Mobile Computing Architecture for a Battlefield Environment
نویسندگان
چکیده
Improvements in cellular and satellite technology have permitted portable computers to communicate with existing distributed computing networks. Users with palm-top computers, known as mobile hosts (MHs), utilize wireless connections to communicate with wired network from a number of locations at diierent times. In this paper, we introduce a mobile computing architecture for a battleeeld environment. When data is stored on mobile hosts, the mobility issue becomes increasingly more complicated. To deal with this issue, we introduce a mobile transaction manager (MTM) that is responsible for all the global transactions created by mobile hosts, which contain a portion of the distributed database. A battleeeld is a very unique environment due to the fact that the medical units are susceptible to damage and disconnection from an attack by an enemy force. Prime Time III, which is being supported by the Medical Advanced Technology Management OOce, is the operational name for the telemedicine support for the U.S. troop deployment in Bosnia. A distributed patient-soldier database provides patient-soldier medical information in real-time. An application of the patient-soldier database is discussed with respect to transaction management in the battleeeld environment .
منابع مشابه
A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment
With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...
متن کاملAn Enhanced MSS-based checkpointing Scheme for Mobile Computing Environment
Mobile computing systems are made up of different components among which Mobile Support Stations (MSSs) play a key role. This paper proposes an efficient MSS-based non-blocking coordinated checkpointing scheme for mobile computing environment. In the scheme suggested nearly all aspects of checkpointing and their related overheads are forwarded to the MSSs and as a result the workload of Mobile ...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملReduction of Energy Consumption in Mobile Cloud Computing by Classification of Demands and Executing in Different Data Centers
In recent years, mobile networks have faced with the increase of traffic demand. By emerging mobile applications and cloud computing, Mobile Cloud Computing (MCC) has been introduced. In this research, we focus on the 4th and 5th generation of mobile networks. Data Centers (DCs) are connected to each other by high-speed links in order to minimize delay and energy consumption. By considering a ...
متن کاملA review of methods for resource allocation and operational framework in cloud computing
The issue of management and allocation of resources in cloud computing environments, according to the breadth of scale and modern technology implementation, is a complicated issue. Issues such as: the heterogeneity of resources, resource dependencies to each other, the dynamics of the environment, virtualization, workload diversity as well as a wide range of management objectives of cloud servi...
متن کامل