31 research outputs found

    A performance study of routing protocols for mobile grid environment

    Get PDF
    Integration of mobile wireless consumer devices into the Grid initially seems unlikely due to limitation such as CPU performance,small secondary storage, heightened battery consumption sensitivity and unreliable low-bandwidth communication. The current grid architecture and algorithm also do not take into account the mobile computing environment since mobile devices have not been seriously considered as valid computing resources or interfaces in grid communities. This paper presents the results of simulation done in identifying a suitable ad hoc routing protocol that can be used for the target grid application in mobile environment. The simulation comparing three ad hoc routing protocols named DSDV, DSR and AODV

    Mobile Computing in Physics Analysis - An Indicator for eScience

    Full text link
    This paper presents the design and implementation of a Grid-enabled physics analysis environment for handheld and other resource-limited computing devices as one example of the use of mobile devices in eScience. Handheld devices offer great potential because they provide ubiquitous access to data and round-the-clock connectivity over wireless links. Our solution aims to provide users of handheld devices the capability to launch heavy computational tasks on computational and data Grids, monitor the jobs status during execution, and retrieve results after job completion. Users carry their jobs on their handheld devices in the form of executables (and associated libraries). Users can transparently view the status of their jobs and get back their outputs without having to know where they are being executed. In this way, our system is able to act as a high-throughput computing environment where devices ranging from powerful desktop machines to small handhelds can employ the power of the Grid. The results shown in this paper are readily applicable to the wider eScience community.Comment: 8 pages, 7 figures. Presented at the 3rd Int Conf on Mobile Computing & Ubiquitous Networking (ICMU06. London October 200

    Simulation Analysis of New 802.11KT MAC Protocol And IEEE 802.11 MAC Protocol for Grid Topology in MANET Using NS-2

    Get PDF
    This paper compare the performance analysis of newly designed 802.11KT MAC protocol for a mobile ad-hoc network (MANET) communication system which aims to provide low cost, small end to end delay and more throughputs with the existing IEEE 802.11 MAC protocol. Simulation is the main method for evaluating the performance of protocol. It is subjected to comparison of performance of existing IEEE802.11 Mac protocol and new 802.11KT Mac protocol for random topology in MANET. The Adhoc On Demand Distance Vector (AODV) is used as routing protocol with NS-2 simulator. Simulation results indicated that newly designed 802.11KT MAC protocol has better performance than existing IEEE 802.11 MAC protocol

    Grid enabled data analysis on handheld devices

    Get PDF
    The requirement for information on portable, handheld devices demands the realization of increasingly complex applications for increasingly small and ubiquitous devices. This trend promotes the migration of technologies that were originally developed for desktop computers to handheld devices. With the onset of grid computing, users of handheld devices should be able to accomplish much more complex tasks, by accessing the processing and storage resources of the grid. This paper describes the development, features, and performance aspects of a grid enabled analysis environment designed for handheld devices. We also describe some differences in the technologies required to run these applications on desktop machines and handheld devices. In addition, we propose a prototype agent-based distributed architecture for carrying out high-speed analysis of physics data on handheld devices

    АЛГОРИТМ ФОРМУВАННЯ СТІЙКОЇ СТРУКТУРИ МОБІЛЬНОЇ GRID-СИСТЕМИ

    Get PDF
     Запропоновано алгоритм формування стійкої структури мобільної GRID-системи з забезпеченням заданих параметрів якості обслуговування та з урахуванням нестабільності підключення мобільних вузлів, що дало можливість підвищити продуктивність систем

    Mobile P2Ping: A Super-Peer based Structured P2P System Using a Fleet of City Buses

    Get PDF
    Recently, researchers have introduced the notion of super-peers to improve signaling efficiency as well as lookup performance of peer-to-peer (P2P) systems. In a separate development, recent works on applications of mobile ad hoc networks (MANET) have seen several proposals on utilizing mobile fleets such as city buses to deploy a mobile backbone infrastructure for communication and Internet access in a metropolitan environment. This paper further explores the possibility of deploying P2P applications such as content sharing and distributed computing, over this mobile backbone infrastructure. Specifically, we study how city buses may be deployed as a mobile system of super-peers. We discuss the main motivations behind our proposal, and outline in detail the design of a super-peer based structured P2P system using a fleet of city buses.Singapore-MIT Alliance (SMA

    A Methodology for Engineering Collaborative and ad-hoc Mobile Applications using SyD Middleware

    Get PDF
    Today’s web applications are more collaborative and utilize standard and ubiquitous Internet protocols. We have earlier developed System on Mobile Devices (SyD) middleware to rapidly develop and deploy collaborative applications over heterogeneous and possibly mobile devices hosting web objects. In this paper, we present the software engineering methodology for developing SyD-enabled web applications and illustrate it through a case study on two representative applications: (i) a calendar of meeting application, which is a collaborative application and (ii) a travel application which is an ad-hoc collaborative application. SyD-enabled web objects allow us to create a collaborative application rapidly with limited coding effort. In this case study, the modular software architecture allowed us to hide the inherent heterogeneity among devices, data stores, and networks by presenting a uniform and persistent object view of mobile objects interacting through XML/SOAP requests and responses. The performance results we obtained show that the application scales well as we increase the group size and adapts well within the constraints of mobile devices

    DIGITAL MEDIA LITERACY AWARENESS ON MOBILE DEVICE SECURITY ISSUES

    Get PDF
    Digital literacy is the set of competencies required for full participation in a knowledge society. It includes knowledge, skills, and behaviors involving the effective use of digital devices such as smartphones, tablets, laptops for purposes of communication, expression, collaboration and advocacy. Along with this expansion came a number of security issues to affect mobile devices. A chance to have a tiny and powerful device that is Internet linked and allows communication from anywhere at any time is alluring as well as a problem for companies. Many individuals who have attached their personal smartphones to corporate networks have found out the hard way the cost of doing so. Specifically, there have been a handful of cases where individuals who attached their own personal devices to a company network had their personal phone wiped and all their data and other information lost that was stored on it. Why did this happen? Simply put, a system administrator sent out a remote wipe command to the device and instructed it to wipe itself of all apps and data to keep it from falling in the wrong hands. Or an administrator may have found the device and did not recognize it, so they wiped it in response. If we have an Android device or have read about the operating system, you may have heard the term “rooting the device.” In a nutshell, this refers to undertaking a process of gaining root access to a device. Typically, this involves running an application or script that grants root access to the user. Once access is granted, the user can do pretty much whatever they want on the system without restriction. However, one of the downsides of this process is that the device is now exposed to greater danger from external threats as well. Moreover, this article focus on how digital devices such as smartphones communication and store information for "media education" that is used to define the process of teaching and learning about media. It is about developing people's critical and creative abilities when it comes to mass media, popular culture and digital media. Since digital media is using smartphone for store information and article also referring how to maintain security of these smartphone data. Keywords: encryption, remoteness, digital affixing signature, trojan horse attacks, malware, social engineering attacks, digital literacy, digital medi
    corecore