A Review of Computation Solutions by Mobile Agents in an Unsafe Environment
نویسندگان
چکیده
Exploration in an unsafe environment is one of the major problems that can be seen as a basic block for many distributed mobile protocols. In such environment we consider that either the nodes (hosts) or the agents can pose some danger to the network. Two cases are considered. In the first case, the dangerous node is a called black hole, a node where incoming agents are trapped, and the problem is for the agents to locate it. In the second case, the dangerous agent is a virus; an agent moving between nodes infecting them, and the problem is for the “good” agents to capture it, and decontaminate the network. In this paper, we present several solutions for a black–hole and network decontamination problems. Then, we analyze their efficiency. Efficiency is evaluated based on the complexity, and the effort is in the minimization of the number of simultaneous decontaminating elements active in the system while performing the decontamination techniques. Keywords—Distributed algorithm; Mobile Agent; Network Decontamination; Black Hole Search; and Network Exploration
منابع مشابه
A Study on the Removal of Chromium(VI) Oxanions from Acid Solutions by Using Oxonium Ion-Crown Ether Complexes as Mobile Carrier Agents
Crown ethers 12-crown-4 (12C4), benzo-15-crown-5 (B15C5), 18-crown-6 (18C6), nitrobenzo-18-crown-6 (NB18C6) dibenzo-18-crown-6 (DB18C6) and dicyclohexyl-18-crown-6 (DC18C6), dissolved in dichloromethane, are able to form oxonium-ion complexes in contact with aqueous sulfuric and hydrochloric acid solutions. This ability allows the transfer of Cr(VI) oxanions from the acid media, through an ...
متن کاملAn Overview of Group Key Management Issues in IEEE 802.16e Networks
The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...
متن کاملوضعیت سقط القایی در ایران: حقوق باروری و چالشهای سقط القایی ایمن در ایران
Unwanted pregnancy is one of the important public health issues in the world which will cause a lot of worriness and stress for mother, wife and possibly for the child if pregnancy continues for a period of time. Unintended pregnancies account for 34 percent of all cases of pregnancy in Iran with 16 percent as unwanted and 18 percent mistimed. There is no certain rate regarding induced and unsa...
متن کاملDesign and Evaluation of a Method for Partitioning and Offloading Web-based Applications in Mobile Systems with Bandwidth Constraints
Computation offloading is known to be among the effective solutions of running heavy applications on smart mobile devices. However, irregular changes of a mobile data rate have direct impacts on code partitioning when offloading is in progress. It is believed that once a rate-adaptive partitioning performed, the replication of such substantial processes due to bandwidth fluctuation can be avoid...
متن کاملApplication of Nanotechnology in Pesticides Removal from Aqueous Solutions - A review
In recent years, water pollution and pesticide residues in the food chain have become a serious environmental and health hazard problem. Therefore, an efficient technology is essential for complete mineralization of pesticides to non-toxic forms. Nanotechnology offers many potential benefits to improve existing environmental technologies using new materials with effective performance, re...
متن کامل