首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Breugst  M. Magedanz  T. 《IEEE network》1998,12(3):53-60
The emerging notion of active networks describes the general vision of communication network evolution, where the network nodes become active because they take part in the computation of applications and provision of customized services. In this context mobile agent technology and programmable switches are considered as enabling technologies. This article looks at the impact of mobile agent technology on telecommunication service environments, influenced by the intelligent network (IN) architecture. The authors illustrate how the integration of mobile agent platforms into IN elements, notably into the IN switches, will realize an active IN environment. This enables telecom services implemented through mobile service agents on a per user basis to be instantly deployed at programmable switching nodes, which results in better performance and fault tolerance compared to traditional IN service implementations  相似文献   

2.
利用移动代理技术改善主动网络管理   总被引:1,自引:0,他引:1  
目前的网络体系结构缺乏一定的灵活性,制约了新协议、新应用的开发。主动网络把计算能力从端结点引入到网络内部,赋与网络可编程能力。伴随着网络灵活性的提高,网络管理的难度也在增加,利用移动代理来改善主动网络管理是一个有效的途径。  相似文献   

3.
移动代理技术在移动智能网中的应用,是目前移动通信领域研究的热点之一。虚拟归属环境概念的提出为在第三代移动通信系统中应用移动代理技术提供了可能。本在重点介绍移动代理技术的基础上,阐述了移动代理技术在第三代移动通信系统UMTS中的应用:首先必须构造一个分布式的移动代理环境(DAE),再实现基于移动代理技术的虚拟归属环境,从而完成出入呼叫处理。  相似文献   

4.
基于PKI的移动代理安全策略研究   总被引:1,自引:0,他引:1  
移动代理是新型的分布式计算技术,具有移动性和自治性两个特点,与传统的分布式计算模型Client/Server相比具有非常多的优势,有着广阔的应用前景,但安全问题一直困扰着移动代理的应用。针对移动代理系统所受的安全威胁以及带来的安全需求,提出了一种用PKI来实现移动代理系统安全性的方法,并分析了该方法的优点和有待改进的地方。  相似文献   

5.
周奇 《通信技术》2012,45(4):34-37
针对聚类无线传感器网络安全的问题,将移动代理技术与分布式入侵检测技术相结合,提出了一种基于移动代理的无线传感器网络分布式入侵检测方案,采用了多个代理模块进行分布式协作,运用一种基于聚类的分布式入侵检测算法,从节点上收集和处理数据,减少网络负载、促进效率平衡,能够满足WSNs的要求和限制。从而达到提高无线传感器网络的安全性、可靠性,降低入侵检测能量消耗的目的。  相似文献   

6.
根据网格计算环境的各种特点,分析比较了网格计算环境下各种资源调度模型,得出采用分布式资源调度的体系结构和基于移动代理的资源管理策略的可行性和必要性.论述了在网格计算环境下引入移动代理技术对于解决网格计算问题的作用和优点,提出了基于移动代理的资源管理模型,并分析了在此系统中采用的资源发现算法及资源调度策略.  相似文献   

7.
The paper discusses the application of mobile agents in the management of mobile telephone (cellular) networks. We propose the use of mobile agents for collecting subscriber information, such as location area identifier and cell identifier. By using a subscriber profile containing these data the signaling messages caused by location update could be reduced. We also propose a method to improve the quality of network coverage by collecting measurements data by a mobile agent in the mobile station (mobile phone) or at the mobile switching center. By analyzing these data the network provider would be able to discover areas without proper radio signal coverage (black holes), thereby avoiding expensive and time-consuming measurements done by specially equipped vehicles. In addition, we discuss the basic infrastructure requirements for deployment of the mobile agent technology in cellular networks.  相似文献   

8.
移动代理技术在Ad Hoc无线网络中的应用研究   总被引:1,自引:0,他引:1  
Ad Hoc无线网络是一组具有路由和转发功能的移动节点组成的一个多跳的临时性自治系统,是一种无中心的无线网络。现有的主动路由协议或者按需路由协议都不能很好地满足Ad Hoc网络的需要。介绍了Ad Hoc无线移动网络和移动代理技术。在分析了现有的2种路由协议后,提出了在按需路由协议中加入移动代理技术来增强Ad Hoc无线网络的性能。在这些结果的基础上,提出了移动代理通信协议。  相似文献   

9.
10.
A survey of active network research   总被引:8,自引:0,他引:8  
Active networks are a novel approach to network architecture in which the switches (or routers) of the network perform customized computations on the messages flowing through them. This approach is motivated by both lead user applications, which perform user-driven computation at nodes within the network today, and the emergence of mobile code technologies that make dynamic network service innovation attainable. The authors discuss two approaches to the realization of active networks and provide a snapshot of the current research issues and activities. They illustrate how the routers of an IP network could be augmented to perform such customized processing on the datagrams flowing through them. These active routers could also interoperate with legacy routers, which transparently forward datagrams in the traditional manner  相似文献   

11.
With the arrivals of critical data transactions and multimedia applications, the needs of network services with different Quality of Service (QoS) guarantees increase rapidly. In order to ensure the delivery of information with a desired quality at the application layer, policy-based management (pbm) systems should be deployed at network service providers for configuring network devices properly. A policy-based management system is capable of resolving and enforcing policy rules in realizing end-to-end QoS for all kinds of network connections. In this paper, a novel design of policy-based management system based on active networks is proposed. Active network technology empowers network routers the ability to execute and move data and program code as needed. It is used in the proposed design (Active Bandwidth Broker architecture) to achieve the goals of system scalability and reliability. Moreover, policy control operations can be distributed among different active nodes. Thus, the architecture reduces the aggregate amount of policy control traffic in networks and expedites the response times on policy requests. Furthermore, the Policy Decision Point is a mobile agent that moves and avoids encountering network congestion situations. A system prototype has been constructed to implement the designed architecture. It has successfully demonstrated that the new design framework offers architecture flexibility, improves system reliability, and provides system scalability in handling a large number of service requests.  相似文献   

12.
移动Agent是一种全新的分布式计算模型,其优越的性能已受到越来越多的重视。文章分析了Agent技术与面向对象方法之间的关系,阐述了面向对象的分布式计算工业标准-CORBA规范,并在此基础上构建出基于CORBA的移动Agent服务器架构模型,充分利用了现有技术,大大减少了开发Agent系统的工作量,简化了Agent系统的实现,并且系统功能完善、开放灵活、稳定性强。  相似文献   

13.
Building reusable mobile agents for network management   总被引:7,自引:0,他引:7  
Mobile agents can migrate among nodes to perform a set of management tasks at each of the visited nodes. Existing mobile agent-based network management systems often assume that their mobile agents are designed to work in particular networks to raise the efficiency of agent migration among multiple nodes. Unfortunately, such mobile agents cannot be reused in different networks. This paper proposes a framework where a mobile agent for network management is composed of two kinds of software components, an itinerary part and a behavioral logic part. Both components are implemented as mobile agents. The former is a carrier designed for particular networks, and it can efficiently navigate other mobile agents among nodes in its target network. The latter defines management tasks performed at each node independently of any local network. This framework allows a mobile agent for network management to be reused in various networks without being modified. A prototype implementation of this framework and its application were built on a Java-based mobile agent system.  相似文献   

14.
This article proposes a network paradigm called the single-server-view network as the basis for networks in the 21st century, when the value of a network to users will be based on the services provided rather than data communication capability. Based on our paradigm, we propose a double-plane network architecture, consisting of a simplified data forwarding plane and a service control plane, that performs all the complex processing tasks. The data forwarding plane uses an advanced photonic network as its basis. The service control plane consists of agent, service, and policy control layers with open interfaces between layers. Leading-edge information processing technologies, such as active node, agent, distributed processing, and policy-based management, are used in this plane. Since mobile communication is becoming a major access technology, an approach to integrating mobile and fixed networks into this framework is also proposed. The current status of key technologies, such as photonic networks, agent technology, and policy-based management, are reported.  相似文献   

15.
《电子与信息学报》2016,38(9):2158-2164
K匿名技术是当前轨迹隐私保护的主流方法,但该方法也存在隐私泄露的风险。该文提出一种在移动社交网络中基于代理转发机制(BAFM)的轨迹隐私保护方法。该方法利用安全多方计算和内积安全计算进行隐私加密匹配,通过可信服务器在移动社交网络中找最匹配的用户做代理,然后由代理转发用户的请求到服务器进行查询,隐藏用户的真实轨迹与位置服务器的联系,有效保护用户的轨迹隐私。安全分析表明该方法能有效保护用户的轨迹隐私;同时,通过实验验证该方法相对K匿名更高效,能减小服务器的查询和通信开销。  相似文献   

16.
Active and programmable networks change the functionality of routers and switches by using agents and active packets. This paper presents a new packet scheduling scheme called Active Scheduling to control and maintain QoS parameters in virtual private networks (VPNs) within the confines of adaptive and programmable networks. In Active Scheduling an agent on the router monitors the accumulated queuing delay for each service. In order to control and to keep the end‐to‐end delay within the bounds, the weights for services are adjusted dynamically by agents on the routers spanning the VPN. If there is an increase or decrease in queuing delay of a service, an agent on a downstream router informs the upstream routers to adjust the weights of their queues. This keeps the end‐to‐end delay of services within the specified bounds and offers better QoS compared to VPNs using static WFQ. The paper describes the algorithm for Active Scheduling, and presents simulation results and these are compared with WFQ. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   

17.
The paper analyzes the current state- of- the- art of mobile agents technology wrt security, seen from the standpoint of a public network operator (pno). It is argued that the current state- of- the- art does not offer sufficient security for large- scale, commercial applications of mobile agents technology within the pno ’s networks. To support this premise, the most important security issues in this context are discussed, and a number of deficiencies are identified. Some of these deficiencies pose principal questions for future research that are not necessarily widely accepted within the agent community.  相似文献   

18.
Seamless roaming between cellular networks (3G or upcoming 4G) and wireless local area networks can be provided using Mobile IP. However, GPRS/UMTS and 802.11-based WLAN networks have no native support for mobile IP. Mobile IP requires the deployment of home agents and a protocol between the mobile nodes, home agent, and corresponding nodes. We address the home agent placement and home address assignment issues for supporting mobile IP for heterogeneous roaming. Placement techniques for mobile IP home agents are presented including dynamic HA assignment in either WLAN or cellular network domains using the diameter mobile IP application. Next, we present several IPv4 home address assignment schemes for mobile nodes visiting in the WLAN domain such as NAT/NAPT traversal, reverse tunneling, and mobile VPNs. It is shown that HA placement and address management are orthogonal, and any combination is possible. Various architectures for both issues are evaluated against the optimal solutions  相似文献   

19.
Mobile IPv6中建立IPSec安全关联的一种新方案   总被引:2,自引:0,他引:2  
李兴华  马建峰 《通信学报》2004,25(6):102-108
Mobile IPv6的消息交互需要IPSec来提供安全保护,但什么时候建立IPSec安全关联会对Mobile IPv6的安全性、效率、计算量产生较大影响。传统的方法是当移动节点移动到外地网络之后需要时才建立,分析表明该方法效率低、计算量大、安全性差,不符合应用要求。本文提出移动节点在家乡网络中提前建立保护Mobile IPv6消息交互的安全关联,并给出了具体的方法。分析表明新方案较传统方法具有时延少、计算量小、效率高、安全性强的特点。  相似文献   

20.
文凯  陈劼  郭伟 《电信科学》2005,21(9):41-46
Ad hoc网络管理相对传统网络的管理而言明显要难得多,主要是因为节点移动造成网络拓扑结构动态变化以及网络应用的环境和范围具有多样性;同时还因为网络维持是通过节点共同参与完成的,但网络节点存在诸多的限制:如有限的电池能量、较小的存储和计算能力、变化的链路质量、无线资源匮乏等.本文分析比较了基于位置管理、基于移动性感知以及基于代理和策略驱动的网络管理方案,并指出了管理方案下一步的发展方向.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号