Resource Monitoring to Support Mobile Agents in Ubiquitous Computing
نویسندگان
چکیده
Mobile agents are a form of software agents that migrate from device to device, performing their job in an unobtrusive manner. Mobile agents are particularly useful for pervasive computing as they are lightweight processes that allow for the delegation of tasks, have migratory characteristics, and operate regardless of whether the device they are on is connected to the network. However, in order to facilitate the full potential of mobile agents in pervasive environments, it is evident that there is a need for mobile agents to be resource-aware. To this end, we propose a model for a Resource Aware Middleware for Mobile Agents (RAMMA). We present the conceptual architecture of RAMMA, its implementation and an evaluation of the resource utilisation patterns of the monitor itself.
منابع مشابه
A Mobile Agent Infrastructure for QoS Negotiation of Adaptive Distributed Applications
QoS-aware distributed applications such as certain Multimedia and Ubiquitous Computing applications can benefit greatly from the provision of QoS guarantees from the underlying system and middleware infrastructure. They must avoid execution glitches that affect the user’s perception of the application output. Most research in QoS support for distributed systems focuses on three aspects of QoS m...
متن کاملPerformance Analysis of a Priority based Resource Allocation Scheme in Ubiquitous Networks
It is difficult to perform resource allocation for a node with the agreed QoS requirement in a ubiquitous network, which consists of subnetwork segments of different technologies with different resource constraints and control. In this paper, we discuss performance analysis of a priority based resource allocation scheme for the Unodes, i.e., nodes running a ubiquitous application in a ubiquitou...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملارائه یک رویکرد همانند سازی شده عامل محور در اجرای یک الگوی کد متحرک مطمئن
Abstract Using mobile agents, it is possible to bring the code close to the resources, which is not foreseen by the traditional client/server paradigm. Compared to the client/server computing paradigm, the greater flexibility of the mobile agent paradigm comes at additional costs as well as the additional complexity of developing and managing mobile agent-based applications. Such complexity ...
متن کاملPerormance Analysis of a Node Monitoring Protocol in Ubiquitous Networks
The proliferation of the ubiquitous applications in different sphere of life like ubiquitous health monitoring system, and ubiquitous learning system demands the network monitoring, to check whether the nodes are getting the promised resources and inputs. Dynamicity and heterogeneity of the ubiquitous network adds challenges to the monitoring of a node because of node's mobility and migration b...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004