89,778 research outputs found

    Enabling ad-hoc collaboration between mobile users in the MESSENGER project

    Get PDF
    Abstract This paper discusses how ad-hoc collaboration boosts the operation of a set of messengers. This discussion continues the research we earlier initiated in the \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}MESSENGER\mathcal{MESSENGER}\end{document} project, which develops data management mechanisms for UDDI registries of Web services using mobile users and software agents. In the current operation mode of messengers, descriptions of Web services are first, collected from UDDI registries and later, submitted to other UDDI registries. This submission mode of Web services descriptions does not foster the tremendous opportunities that both wireless technologies and mobile devices offer. When mobile devices are “close” to each other, they can form a mobile ad-hoc network that permits the exchange of data between these devices without any pre-existing communication infrastructure. By authorizing messengers to engage in ad-hoc collaboration, collecting additional descriptions of Web services from other messengers can happen, too. This has several advantages, but at the same time poses several challenges, which in fact highlight the complexity of ad-hoc networks

    Collaboration Enforcement In Mobile Ad Hoc Networks

    Get PDF
    Mobile Ad hoc NETworks (MANETs) have attracted great research interest in recent years. Among many issues, lack of motivation for participating nodes to collaborate forms a major obstacle to the adoption of MANETs. Many contemporary collaboration enforcement techniques employ reputation mechanisms for nodes to avoid and penalize malicious participants. Reputation information is propagated among participants and updated based on complicated trust relationships to thwart false accusation of benign nodes. The aforementioned strategy suffers from low scalability and is likely to be exploited by adversaries. To address these problems, we first propose a finite state model. With this technique, no reputation information is propagated in the network and malicious nodes cannot cause false penalty to benign hosts. Misbehaving node detection is performed on-demand; and malicious node punishment and avoidance are accomplished by only maintaining reputation information within neighboring nodes. This scheme, however, requires that each node equip with a tamper-proof hardware. In the second technique, no such restriction applies. Participating nodes classify their one-hop neighbors through direct observation and misbehaving nodes are penalized within their localities. Data packets are dynamically rerouted to circumvent selfish nodes. In both schemes, overall network performance is greatly enhanced. Our approach significantly simplifies the collaboration enforcement process, incurs low overhead, and is robust against various malicious behaviors. Simulation results based on different system configurations indicate that the proposed technique can significantly improve network performance with very low communication cost

    OLSR improvement for distributed traffic applications

    Get PDF
    PosterInternational audienceThis paper presents the experimental framework currently being developed at INRIA on mobile traffic applications using ad hoc communication. In this paper we propose a set of modifications to the OLSR protocol in order to adapt it to vehicle ad hoc networks. This work is the fruit of a collaboration between two INRIA research teams: HIPERCOM and IMARA. HIPERCOM is working on ad hoc routing protocols and IMARA is working on intelligent vehicles

    SPAWN: Service Provision in Ad-hoc Wireless Networks

    Get PDF
    The increasing ubiquity of wireless mobile computing platforms has opened up the potential for unprecedented levels of communication, coordination and collaboration among mobile computing devices, most of which will occur in an ad hoc, on-demand manner. This paper describes SPAWN, a middleware supporting service provision in ad-hoc wireless networks. The aim of SPAWN is to provide the software resources on mobile devices that facilitate electronic collaboration. This is achieved by applying the principles of service oriented computing (SOC), an emerging paradigm that has seen success in wired settings. SPAWN is an adaptation and extension of the Jini model of SOC to ad-hoc networks. The key contributions of SPAWN are (1) a completely decentralized service advertisement and request system that is geared towards handling the unpredictability and dynamism of mobile ad-hoc networks, (2) an automated code management system that can fetch, use and dispose of binaries on an on-demand basis, (3) a mechanism supporting the logical mobility of services, (4) an upgrade mechanism to extend the life cycle of services, and (5) a lightweight security model that secures all interactions, which is essential in an open environment. We discuss the software architecture, a Java implementation, sample applications and an empirical evaluation of the system

    Framework for collaboration in mobile ad hoc networks

    Get PDF

    On promoting ad-hoc collaboration among messengers

    Get PDF
    The explosion growth in the market place for handheld wireless devices has enabled new opportunities for wireless applications. Currently, handheld devices are restricted to being clients that make requests to servers and receive responses over the network. But as mobile ad-hoc networks become the trend, such devices will need to become active participants that serve requests from other devices and convey data to other devices as well. In this paper we present our vision of the future role that handheld devices will play in a mobile ad-hoc network configuration. We present this vision as part of the MESSENGER project that develops data management mechanisms for UDDI registries of Web services using mobile users and their software agents, and then describe its extension for exchanging descriptions of Web services during ad-hoc collaboration sessions. User agents are in charge of interacting with peer users over an ad-hoc network, and collaborating on feeding UDDI registries with recent content. © 2006 IEEE

    Ad-hoc collaboration between messengers: Operations and incentives

    Get PDF
    This paper discusses how ad-hoc collaboration boosts the operation of a set of messengers. This discussion continues the research we earlier initiated in the MESSENGER project, which develops data management mechanisms for UDDI registries of Web services using mobile users and software agents. In the current operation mode of messengers, descriptions of Web services are first, collected from UDDI registries and later on, distributed to other UDDI registries. This distribution mode of Web services descriptions does not foster the tremendous opportunities that both wireless technologies and mobile devices offer. When mobile devices are in the vicinity of each other, they can form a mobile ad-hoc network, which enables the exchange of data between these devices without any preexisting communication infrastructure. By authorizing messengers to engage in collaboration, collecting additional descriptions of Web services from other messengers can happen, too. © 2006 IEEE

    Many-to-Many Invocation: A New Framework for Building Collaborative Applications in Ad Hoc Networks

    Get PDF
    Many-to-Many Invocation (M2MI) is a new paradigm for building collaborative systems that run in wireless proximal ad hoc networks of fixed and mobile computing devices. M2MI is useful for building a broad range of systems, including service discovery frameworks; groupware for mobile ad hoc collaboration; systems involving networked devices (printers, cameras, sensors); and collaborative middleware systems. M2MI provides an object oriented method call abstraction based on broadcasting. An M2MI invocation means ``Every object out there that implements this interface, call this method.\u27\u27. M2MI is layered on top of a new messaging protocol, the Many-to-Many Protocol (M2MP), which broadcasts messages to all nearby devices using the wireless network\u27s inherent broadcast nature instead of routing messages from device to device. In an M2MI-based system, central servers are not required; network administration is not required; complicated, resource-consuming ad hoc routing protocols are not required; and system development and deployment are simplified

    Spatial aspects of mobile ad hoc collaboration

    Get PDF
    Thesis (S.M.)--Massachusetts Institute of Technology, School of Architecture and Planning, Program in Media Arts and Sciences, 2003.Includes bibliographical references (p. 72-76).Traditionally, communication devices are designed to overcome distance in space or time. How can personal mobile tools augment local interaction and promote spontaneous collaboration between users in proximity? Mobile ad hoc collaboration is an emerging framework that attempts to answer this question. This thesis reviews current research in mobile ad hoc collaboration, explores its precedents in art, and examines the enabling wireless communication and location sensing technology. It then proceeds to consider location, proximity and spatial organization as major factors in the development of interfaces and applications within the framework. The importance of seamless transitions between face-to-face communication and mediated communication is emphasized, and the principle of ad hoc communication group formation on the basis of proximity is proposed. The principle is demonstrated in a prototype wearable system for synchronous voice messaging.by Ivan Sergeyevich Chardin.S.M

    Vehicle Based Intersection Management with Intelligent Agents

    Get PDF
    Signal-based intersection management will change when vehicles with intelligent capability are available in the future. Intelligent agents embedded in vehicle software will be responsible for vehicle control and route guidance. Intersection management can be achieved through the collaboration of these agents, without a centralized control infrastructure. This research focuses on the use of distributed multi-agent systems to provide microscopic adaptive control which might reduce traffic delay and chances of collisions at intersections. A hypothesized Mobile Ad-hoc Network provides communication links to connect the agents.Intelligent Agents, Adaptive Intersection Control
    corecore