu. So, the choice can be made depending on the resources available on the machine executing the sending lieu and the receiving lieu. If the code is predened and is to be constantly used over a period of time, the code could be placed at the receiving lieu. If however the program is going to change over time and the sending lieu machine has enough resources to provide for saving of les locally the code could be stored at the sending machines and the agent thus carry their code when they leave the sending lieu. MA- GENTA thus provides a exible policy in placement of code. Depending on the resources of the host machine the choice could be made. 4.4 Minimization of code overhead In order to execute an agent the template of the agent and the code which needs to be executed by theagent are required. New agents can be created and utilized irrespective of the location of the agent template code. In order to do that, the feature of Java (programming language used to implement MAGENTA) have been used. Especially, a class loader for the class that implements the agent object has been designed. At the rst occurrence of this class, the class loader loads the agent template class from the network. Afterwards, the loaded class is put in a local hash table from which it is retrieved in the future. In this way, it isn't necessary to have in each host copies of the same class implementation, thus a mobile computer sending an agent to a remote site in a wired network need not store the agent template which are stored at a predened site in the wired network. As soon as the agent migrates from the mobile computer to another lieu the related agent classes are loaded by the class loader of the new lieu from the mobile computer and in the absence of agent template on the mobile computer they are loaded from the predened lieu. Thus the resources consumed of the mobile computers is reduced. 4.5 Tolerating site failures The agents and the lieus can fall prey to numerous accidents. The agents and the lieus might disappear because of abrupt disconnection of the portable computer or the crashing of the system executing the lieu. Fault tolerance schemes have been provided to minimize the overheads associated in detection and recovery from such site failures. In MAGENTA we provide for disappearance and recreation of agents from a single fault at a time. We maintain backup copies of the agents in order to take care of abrupt disappearance of an agent. In order to reduce the number of backup copies and to reduce the communication which results in case of disappearance of an agent we employ a scheme to maintain judicious number of copies. A lieu before sending an agent to the next lieu saves a copy of it and takes the temporary responsibility of detecting the failure of the next lieu. The next lieu after sending the agent to another lieu informs the lieu with the backup to remove the backup. The lieu with the backup periodically performs checks on the next lieu until it receives a message from the next lieu to destroy the backup. In case such a message is not received by the lieu with the backup within timeout and
4 if it detects that the next lieu has crashed it recreates the agent from the backup copy. This can be better explained with an example. Before an agent moves from a lieu, lets call it a lieu A to the next lieu, say lieu B it makes a copy of itself on lieu A. B processes this agent and makes a copy of it before moving it to the next lieu, say lieu C. As soon as the agent is successfully moved to the lieu C, lieu B requests lieu A to delete the copy of the agent. In case lieu B discovers that it is not possible to move the agent to lieu C because of some problem, it tries to reach lieu D. In case this operation is successfully carried out it asks lieu A to delete the copy. B after successfully moving the agent to the next lieu waits for a message from the next lieu, say lieu C. In case, the lieu C fails to send message to lieu B, lieu B understands that lieu C has not been able to move the agent to the next site in the itinerary because of some problems. It thus rst does its own check to nd out the problem. In case lieu C has crashed the backup copy of the agent on lieu B is used to create the agent and is passed to the next alive lieu. This scheme thus takes care of single fault and regeneration of agent by keeping the messages to a bare minimum. A B Agent copies itself and moves from A to B A B C Agent successfully moves to C from B. A B C B request A to delete its copy. A B D B does not receive message from C which crashes. B checks and sends agent to D instead. Figure 2: The implementation of fault-tolerance scheme in MAGENTA 4.6 Directory services for agents In MAGENTA a directory service has been provided so as to trace the agents. Every lieu can request all the other lieu about the latest information about the agents present on them and launched by them. This comes in handy to the mobile lieu which after launching an array of agents can connect back and determine the status of all the agents sent by it. 4.7 Simultaneous and fast execution The agents' execution on a lieu is multi threaded in nature so that all the agents can run simultaneously on the same lieu. This enables a portable computer to launch a large number of agents without bothering about their itinerary and performance before disconnecting. Thus the mobile user need not wait for other agents to nish operation before launching new agents. 5 MAGENTA in a mobile user aware application The MAGENTA environment being generic in nature it can be utilised for a variety of applications supporting mobile users. we utilized the MAGENTA environment in the domain of network management. In this context we enabled a Mobile Network Manager (MNM) to manage a network from a portable computer. The administrator of the network in this case is thus the mobile user. In order to appreciate the functioning of the MNM, the basics of network management in brief are presented. 5.1 Network Management Network management comprises essentially of monitoring and control of network elements. Network monitoring involves observing and analyzing the status of the network, and thus does not involve interference in the network functioning. Network control involves active interference and conguration of the state of the network. ANetwork Management System (NMS) essentially comprises of a manager managing the network elements and using a management protocol. The management protocol which has found extensive usage is the SNMP (Simple Network Management Protocol) [2]. The manager communicates with the SNMP agents executing on the managed nodes through a set of management primitives. The SNMP agents are static programs which execute on the managed nodes and provide the manager the information it requests from time to time. A NMS provides the functionalities of conguration of the network, monitoring of the network, studying the performance of the network, handling of security of the network and studying of the alarms being generated in the network Mobile Network Manager A MNM is a network manager executing on a portable computer and managing a network comprising of static network components executing SNMP agents. The MNM queries the SNMP agents about the network management variables and obtains their values. In order to demonstrate the functionalities of the MAGENTA environment wehave enabled the MNM through mobile agents. The MNM and the SNMP agents are integrated with MAGENTA lieussothattheyare capable of sending, receiving and storing the agents as shown in Figure.3. The agents are utilized to study the performance of network components, install software, audit the network components (by collecting the information on disk usage, users utilizing the machine, application conguration etc) and for network discovery. The MNM operates in either tethered mode or in wireless mode. The MNM typically sends a large number of agents to implement a variety of desired actions. After sending the agents it might disconnect, the agent after completing its itinerary waits at the last lieu of its itinerary. If the MNM had quit gracefully informing all other lieus about its disappearance, the agent waits for the MNM lieu to connect back. In case the MNM had disappeared abruptly, the agent tries to reach the MNM lieu being unaware of its absence. As it fails to reach the MNM lieu the agent again waits for the MNM lieu to connect back. The lieu hosting the agentat this moment informs all other lieus about the disappearance of MNM lieu. When the MNM connects back all the lieus are informed about the appearance of the MNM lieu. The agent waiting for the MNM at the last lieu returns back to it with the results.
5 A MNM operating in tethered mode makes a PPP/SLIP connection to the wired network. In such a case after the connection is established the portable computer is assigned a internet address local to the LAN to which it connects. This connection can be teared down after launching the agents and might be reestablished once the administrator deems it t to reconnect. In wireless computing the total domain is divided into cells. Each ofthecellshave a Mobile Support Station (MSS) of their own. The responsibility of serving the Mobile Host (MH) as it moves from one cell to another cell changes from one MSS to another [9][1]. The operation of MNM in case of a wireless network is shown in Figure.3. The MNM sends an agent from a particular cell and moves to another cell. The agent moves on its itinerary and tries to come back to the MNM after accomplishing its task. The agent isdirected to the new cell of the MNM by the MSS. The agent thus returns with the results of tasks performed by it. Wired network Mobile agent MSS MSS Manager Initial cell of the portable Manager Mobile IP Mobile agent Final cell of the portable Figure 3: Mobile Network Manager in the wireless mode 6 Performance Evaluation 6.1 MAGENTA in general The performance evaluation was carried out by executing lieus on two machines, wallace and boule (Sun Sparc machines executing SunOS 5.5). These two machines are connected by a 1 Mbps ethernet with no intervening router. The average time to launch an agent i.e to send an agent after initializing it from one lieu executing at wallace was found to be.371 seconds while the time for starting remote execution i.e requesting a remote lieu running at boule to startanagent on behalf of wallace was found to be.52 secs as it involved sending a message. In the former case the agent is sent by the lieu on wallace while in the latter case a simple request is sent toboule to prepare for a launch ofthe agent on its behalf. However, the time to request the results of the computation from boule by wallace was found to be.48 secs as it involved sending a request, searching ofthe results at boule and sending of the results back towallace. A comparison with dierent locations of code was also tried out. In the rst case the agent was sent from wallace to boule with only its state while the code to be executed was placed at boule. The code retrieves a le from the local le system and stores it in the agents folder. The time for the agent to return back after performing its task was found to be.931 secs. In the second case the agent was sent withits code and state from wallace to boule and the time measured was.993 seconds. So it is apparent that with larger size of the code to be transported and executed the response time would be higher in the latter case. 6.2 MAGENTA in a mobile user aware application We intended to study the suitability of mobile agents in the context of its utilization in mobile user aware applications as compared to the existing client-server mechanisms. Especially in the case of mobile users the network bandwidth usage and the response times are important factors as they have a fallible and costly link which should not be overused and they also need to know the response times so that they can reconnect back afterapproximately known time. The MNM was executed on a IBM ThinkPad 76 EL, a Pentium PC, 133 MHz, having 16Mo memory, executing windows 95 connected onto a 1Mbps Ethernet. In order to compare the usefulness and applicability of mobile agents in implementing the basic network management functionalities we have compared it with the client server mechanism. We thus implemented two MNMs, one utilizing mobile agents exclusively and the other utilizing the client server mechanism. The Figure 4 displays the comparison of bandwidth utilization when the client-server and mobile agent technologies are used to obtain given number of samples of a single SNMP variable from a SNMP agent. As is evident from the chart the client-server technique is suitable for SNMP monitoring when it is to be done for a limited amount of time. When large number of samples are desired, in terms of bandwidth utilization it is better to use the mobile agent technique. In our case the threshold we obtained was of 3 samples and with a sampling rate of.5 secs, we can derive that if a NMS intends to observe a SNMP variable for more than 2 min 3 secs it needs to use the mobile agent technology. The curve for mobile agent based MNM starts at 2 Kbytes as the agent size is 1K and the minimum cost of utilizing an agent for a round trip is 2K. In Figure 5 a similar comparison is shown but samples of5snmpvariables are obtained. The threshold in this case reduces to 6 samples. In Figure 6 the comparison of bandwidth utilization, when a single agent issent in a itinerary to retrieve 4 samples of a single SNMP variable from multiple machines and client-server technique is shown. The client-server mechanism is used from the manager machine to the SNMP agent machines separately and the requests are made in parallel. We observe that for this particular case an itinerary of no more than 18 machines is desirable. In Figure7 the response times between the client-server and the mobile-agent technology are compared. From the manager machine the time (in millisecs) it took for both the agents and the client-server technique to retrieve the given number
6 of samples were noted and plotted as shown. The response time in retrieving the samples were initially found better in client-server technique. But for larger number of samples the response time was better in sending an agent toretrieve the values than using client-server technique to continuously query and obtain the values of the SNMP variable from the SNMP agent. BW usage (in Kbytes) Comparison of Client Server and mobile agent technology Client Server Mobile Agent No of Samples Figure 4:Comparison of bandwidth utilization BW utilisation CS Agent Comparison BW utilisation No machines Figure 6:Comparison of bandwidth utilization 7 Conclusion BW usage (in Kbytes) Comparison of BW usage of client server and mobile agent techniques Client Server Mobile Agent No of Samples of 5 SNMP variables obtained Figure 5:Comparison of bandwidth utilization Time Taken (in MilliSecs) x 14 Comparison of Client Server and mobile agent techniques Client Server Mobile Agent No of Samples Figure 7:Comparison of response times MAGENTA is a generic mobile agent environment whichprovides mechanisms to enable functioning of mobile user aware applications. This mobile agent environment alsosatises the weaker notion of agency. Being generic in nature, it can be utilised for a number of applications. In order to demonstrate the support mechanisms for mobile users we have utilized MAGENTA environment inthe realm of network management to construct a Mobile Network Manager (MNM). We have also presented the performance evaluation of some of the interesting features of MAGENTA and have studied its performance in the context of its application in MNM as well. With respect to the existent client-server mechanism, we have found it to perform better in terms of bandwidth usage and response time for retrieval of large number of management variables. 8 Acknowledgments We would like to thank Dr. Michel Banatre for his support to the project. We would also like to thank Tiziana Signorelli and Janusz Wisniewski for their contributions to the implementation of the environment. Acknowledgments are also due to Serge Lassabe for his suggestions and feedbacks. References [1] B. Lily, M.R. Ebling and M. Satyanarayanan. Exploiting weak connectivity for mobile le access. in Proceedings of the Fifteenth ACM Symposium on Operating Systems Principles, Pg , December 1995 [2] P. Reiher, J. Heidemann et al. Resolving le conicts in the Ficus le system. in Proceedings of the 1994 Summer USENIX Conference, Pg , 1994 [3] A.D. Joseph, A. F. delespinasse, et al. Rover: A toolkit for mobile information access. in Proceedings of the Fifteenth ACM Symposium on Operating Systems Principles, Pg , December 1995 [4] Odyssey at General Magic Inc. Information available at [5] R. Beale and A. Wood. Agent Based Interaction in People and Computers IX : Proceedings of HCI'94,Glasgow,UK, August 1994, pp [6] G. Colin, Harrison et al. Mobile Agents: Are they a good idea? IBM T.J. Watson Research Center Technical report [7] N. Jennings, M. Wooldridge. Software Agents. IEE Review, January 1996, pp1 7-2 [8] D. Chess et al. Itinerant Agents for Mobile Computing IBM T.J. Watson Research Center Technical Report RC [9] A. Bakre and B.R. Badrinath. I-TCP:Indirect TCP for Mobile Hosts.Technical Report DCS-TR-314, Department of Computer Science, Rutgers University, 1994 [1] Markku, Kojo et al. Enhanced Communication Services for Mobile TCP/IP Networking. Technical Report C , Deptt. of Computer Science, University of Helsinki [11] T. Magedanz, K. Rothermel, S. Krause. Intelligent Agents: An Emerging Technology for Next Generation Telecommunications? INFOCOM' 96, USA, March 24-28, [12] P. Maes. Agents that reduce work and information overload. Communications of the ACM, 37(7):31-4, [13] Tomasz Imielinski, B.R. Badrinath. Mobile Wireless Computing: Challenges in Data ManagementCommunications of the ACM, October 1994, pp19-27 [14] R. Gray. Agent Tcl: Alpha Release 1.1, Computer Science Deptt, Dartmouth college, USA, rgray/transportable.html. [15] Mitsubishi Electric ITA. Concordia: An Infrastructure for Collaborating Mobile AgentsPresented and published in the proceedings of First International Workshop on Mobile Agents 97. [16] D. Johansen, R. V. Renesse and F. B. Schneider. An Introduction to TACOMA Distributed System Technical report CS-95-23, Department of Computer Science, Institute of Mathematical and Physical Sciences, University of Tromso.
7 [17] J. Bauman et al. Mole - A Java based Mobile Agent System. ECOOP'96 Workshop on Mobile Object Systems. [18] H. Peine, T.Stolpmann. The Architecture of the Ara Platform for Mobile Agents. First international Workshop on Mobile Agents, MA97 [19] Goldzmith, G. and Yemini Y. Decentralizing Control and Intelligence in Network Management.In the Proc. of 4th International Symposium on Integrated Network Management, Santa Barbara, CA 1995 [2] W. Stallings. SNMP, SNMPv2 and CMIP: The practical guide to network management standards. Addison- Wesley publication, 1994.
NMS. Graphical User Interface (GUI) Management Applications. NMS kernel Daemons, DBMS Network protocols,mechanisms
Enabling a Mobile Network Manager (MNM) through mobile agents Akhil Sahai, Christine Morin IRISA-INRIA, Campus Universitaire de Beaulieu 35042 Rennes Cedex (France) fasahai, cmorin g@irisa.fr Abstract.
More information27 Intelligent Agents for a Mobile Network Manager (MNM)
27 Intelligent Agents for a Mobile Network Manager (MNM) Akhil Sahait, Christine Morin t, Stfphane Billiartt tinria + BULL IRISA, Campus Universitaire de Beaulieu 35042 Rennes Cedex (France) {asahai, cmorin,
More informationMobile NFS. Fixed NFS. MFS Proxy. Client. Client. Standard NFS Server. Fixed NFS MFS: Proxy. Mobile. Client NFS. Wired Network.
On Building a File System for Mobile Environments Using Generic Services F. Andre M.T. Segarra IRISA Research Institute IRISA Research Institute Campus de Beaulieu Campus de Beaulieu 35042 Rennes Cedex,
More informationMobile Computing Models What is the best way to partition a computation as well as the functionality of a system or application between stationary and
Mobile Computig: Conclusions Evaggelia Pitoura Computer Science Department, University of Ioannina, Ioannina, Greece http://www.cs.uoi.gr/~ pitoura Summer School, Jyvaskyla, August 1998 Mobile Computing
More informationDEVELOPING A NEW MECHANISM FOR LOCATING AND MANAGING MOBILE AGENTS
Journal of Engineering Science and Technology Vol. 7, No. 5 (2012) 614-622 School of Engineering, Taylor s University DEVELOPING A NEW MECHANISM FOR LOCATING AND MANAGING MOBILE AGENTS AHMED Y. YOUSUF*,
More informationMobile Agents to Automate Fault Management in Wireless and Mobile Networks 1
Mobile Agents to Automate Fault Management in Wireless and Mobile Networks 1 Niki Pissinou, Bhagyavati, Kia Makki The University of Louisiana at Lafayette {pissinou/bxb8329/makki@cacs.usl.edu} Abstract.
More informationA Study of Distributed Network Management Architectures
A Study of Distributed Network Management Architectures Kriti Nagpal 1 & Anish Saini 2 MTech Student, Department of Computer Science & Engineering, Echelon Institute of Technology, Faridabad, India 1 Assistant
More informationNetwork Processing of Mobile Agents, by Mobile Agents, for Mobile Agents
Network Processing of Mobile Agents, by Mobile Agents, for Mobile Agents Ichiro Satoh National Institute of Informatics / Japan Science and Technology Corporation 2-1-2 Hitotsubashi, Chiyoda-ku, Tokyo
More informationEvaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network
Evaluating the Performance of Mobile Agent-Based Communication among Mobile Hosts in Large Ad Hoc Wireless Network S. Bandyopadhyay Krishna Paul PricewaterhouseCoopers Limited Techna Digital Systems Sector
More informationforward packets do not forward packets
Power-aware Routing in Wireless Packet Networks Javier Gomez, Andrew T. Campbell Dept. of Electrical Engineering Columbia University, N 10027, USA Mahmoud Naghshineh, Chatschik Bisdikian IBM T.J. Watson
More informationA tutorial report for SENG Agent Based Software Engineering Course Instructor: Dr. Behrouz H. Far. Mobile Agents.
A tutorial report for SENG 609.22 Agent Based Software Engineering Course Instructor: Dr. Behrouz H. Far Mobile Agents Samuel Lee Department of Electrical Engineering University of Calgary Abstract With
More informationUsing Tcl Mobile Agents for Monitoring Distributed Computations
Using Tcl Mobile Agents for Monitoring Distributed Computations Dilyana Staneva, Emil Atanasov Abstract: Agents, integrating code and data mobility, can be used as building blocks for structuring distributed
More informationA Mobile Agent-Based Framework for Active Networks. Ichiro Satoh
A Mobile -Based Framework for Active Networks Ichiro Satoh Department of Information Sciences, Ochanomizu University 2-1-1 Otsuka Bunkyo-ku Tokyo 112-8610, Japan E-mail: ichiro@is.ocha.ac.jp IEEE Systems,
More informationCh 1. Mobile Adaptive Computing
Ch 1. Mobile Adaptive Computing What is Mobile Computing Mobile computing? Distributed system Wireless communications Mobility of communications devices Difference between mobile computing and mobile communications?
More informationBRANCH:IT FINAL YEAR SEVENTH SEM SUBJECT: MOBILE COMPUTING UNIT-IV: MOBILE DATA MANAGEMENT
- 1 Mobile Data Management: Mobile Transactions - Reporting and Co Transactions Kangaroo Transaction Model - Clustering Model Isolation only transaction 2 Tier Transaction Model Semantic based nomadic
More informationApplication of Autonomous Mobile Agents to Provide Security in Wireless Networks
Application of Autonomous Mobile Agents to Provide Security in Wireless Networks ¹Odhiambo MO, ²Aderemi Lawal Department of Electrical and Mining Engineering, University of South Africa, Pretoria, South
More informationClient (meet lib) tac_firewall ch_firewall ag_vm. (3) Create ch_firewall. (5) Receive and examine (6) Locate agent (7) Create pipes (8) Activate agent
Performance Issues in TACOMA Dag Johansen 1 Nils P. Sudmann 1 Robbert van Renesse 2 1 Department of Computer Science, University oftroms, NORWAY??? 2 Department of Computer Science, Cornell University,
More informationMobile Computing An Browser. Grace Hai Yan Lo and Thomas Kunz fhylo, October, Abstract
A Case Study of Dynamic Application Partitioning in Mobile Computing An E-mail Browser Grace Hai Yan Lo and Thomas Kunz fhylo, tkunzg@uwaterloo.ca University ofwaterloo, ON, Canada October, 1996 Abstract
More informationImproving Reliable Transport and Handoff Performance in Cellular Wireless Networks
Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks H. Balakrishnan, S. Seshan, and R. H. Katz ACM Wireless Networks Vol. 1, No. 4, pp. 469-482 Dec. 1995 P. 1 Introduction
More informationMobile agent based online bandwidth allocation scheme for multimedia communication
Mobile based online bandwidth allocation scheme for multimedia communication S.S.Manvi and P. Venkataram Electrical Communication Engineering Department, Indian Institute of Science, Bangalore-560012 INDIA,
More informationDistributed AAA: Proposals for Ad Hoc Networks
Distributed AAA: Proposals for Ad Hoc Networks Pradip Lamsal Department of Computer Science University of Helsinki, Finland pradip.lamsal@helsinki.fi ABSTRACT AAA frameworks such as diameter protocol allows
More informationA PERFORMANCE ANALYSIS FRAMEWORK FOR MOBILE-AGENT SYSTEMS
A PERFORMANCE ANALYSIS FRAMEWORK FOR MOBILE-AGENT SYSTEMS Marios D. Dikaiakos Department of Computer Science University of Cyprus George Samaras Speaker: Marios D. Dikaiakos mdd@ucy.ac.cy http://www.cs.ucy.ac.cy/mdd
More informationA Framework for Building Reusable Mobile Agents for Network Management
A Framework for Building Reusable Mobile Agents for Network Management Ichiro Satoh Λ National Institute of Informatics / Japan Science and Technology Corporation 2-1-2 Hitotsubashi, Chiyoda-ku, Tokyo
More informationTCP over Wireless Networks Using Multiple. Saad Biaz Miten Mehta Steve West Nitin H. Vaidya. Texas A&M University. College Station, TX , USA
TCP over Wireless Networks Using Multiple Acknowledgements (Preliminary Version) Saad Biaz Miten Mehta Steve West Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, TX
More informationECS-087: Mobile Computing
ECS-087: Mobile Computing TCP over wireless TCP and mobility Most of the Slides borrowed from Prof. Sridhar Iyer s lecture IIT Bombay Diwakar Yagyasen 1 Effect of Mobility on Protocol Stack Application:
More informationRFC 003 Event Service October Computer Science Department October 2001 Request for Comments: 0003 Obsoletes: none.
Ubiquitous Computing Bhaskar Borthakur University of Illinois at Urbana-Champaign Software Research Group Computer Science Department October 2001 Request for Comments: 0003 Obsoletes: none The Event Service
More informationOPNET M-TCP model. Modupe Omueti
OPNET M-TCP model Modupe Omueti momueti@cs.sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/research/cnl School of Engineering Science Simon Fraser University Roadmap Introduction Motivation
More informationExtensions to RTP to support Mobile Networking: Brown, Singh 2 within the cell. In our proposed architecture [3], we add a third level to this hierarc
Extensions to RTP to support Mobile Networking Kevin Brown Suresh Singh Department of Computer Science Department of Computer Science University of South Carolina Department of South Carolina Columbia,
More informationAgents for Mobility with a Java-enabled Orbiter
Agents for Mobility with a Java-enabled Orbiter André Vellino Computing Research Lab, Nortel Technology Institute for Information Technology, National Research Council Aug 2nd 96 What are Agents? Software
More informationA Centralized Approaches for Location Management in Personal Communication Services Networks
A Centralized Approaches for Location Management in Personal Communication Services Networks Fahamida Firoze M. Tech. (CSE) Scholar, Deptt. Of CSE, Al Falah School of Engineering & Technology, Dhauj, Faridabad,
More informationcrossing disconnected Fixed Host Base Station Fixed Host Fixed Host Fixed Host High Speed Wireful Network Base Station Base Station Fixed Host
MOBILE COMPUTING and DATABASES: ANYTHING NEW? Margaret H. Dunham Dept of Computer Science and Engineering Southern Methodist University mhd@seas.smu.edu Abdelsalam (Sumi) Helal Dept of Computer Science
More informationMiddleware for Ubiquitous Computing
Middleware for Ubiquitous Computing Software Testing for Mobile Computing National Institute of Informatics Ichiro Satoh Abstract When a portable computing device is moved into and attached to a new local
More informationAdvanced Peer to Peer Discovery and Interaction Framework
Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 peeyush_tugnawat@jdedwards.com Mohamed E. Fayad Computer Engineering
More informationOn Object Orientation as a Paradigm for General Purpose. Distributed Operating Systems
On Object Orientation as a Paradigm for General Purpose Distributed Operating Systems Vinny Cahill, Sean Baker, Brendan Tangney, Chris Horn and Neville Harris Distributed Systems Group, Dept. of Computer
More informationCreating and Running Mobile Agents with XJ DOME
Creating and Running Mobile Agents with XJ DOME Kirill Bolshakov, Andrei Borshchev, Alex Filippoff, Yuri Karpov, and Victor Roudakov Distributed Computing & Networking Dept. St.Petersburg Technical University
More informationA Mobile Agent-based Model for Service Management in Virtual Active Networks
A Mobile Agent-based Model for Service Management in Virtual Active Networks Fábio Luciano Verdi and Edmundo R. M. Madeira Institute of Computing, University of Campinas (UNICAMP), Campinas-SP, Brazil
More informationperform well on paths including satellite links. It is important to verify how the two ATM data services perform on satellite links. TCP is the most p
Performance of TCP/IP Using ATM ABR and UBR Services over Satellite Networks 1 Shiv Kalyanaraman, Raj Jain, Rohit Goyal, Sonia Fahmy Department of Computer and Information Science The Ohio State University
More informationManagement. Station RMON. Network Device. Agent. Switch. Agent. Standalone Probe. Management. Agent. Workstation
Exploiting Code Mobility in Decentralized and Flexible Network Management Mario Baldi, Silvano Gai, and Gian Pietro Picco Dip. Automatica e Informatica, Politecnico di Torino C.so Duca degli Abruzzi 24,
More informationExperiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol
Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Kalyan Kalepu, Shiv Mehra and Chansu Yu, Department of Electrical and Computer Engineering Cleveland State University 2121
More informationAssignment 5. Georgia Koloniari
Assignment 5 Georgia Koloniari 2. "Peer-to-Peer Computing" 1. What is the definition of a p2p system given by the authors in sec 1? Compare it with at least one of the definitions surveyed in the last
More informationPacket Estimation with CBDS Approach to secure MANET
Packet Estimation with CBDS Approach to secure MANET Mr. Virendra P. Patil 1 and Mr. Rajendra V. Patil 2 1 PG Student, SSVPS COE, Dhule, Maharashtra, India 2 Assistance Professor, SSVPS COE, Dhule, Maharashtra,
More informationAdaptive Mobile Agents: Modeling and a Case Study
Adaptive Mobile Agents: Modeling and a Case Study Supranamaya Ranjan Department of Electrical & Computer Engineering Rice University Houston, Texas - 77005 Arobinda Gupta Anupam Basu Anand Meka Abhishek
More informationKevin Skadron. 18 April Abstract. higher rate of failure requires eective fault-tolerance. Asynchronous consistent checkpointing oers a
Asynchronous Checkpointing for PVM Requires Message-Logging Kevin Skadron 18 April 1994 Abstract Distributed computing using networked workstations oers cost-ecient parallel computing, but the higher rate
More informationA Resource Look up Strategy for Distributed Computing
A Resource Look up Strategy for Distributed Computing F. AGOSTARO, A. GENCO, S. SORCE DINFO - Dipartimento di Ingegneria Informatica Università degli Studi di Palermo Viale delle Scienze, edificio 6 90128
More informationWhat is the fundamental purpose of a communication system? Discuss the communication model s elements.
What is the fundamental purpose of a communication system? The fundamental purpose of a communication system is the exchange of data between two parties. Discuss the communication model s elements. The
More informationDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES B.Poonguzharselvi 1 and V.Vetriselvi 2 1,2 Department of Computer Science and Engineering, College of Engineering Guindy, Anna University Chennai,
More informationWireless and Mobile Networks Reading: Sections 2.8 and 4.2.5
Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained
More informationSUMMERY, CONCLUSIONS AND FUTURE WORK
Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six
More informationTCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS
TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS Deddy Chandra and Richard J. Harris School of Electrical and Computer System Engineering Royal Melbourne Institute of Technology Melbourne, Australia
More informationAndrew T. Campbell, Javier Gomez. Center for Telecommunications Research, Columbia University, New York. [campbell,
An Overview of Cellular IP Andrew T. Campbell, Javier Gomez Center for Telecommunications Research, Columbia University, New York [campbell, javierg]@comet.columbia.edu Andras G. Valko Ericsson Research
More informationSupporting IP Multicast for Mobile Hosts. Yu Wang Weidong Chen. Southern Methodist University. May 8, 1998.
Supporting IP Multicast for Mobile Hosts Yu Wang Weidong Chen Southern Methodist University fwy,wcheng@seas.smu.edu May 8, 1998 Abstract IP Multicast is an ecient mechanism of delivering a large amount
More informationEnhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1
Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1 Shiv Mehra and Chansu Yu Department of Electrical and Computer Engineering Cleveland State University E-mail: {s.mehra,c.yu91}@csuohio.edu
More informationChapter 5 INTRODUCTION TO MOBILE AGENT
Chapter 5 INTRODUCTION TO MOBILE AGENT 135 Chapter 5 Introductions to Mobile Agent 5.1 Mobile agents What is an agent? In fact a software program is containing an intelligence to help users and take action
More informationCS514: Intermediate Course in Computer Systems
: Intermediate Course in Computer Systems Lecture 23: March 12, 2003 Challenges of Mobility Mobility is a huge topic Breaks existing applications Anything bandwidth intensive or synchronous Opportunities
More informationSoftEther VPN Server supports the clustering function. This section explains the clustering function.
SoftEther VPN Server supports the clustering function. This section explains the clustering function. 3.9.1 What is Clustering? Clustering Necessity In general terms, clustering is a processing method
More informationMSS. MH <Disconnected> MSS MSS. wired link. wireless link. cell boundary
Chapter 1 Fault Tolerance and Recovery in Mobile Computing Systems Elisa Bertino, Elena Pagani, and Gian Paolo Rossi 11 INTRODUCTION Through wireless networks, mobile personal machines have the ability
More informationM Commerce: Mobile Applications. Sridhar Iyer K R School of Information Technology IIT Bombay
M Commerce: Mobile Applications Sridhar Iyer K R School of Information Technology IIT Bombay sri@it.iitb.ernet.in http://www.it.iitb.ernet.in/~sri Outline Mobile applications Wireless networking Routing
More informationLocal Recovery of Routes for Reliability using Backup Nodes in MANETs
Local Recovery of Routes for Reliability using Backup Nodes in MANETs Madhura Krishna R K 1, Megha T 2, Meghana M S 3, Dr. K Raghuveer (Professor and Head) 4 1,2,3,4 Dept. of Information Science and Engineering,The
More informationYear, pier University Nikos Migas PhD student 2 Supervisors: School of Computing, Na MARIAN
MARIAN Mobile Agents for Routing In Ad-hoc Networks Nikos Migas PhD student 2 nd Year, School of Computing, Napier University n.migas@napier.ac.uk Supervisors: W.Buchanan, K.McArtney Introduction MARIAN
More informationAn Architecture for Next Generation Mobile Agent Infrastructure
An Architecture for Next Generation Mobile Agent Infrastructure Ichiro Satoh Department of Information Sciences, Ochanomizu University / Japan Science and Technology Corporation Abstract This paper presents
More information2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,
2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising
More informationChapter 18 Distributed Systems and Web Services
Chapter 18 Distributed Systems and Web Services Outline 18.1 Introduction 18.2 Distributed File Systems 18.2.1 Distributed File System Concepts 18.2.2 Network File System (NFS) 18.2.3 Andrew File System
More informationIP Mobility vs. Session Mobility
IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when
More informationTHE IMPLEMENTATION OF A DISTRIBUTED FILE SYSTEM SUPPORTING THE PARALLEL WORLD MODEL. Jun Sun, Yasushi Shinjo and Kozo Itano
THE IMPLEMENTATION OF A DISTRIBUTED FILE SYSTEM SUPPORTING THE PARALLEL WORLD MODEL Jun Sun, Yasushi Shinjo and Kozo Itano Institute of Information Sciences and Electronics University of Tsukuba Tsukuba,
More informationKEYWORDS. Mobile commerce, E-commerce, mobile agent, SMA, Aglet. 1 INTRODUCTION
Mobile commerce approach based on mobile Oussama Zerdoumi, Department of Mathematics and Computer Science, University of Kasdi Merbah Ouargla, 30000 Algeria Okba Kazar, Saber Benharzallah Department of
More informationPerformance comparison of implementation mechanisms for e-commerce applications: Towards a hybrid approach
Proceedings of the 2nd Asian International Mobile Computing Conference(AMOC 2002) 14-17 May, 2002 Langkawi, Malaysia Performance comparison of implementation mechanisms for e-commerce applications: Towards
More informationAnalysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group
More informationApproaches to Capturing Java Threads State
Approaches to Capturing Java Threads State Abstract This paper describes a range of approaches to capturing the state of Java threads. The capture and restoration of Java threads state have two main purposes:
More informationDISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 1. Introduction
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 1 Introduction Modified by: Dr. Ramzi Saifan Definition of a Distributed System (1) A distributed
More informationVERITAS Volume Replicator. Successful Replication and Disaster Recovery
VERITAS Volume Replicator Successful Replication and Disaster Recovery V E R I T A S W H I T E P A P E R Table of Contents Introduction.................................................................................1
More informationTCP Strategies. Keepalive Timer. implementations do not have it as it is occasionally regarded as controversial. between source and destination
Keepalive Timer! Yet another timer in TCP is the keepalive! This one is not required, and some implementations do not have it as it is occasionally regarded as controversial! When a TCP connection is idle
More information1 Energy Efficient Protocols in Self-Aware Networks
Energy Efficient Protocols in Self-Aware Networks Toktam Mahmoodi Centre for Telecommunications Research King s College London, London WC2R 2LS, UK Stanford NetSeminar 13 December 2011 1 Energy Efficient
More informationThe effect of Mobile IP handoffs on the performance of TCP
Mobile Networks and Applications 4 (1999) 131 135 131 The effect of Mobile IP handoffs on the performance of TCP Anne Fladenmuller a and Ranil De Silva b a Alcatel CIT, Software Department, Route de Nozay,
More informationScalable Middleware Environment for Agent-Based Internet Applications]
Scalable Middleware Environment for Agent-Based Internet Applications] Benno J. Overeinder and Frances M.T. Brazier Department of Computer Science, Vrije Universiteit Amsterdam De Boelelaan 1081a, 1081
More informationAn Improvement of TCP Downstream Between Heterogeneous Terminals in an Infrastructure Network
An Improvement of TCP Downstream Between Heterogeneous Terminals in an Infrastructure Network Yong-Hyun Kim, Ji-Hong Kim, Youn-Sik Hong, and Ki-Young Lee University of Incheon, 177 Dowha-dong Nam-gu, 402-749,
More informationA Mobile Agent Platform for Supporting Ad-hoc Network Environment
International Journal of Grid and Distributed Computing 9 A Mobile Agent Platform for Supporting Ad-hoc Network Environment Jinbae Park, Hyunsang Youn, Eunseok Lee School of Information and Communication
More informationComputer Networks, Andrew Tannenbaum, Chapter 5.6. Computer Networking: A Top Down Approach Featuring the
Mobile IP (IPv4 and IPv6) Dr. John Keeney 3BA33 Elements of a wireless Wired infrastructure wireless hosts laptop, PDA, IP phone run applications may be stationary (nonmobile) or mobile wireless does not
More informationAn Efficient DECT-Mobile IP Interworking for Mobile Computing
An Efficient DECT-Mobile IP Interworking for Mobile Computing Anthony Lo *, Winston Seah * and Edwin Schreuder + * Centre for Wireless Communications 1, National University of Singapore, 20 Science Park
More informationTCP Congestion Control in Wired and Wireless networks
TCP Congestion Control in Wired and Wireless networks Mohamadreza Najiminaini (mna28@cs.sfu.ca) Term Project ENSC 835 Spring 2008 Supervised by Dr. Ljiljana Trajkovic School of Engineering and Science
More informationDisconnected Operation in a Mobile Computation System
Disconnected Operation in a Mobile Computation System Marco T. de O. Valente, Roberto da S. Bigonha, Mariza A. da S. Bigonha, Antonio A.F. Loureiro Department of Computer Science University of Minas Gerais
More informationCongestion Control in Mobile Ad-Hoc Networks
Congestion Control in Mobile Ad-Hoc Networks 1 Sandeep Rana, 2 Varun Pundir, 3 Ram Sewak Singh, 4 Deepak Yadav 1, 2, 3, 4 Shanti Institute of Technology, Meerut Email: sandeepmietcs@gmail.com Email: varunpundir@hotmail.com
More informationARCHITECTURAL SOFTWARE POWER ESTIMATION SUPPORT FOR POWER AWARE REMOTE PROCESSING
ARCHITECTURAL SOFTWARE POWER ESTIMATION SUPPORT FOR POWER AWARE REMOTE PROCESSING Gerald Kaefer, Josef Haid, Karl Voit, Reinhold Weiss Graz University of Technology Graz, AUSTRIA {kaefer, haid, voit, rweiss}@iti.tugraz.at
More informationThe ATL Postmaster: A System for Agent Collaboration and Information Dissemination
The ATL Postmaster: A System for Agent Collaboration and Information Dissemination Jennifer Kay, Julius Etzl, Goutham Rao, and Jon Thies Lockheed Martin Advanced Technology Laboratories 1 Federal Street
More informationUbiquitous Mobile Host Internetworking
Ubiquitous Mobile Host Internetworking David B. Johnson School of Computer Science Carnegie Mellon University Pittsburgh, PA 152 13-389 1 dbj Qcs. cmu. edu 1. Introduction With the increasing popularity
More informationDistributed Communication for Highly Mobile Agents
Distributed Communication for Highly Mobile Agents Mohammad Samarah and Philip Chan The division of Electrical and Computer Science and Engineering Florida Institute of Technology, Melbourne, FL 32901
More informationComputer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1
Computer Networks Wireless and Mobile Networks László Böszörményi Computer Networks Mobile - 1 Background Number of wireless (mobile) phone subscribers now exceeds number of wired phone subscribers! Computer
More informationCMPE150 Midterm Solutions
CMPE150 Midterm Solutions Question 1 Packet switching and circuit switching: (a) Is the Internet a packet switching or circuit switching network? Justify your answer. The Internet is a packet switching
More informationImplementation and Performance Evaluation of Indirect TCP
260 IEEE TRANSACTIONS ON COMPUTERS, VOL. 46, NO. 3, MARCH 1997 Implementation and Performance Evaluation of Indirect TCP Ajay V. Bakre and B.R. Badrinath Abstract With the advent of small portable computers
More informationDistributed Systems. Pre-Exam 1 Review. Paul Krzyzanowski. Rutgers University. Fall 2015
Distributed Systems Pre-Exam 1 Review Paul Krzyzanowski Rutgers University Fall 2015 October 2, 2015 CS 417 - Paul Krzyzanowski 1 Selected Questions From Past Exams October 2, 2015 CS 417 - Paul Krzyzanowski
More informationDelay Performance of the New Explicit Loss Notification TCP Technique for Wireless Networks
Delay Performance of the New Explicit Loss Notification TCP Technique for Wireless Networks Wenqing Ding and Abbas Jamalipour School of Electrical and Information Engineering The University of Sydney Sydney
More informationEfficient Handoff using Mobile IP and Simplified Cellular IP
Presented at GNSS 2004 The 2004 International Symposium on GNSS/GPS Sydney, Australia 6 8 December 2004 Efficient Handoff using Mobile IP and Simplified Cellular IP S. Omar School of Surveying & Spatial
More informationPerformance Evaluation of Mobile Agents for E-Commerce Applications
Performance Evaluation of Mobile Agents for E-Commerce Applications Rahul Jha and Sridhar Iyer Kanwal Rekhi School of Information Technology, Indian Institute of Technology Bombay, Powai, Mumbai - 4 76.
More informationUNIT II NETWORKING
UNIT II INTRODUCTION TO WIRELESS NETWORKING Wireless Network The cellular telephone system is responsible for providing coverage throughout a particular area known as coverage region or market The interconnection
More informationPolicy-Based Context-Management for Mobile Solutions
Policy-Based Context-Management for Mobile Solutions Caroline Funk 1,Björn Schiemann 2 1 Ludwig-Maximilians-Universität München Oettingenstraße 67, 80538 München caroline.funk@nm.ifi.lmu.de 2 Siemens AG,
More informationMobile Agent Paradigm in Computer Networks
Mobile Agent Paradigm in Computer Networks Nguyen Hong Van DSV, Stockholm University, Forum 100, SE-164 40 Kista, Sweden Email: si-hvan@dsv.su.se ABSTRACT : Mobile agent technology has recently emerged
More informationVirtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing
Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Zhi Li, Prasant Mohapatra, and Chen-Nee Chuah University of California, Davis, CA 95616, USA {lizhi, prasant}@cs.ucdavis.edu,
More informationSimulating a General Purpose Mobile Computing Environment
Computer Science Technical Report Simulating a General Purpose Mobile Computing Environment Anurag Kahol, Sumit Khurana, Sandeep Gupta and Pradip Srimani Department of Computer Science Colorado State University
More information1 sat-nms SCC Overview
1 sat-nms SCC Overview The sat-nms NMS normally uses dial-up telephone lines (analog telephone, ISDN, GSM) for the control connections between the sat-nms NMS and each particular VLC. Using modems or ISDN
More informationDepartment of Electronic and Electrical Engineering, Loughborough University
SMDS PEFOMANCE MONITOING : TAFFIC GENEATION, INFOMATION POCESSING & ANALYSIS Omar Bashir, Iain Phillips & David Parish + Abstract Many aspects of the performance of data communication networks can be determined
More informationCIS 632 / EEC 687 Mobile Computing
CIS 632 / EEC 687 Mobile Computing TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple
More information