首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 850 毫秒
1.
The Byzantine Agreement (BA) plays a key role in fault-tolerant distributed system design. A number of solutions to the BA problem based on various network model assumptions have been proposed. However, most existing BA protocols are designed for pure wired or pure wireless networks. In practice, most current networks are combined wired and wireless environments. In this paper, we extend the BA problem over a combined wired/wireless network, consisting of both powerful computing stationary processor and low-power mobile processor. The communication overhead of BA protocol is inherently large and secure group communications are important. The protocols proposed in this paper use the hierarchical model concept to reduce the communication overhead and provide secure group communications well suited for combined wired/wireless networks.  相似文献   

2.
Proposed applications for mobile code systems include autonomous shopping agents, autonomic systems, distributed sensor network applications, and interstellar space networks. I argue the case for mobile code systems as the next-generation distributed programming paradigm and discuss the security problems that must be addressed before this vision is practically realizable. The security discussion will focus on protecting mobile code programs that execute in the wild from malicious actions by remote hosts.  相似文献   

3.
大规模移动自组网安全群组通信研究   总被引:2,自引:1,他引:2  
移动自组网中的安全群组通信需要处理群组成员关系的动态性、成员位置的动态性、以及网络分区和合并等情况。如何高效地处理这些情况是移动自组网安全群组通信中要解决的重要问题。针对成员关系动态性、成员位置动态性和网络分区和合并带来的问题,提出研究与设计一种移动自组网中的“虚拟动态骨干网”模型。主要从组成员认证和组密钥管理两方面进行了研究,并基于虚拟动态骨干网提出了初步的解决方案。  相似文献   

4.
This paper presents a bio-inspired mobile agent-based integrated system for flexible autonomic job shop scheduling. The system matches the autonomic system architecture, inspired by the autonomic nervous system and proposed by the IBM, and has the IBM-defined fundamental self-managing properties, so that it can manage itself with little human intervention. The system conforms to the IEEE FIPA (Foundation for Intelligent Physical Agents) standard. Therefore, the interoperability between agents of the system and agents from many active heterogeneous FIPA compliant agent platforms can be ensured. The system supports the execution of C/C++ mobile agent codes. Thus, it is applicable to a variety of applications, especially for distributed mechatronic and embedded systems. In addition, since the system is composed of agents, including stationary and mobile agents, the system has a high scalability and flexibility to integrate and adopt various scheduling models and algorithms for different scheduling requirements. An overall architecture of the system and critical implementation details about the agency and agents in the system are presented in this article. An energy saving job shop scheduling example is used to validate one autonomic property of the system.  相似文献   

5.
Mobile agent-based network routing is a new technique for routing in large-scale networks. An analysis of the searching activity and population growth of mobile agents is important for improving performance in agent-driven networks. In this paper, we describe a general execution model of mobile agents for network routing and classify it into two cases. For each case, we analyze the population distribution of mobile agents (the distribution of mobile agents running in the network) and the probability of success (the probability that an agent can find its destination). We also perform extensive experiments for various network topologies to validate our analytical results. Both theoretical and experimental results show that the population distribution and the probability of success of mobile agents can be controlled by locally adjusting relevant parameters, such as the number of agents generated per request, the number of jumps each mobile agent can move, etc. Our results reveal new theoretical insights into the statistical behaviors of mobile agents and provide useful tools for effectively managing mobile agents in large networks.  相似文献   

6.
本文设计了一套采用GPRS技术的动力环境监控系统,具有告警管理、四遥信息、配置管理、统计管理和系统维护等功能。系统利用成熟的.Net架构,借助移动的GPRS传输通道,采用B/S模型和C/S模型相结合的方式,系统完全基于浏览器运行,方便系统部署。特别针对通信网络不健全的监控场地,对其进行动力与环境的监控具有现实意义。  相似文献   

7.
本文设计了一套采用GPRS技术的动力环境监控系统,具有告警管理、四遥信息、配置管理、统计管理和系统维护等功能。系统利用成熟的.Net架构,助移动的GPRS传输通道,采用B/S模型和C/S模型相结合的方式,系统完全基于浏览器运行,方便系统部署。特别针对通信网络不健全的监控场地,对其进行动力与环境的监控具有现实意义。  相似文献   

8.
《Computer Communications》2007,30(11-12):2497-2509
Multi-privileged group communications containing multiple data streams have been studied in the traditional wired network environment and the Internet. With the rapid development of mobile and wireless networks and in particular mobile ad-hoc networks (MANETs), the traditional Internet has been integrated with mobile and wireless networks to form the mobile Internet. The multi-privileged group communications can be applied to the mobile Internet. Group users can subscribe to different data streams according to their interest and have multiple access privileges with the support of multi-privileged group communications. Security is relatively easy to be guaranteed in traditional groups where all group members have the same privilege. On the other hand, security has been a challenging issue and is very difficult to handle in multi-privileged groups. In this paper, we first introduce some existing rekeying schemes for secure multi-privileged group communications and analyze their advantages and disadvantages. Then, we propose an efficient group key management scheme called ID-based Hierarchical Key Graph Scheme (IDHKGS) for secure multi-privileged group communications. The proposed scheme employs a key graph, on which each node is assigned a unique ID according to access relations between nodes. When a user joins/leaves the group or changes its access privileges, other users in the group can deduce the new keys using one-way function by themselves according to the ID of joining/leaving/changing node on the graph, and thus the proposed scheme can greatly reduce the rekeying overhead.  相似文献   

9.
This paper considers two cooperative control problems for nonholonomic mobile agents. In the first problem, we discuss the design of cooperative control laws such that a group of nonholonomic mobile agents cooperatively converges to some stationary point under various communication scenarios. Dynamic control laws for each agent are proposed with the aid of $sigma $-processes and results from graph theory. In the second problem, we discuss the design of cooperative control laws such that a group of mobile agents converges to and tracks a target point which moves along a desired trajectory under various communication scenarios. By introducing suitable variable transformations, cooperative control laws are proposed. Since communication delay is inevitable in cooperative control, in each of the above cooperative control problems, we analyze the effect of delayed communication on the proposed controllers. As applications of the proposed results, formation control of wheeled mobile robots is discussed. It is shown that our results can be successfully used to solve formation control problem. To show effectiveness of the proposed approach, simulation results are included.   相似文献   

10.
由于计算机网络和通信网络内在的复杂性,并且随着网络的不断发展,传统集中式网络管理已经越来越不能满足实际的需要,采用分布式管理策略已经成为网络管理研究和发展的重要方向。针对目前这种现状,提出基于移动代理的网络管理策略,使得网络管理具有分布式管理的功能,提高网络管理的灵活性和自主性,解决集中式网络管理中存在的缺陷和问题。通过建立移动代理工作运行模型,并在相同的网络条件下,与传统网络管理策略进行分析比较,确立基于移动代理网络管理策略的优势。  相似文献   

11.
应用于多层小区结构的移动IP方案   总被引:1,自引:1,他引:0  
唐宏  安勇  陶京涛  王柏丁 《计算机应用》2005,25(6):1237-1240
给出了一种新的移动IP移动性管理方案,包括分层的FA拓朴、灵活的切换控制策略和两种COA方式,与其他的微移动协议相比,该方案更适合多层小区结构的网络。  相似文献   

12.
This paper presents a framework for reusable mobile agents for network management in the sense that they are independent of either particular networks or applications. The framework enables a mobile agent to be composed from two layered components, which are mobile agents. The former is a carrier of the latter over particular networks independent of any management tasks and the latter defines management tasks performed at each host independently of any networks. The framework also offers a mechanism for matchmaking the two components. Since the mechanism is formulated on a process algebra approach, it can accurately select the appropriate itinerary component to perform management tasks at hosts that the tasks want to visit over networks. The framework provides a methodology for easily developing and operating mobile agents for traveling among multiple sub-networks to perform their management tasks at all of the nodes that they visit. This paper also describes the framework, its prototype implementation, and a practical application.
Ichiro SatohEmail:
  相似文献   

13.
一种基于移动Agent的异构网络管理模型   总被引:1,自引:0,他引:1  
分析了集中式网络管理方法的局限性,介绍了移动Agent的特点及与传统方法相比的优势,提出了一种针对异构网络的基于移动Agent的网管模型,详细地介绍了该模型的设计思想、结构、管理方式及安全性、容错性、独立性等特点。设计实现了两种移动Agent:故障诊断代理和故障搜索代理。使用它们评估和验证了移动A gent管理实际的异构网络的能力,它们能够在一个特定大小的网络中准确定位故障并分析故障的原因。  相似文献   

14.
Mobile Agent Coordination for Distributed Network Management   总被引:4,自引:0,他引:4  
Mobile agents are a promising technology to face the problems raised by the increasing complexity and size of today's networks. In particular, in the area of network management, mobile agents can lead to a fully distributed paradigm to overcome the limits of traditional centralized approaches. A basic requirement for the management of a complex network is the definition of high-level and flexible models to coordinate the accesses to the resources—data and services—provided by the network nodes. On this basis, this paper describes the MARS coordination architecture for mobile agents. MARS is based on the definition of programmable tuple spaces associated with the network nodes: mobile agents can access the local resources and services via the tuple space, thus adopting a standard and high-level interface. The network administrator—via mobile agents—can dynamically program the behavior of the tuple space in reaction to the agents' access to the tuple space, thus leading to a flexible network model. Several examples show the effectiveness of the MARS approach in supporting network management activities.  相似文献   

15.
陈志  王汝传 《微机发展》2004,14(5):14-18
配置管理作为网络管理的功能之一,负责监控和管理整个网络的配置状态,调整网络设备配置以保持整个网络的正常操作。利用移动代理进行网络配置管理的目的是解决当前集中式网络管理所带来的管理信息流量大、效率低和灵活性差等问题。基于移动代理的网络配置管理模型利用移动代理分布式计算能力改进了传统的集中式网络配置管理模型,它能够适应配置管理功能的发展和变化,对网络进行高效、持续、实时和准确的配置管理。文中通过对该模型的构成、配置管理过程和特点等进行详细研究,充分说明了利用移动代理进行配置管理的可行性和优势。  相似文献   

16.
In this paper we address the support of wearable mHealth applications in LTE and future 5G networks following a holistic approach that spans across the elements of a mobile network. The communication requirements change from one application to another so we propose a measurement methodology to facilitate the selection of the user equipment to fulfil these requirements. We also discuss a new network architecture to support traffic prioritization, RAN programmability, low latency and group communications to over-the-top applications. Our proposal is validated using several realistic experimentation platforms and the results show that mHealth systems can benefit from our approach.  相似文献   

17.
This paper presents an agent-based artificial immune system approach for adaptive damage detection in distributed monitoring networks. The presented approach establishes a new monitoring paradigm by embodying desirable immune attributes, such as adaptation, immune pattern recognition, and self-organization, into monitoring networks. In the artificial immune system-based paradigm, a group of autonomous mobile monitoring agents mimic immune cells (such as B-cells) in the natural immune system, interact locally with monitoring environment, and respond to emerging problems through simulated immune responses. The presented immune-inspired monitoring paradigm has been applied to structural health monitoring. The “antibody” of a mobile monitoring agent is a pattern recognition algorithm tuned to a certain type of structural damage pattern. The mobile monitoring agent performs damage diagnosis based on structural dynamic response data. Mobile monitoring agents communicate with each other and collaborate with network components based on agent interaction protocols defined in agent standards, the Foundation for Intelligent Physical Agents standards. A mobile agent system embedded in sensor nodes supports the selective generation, migration, communication, and management of mobile monitoring agents automatically. The active structural health monitoring is achieved by distributing mobile monitoring agents to the sites where they are needed. The structural damage diagnosis using mobile monitoring agents and artificial immune pattern recognition method has been tested using a scaled steel bridge structure. The test result shows the feasibility of using this approach for real-time structural damage diagnosis.  相似文献   

18.
基于移动Agent的数字气田生产运行系统应用研究   总被引:4,自引:1,他引:3  
通过分析移动代理在数字气田生产运行系统中的优势,提出了基于Masterworker移动代理数字气田生产运行系统模型结构,详细讨论了主要代理和工作流程,重点分析了基于该模型移动代理的迁移和基于VPN的移动代理安全性。该方案在数字气田的应用,为数字气田分布式应用提供了一种新的方法和手段。  相似文献   

19.
主动网络管理代理的执行环境   总被引:1,自引:0,他引:1  
随着网络的迅速发展,网络管理变得越来越复杂,主动网络以其动态特性为网络管理带来了新的挑战和新的契机,根据主动网络的特性设计了一个主动网络管理代理的执行环境(ANMAEE),该环境支持主动网络管理代理的URL部署和字节码部署,并提供两级安全结构,代码的合法性验证和基于角色的安全加载,管理接口共享动态库机制提供了动态被管对象和管理代理间交互,为管理主动节点上其它执行环境及主动网络服务提供了一种有效的手段。利用主动网络管理代理执行环境可以实现主动网络管理代理的动态部署,改善网络管理的可扩展性,该主动网络管理代理执行环境(ANMAEE)已经在Linux平台上实现。  相似文献   

20.
In mobile ad hoc networks, due to unreliable wireless media, host mobility and lack of infrastructure, providing secure communications is a big challenge. Usually, cryptographic techniques are used for secure communications in wired and wireless networks. Symmetric and asymmetric cryptography have their advantages and disadvantages. In fact, any cryptographic means is ineffective if its key management is weak. Key management is also a central aspect for security in mobile ad hoc networks. In mobile ad hoc networks, the computational load and complexity for key management are strongly subject to restriction by the node's available resources and the dynamic nature of network topology. We propose a secure and efficient key management (SEKM) framework for mobile ad hoc networks. SEKM builds a public key infrastructure (PKI) by applying a secret sharing scheme and using an underlying multi-cast server groups. We give detailed information on the formation and maintenance of the server groups. In SEKM, each server group creates a view of the certificate authority (CA) and provides certificate update service for all nodes, including the servers themselves. A ticket scheme is introduced for efficient certificate service. In addition, an efficient server group updating scheme is proposed. The performance of SEKM is evaluated through simulation.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号