首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
In the ages of current network technology, as a new technology, the emergence of mobile agent shows us a wider and wider application prospect in the fields of network technology, such as Network Management,Intelligence Information Retrieval and Electronic Commence and so on. The security is the essence of mobile agent technology. In this paper we analyze the security issues and survey some representative approaches to solve the problem in mobile agent systems. We focus on the issues about the agent's security and propose a master-slave designpattern based security model for mobile agent called SMAP(Secure Mobile Agent Platform). In the end we give anapplication example to show how to use these.  相似文献   

2.
3G网络的移动视频监控系统   总被引:5,自引:0,他引:5       下载免费PDF全文
移动流媒体应用是基于3G独特高数据带宽的业务应用,是3G业务网络中最具市场潜力的增值业务类型。为了进一步推广移动流媒体技术的应用,该文将3G移动网络和固网视频监控结合起来,实现两者优势互补,提出了一种基于3G网络的移动视频监控系统模型,此模型能够弥补传统移动网络和固网的不足对移动视频监控系统的设计具有一定的指导意义。  相似文献   

3.
The integration of the issue of survivability of wireless networks in the design process of the backbone network is addressed in this paper. The effectiveness of this integration plays a critical role in the success of the wireless network and the satisfaction of its mobile users. In this paper, we consider the design problem of allocating the backbone links in ATM-based personal communication networks (PCNs) that are survivable under single backbone link failures. Survivability is achieved by selecting two link-disjoint routes in the backbone network between every pair of ATM switches. We also take the novel approach of not only minimizing the diameter of the network as a primary objective but also minimizing the total length of the network as a secondary objective. We propose a new heuristic algorithm to optimize the design of the network based on both objectives. We report the results of an extensive simulation study that show that our algorithm generates backbone networks that can withstand single link failures, have shorter average diameters and smaller total lengths and achieve a higher percentage of admitted calls under a mobile environment.  相似文献   

4.
The widespread of mobile ad hoc networking calls for a careful design of network functions in order to meet the application requirements and economize on the limited resources. In this paper we address the problem of distributing query messages among peers in mobile ad hoc networks. We assume that peers are organized in classes. Each peer possesses a local database and can answer queries posed by other peers. Each peer can also pose queries to all the peers belonging to a certain class or classes. Contrary to traditional p2p lookup queries, we are interested in collecting answers from as many peers as possible. We propose a query routing protocol, called CL-QF, which is based on a novel cross-layer design. The purpose of this design is to incorporate application layer specifics (e.g., class information) into the network layer in order to reduce transmissions therefore economize on resources. CL-QF coexists with traditional routing. This synergy minimizes the complexity and signaling of CL-QF while the network is able to seamlessly provide legacy unicast communication. CL-QF manages a reduction of up to ~78% compared to non-cross-layer approaches, such as probabilistic forwarding, without compromising the ability to effectively collect replies.  相似文献   

5.
移动自组织网络上VoIP的实现方法研究   总被引:3,自引:0,他引:3  
提出了一种在移动自组织网络上实现VoIP应用的设计方案,能够有效地解决移动自组织网络上地址变更的问题,消除其对于语音通信的影响,保证节点之间可靠地进行通信.  相似文献   

6.
The proliferation of wireless and mobile devices such as personal digital assistants and mobile phones has created a large demand for mobile software applications such as social networking software. In addition, the realization and widespread usage of peer-to-peer (P2P) networking have drastically increased the number of applications utilizing these technologies. The convergence of mobile and P2P networking have generated increasing interest in the mobile peer-to-peer (MP2P) community. In this paper, we describe the design and development of a mobile social software (MoSoSo) based on a P2P network architecture using Juxtapose (JXTA) and Juxtapose for Java MicroEdition (JXME). The MoSoSo application allows users to discover, communicate and share resources with one another. We present three facets of designing the MoSoSo: object-oriented software design, network infrastructure design, and user-interface design. The software has been fully implemented and tested on a variety of mobile devices for use in a campus setting. By studying the design and implementation of the MoSoSo, we hope to benefit the entire mobile application development community by providing common models and insights into developing MP2P software.  相似文献   

7.
The features of two important application scenarios, supporting mobile switches with fixed end users and mobile switches with mobile users, are dramatically different from those of the traditional wired network structure. To exploit mobile switches, the location and configuration management of mobile switches is essential to handle the mobility and topology change of the wireless/mobile ATM network. In this paper we address the location management and configuration problems of mobile switches in an ATM network. We investigate several aspects of the location management problem including architecture to support switch mobility, mobile switch tracking, and mobile switch locating. We propose an approach that is based on the Private Network-Network Interface (PNNI) protocol. We extend the PNNI protocol to enable it to handle mobile switches. Moreover, we develop analytical models to determine the tracking and locating costs for mobile switches under the proposed scheme. The models illustrate the relation between total cost (tracking cost + locating cost) and peer group size. The models can be used to derive the optimal configuration for an ATM network with mobile switches.  相似文献   

8.
移动代理系统的安全框架   总被引:2,自引:0,他引:2  
移动代理技术是一种新型的分布式网络计算模式,它很好地解决了网络间任务分配合作的问题,但是移动代理技术存在的安全问题限制了它的应用。该文为移动代理技术设计了一套安全框架,旨在解决移动代理技术中的安全认证及安全通信问题。  相似文献   

9.
在开放网络环境中,安全性问题已经成为移动Agent应用的重要因素。通过对Agent的安全问题及其研究现状的分析,提出了一种基于可信任第三方的移动Agent的整体安全设计方案,为解决移动Agent问题提供了一个可行的方法。  相似文献   

10.
For Wireless Sensor Networks (WSNs), an unbalanced energy consumption will decrease the lifetime of network. In this paper, we leverage mobile agent technology to investigate the problem of how to balance the energy consumption during data collection in WSNs. We first demonstrate that for a sensor network with uniform node distribution and constant data reporting, balancing the energy of the whole network cannot be realized when the distribution of data among sensor nodes is unbalanced. We design a method to mitigate the uneven energy dissipation problem by controlling the mobility of agents, which is achieved by an energy prediction strategy to find their positions. Finally, we propose energy balancing cluster routing based on a mobile agent (EBMA) for WSNs. To obtain better performance, the cluster structure is formed based on cellular topology taking into consideration the energy balancing of inter-cluster and intra-cluster environments. Extensive simulation experiments are carried out to evaluate EBMA with several performance criteria. Our simulation results show that EBMA can effectively balance energy consumption and perform high efficiency in large-scale network deployment.  相似文献   

11.
针对信息互动系统的实际应用及面向移动环境的加密认证系统的特点,结合使用密码技术和硬件令牌的身份认证技术,设计了一个基于内置加密技术的USB Key便携加密认证系统模型.该系统使用了改进的RSA公钥密码技术和SHA-1单向散列函数,设计和实现了身份认证协议以及相关应用接口,可以安全和有效地解决应用中所面临的加密认证问题.  相似文献   

12.
Optical Burst Switching (OBS) is a promising switching technology for the next generation all-optical networks. An OBS network without wavelength converters and fiber delay lines can be implemented simply and cost-effectively using the existing technology. However, this kind of networks suffers from a relatively high burst loss probability at the OBS core nodes. To overcome this issue and consolidate OBS networks with QoS provisioning capabilities, we propose a wavelength partitioning approach, called Optimization-based Topology-aware Wavelength Partitioning approach (OTWP). OTWP formulates the wavelength partitioning problem, based on the topology of the network, as an Integer Linear Programming (ILP) model and uses a tabu search algorithm (TS) to resolve large instances efficiently. We use OTWP to develop an absolute QoS differentiation scheme, called Absolute Fair Quality of service Differentiation scheme (AFQD). AFQD is the first absolute QoS provisioning scheme that guarantees loss-free transmission for high priority traffic, inside the OBS network, regardless of its topology. Also, we use OTWP to develop a wavelength assignment scheme, called Best Effort Traffic Wavelength Assignment scheme (BETWA). BETWA aims to reduce loss probability for best effort traffic. To make AFQD adaptive to non-uniform traffic, we develop a wavelength borrowing protocol, called Wavelength Borrowing Protocol (WBP). Numerical results show the effectiveness of the proposed tabu search algorithm to resolve large instances of the partitioning problem. Also, simulation results, using ns-2, show that: (a) AFQD provides an excellent quality of service differentiation; (b) BETWA substantially decreases the loss probability of best effort traffic to a remarkably low level for the OBS network under study; and (c) WBP makes AFQD adaptive to non-uniform traffic by reducing efficiently blocking probability for high priority traffic.  相似文献   

13.
ABSTRACT

Recent advances in mobile computing and wireless communication technologies are enabling high mobility and flexibility of anytime, anywhere service access for mobile users. As a result, network connections of such users often span over heterogeneous networking environments consisting of wired and wireless networking technologies. Both network heterogeneity and user mobility make the securing of data transmission over heterogeneous networks challenging and complex. In this paper, we focus on the challenge of providing secure end-to-end network transmissions to wireless mobile users. To minimize service interruption during ongoing secure sessions of mobile users, we present the design and implementation of an approach based on the well-known Internet Protocol Security (IPSec) standard. We conducted a performance evaluation of our implementation using a Voice over IP (VoIP) application over an actual network testbed. Our empirical performance results demonstrate a packet loss improvement of 17% to 34% (for various VoIP packet sizes) and a handoff delay improvement of almost 24% validating the high efficiency of our proposed approach.  相似文献   

14.
Application software execution requests, from mobile devices to cloud service providers, are often heterogeneous in terms of device, network, and application runtime contexts. These heterogeneous contexts include the remaining battery level of a mobile device, network signal strength it receives and quality‐of‐service (QoS) requirement of an application software submitted from that device. Scheduling such application software execution requests (from many mobile devices) on competent virtual machines to enhance user quality of experience (QoE) is a multi‐constrained optimization problem. However, existing solutions in the literature either address utility maximization problem for service providers or optimize the application QoS levels, bypassing device‐level and network‐level contextual information. In this paper, a multi‐objective nonlinear programming solution to the context‐aware application software scheduling problem has been developed, namely, QoE and context‐aware scheduling (QCASH) method, which minimizes the application execution times (i.e., maximizes the QoE) and maximizes the application execution success rate. To the best of our knowledge, QCASH is the first work in this domain that inscribes the optimal scheduling problem for mobile application software execution requests with three‐dimensional context parameters. In QCASH, the context priority of each application is measured by applying min–max normalization and multiple linear regression models on three context parameters—battery level, network signal strength, and application QoS. Experimental results, found from simulation runs on CloudSim toolkit, demonstrate that the QCASH outperforms the state‐of‐the‐art works well across the success rate, waiting time, and QoE. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   

15.
Alarm correlation is a necessity in large mobile phone networks, where the alarm bursts resulting from severe failures would otherwise overload the network operators. In this paper, we describe how to realize alarm-correlation in cellular phone networks using extended logic programming. To this end, we describe an algorithm and system solving the problem, a model of a mobile phone network application, and a detailed solution for a specific scenario.  相似文献   

16.
为了解决偏远地区的图像监测问题,提出一种基于遥测终端机的图像监测系统设计方案。通过设计合理的供电系统方案,根据无线移动通信网络环境选择适当的链路传输模式,优化图片数据传输的效率,解决图像监测系统实际应用中所遇到的问题。  相似文献   

17.
As devices become smaller and wireless networking technologies improve, the popularity of mobile computing continues to rise. In today's world, many consider devices such as cell phones, PDAs, and laptops as essential tools. As these and other devices become increasingly independent of the wired infrastructure, new kinds of applications that assume an ad hoc network infrastructure are being deployed. Their development forces software engineers to revisit well understood problems in a setting in which existing solutions are no longer working. This paper illustrates one such attempt by focusing on an important problem in distributed computing, termination detection in diffusing computations, in an ad hoc network environment. We formulate an algorithmic solution amenable to usage in mobile ad hoc networks. Along the way, we highlight several important software engineering concerns one must address and design strategies one might employ in a mobile setting.  相似文献   

18.
Mobile peer-to-peer networks have found many uses such as streaming of audio and video data. There are circumstances, such as emergency situations and disaster recovery, when real-time delivery is a fundamental requirement. The problem is challenging due to the limited network capacity, the variable transmission rates and the unpredictability with respect to the network conditions in the mobile peer-to-peer network.In this paper we address the problem of real-time data dissemination of multimedia streams in mobile peer-to-peer networks. Four routing algorithms are proposed based on a packet's deadline, priority or a combination of these metrics. They are simulated under different setups in a mobile peer-to-peer network with Bluetooth connectivity and nodes broadcasting audio and video streams using different priorities. We compare the performance of the algorithms using a number of metrics. Detailed experimental results are presented. Based on these results, propositions on the usage of the algorithms and the design of network requirements are presented.  相似文献   

19.
邬春学  冯斌 《微计算机信息》2007,23(24):118-120
随着网络技术和无线移动通信技术日趋成熟,无线移动网络在控制系统中的应用也成为研究热点。无线移动NCS是一个崭新的研究领域,由于传输介质是无线移动通信网络,节点之间的数据通信的时间问题(如时间同步和时延等)是控制系统实现和运行稳定的主要影响因素。针对无线移动NCS的特点,作者在重点归纳现有的各种时间同步机制和算法的基础上,利用对时间同步协议和GPS机制以及mini-sync与tiny-sync算法等的研究,提出了适合无线移动NCS的传感器-控制器、控制器-执行器以及多输入多输出节点的数据传输同步机制,包括多传感器和多执行器操作的同步操作等。不同需求环境下的各种同步机制的建模分析和优化设计,为无线移动NCS的时间同步机制设计和分析提供了理论依据。  相似文献   

20.
AmigoBot移动机器人上位控制系统的设计   总被引:1,自引:1,他引:0  
针对AmigoBot移动机器人存在不支持本地可编程控制、只能作为网络终端的问题,提出了一种基于OMAP3530和Android嵌入式平台的AmigoBot移动机器人上位控制系统的设计方案;给出了该系统的硬件及软件结构,详细介绍了在OMAP3530上移植Android系统的过程:首先对Android系统进行裁剪,使其内核功能模块既能满足上位控制系统的要求,又不冗余;在裁剪后的Android系统的基础上,对AmigoBot移动机器人的Aria控制软件、无线通信等应用软件进行设计。实验结果表明,该系统解决了AmigoBot本地控制问题,提高了AmigoBot的扩展能力。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号