9,300 Hits in 4.2 sec

Locating and repairing faults in a network with mobile agents

Colin Cooper, Ralf Klasing, Tomasz Radzik
2010 Theoretical Computer Science  
• Black hole -a node in the network which destroys agents entering it (without a trace). • O bjective: agents are to locate black holes. • M otivation: a black hole models a malicious host in a computer  ...  What is the cost of repairing a fault?  ... 
doi:10.1016/j.tcs.2010.01.011 fatcat:cq56szwxdvb2rhocpo7g5ilfua

Locating and Repairing Faults in a Network with Mobile Agents [chapter]

Colin Cooper, Ralf Klasing, Tomasz Radzik
Lecture Notes in Computer Science  
Some nodes in the network may be faulty and the agents are to find the faults and repair them.  ...  We consider a fixed, undirected, known network and a number of "mobile agents" which can traverse the network in synchronized steps.  ...  In other scenarios only the "content" part of the agent (the "repair kit") may have to be sacrificed to fix a fault, while the "carrier" part can remain mobile and can communicate with other agents, or  ... 
doi:10.1007/978-3-540-69355-0_4 fatcat:tvzwj5jttnfpvhcbscnkgfzuiy

Designing Fault-Tolerant Mobile Systems [chapter]

Giovanna Di Marzo Serugendo, Alexander Romanovsky
2003 Lecture Notes in Computer Science  
The purpose of this paper is to investigate how several innovative techniques, not all initially intended for fault-tolerance, can be applied in providing fault tolerance of complex mobile agent systems  ...  In the next part of the paper we present evaluation criteria for fault tolerance techniques, and propose several possible solutions for error recovery at the application level: meta-agent, Coordinated  ...  In the case of a built-in fault-tolerant mechanism each agent is equipped with fault tolerance.  ... 
doi:10.1007/3-540-36520-6_17 fatcat:7bm7bzlnxnhfri3xdty755umny

FANTOMAS Fault Tolerance for Mobile Agents in Clusters [chapter]

Holger Pals, Stefan Petri, Claus Grewe
2000 Lecture Notes in Computer Science  
We examine fault tolerance with regard to properties and requirements of mobile agents, and find that independent checkpointing with receiver based message logging is appropriate in this context.  ...  In this context, mobile agents are of growing interest as base for distributed and parallel applications.  ...  In contrast, in applications where a large number of agents are sent out to search and process information in a network, the loss of one or several mobile agents might be acceptable.  ... 
doi:10.1007/3-540-45591-4_170 fatcat:mtwhpmtvmrcsdoaovvktjxrl3i

Optimized Design of Mechanical Chain Drive Based on a Wireless Sensor Network Data Algorithm

Min Zhuang, Ge Li, Kexin Ding, Guansheng Xu, Guolong Shi
2021 Journal of Sensors  
A model and theoretical basis are provided for the subsequent trusted data-driven participant selection problem in swarm-wise sensing networks.  ...  In this paper, we use a wireless sensor network data algorithm to optimize the design of mechanical chain drive by conducting an in-depth study of the mechanical chain drive optimization.  ...  When the number of mobile nodes in the network is sufficient, the void repair rate of GRAND can reach 100%, and the repair redundancy does not exceed 0.354, as shown in Figure 6 .  ... 
doi:10.1155/2021/2901624 fatcat:hnf4l6pxcveavnt7rfas3iqmte

Scalable Fault-Tolerant Location Management Scheme for Mobile IP

JinHo Ahn, Sung-Gi Min, ChongSun Hwang
2001 Australasian Journal of Information Systems  
As the number of mobile nodes registering with a network rapidly increases in Mobile IP, multiple mobility (home or foreign) agents can be allocated to a network in order to improve performance and availability  ...  The CML scheme achieves low failure-free latency even if the number of mobility agents in a network increases, and improves scalability to a large number of mobile nodes registering with each network compared  ...  It means that if a mobile node has registered with a foreign agent in a network and the agent fails currently, the mobile node can re-register with another foreign agent in the same network [Perkins (  ... 
doi:10.3127/ajis.v9i1.222 fatcat:afi4snbj6fbvtg5s4kwmjjb3we

Automation of Cellular Network Faults [chapter]

Okuthe P., Johnson I.
2011 Cellular Networks - Positioning, Performance Analysis, Reliability  
A MIA agent is a JADE-LEAP agent, which is a mobile agent with autonomy and high degree of collaboration.  ...  In contrast, static multiple servers require duplication of functionality at every location. Mobile agents carry the functionality with them, so it does not have to be duplicated.  ...  The Section 3 contains two Chapters and deal with reliability issues of wireless cellular networks.  ... 
doi:10.5772/16211 fatcat:zxn5bkd5tzgvvfb6lslx3x7uoe

Design, Validation, Simulation and Parametric Evaluation of a Novel Protocol for Locating Mobile Agents in Multiregion Environment

Rama Sushil, Kumkum Garg, Rama Bhargava
2008 Journal of Computer Science  
Location management is a necessity for locating mobile agents in a network of mobile agent hosts for controlling, monitoring and communication during processing and it still represents an open research  ...  BSPC provided better scalability, location updating availability and interaction fault rate with theoretical considerations of network usage and network fault rate.  ...  A mobile agent host is a node in the network which has a mobile agent platform installed in it.  ... 
doi:10.3844/jcssp.2008.256.271 fatcat:xoraqmew7fbndhfr4bupkbsymy

Exploiting the Usage of Mobile Agents as a Network Performance Monitoring Tool for Network Fault Management an Alternative to Other Traditional Approaches

Isaac Bansah, Tonny Montana Adegboyega
2015 International Journal of Computer Applications  
In short mobile agent is a form of software agent that is capable of traveling across a network. [6] mentioned that agents are capable of transporting itself with its state and code.  ...  The mobile agent is only capable of executing its functions or interacts with an object across a network with the same host.  ... 
doi:10.5120/21206-3891 fatcat:evgfow44d5ejjiz6t7vzt5aesq

Faulty Node Repair and Dynamically Spawned Black Hole Search [chapter]

Wei Shi, Mengfei Peng, Jean-Pierre Corriveau, William Lee Croft
2017 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
We conclude that, using our proposed algorithm, b + 4 agents can repair all faulty nodes and locate the black hole infected by a virus v within finite time, when the black hole appears in the network before  ...  In this paper, we consider a specific attack model that involves multiple faulty nodes that can be repaired by mobile software agents, as well as a virus v that can infect a previously repaired faulty  ...  Acknowledgments The authors gratefully acknowledge financial support from the Natural Sciences and Engineering Research Council of Canada (NSERC) under Grant No. GPIN-2015-05390.  ... 
doi:10.1007/978-3-319-59608-2_8 fatcat:ercaxwwm3zb7nivqbbxivclygu

Mobile agents for network management

Andrzej Bieszczad, Bernard Pagurek, Tony White
1998 IEEE Communications Surveys and Tutorials  
This definition has its roots in the concurrent Actor model [9] . We will call these basic characteristics a basic agent model. A mobile agent is a software agent that can move between locations.  ...  In the section that follows we present a number of applications of mobile agents in the OSI functional areas of network management [6] .  ...  T ABSTRACT In this article we discuss the potential uses of mobile agents in network management and define software agents and a navigation model that determines agent mobility.  ... 
doi:10.1109/comst.1998.5340400 fatcat:qfjpsj4b5ndedlwwwiwslihjxe

Autonomous pipeline monitoring and maintenance system: a RFID-based approach

Jong-Hoon Kim, Gokarna Sharma, Noureddine Boudriga, S.S. Iyengar, Nagarajan Prabakar
2015 EURASIP Journal on Wireless Communications and Networking  
for efficient and accurate inspection, corrective reparation, and precise geo-location information.  ...  Existing monitoring and maintenance approaches are costly and inefficient because pipelines can be installed in large scale and in an inaccessible and hazardous environment.  ...  [3] developed a wireless network system in which an underwater team of "Collaborative Autonomous Agents" (CAAs) is able to locate and repair scale formations in pipelines and tanks.  ... 
doi:10.1186/s13638-015-0495-y fatcat:yav2o6downc47avq6g4a3dyuqi

SPAMMS: A sensor-based pipeline autonomous monitoring and maintenance system

Jong-Hoon Kim, Gokarna Sharma, Noureddine Boudriga, S. Sitharama Iyengar
2010 2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010)  
In addition, it permits a good tracking of the mobile sensors.  ...  It combines robot agent based technologies with sensing technologies for efficiently locating health related events and allows active and corrective monitoring and maintenance of the pipelines.  ...  The repair actuator, a device that can treat the calcium carbonate site with a repair fluid/chemical, is also embedded with in CAAs, which treats scale formation once it is detected and located by the  ... 
doi:10.1109/comsnets.2010.5432015 dblp:conf/comsnets/KimSBI10 fatcat:3pj6yoec5jhk7ku4wmebn24fze

Mobile Agents and Active Networks [chapter]

Fritz Hohl
2000 IFIP Advances in Information and Communication Technology  
In this sense, mobile agents are a model where the programmer imagines to employ a breed of "software robots" wandering through the network, interacting with other agents and users.  ...  Two of these new technologies are mobile agents and active networks. Mobile agents allow the programmer to employ "software robots" which wander around in the network, and fulfil tasks for a user.  ... 
doi:10.1007/978-0-387-35581-8_5 fatcat:2mt2c5gl65h77msgdy2m5xgsja

A twofold self-healing approach for MANET survivability reinforcement

Damien Magoni, Leila Mechtri, Salim Ghanemi, Fatiha Djemili Tolba
2017 International Journal of Intelligent Engineering Informatics  
First, a fault-tolerant IDS is designed by replication of individual agents within MASID to ensure continuous supervision of the network.  ...  It is based on the ability of MASID-R to assess the damage caused by the detected intrusions and aimed at enabling the supervised network to heal itself of those faults and damages.  ...  Specifically, they equipped the network with a mobile agent server capable of creating and dispatching three types of mobile agents: update, analysis, and verification agents.  ... 
doi:10.1504/ijiei.2017.10008800 fatcat:2qifnrxxcrc5rfj2ljpfyq7vbq
« Previous Showing results 1 — 15 out of 9,300 results