Service Access Point. Service Access point. Lieu A. Lieu B. Service Access Point. Lieu C

Size: px
Start display at page:

Download "Service Access Point. Service Access point. Lieu A. Lieu B. Service Access Point. Lieu C"

Transcription

1 Mobile Agents for Enabling Mobile User Aware Applications Akhil Sahai, Christine Morin INRIA-IRISA Campus de beaulieu 3542, Rennes CEDEX, France Abstract Mobile agents based computing has been propounded as the possible approach to next generation computing. The approach has been shown to be eective in dierent domains, especially in the area of mobile and partially connected computing. We describe the design and implementation details of MAGENTA (Mobile AGENT environment for distributed Applications) and the mechanisms it provides for enabling applications supporting mobile users. MAGENTA is a generic mobile agent environment and provides the agents the capabilities of autonomy, reactivity, proactivity and communication. In order to demonstrate the functionalities provided by MAGENTA to mobile users we have applied it in the domain of network management in order to implement a Mobile Network Manager (MNM). We also present the performance evaluation results of MAGENTA. Keywords: 1 Introduction mobile agents, mobile computing, Java. Mobile users pose a new problem to the applications catering to static users. The mobile user aware applications must thus utilize special mechanisms in order to be useful to mobile users. Mobile users are characterized by the costly and fallible link they utilize and the resource constrained computer they operate on. In order to support mobile users the mobile agent paradigm can be used as it is ideally suited to the partially connected mode of computing. Mobile agents are autonomous programs that can move through a network from host to host under their own control, interacting with resources and other agents. The motivation behind MAGENTA was to adapt it to real-world situations. As the networks are becoming more and more complex and mobile user coexist with the static users, it is necessary to support a variety ofusers in realworld applications. MAGENTA environment was developed to provide support services for intermittently connected computing. MAGENTA is a generic mobile agent environment which satises weaker notion of agency i.e the agents exhibit autonomy, reactivity, proactivity and social ability. The agents perform goal-directed behaviour, interact with the system as well as the other agents, move and perceive the changes in the environment toachieve a predened goal. MAGENTA also provides easy extensibility, fault-tolerance, dynamic adaptability tochanges in the environment, exibility in the location of code, remote execution and simultaneous execution which go a long way inproviding support to mobile users. MAGENTA environment has been developed in Java and has been utilized for implementation of a Mobile Network Manager (MNM) which isanetwork manager executing on a portable computer. The rest of the paper is structured as follows. The subsequent section provides details about the characteristics of mobile computing. This, is followed by a brief overview of mobile agents and their utilization in the domain of mobile computing. We present the support features of the MA- GENTA environment which make it capable of providing for mobile users in the subsequent section. Section 5 details the application of MAGENTA in a mobile user aware application. Section 6 provides the performance results before concluding. 2 Characteristics of a mobile computing environment Mobile computing as the name suggests, is a domain encompassing the mobility aspects of computing. The mobility could be one of the following types: Only the users are mobile while the computers are stationary. Although the user and the computer are both mobile within the network, they are both stationary while working. The users while working on their computers are mobile. In this case the problems of locating mobile entities as well as message routing and connection management are to be dealt with. Mobile computing is characterized by the resource constrained portable computer and the communication. The mobile computer need to be small and light-weight. Thus such devices are decient in memory and processing power. As a result they are capable of supporting only those programs which donot take uplotof resources. The mobile computers being battery powered are also prone to frequent disconnections which might beentailed because of battery discharge. The power sources of typical palmtops range from

2 8 AA batteries (each AA battery has 9 mah at 1.2V) to rechargeable NiCd batteries (2.4Ah at 1.8 V) which gives a low battery life of typically between 3 to 8 hours. The IBM ThinkPad 76EL we used for experimentation has a capacity of (3. Ah at 1.8V cc) which limits its battery life to approximately 3 hours. The mobile computer can either connect to the wired network permanently or on a temporary basis. The permanent connection can be achieved by radio links whereas temporary connections are made through telephone lines and modems. The temporary connections are usually made using telephone lines and the PPP or SLIP protocol. In such a case no movement is possible during the communication and the bandwidth oered by the telephone networks is poor. Permanent connection requires the additional overhead of mobility management and routing. In [9] [1] various approaches towards the mobility management insuch cases have been proposed. The permanent connections are made using wireless techniques. The wireless networks that are available for usage are cellular networks, wireless LANs, wide area wireless networks and paging networks. These wireless networks do not have a large bandwidth available to them as compared to their wired counterparts. Some of the wireless LANs that are available are NCR's wavelan, Motorola's ALTAIR, Proxims Range LAN and Telesystem's ARLAN. They operate in the MHz (ISM) band and the specications ranges from 25bps to 2 Mbps with a range of 5 to 1 meters, indoors and a range of few kilometers outdoors [13]. 3 Mobile agents for mobile computing In a wired network, the machines interact over the network through a logical connection. They exchange messages in order to carry out this interaction. The client-server paradigm although being highly prevalent in a wired network and in spite of attempts to utilise this technology in the domain of mobile computing has been found to have unsatisfactory performance. The client-server paradigm assumes a tight coupling between the machines and assumes the presence and reliability of the machines as well as the bandwidth in case of a prolonged interaction between them. However in the domain of mobile computing, the link is highly fallible, has serious bandwidth constraints and has high latency and is prone to sudden failures such as when a signal from a cellular modem is blocked by an obstacle. The mobile devices are inherently short of energy due to the limited acceptable weight of their batteries. The mobile agent approach decouples the interacting partners. The mobile agent approach provides a means of asynchronous and remote execution and thus does not necessitate the presence of the partners. This approach also removes the constraints of message passing and constant bandwidth requirement. Mobile agents have been used for mobile computing in AgentTCL [14]. Adocking mechanism has been used to provide for the disconnected mode of operation of the portable computer. However, this scheme diers from the scheme we propose in the paper. Concordia [15] agents provides support for mobile computing as well as oine processing in a manner transparent to the user. Telescript one of the premier mobile agent systems from General Magic which supported mobile devices like PDAs is being replaced by Odyssey [4]. The design and implementation details of Odyssey are not clear. There are several other projects which are developing agent environments and few of them are Tacoma [16], Ara [18], Mole [17]. However, the few projects mentioned above have not considered mobile platforms as yet. Some distributed le systems provide support for disconnected operation, as in Coda[1] and Ficus [2]. In the Rover system [3] queued RPC and relocatable dynamic objects are used. These relocatable dynamic objects are incapable of moving halfway through their execution and thus cannot be classied as mobile agents. 4 MAGENTA for mobile users The architecture of MAGENTA comprises of lieus and agents as shown in Figure 1. A lieu is a place or location where an agent can originate, reside, execute and interact with the system as well as with other agents. An agent is a program which moves between the lieus and utilises the lieu to perform it's functions. The agents have globally unique name, have apurpose which denes its type and behave autonomously. Theymove between the lieus carrying with them their data and program state. They have afolder to carry their results and can meet with other agents and exchange notes. A meet operation is enabled by the lieu to enable local communication between the agents. They also carry a history which stores all the tasks performed by the agent and knowledge which stores the information it gathers about the failed sites as it traverses its itinerary. s have unique names. A lieu provides the execution environment for the incoming agents. The incoming agents are rst authenticated to determine their suitability for execution. After the agent passes the security requirements of the lieu, the agent is allowed to access the services available at the lieu through the service access point. The lieu facilitates the agents to communicate with other agents and to move to other sites. They also allow the agents to reside. This becomes important in the case when lieus running on mobile devices disappear either in a planned or in an unplanned manner. The agents destined for such lieus reside at the last lieus of their itinerary waiting for such lieusto reappear. It is also important in the case of meet operation where an agent might have towait at a lieu to meet another agent. Each lieu has a repository of all the agents created and dispatched by it and of the agents executing on it and so it keeps the trace of the agents. A lieu also maintains information about all the executing agents. They maintain the backup copies of agents absent locally as long as they do not get the instruction from another lieu to delete the copy. The architecture of MAGENTA in addition to general features provides support mechanisms for mobile users. Some of the important mechanisms are as follows: 4.1 Remote Execution A lieu can be requested by a remote site to launch anagent on its behalf and can collect the results of the computation performed by the agent remotely. The requesting site could be a lieu or a non MAGENTA site. On request, the agents are launched by the lieu after authenticating the remote site. MAGENTA thus provides extremely resource constrained devices like Personal Digital Assistants(PDAs) the facility to utilise the mobile agent functionalities and obtain the results of the computation without executing a lieu. Portable computers executing a non-java capable OS can also request a MAGENTA lieu to launch agents on its behalf.

3 A Service Access Point C B Service Access Point Figure 1: An overview of MAGENTA 4.2 Appearance and disappearance of lieus Service Access point The mobile computers are characterized by their intermittently connected mode of operation. They usually disconnect a short while after connection which is most of the times preplanned and sometimes unplanned (because of break in connection). They are also likely to connect randomly. MA- GENTA provides for such likelihoods. In MAGENTA the lieus can appear dynamically and disappear dynamically. This disappearance can be planned or unplanned. In case of planned disappearance a mechanism of exit is provided to the lieus. The lieu informs all the other lieus about its imminent disappearance and then quits gracefully. When the lieu reappears subsequently all the lieus in the environment are informed about the appearance of the new lieu. Adis- tributed update of information is thus carried out. In case of abrupt disappearance of the lieu, fault-tolerance mechanisms are provided for detecting such disappearances. To communicate with other lieus, every lieu maintains information about all other lieus in the system. To update this information and to detect abrupt disappearances of lieus, the following mechanism is used. Each agent, moving from a lieu to another avoids the unavailable lieus found during its travel, dynamically changing its itinerary and keeping track of the failed lieus in its variable knowledge. When the agent arrives at the last destination of its itinerary, itprovides the lieu information about the unavailable lieus, if there are such failed lieus, then the destination lieu informs all other lieus about the disappeared lieus. On receiving this information, all other lieus update their local information. So the failure of a lieu running on a mobile computer which disconnects abruptly can be discovered by an agent not launched by it but having it in its itinerary. A lieu executing on a portable computer might disappear abruptly after launching an agent. The agent after nishing its itinerary moves to the last destination lieu on the wired network. It tries to move to the mobile lieu but it fails in its attempt. It informs the lieu of residence about its failure which in turn informs all other present lieus about the abrupt disappearance of the mobile lieu. Thus a failed lieu is also discovered by the agents launched by it when they try to come back to it at the end of itinerary. The agent in this case waits on the last static lieu for the mobile lieu to connect back. 4.3 Flexible choice of location of the code to be executed The code of an agent moving from a sending lieu to a receiving lieu can exist on the receiving lieu or on the sending lieu. In the latter case the agent brings its code of execution to the receiving lieu. So, the choice can be made depending on the resources available on the machine executing the sending lieu and the receiving lieu. If the code is predened and is to be constantly used over a period of time, the code could be placed at the receiving lieu. If however the program is going to change over time and the sending lieu machine has enough resources to provide for saving of les locally the code could be stored at the sending machines and the agent thus carry their code when they leave the sending lieu. MA- GENTA thus provides a exible policy in placement of code. Depending on the resources of the host machine the choice could be made. 4.4 Minimization of code overhead In order to execute an agent the template of the agent and the code which needs to be executed by theagent are required. New agents can be created and utilized irrespective of the location of the agent template code. In order to do that, the feature of Java (programming language used to implement MAGENTA) have been used. Especially, a class loader for the class that implements the agent object has been designed. At the rst occurrence of this class, the class loader loads the agent template class from the network. Afterwards, the loaded class is put in a local hash table from which it is retrieved in the future. In this way, it isn't necessary to have in each host copies of the same class implementation, thus a mobile computer sending an agent to a remote site in a wired network need not store the agent template which are stored at a predened site in the wired network. As soon as the agent migrates from the mobile computer to another lieu the related agent classes are loaded by the class loader of the new lieu from the mobile computer and in the absence of agent template on the mobile computer they are loaded from the predened lieu. Thus the resources consumed of the mobile computers is reduced. 4.5 Tolerating site failures The agents and the lieus can fall prey to numerous accidents. The agents and the lieus might disappear because of abrupt disconnection of the portable computer or the crashing of the system executing the lieu. Fault tolerance schemes have been provided to minimize the overheads associated in detection and recovery from such site failures. In MAGENTA we provide for disappearance and recreation of agents from a single fault at a time. We maintain backup copies of the agents in order to take care of abrupt disappearance of an agent. In order to reduce the number of backup copies and to reduce the communication which results in case of disappearance of an agent we employ a scheme to maintain judicious number of copies. A lieu before sending an agent to the next lieu saves a copy of it and takes the temporary responsibility of detecting the failure of the next lieu. The next lieu after sending the agent to another lieu informs the lieu with the backup to remove the backup. The lieu with the backup periodically performs checks on the next lieu until it receives a message from the next lieu to destroy the backup. In case such a message is not received by the lieu with the backup within timeout and

4 if it detects that the next lieu has crashed it recreates the agent from the backup copy. This can be better explained with an example. Before an agent moves from a lieu, lets call it a lieu A to the next lieu, say lieu B it makes a copy of itself on lieu A. B processes this agent and makes a copy of it before moving it to the next lieu, say lieu C. As soon as the agent is successfully moved to the lieu C, lieu B requests lieu A to delete the copy of the agent. In case lieu B discovers that it is not possible to move the agent to lieu C because of some problem, it tries to reach lieu D. In case this operation is successfully carried out it asks lieu A to delete the copy. B after successfully moving the agent to the next lieu waits for a message from the next lieu, say lieu C. In case, the lieu C fails to send message to lieu B, lieu B understands that lieu C has not been able to move the agent to the next site in the itinerary because of some problems. It thus rst does its own check to nd out the problem. In case lieu C has crashed the backup copy of the agent on lieu B is used to create the agent and is passed to the next alive lieu. This scheme thus takes care of single fault and regeneration of agent by keeping the messages to a bare minimum. A B Agent copies itself and moves from A to B A B C Agent successfully moves to C from B. A B C B request A to delete its copy. A B D B does not receive message from C which crashes. B checks and sends agent to D instead. Figure 2: The implementation of fault-tolerance scheme in MAGENTA 4.6 Directory services for agents In MAGENTA a directory service has been provided so as to trace the agents. Every lieu can request all the other lieu about the latest information about the agents present on them and launched by them. This comes in handy to the mobile lieu which after launching an array of agents can connect back and determine the status of all the agents sent by it. 4.7 Simultaneous and fast execution The agents' execution on a lieu is multi threaded in nature so that all the agents can run simultaneously on the same lieu. This enables a portable computer to launch a large number of agents without bothering about their itinerary and performance before disconnecting. Thus the mobile user need not wait for other agents to nish operation before launching new agents. 5 MAGENTA in a mobile user aware application The MAGENTA environment being generic in nature it can be utilised for a variety of applications supporting mobile users. we utilized the MAGENTA environment in the domain of network management. In this context we enabled a Mobile Network Manager (MNM) to manage a network from a portable computer. The administrator of the network in this case is thus the mobile user. In order to appreciate the functioning of the MNM, the basics of network management in brief are presented. 5.1 Network Management Network management comprises essentially of monitoring and control of network elements. Network monitoring involves observing and analyzing the status of the network, and thus does not involve interference in the network functioning. Network control involves active interference and conguration of the state of the network. ANetwork Management System (NMS) essentially comprises of a manager managing the network elements and using a management protocol. The management protocol which has found extensive usage is the SNMP (Simple Network Management Protocol) [2]. The manager communicates with the SNMP agents executing on the managed nodes through a set of management primitives. The SNMP agents are static programs which execute on the managed nodes and provide the manager the information it requests from time to time. A NMS provides the functionalities of conguration of the network, monitoring of the network, studying the performance of the network, handling of security of the network and studying of the alarms being generated in the network Mobile Network Manager A MNM is a network manager executing on a portable computer and managing a network comprising of static network components executing SNMP agents. The MNM queries the SNMP agents about the network management variables and obtains their values. In order to demonstrate the functionalities of the MAGENTA environment wehave enabled the MNM through mobile agents. The MNM and the SNMP agents are integrated with MAGENTA lieussothattheyare capable of sending, receiving and storing the agents as shown in Figure.3. The agents are utilized to study the performance of network components, install software, audit the network components (by collecting the information on disk usage, users utilizing the machine, application conguration etc) and for network discovery. The MNM operates in either tethered mode or in wireless mode. The MNM typically sends a large number of agents to implement a variety of desired actions. After sending the agents it might disconnect, the agent after completing its itinerary waits at the last lieu of its itinerary. If the MNM had quit gracefully informing all other lieus about its disappearance, the agent waits for the MNM lieu to connect back. In case the MNM had disappeared abruptly, the agent tries to reach the MNM lieu being unaware of its absence. As it fails to reach the MNM lieu the agent again waits for the MNM lieu to connect back. The lieu hosting the agentat this moment informs all other lieus about the disappearance of MNM lieu. When the MNM connects back all the lieus are informed about the appearance of the MNM lieu. The agent waiting for the MNM at the last lieu returns back to it with the results.

5 A MNM operating in tethered mode makes a PPP/SLIP connection to the wired network. In such a case after the connection is established the portable computer is assigned a internet address local to the LAN to which it connects. This connection can be teared down after launching the agents and might be reestablished once the administrator deems it t to reconnect. In wireless computing the total domain is divided into cells. Each ofthecellshave a Mobile Support Station (MSS) of their own. The responsibility of serving the Mobile Host (MH) as it moves from one cell to another cell changes from one MSS to another [9][1]. The operation of MNM in case of a wireless network is shown in Figure.3. The MNM sends an agent from a particular cell and moves to another cell. The agent moves on its itinerary and tries to come back to the MNM after accomplishing its task. The agent isdirected to the new cell of the MNM by the MSS. The agent thus returns with the results of tasks performed by it. Wired network Mobile agent MSS MSS Manager Initial cell of the portable Manager Mobile IP Mobile agent Final cell of the portable Figure 3: Mobile Network Manager in the wireless mode 6 Performance Evaluation 6.1 MAGENTA in general The performance evaluation was carried out by executing lieus on two machines, wallace and boule (Sun Sparc machines executing SunOS 5.5). These two machines are connected by a 1 Mbps ethernet with no intervening router. The average time to launch an agent i.e to send an agent after initializing it from one lieu executing at wallace was found to be.371 seconds while the time for starting remote execution i.e requesting a remote lieu running at boule to startanagent on behalf of wallace was found to be.52 secs as it involved sending a message. In the former case the agent is sent by the lieu on wallace while in the latter case a simple request is sent toboule to prepare for a launch ofthe agent on its behalf. However, the time to request the results of the computation from boule by wallace was found to be.48 secs as it involved sending a request, searching ofthe results at boule and sending of the results back towallace. A comparison with dierent locations of code was also tried out. In the rst case the agent was sent from wallace to boule with only its state while the code to be executed was placed at boule. The code retrieves a le from the local le system and stores it in the agents folder. The time for the agent to return back after performing its task was found to be.931 secs. In the second case the agent was sent withits code and state from wallace to boule and the time measured was.993 seconds. So it is apparent that with larger size of the code to be transported and executed the response time would be higher in the latter case. 6.2 MAGENTA in a mobile user aware application We intended to study the suitability of mobile agents in the context of its utilization in mobile user aware applications as compared to the existing client-server mechanisms. Especially in the case of mobile users the network bandwidth usage and the response times are important factors as they have a fallible and costly link which should not be overused and they also need to know the response times so that they can reconnect back afterapproximately known time. The MNM was executed on a IBM ThinkPad 76 EL, a Pentium PC, 133 MHz, having 16Mo memory, executing windows 95 connected onto a 1Mbps Ethernet. In order to compare the usefulness and applicability of mobile agents in implementing the basic network management functionalities we have compared it with the client server mechanism. We thus implemented two MNMs, one utilizing mobile agents exclusively and the other utilizing the client server mechanism. The Figure 4 displays the comparison of bandwidth utilization when the client-server and mobile agent technologies are used to obtain given number of samples of a single SNMP variable from a SNMP agent. As is evident from the chart the client-server technique is suitable for SNMP monitoring when it is to be done for a limited amount of time. When large number of samples are desired, in terms of bandwidth utilization it is better to use the mobile agent technique. In our case the threshold we obtained was of 3 samples and with a sampling rate of.5 secs, we can derive that if a NMS intends to observe a SNMP variable for more than 2 min 3 secs it needs to use the mobile agent technology. The curve for mobile agent based MNM starts at 2 Kbytes as the agent size is 1K and the minimum cost of utilizing an agent for a round trip is 2K. In Figure 5 a similar comparison is shown but samples of5snmpvariables are obtained. The threshold in this case reduces to 6 samples. In Figure 6 the comparison of bandwidth utilization, when a single agent issent in a itinerary to retrieve 4 samples of a single SNMP variable from multiple machines and client-server technique is shown. The client-server mechanism is used from the manager machine to the SNMP agent machines separately and the requests are made in parallel. We observe that for this particular case an itinerary of no more than 18 machines is desirable. In Figure7 the response times between the client-server and the mobile-agent technology are compared. From the manager machine the time (in millisecs) it took for both the agents and the client-server technique to retrieve the given number

6 of samples were noted and plotted as shown. The response time in retrieving the samples were initially found better in client-server technique. But for larger number of samples the response time was better in sending an agent toretrieve the values than using client-server technique to continuously query and obtain the values of the SNMP variable from the SNMP agent. BW usage (in Kbytes) Comparison of Client Server and mobile agent technology Client Server Mobile Agent No of Samples Figure 4:Comparison of bandwidth utilization BW utilisation CS Agent Comparison BW utilisation No machines Figure 6:Comparison of bandwidth utilization 7 Conclusion BW usage (in Kbytes) Comparison of BW usage of client server and mobile agent techniques Client Server Mobile Agent No of Samples of 5 SNMP variables obtained Figure 5:Comparison of bandwidth utilization Time Taken (in MilliSecs) x 14 Comparison of Client Server and mobile agent techniques Client Server Mobile Agent No of Samples Figure 7:Comparison of response times MAGENTA is a generic mobile agent environment whichprovides mechanisms to enable functioning of mobile user aware applications. This mobile agent environment alsosatises the weaker notion of agency. Being generic in nature, it can be utilised for a number of applications. In order to demonstrate the support mechanisms for mobile users we have utilized MAGENTA environment inthe realm of network management to construct a Mobile Network Manager (MNM). We have also presented the performance evaluation of some of the interesting features of MAGENTA and have studied its performance in the context of its application in MNM as well. With respect to the existent client-server mechanism, we have found it to perform better in terms of bandwidth usage and response time for retrieval of large number of management variables. 8 Acknowledgments We would like to thank Dr. Michel Banatre for his support to the project. We would also like to thank Tiziana Signorelli and Janusz Wisniewski for their contributions to the implementation of the environment. Acknowledgments are also due to Serge Lassabe for his suggestions and feedbacks. References [1] B. Lily, M.R. Ebling and M. Satyanarayanan. Exploiting weak connectivity for mobile le access. in Proceedings of the Fifteenth ACM Symposium on Operating Systems Principles, Pg , December 1995 [2] P. Reiher, J. Heidemann et al. Resolving le conicts in the Ficus le system. in Proceedings of the 1994 Summer USENIX Conference, Pg , 1994 [3] A.D. Joseph, A. F. delespinasse, et al. Rover: A toolkit for mobile information access. in Proceedings of the Fifteenth ACM Symposium on Operating Systems Principles, Pg , December 1995 [4] Odyssey at General Magic Inc. Information available at [5] R. Beale and A. Wood. Agent Based Interaction in People and Computers IX : Proceedings of HCI'94,Glasgow,UK, August 1994, pp [6] G. Colin, Harrison et al. Mobile Agents: Are they a good idea? IBM T.J. Watson Research Center Technical report [7] N. Jennings, M. Wooldridge. Software Agents. IEE Review, January 1996, pp1 7-2 [8] D. Chess et al. Itinerant Agents for Mobile Computing IBM T.J. Watson Research Center Technical Report RC [9] A. Bakre and B.R. Badrinath. I-TCP:Indirect TCP for Mobile Hosts.Technical Report DCS-TR-314, Department of Computer Science, Rutgers University, 1994 [1] Markku, Kojo et al. Enhanced Communication Services for Mobile TCP/IP Networking. Technical Report C , Deptt. of Computer Science, University of Helsinki [11] T. Magedanz, K. Rothermel, S. Krause. Intelligent Agents: An Emerging Technology for Next Generation Telecommunications? INFOCOM' 96, USA, March 24-28, [12] P. Maes. Agents that reduce work and information overload. Communications of the ACM, 37(7):31-4, [13] Tomasz Imielinski, B.R. Badrinath. Mobile Wireless Computing: Challenges in Data ManagementCommunications of the ACM, October 1994, pp19-27 [14] R. Gray. Agent Tcl: Alpha Release 1.1, Computer Science Deptt, Dartmouth college, USA, rgray/transportable.html. [15] Mitsubishi Electric ITA. Concordia: An Infrastructure for Collaborating Mobile AgentsPresented and published in the proceedings of First International Workshop on Mobile Agents 97. [16] D. Johansen, R. V. Renesse and F. B. Schneider. An Introduction to TACOMA Distributed System Technical report CS-95-23, Department of Computer Science, Institute of Mathematical and Physical Sciences, University of Tromso.

7 [17] J. Bauman et al. Mole - A Java based Mobile Agent System. ECOOP'96 Workshop on Mobile Object Systems. [18] H. Peine, T.Stolpmann. The Architecture of the Ara Platform for Mobile Agents. First international Workshop on Mobile Agents, MA97 [19] Goldzmith, G. and Yemini Y. Decentralizing Control and Intelligence in Network Management.In the Proc. of 4th International Symposium on Integrated Network Management, Santa Barbara, CA 1995 [2] W. Stallings. SNMP, SNMPv2 and CMIP: The practical guide to network management standards. Addison- Wesley publication, 1994.

NMS. Graphical User Interface (GUI) Management Applications. NMS kernel Daemons, DBMS Network protocols,mechanisms

NMS. Graphical User Interface (GUI) Management Applications. NMS kernel Daemons, DBMS Network protocols,mechanisms Enabling a Mobile Network Manager (MNM) through mobile agents Akhil Sahai, Christine Morin IRISA-INRIA, Campus Universitaire de Beaulieu 35042 Rennes Cedex (France) fasahai, cmorin g@irisa.fr Abstract.

More information

27 Intelligent Agents for a Mobile Network Manager (MNM)

27 Intelligent Agents for a Mobile Network Manager (MNM) 27 Intelligent Agents for a Mobile Network Manager (MNM) Akhil Sahait, Christine Morin t, Stfphane Billiartt tinria + BULL IRISA, Campus Universitaire de Beaulieu 35042 Rennes Cedex (France) {asahai, cmorin,

More information

Mobile NFS. Fixed NFS. MFS Proxy. Client. Client. Standard NFS Server. Fixed NFS MFS: Proxy. Mobile. Client NFS. Wired Network.

Mobile NFS. Fixed NFS. MFS Proxy. Client. Client. Standard NFS Server. Fixed NFS MFS: Proxy. Mobile. Client NFS. Wired Network. On Building a File System for Mobile Environments Using Generic Services F. Andre M.T. Segarra IRISA Research Institute IRISA Research Institute Campus de Beaulieu Campus de Beaulieu 35042 Rennes Cedex,

More information

Mobile Computing Models What is the best way to partition a computation as well as the functionality of a system or application between stationary and

Mobile Computing Models What is the best way to partition a computation as well as the functionality of a system or application between stationary and Mobile Computig: Conclusions Evaggelia Pitoura Computer Science Department, University of Ioannina, Ioannina, Greece http://www.cs.uoi.gr/~ pitoura Summer School, Jyvaskyla, August 1998 Mobile Computing

More information

DEVELOPING A NEW MECHANISM FOR LOCATING AND MANAGING MOBILE AGENTS

DEVELOPING A NEW MECHANISM FOR LOCATING AND MANAGING MOBILE AGENTS Journal of Engineering Science and Technology Vol. 7, No. 5 (2012) 614-622 School of Engineering, Taylor s University DEVELOPING A NEW MECHANISM FOR LOCATING AND MANAGING MOBILE AGENTS AHMED Y. YOUSUF*,

More information

Mobile Agents to Automate Fault Management in Wireless and Mobile Networks 1

Mobile Agents to Automate Fault Management in Wireless and Mobile Networks 1 Mobile Agents to Automate Fault Management in Wireless and Mobile Networks 1 Niki Pissinou, Bhagyavati, Kia Makki The University of Louisiana at Lafayette {pissinou/bxb8329/makki@cacs.usl.edu} Abstract.

More information

A Study of Distributed Network Management Architectures

A Study of Distributed Network Management Architectures A Study of Distributed Network Management Architectures Kriti Nagpal 1 & Anish Saini 2 MTech Student, Department of Computer Science & Engineering, Echelon Institute of Technology, Faridabad, India 1 Assistant

More information

Network Processing of Mobile Agents, by Mobile Agents, for Mobile Agents

Network Processing of Mobile Agents, by Mobile Agents, for Mobile Agents Network Processing of Mobile Agents, by Mobile Agents, for Mobile Agents Ichiro Satoh National Institute of Informatics / Japan Science and Technology Corporation 2-1-2 Hitotsubashi, Chiyoda-ku, Tokyo

More information

Evaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network

Evaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network Evaluating the Performance of Mobile Agent-Based Communication among Mobile Hosts in Large Ad Hoc Wireless Network S. Bandyopadhyay Krishna Paul PricewaterhouseCoopers Limited Techna Digital Systems Sector

More information

forward packets do not forward packets

forward packets do not forward packets Power-aware Routing in Wireless Packet Networks Javier Gomez, Andrew T. Campbell Dept. of Electrical Engineering Columbia University, N 10027, USA Mahmoud Naghshineh, Chatschik Bisdikian IBM T.J. Watson

More information

A tutorial report for SENG Agent Based Software Engineering Course Instructor: Dr. Behrouz H. Far. Mobile Agents.

A tutorial report for SENG Agent Based Software Engineering Course Instructor: Dr. Behrouz H. Far. Mobile Agents. A tutorial report for SENG 609.22 Agent Based Software Engineering Course Instructor: Dr. Behrouz H. Far Mobile Agents Samuel Lee Department of Electrical Engineering University of Calgary Abstract With

More information

Using Tcl Mobile Agents for Monitoring Distributed Computations

Using Tcl Mobile Agents for Monitoring Distributed Computations Using Tcl Mobile Agents for Monitoring Distributed Computations Dilyana Staneva, Emil Atanasov Abstract: Agents, integrating code and data mobility, can be used as building blocks for structuring distributed

More information

A Mobile Agent-Based Framework for Active Networks. Ichiro Satoh

A Mobile Agent-Based Framework for Active Networks. Ichiro Satoh A Mobile -Based Framework for Active Networks Ichiro Satoh Department of Information Sciences, Ochanomizu University 2-1-1 Otsuka Bunkyo-ku Tokyo 112-8610, Japan E-mail: ichiro@is.ocha.ac.jp IEEE Systems,

More information

Ch 1. Mobile Adaptive Computing

Ch 1. Mobile Adaptive Computing Ch 1. Mobile Adaptive Computing What is Mobile Computing Mobile computing? Distributed system Wireless communications Mobility of communications devices Difference between mobile computing and mobile communications?

More information

BRANCH:IT FINAL YEAR SEVENTH SEM SUBJECT: MOBILE COMPUTING UNIT-IV: MOBILE DATA MANAGEMENT

BRANCH:IT FINAL YEAR SEVENTH SEM SUBJECT: MOBILE COMPUTING UNIT-IV: MOBILE DATA MANAGEMENT - 1 Mobile Data Management: Mobile Transactions - Reporting and Co Transactions Kangaroo Transaction Model - Clustering Model Isolation only transaction 2 Tier Transaction Model Semantic based nomadic

More information

Application of Autonomous Mobile Agents to Provide Security in Wireless Networks

Application of Autonomous Mobile Agents to Provide Security in Wireless Networks Application of Autonomous Mobile Agents to Provide Security in Wireless Networks ¹Odhiambo MO, ²Aderemi Lawal Department of Electrical and Mining Engineering, University of South Africa, Pretoria, South

More information

Client (meet lib) tac_firewall ch_firewall ag_vm. (3) Create ch_firewall. (5) Receive and examine (6) Locate agent (7) Create pipes (8) Activate agent

Client (meet lib) tac_firewall ch_firewall ag_vm. (3) Create ch_firewall. (5) Receive and examine (6) Locate agent (7) Create pipes (8) Activate agent Performance Issues in TACOMA Dag Johansen 1 Nils P. Sudmann 1 Robbert van Renesse 2 1 Department of Computer Science, University oftroms, NORWAY??? 2 Department of Computer Science, Cornell University,

More information

Mobile Computing An Browser. Grace Hai Yan Lo and Thomas Kunz fhylo, October, Abstract

Mobile Computing An  Browser. Grace Hai Yan Lo and Thomas Kunz fhylo, October, Abstract A Case Study of Dynamic Application Partitioning in Mobile Computing An E-mail Browser Grace Hai Yan Lo and Thomas Kunz fhylo, tkunzg@uwaterloo.ca University ofwaterloo, ON, Canada October, 1996 Abstract

More information

Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks

Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks H. Balakrishnan, S. Seshan, and R. H. Katz ACM Wireless Networks Vol. 1, No. 4, pp. 469-482 Dec. 1995 P. 1 Introduction

More information

Mobile agent based online bandwidth allocation scheme for multimedia communication

Mobile agent based online bandwidth allocation scheme for multimedia communication Mobile based online bandwidth allocation scheme for multimedia communication S.S.Manvi and P. Venkataram Electrical Communication Engineering Department, Indian Institute of Science, Bangalore-560012 INDIA,

More information

Distributed AAA: Proposals for Ad Hoc Networks

Distributed AAA: Proposals for Ad Hoc Networks Distributed AAA: Proposals for Ad Hoc Networks Pradip Lamsal Department of Computer Science University of Helsinki, Finland pradip.lamsal@helsinki.fi ABSTRACT AAA frameworks such as diameter protocol allows

More information

A PERFORMANCE ANALYSIS FRAMEWORK FOR MOBILE-AGENT SYSTEMS

A PERFORMANCE ANALYSIS FRAMEWORK FOR MOBILE-AGENT SYSTEMS A PERFORMANCE ANALYSIS FRAMEWORK FOR MOBILE-AGENT SYSTEMS Marios D. Dikaiakos Department of Computer Science University of Cyprus George Samaras Speaker: Marios D. Dikaiakos mdd@ucy.ac.cy http://www.cs.ucy.ac.cy/mdd

More information

A Framework for Building Reusable Mobile Agents for Network Management

A Framework for Building Reusable Mobile Agents for Network Management A Framework for Building Reusable Mobile Agents for Network Management Ichiro Satoh Λ National Institute of Informatics / Japan Science and Technology Corporation 2-1-2 Hitotsubashi, Chiyoda-ku, Tokyo

More information

TCP over Wireless Networks Using Multiple. Saad Biaz Miten Mehta Steve West Nitin H. Vaidya. Texas A&M University. College Station, TX , USA

TCP over Wireless Networks Using Multiple. Saad Biaz Miten Mehta Steve West Nitin H. Vaidya. Texas A&M University. College Station, TX , USA TCP over Wireless Networks Using Multiple Acknowledgements (Preliminary Version) Saad Biaz Miten Mehta Steve West Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, TX

More information

ECS-087: Mobile Computing

ECS-087: Mobile Computing ECS-087: Mobile Computing TCP over wireless TCP and mobility Most of the Slides borrowed from Prof. Sridhar Iyer s lecture IIT Bombay Diwakar Yagyasen 1 Effect of Mobility on Protocol Stack Application:

More information

RFC 003 Event Service October Computer Science Department October 2001 Request for Comments: 0003 Obsoletes: none.

RFC 003 Event Service October Computer Science Department October 2001 Request for Comments: 0003 Obsoletes: none. Ubiquitous Computing Bhaskar Borthakur University of Illinois at Urbana-Champaign Software Research Group Computer Science Department October 2001 Request for Comments: 0003 Obsoletes: none The Event Service

More information

OPNET M-TCP model. Modupe Omueti

OPNET M-TCP model. Modupe Omueti OPNET M-TCP model Modupe Omueti momueti@cs.sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/research/cnl School of Engineering Science Simon Fraser University Roadmap Introduction Motivation

More information

Extensions to RTP to support Mobile Networking: Brown, Singh 2 within the cell. In our proposed architecture [3], we add a third level to this hierarc

Extensions to RTP to support Mobile Networking: Brown, Singh 2 within the cell. In our proposed architecture [3], we add a third level to this hierarc Extensions to RTP to support Mobile Networking Kevin Brown Suresh Singh Department of Computer Science Department of Computer Science University of South Carolina Department of South Carolina Columbia,

More information

Agents for Mobility with a Java-enabled Orbiter

Agents for Mobility with a Java-enabled Orbiter Agents for Mobility with a Java-enabled Orbiter André Vellino Computing Research Lab, Nortel Technology Institute for Information Technology, National Research Council Aug 2nd 96 What are Agents? Software

More information

A Centralized Approaches for Location Management in Personal Communication Services Networks

A Centralized Approaches for Location Management in Personal Communication Services Networks A Centralized Approaches for Location Management in Personal Communication Services Networks Fahamida Firoze M. Tech. (CSE) Scholar, Deptt. Of CSE, Al Falah School of Engineering & Technology, Dhauj, Faridabad,

More information

crossing disconnected Fixed Host Base Station Fixed Host Fixed Host Fixed Host High Speed Wireful Network Base Station Base Station Fixed Host

crossing disconnected Fixed Host Base Station Fixed Host Fixed Host Fixed Host High Speed Wireful Network Base Station Base Station Fixed Host MOBILE COMPUTING and DATABASES: ANYTHING NEW? Margaret H. Dunham Dept of Computer Science and Engineering Southern Methodist University mhd@seas.smu.edu Abdelsalam (Sumi) Helal Dept of Computer Science

More information

Middleware for Ubiquitous Computing

Middleware for Ubiquitous Computing Middleware for Ubiquitous Computing Software Testing for Mobile Computing National Institute of Informatics Ichiro Satoh Abstract When a portable computing device is moved into and attached to a new local

More information

Advanced Peer to Peer Discovery and Interaction Framework

Advanced Peer to Peer Discovery and Interaction Framework Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 peeyush_tugnawat@jdedwards.com Mohamed E. Fayad Computer Engineering

More information

On Object Orientation as a Paradigm for General Purpose. Distributed Operating Systems

On Object Orientation as a Paradigm for General Purpose. Distributed Operating Systems On Object Orientation as a Paradigm for General Purpose Distributed Operating Systems Vinny Cahill, Sean Baker, Brendan Tangney, Chris Horn and Neville Harris Distributed Systems Group, Dept. of Computer

More information

Creating and Running Mobile Agents with XJ DOME

Creating and Running Mobile Agents with XJ DOME Creating and Running Mobile Agents with XJ DOME Kirill Bolshakov, Andrei Borshchev, Alex Filippoff, Yuri Karpov, and Victor Roudakov Distributed Computing & Networking Dept. St.Petersburg Technical University

More information

A Mobile Agent-based Model for Service Management in Virtual Active Networks

A Mobile Agent-based Model for Service Management in Virtual Active Networks A Mobile Agent-based Model for Service Management in Virtual Active Networks Fábio Luciano Verdi and Edmundo R. M. Madeira Institute of Computing, University of Campinas (UNICAMP), Campinas-SP, Brazil

More information

perform well on paths including satellite links. It is important to verify how the two ATM data services perform on satellite links. TCP is the most p

perform well on paths including satellite links. It is important to verify how the two ATM data services perform on satellite links. TCP is the most p Performance of TCP/IP Using ATM ABR and UBR Services over Satellite Networks 1 Shiv Kalyanaraman, Raj Jain, Rohit Goyal, Sonia Fahmy Department of Computer and Information Science The Ohio State University

More information

Management. Station RMON. Network Device. Agent. Switch. Agent. Standalone Probe. Management. Agent. Workstation

Management. Station RMON. Network Device. Agent. Switch. Agent. Standalone Probe. Management. Agent. Workstation Exploiting Code Mobility in Decentralized and Flexible Network Management Mario Baldi, Silvano Gai, and Gian Pietro Picco Dip. Automatica e Informatica, Politecnico di Torino C.so Duca degli Abruzzi 24,

More information

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Kalyan Kalepu, Shiv Mehra and Chansu Yu, Department of Electrical and Computer Engineering Cleveland State University 2121

More information

Assignment 5. Georgia Koloniari

Assignment 5. Georgia Koloniari Assignment 5 Georgia Koloniari 2. "Peer-to-Peer Computing" 1. What is the definition of a p2p system given by the authors in sec 1? Compare it with at least one of the definitions surveyed in the last

More information

Packet Estimation with CBDS Approach to secure MANET

Packet Estimation with CBDS Approach to secure MANET Packet Estimation with CBDS Approach to secure MANET Mr. Virendra P. Patil 1 and Mr. Rajendra V. Patil 2 1 PG Student, SSVPS COE, Dhule, Maharashtra, India 2 Assistance Professor, SSVPS COE, Dhule, Maharashtra,

More information

Adaptive Mobile Agents: Modeling and a Case Study

Adaptive Mobile Agents: Modeling and a Case Study Adaptive Mobile Agents: Modeling and a Case Study Supranamaya Ranjan Department of Electrical & Computer Engineering Rice University Houston, Texas - 77005 Arobinda Gupta Anupam Basu Anand Meka Abhishek

More information

Kevin Skadron. 18 April Abstract. higher rate of failure requires eective fault-tolerance. Asynchronous consistent checkpointing oers a

Kevin Skadron. 18 April Abstract. higher rate of failure requires eective fault-tolerance. Asynchronous consistent checkpointing oers a Asynchronous Checkpointing for PVM Requires Message-Logging Kevin Skadron 18 April 1994 Abstract Distributed computing using networked workstations oers cost-ecient parallel computing, but the higher rate

More information

A Resource Look up Strategy for Distributed Computing

A Resource Look up Strategy for Distributed Computing A Resource Look up Strategy for Distributed Computing F. AGOSTARO, A. GENCO, S. SORCE DINFO - Dipartimento di Ingegneria Informatica Università degli Studi di Palermo Viale delle Scienze, edificio 6 90128

More information

What is the fundamental purpose of a communication system? Discuss the communication model s elements.

What is the fundamental purpose of a communication system? Discuss the communication model s elements. What is the fundamental purpose of a communication system? The fundamental purpose of a communication system is the exchange of data between two parties. Discuss the communication model s elements. The

More information

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES B.Poonguzharselvi 1 and V.Vetriselvi 2 1,2 Department of Computer Science and Engineering, College of Engineering Guindy, Anna University Chennai,

More information

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS

TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS Deddy Chandra and Richard J. Harris School of Electrical and Computer System Engineering Royal Melbourne Institute of Technology Melbourne, Australia

More information

Andrew T. Campbell, Javier Gomez. Center for Telecommunications Research, Columbia University, New York. [campbell,

Andrew T. Campbell, Javier Gomez. Center for Telecommunications Research, Columbia University, New York. [campbell, An Overview of Cellular IP Andrew T. Campbell, Javier Gomez Center for Telecommunications Research, Columbia University, New York [campbell, javierg]@comet.columbia.edu Andras G. Valko Ericsson Research

More information

Supporting IP Multicast for Mobile Hosts. Yu Wang Weidong Chen. Southern Methodist University. May 8, 1998.

Supporting IP Multicast for Mobile Hosts. Yu Wang Weidong Chen. Southern Methodist University. May 8, 1998. Supporting IP Multicast for Mobile Hosts Yu Wang Weidong Chen Southern Methodist University fwy,wcheng@seas.smu.edu May 8, 1998 Abstract IP Multicast is an ecient mechanism of delivering a large amount

More information

Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1

Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1 Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1 Shiv Mehra and Chansu Yu Department of Electrical and Computer Engineering Cleveland State University E-mail: {s.mehra,c.yu91}@csuohio.edu

More information

Chapter 5 INTRODUCTION TO MOBILE AGENT

Chapter 5 INTRODUCTION TO MOBILE AGENT Chapter 5 INTRODUCTION TO MOBILE AGENT 135 Chapter 5 Introductions to Mobile Agent 5.1 Mobile agents What is an agent? In fact a software program is containing an intelligence to help users and take action

More information

CS514: Intermediate Course in Computer Systems

CS514: Intermediate Course in Computer Systems : Intermediate Course in Computer Systems Lecture 23: March 12, 2003 Challenges of Mobility Mobility is a huge topic Breaks existing applications Anything bandwidth intensive or synchronous Opportunities

More information

SoftEther VPN Server supports the clustering function. This section explains the clustering function.

SoftEther VPN Server supports the clustering function. This section explains the clustering function. SoftEther VPN Server supports the clustering function. This section explains the clustering function. 3.9.1 What is Clustering? Clustering Necessity In general terms, clustering is a processing method

More information

MSS. MH <Disconnected> MSS MSS. wired link. wireless link. cell boundary

MSS. MH <Disconnected> MSS MSS. wired link. wireless link. cell boundary Chapter 1 Fault Tolerance and Recovery in Mobile Computing Systems Elisa Bertino, Elena Pagani, and Gian Paolo Rossi 11 INTRODUCTION Through wireless networks, mobile personal machines have the ability

More information

M Commerce: Mobile Applications. Sridhar Iyer K R School of Information Technology IIT Bombay

M Commerce: Mobile Applications. Sridhar Iyer K R School of Information Technology IIT Bombay M Commerce: Mobile Applications Sridhar Iyer K R School of Information Technology IIT Bombay sri@it.iitb.ernet.in http://www.it.iitb.ernet.in/~sri Outline Mobile applications Wireless networking Routing

More information

Local Recovery of Routes for Reliability using Backup Nodes in MANETs

Local Recovery of Routes for Reliability using Backup Nodes in MANETs Local Recovery of Routes for Reliability using Backup Nodes in MANETs Madhura Krishna R K 1, Megha T 2, Meghana M S 3, Dr. K Raghuveer (Professor and Head) 4 1,2,3,4 Dept. of Information Science and Engineering,The

More information

Year, pier University Nikos Migas PhD student 2 Supervisors: School of Computing, Na MARIAN

Year, pier University Nikos Migas PhD student 2 Supervisors: School of Computing, Na MARIAN MARIAN Mobile Agents for Routing In Ad-hoc Networks Nikos Migas PhD student 2 nd Year, School of Computing, Napier University n.migas@napier.ac.uk Supervisors: W.Buchanan, K.McArtney Introduction MARIAN

More information

An Architecture for Next Generation Mobile Agent Infrastructure

An Architecture for Next Generation Mobile Agent Infrastructure An Architecture for Next Generation Mobile Agent Infrastructure Ichiro Satoh Department of Information Sciences, Ochanomizu University / Japan Science and Technology Corporation Abstract This paper presents

More information

2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising

More information

Chapter 18 Distributed Systems and Web Services

Chapter 18 Distributed Systems and Web Services Chapter 18 Distributed Systems and Web Services Outline 18.1 Introduction 18.2 Distributed File Systems 18.2.1 Distributed File System Concepts 18.2.2 Network File System (NFS) 18.2.3 Andrew File System

More information

IP Mobility vs. Session Mobility

IP Mobility vs. Session Mobility IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when

More information

THE IMPLEMENTATION OF A DISTRIBUTED FILE SYSTEM SUPPORTING THE PARALLEL WORLD MODEL. Jun Sun, Yasushi Shinjo and Kozo Itano

THE IMPLEMENTATION OF A DISTRIBUTED FILE SYSTEM SUPPORTING THE PARALLEL WORLD MODEL. Jun Sun, Yasushi Shinjo and Kozo Itano THE IMPLEMENTATION OF A DISTRIBUTED FILE SYSTEM SUPPORTING THE PARALLEL WORLD MODEL Jun Sun, Yasushi Shinjo and Kozo Itano Institute of Information Sciences and Electronics University of Tsukuba Tsukuba,

More information

KEYWORDS. Mobile commerce, E-commerce, mobile agent, SMA, Aglet. 1 INTRODUCTION

KEYWORDS. Mobile commerce, E-commerce, mobile agent, SMA, Aglet. 1 INTRODUCTION Mobile commerce approach based on mobile Oussama Zerdoumi, Department of Mathematics and Computer Science, University of Kasdi Merbah Ouargla, 30000 Algeria Okba Kazar, Saber Benharzallah Department of

More information

Performance comparison of implementation mechanisms for e-commerce applications: Towards a hybrid approach

Performance comparison of implementation mechanisms for e-commerce applications: Towards a hybrid approach Proceedings of the 2nd Asian International Mobile Computing Conference(AMOC 2002) 14-17 May, 2002 Langkawi, Malaysia Performance comparison of implementation mechanisms for e-commerce applications: Towards

More information

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group

More information

Approaches to Capturing Java Threads State

Approaches to Capturing Java Threads State Approaches to Capturing Java Threads State Abstract This paper describes a range of approaches to capturing the state of Java threads. The capture and restoration of Java threads state have two main purposes:

More information

DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 1. Introduction

DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 1. Introduction DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 1 Introduction Modified by: Dr. Ramzi Saifan Definition of a Distributed System (1) A distributed

More information

VERITAS Volume Replicator. Successful Replication and Disaster Recovery

VERITAS Volume Replicator. Successful Replication and Disaster Recovery VERITAS Volume Replicator Successful Replication and Disaster Recovery V E R I T A S W H I T E P A P E R Table of Contents Introduction.................................................................................1

More information

TCP Strategies. Keepalive Timer. implementations do not have it as it is occasionally regarded as controversial. between source and destination

TCP Strategies. Keepalive Timer. implementations do not have it as it is occasionally regarded as controversial. between source and destination Keepalive Timer! Yet another timer in TCP is the keepalive! This one is not required, and some implementations do not have it as it is occasionally regarded as controversial! When a TCP connection is idle

More information

1 Energy Efficient Protocols in Self-Aware Networks

1 Energy Efficient Protocols in Self-Aware Networks Energy Efficient Protocols in Self-Aware Networks Toktam Mahmoodi Centre for Telecommunications Research King s College London, London WC2R 2LS, UK Stanford NetSeminar 13 December 2011 1 Energy Efficient

More information

The effect of Mobile IP handoffs on the performance of TCP

The effect of Mobile IP handoffs on the performance of TCP Mobile Networks and Applications 4 (1999) 131 135 131 The effect of Mobile IP handoffs on the performance of TCP Anne Fladenmuller a and Ranil De Silva b a Alcatel CIT, Software Department, Route de Nozay,

More information

Scalable Middleware Environment for Agent-Based Internet Applications]

Scalable Middleware Environment for Agent-Based Internet Applications] Scalable Middleware Environment for Agent-Based Internet Applications] Benno J. Overeinder and Frances M.T. Brazier Department of Computer Science, Vrije Universiteit Amsterdam De Boelelaan 1081a, 1081

More information

An Improvement of TCP Downstream Between Heterogeneous Terminals in an Infrastructure Network

An Improvement of TCP Downstream Between Heterogeneous Terminals in an Infrastructure Network An Improvement of TCP Downstream Between Heterogeneous Terminals in an Infrastructure Network Yong-Hyun Kim, Ji-Hong Kim, Youn-Sik Hong, and Ki-Young Lee University of Incheon, 177 Dowha-dong Nam-gu, 402-749,

More information

A Mobile Agent Platform for Supporting Ad-hoc Network Environment

A Mobile Agent Platform for Supporting Ad-hoc Network Environment International Journal of Grid and Distributed Computing 9 A Mobile Agent Platform for Supporting Ad-hoc Network Environment Jinbae Park, Hyunsang Youn, Eunseok Lee School of Information and Communication

More information

Computer Networks, Andrew Tannenbaum, Chapter 5.6. Computer Networking: A Top Down Approach Featuring the

Computer Networks, Andrew Tannenbaum, Chapter 5.6. Computer Networking: A Top Down Approach Featuring the Mobile IP (IPv4 and IPv6) Dr. John Keeney 3BA33 Elements of a wireless Wired infrastructure wireless hosts laptop, PDA, IP phone run applications may be stationary (nonmobile) or mobile wireless does not

More information

An Efficient DECT-Mobile IP Interworking for Mobile Computing

An Efficient DECT-Mobile IP Interworking for Mobile Computing An Efficient DECT-Mobile IP Interworking for Mobile Computing Anthony Lo *, Winston Seah * and Edwin Schreuder + * Centre for Wireless Communications 1, National University of Singapore, 20 Science Park

More information

TCP Congestion Control in Wired and Wireless networks

TCP Congestion Control in Wired and Wireless networks TCP Congestion Control in Wired and Wireless networks Mohamadreza Najiminaini (mna28@cs.sfu.ca) Term Project ENSC 835 Spring 2008 Supervised by Dr. Ljiljana Trajkovic School of Engineering and Science

More information

Disconnected Operation in a Mobile Computation System

Disconnected Operation in a Mobile Computation System Disconnected Operation in a Mobile Computation System Marco T. de O. Valente, Roberto da S. Bigonha, Mariza A. da S. Bigonha, Antonio A.F. Loureiro Department of Computer Science University of Minas Gerais

More information

Congestion Control in Mobile Ad-Hoc Networks

Congestion Control in Mobile Ad-Hoc Networks Congestion Control in Mobile Ad-Hoc Networks 1 Sandeep Rana, 2 Varun Pundir, 3 Ram Sewak Singh, 4 Deepak Yadav 1, 2, 3, 4 Shanti Institute of Technology, Meerut Email: sandeepmietcs@gmail.com Email: varunpundir@hotmail.com

More information

ARCHITECTURAL SOFTWARE POWER ESTIMATION SUPPORT FOR POWER AWARE REMOTE PROCESSING

ARCHITECTURAL SOFTWARE POWER ESTIMATION SUPPORT FOR POWER AWARE REMOTE PROCESSING ARCHITECTURAL SOFTWARE POWER ESTIMATION SUPPORT FOR POWER AWARE REMOTE PROCESSING Gerald Kaefer, Josef Haid, Karl Voit, Reinhold Weiss Graz University of Technology Graz, AUSTRIA {kaefer, haid, voit, rweiss}@iti.tugraz.at

More information

The ATL Postmaster: A System for Agent Collaboration and Information Dissemination

The ATL Postmaster: A System for Agent Collaboration and Information Dissemination The ATL Postmaster: A System for Agent Collaboration and Information Dissemination Jennifer Kay, Julius Etzl, Goutham Rao, and Jon Thies Lockheed Martin Advanced Technology Laboratories 1 Federal Street

More information

Ubiquitous Mobile Host Internetworking

Ubiquitous Mobile Host Internetworking Ubiquitous Mobile Host Internetworking David B. Johnson School of Computer Science Carnegie Mellon University Pittsburgh, PA 152 13-389 1 dbj Qcs. cmu. edu 1. Introduction With the increasing popularity

More information

Distributed Communication for Highly Mobile Agents

Distributed Communication for Highly Mobile Agents Distributed Communication for Highly Mobile Agents Mohammad Samarah and Philip Chan The division of Electrical and Computer Science and Engineering Florida Institute of Technology, Melbourne, FL 32901

More information

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1 Computer Networks Wireless and Mobile Networks László Böszörményi Computer Networks Mobile - 1 Background Number of wireless (mobile) phone subscribers now exceeds number of wired phone subscribers! Computer

More information

CMPE150 Midterm Solutions

CMPE150 Midterm Solutions CMPE150 Midterm Solutions Question 1 Packet switching and circuit switching: (a) Is the Internet a packet switching or circuit switching network? Justify your answer. The Internet is a packet switching

More information

Implementation and Performance Evaluation of Indirect TCP

Implementation and Performance Evaluation of Indirect TCP 260 IEEE TRANSACTIONS ON COMPUTERS, VOL. 46, NO. 3, MARCH 1997 Implementation and Performance Evaluation of Indirect TCP Ajay V. Bakre and B.R. Badrinath Abstract With the advent of small portable computers

More information

Distributed Systems. Pre-Exam 1 Review. Paul Krzyzanowski. Rutgers University. Fall 2015

Distributed Systems. Pre-Exam 1 Review. Paul Krzyzanowski. Rutgers University. Fall 2015 Distributed Systems Pre-Exam 1 Review Paul Krzyzanowski Rutgers University Fall 2015 October 2, 2015 CS 417 - Paul Krzyzanowski 1 Selected Questions From Past Exams October 2, 2015 CS 417 - Paul Krzyzanowski

More information

Delay Performance of the New Explicit Loss Notification TCP Technique for Wireless Networks

Delay Performance of the New Explicit Loss Notification TCP Technique for Wireless Networks Delay Performance of the New Explicit Loss Notification TCP Technique for Wireless Networks Wenqing Ding and Abbas Jamalipour School of Electrical and Information Engineering The University of Sydney Sydney

More information

Efficient Handoff using Mobile IP and Simplified Cellular IP

Efficient Handoff using Mobile IP and Simplified Cellular IP Presented at GNSS 2004 The 2004 International Symposium on GNSS/GPS Sydney, Australia 6 8 December 2004 Efficient Handoff using Mobile IP and Simplified Cellular IP S. Omar School of Surveying & Spatial

More information

Performance Evaluation of Mobile Agents for E-Commerce Applications

Performance Evaluation of Mobile Agents for E-Commerce Applications Performance Evaluation of Mobile Agents for E-Commerce Applications Rahul Jha and Sridhar Iyer Kanwal Rekhi School of Information Technology, Indian Institute of Technology Bombay, Powai, Mumbai - 4 76.

More information

UNIT II NETWORKING

UNIT II NETWORKING UNIT II INTRODUCTION TO WIRELESS NETWORKING Wireless Network The cellular telephone system is responsible for providing coverage throughout a particular area known as coverage region or market The interconnection

More information

Policy-Based Context-Management for Mobile Solutions

Policy-Based Context-Management for Mobile Solutions Policy-Based Context-Management for Mobile Solutions Caroline Funk 1,Björn Schiemann 2 1 Ludwig-Maximilians-Universität München Oettingenstraße 67, 80538 München caroline.funk@nm.ifi.lmu.de 2 Siemens AG,

More information

Mobile Agent Paradigm in Computer Networks

Mobile Agent Paradigm in Computer Networks Mobile Agent Paradigm in Computer Networks Nguyen Hong Van DSV, Stockholm University, Forum 100, SE-164 40 Kista, Sweden Email: si-hvan@dsv.su.se ABSTRACT : Mobile agent technology has recently emerged

More information

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Zhi Li, Prasant Mohapatra, and Chen-Nee Chuah University of California, Davis, CA 95616, USA {lizhi, prasant}@cs.ucdavis.edu,

More information

Simulating a General Purpose Mobile Computing Environment

Simulating a General Purpose Mobile Computing Environment Computer Science Technical Report Simulating a General Purpose Mobile Computing Environment Anurag Kahol, Sumit Khurana, Sandeep Gupta and Pradip Srimani Department of Computer Science Colorado State University

More information

1 sat-nms SCC Overview

1 sat-nms SCC Overview 1 sat-nms SCC Overview The sat-nms NMS normally uses dial-up telephone lines (analog telephone, ISDN, GSM) for the control connections between the sat-nms NMS and each particular VLC. Using modems or ISDN

More information

Department of Electronic and Electrical Engineering, Loughborough University

Department of Electronic and Electrical Engineering, Loughborough University SMDS PEFOMANCE MONITOING : TAFFIC GENEATION, INFOMATION POCESSING & ANALYSIS Omar Bashir, Iain Phillips & David Parish + Abstract Many aspects of the performance of data communication networks can be determined

More information

CIS 632 / EEC 687 Mobile Computing

CIS 632 / EEC 687 Mobile Computing CIS 632 / EEC 687 Mobile Computing TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple

More information