Information sharing mechanism among mobile agents in ad-hoc network environment and its applications

被引:0
|
作者
Umetsuji, K [1 ]
Kawagoe, K [1 ]
机构
[1] Ritsumeikan Univ, Dept Comp Sci, Kusatsu, Shiga, Japan
关键词
mobile agent; distributed system; information sharing; communications and web information change detection;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile agents are programs that can move from one site to another in a network with their data and states. Mobile agents are expected to be an essential tool in pervasive computing. In multi platform environment, it is important to communicate with mobile agents only using their universal or logical name not using their physical locations. More, in an ad-hoc network environment, an agent can migrate autonomously and communicate with other agents on demand. It is difficult that mobile agent grasps the position information on other agents correctly each other, because mobile agent processes a task while moving a network successively. In order to realize on-demand mutual communication among mobile agents without any centralized servers, we propose a new information sharing mechanism within mobile agents. In this paper, we present a new information sharing mechanism within mobile agents. The method is a complete peer based and requires no agent servers to manage mobile agent locations. Therefore, a mobile agent can get another mobile agent, communicate with it and shares information stored in the agent without any knowledge of the location of the target mobile agent. The basic idea of the mechanism is an introduction of Agent Ring, Agent Chain and Shadow Agent. With this mechanism, each agent can communicate with other agents in a server-less environment, which is suitable for ad-hoc agent network and an agent system can manage agents search and communications efficiently.
引用
收藏
页码:426 / 431
页数:6
相关论文
共 50 条
  • [41] Structuring proactive secret sharing in mobile ad-hoc networks
    Asaeda, Hitoshi
    Rahman, Musfiq
    Toyama, Yoshihiro
    INTERNATIONAL SYMPOSIUM ON WIRELESS PERVASIVE COMPUTING 2006, CONFERENCE PROGRAM, 2006, : 342 - +
  • [42] Recovery Information Management for the Mobile Ad-Hoc Networks
    Park, Taesoon
    Kim, Hoonhee
    INTERNATIONAL ELECTRONIC CONFERENCE ON COMPUTER SCIENCE, 2008, 1060 : 320 - 323
  • [43] A mobile multicast algorithm using agents for mobile ad-hoc users
    Li, F
    Wang, X
    Xue, XY
    AINA 2003: 17TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2003, : 838 - 841
  • [44] Evaluation of mobile ad-hoc network techniques in a cellular network
    Wijting, CS
    Prasad, R
    IEEE VEHICULAR TECHNOLOGY CONFERENCE, FALL 2000, VOLS 1-6, PROCEEDINGS: BRINGING GLOBAL MOBILITY TO THE NETWORK AGE, 2000, : 1025 - 1029
  • [45] Replication in Mobile Ad-hoc Network Using Hopfield Network
    Chawla, Tanu
    Kumar, Dr. Mukesh
    PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL CONFERENCE IN MOOC, INNOVATION AND TECHNOLOGY IN EDUCATION (MITE), 2013, : 26 - 31
  • [46] A RELIABLE FLOODING MECHANISM FOR MOBILE AD-HOC NETWORKS
    Narasimhan, B.
    Vadivel, R.
    2014 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING APPLICATIONS (ICICA 2014), 2014, : 301 - +
  • [47] Mobile agents for routing, topology discovery, and automatic network recoinfiguration in ad-hoc networks
    Migas, N
    Buchanan, WJ
    McArtney, KA
    ECBS 2003: 10TH IEEE INTERNATIONAL CONFERENCE AND WORKSHOP ON THE ENGINEERING OF COMPUTER-BASED SYSTEMS, PROCEEDINGS, 2003, : 200 - 206
  • [48] Bandwidth estimation in Mobile Ad-hoc Network (MANET)
    Ali, Rabia
    Zafar, Fareeha
    International Journal of Computer Science Issues, 2011, 8 (5 5-1): : 331 - 337
  • [49] Clustering Application of SVM in Mobile Ad-hoc Network
    Chen Haixia
    Du Ronghua
    Li Ping
    Li Maying
    INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL 2, PROCEEDINGS, 2008, : 924 - 926
  • [50] Centralized frame for routing in mobile ad-hoc network
    Bakht, H
    Merabti, M
    Askwith, B
    Wang, SW
    ICCC2004: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION VOL 1AND 2, 2004, : 613 - 616