89,755 research outputs found

    A Java-based Mobile Agent Framework for Distributed Network Applications

    Get PDF
    Recently, a new paradigm has emerged forstructuring and developing distributed network applications inopen distributed and heterogeneous environments. Manyapplication areas, such as electronic commerce, mobilecomputing, network management and information retrieval canbenefit from the application of the Mobile Agent technology. Theexploitation of Mobile Agents offers several peculiar advantages,such as reduction of network latency, asynchronous execution,robust and fault tolerant behavior. Java technology provides aplatform-independent, portable software environment whichmakes it an excellent tool for mobile agent development. MobileAgents are mainly intended to be used for applicationsdistributed over large scale (slow) networks because they allowsaving communication costs by moving computation to the hoston which the target data resides. However, it has not becomepopular due to some problems such as security. In this paper, wepresent a distributed network architecture based on the MobileAgent approach. A network of communicating servers each ofwhich support multiple clients is our goal. We also propose asecurity approach for mobile agents, which protect critical dataof mobile agents from malicious attacks, by using cryptographictechniques. We implement a bank service application to be testedon our mobile agent framework. The results suggest that fornetworks with high latency, Mobile Agents may provideimprovements over more conventional client-server systems

    The simplicity project: easing the burden of using complex and heterogeneous ICT devices and services

    Get PDF
    As of today, to exploit the variety of different "services", users need to configure each of their devices by using different procedures and need to explicitly select among heterogeneous access technologies and protocols. In addition to that, users are authenticated and charged by different means. The lack of implicit human computer interaction, context-awareness and standardisation places an enormous burden of complexity on the shoulders of the final users. The IST-Simplicity project aims at leveraging such problems by: i) automatically creating and customizing a user communication space; ii) adapting services to user terminal characteristics and to users preferences; iii) orchestrating network capabilities. The aim of this paper is to present the technical framework of the IST-Simplicity project. This paper is a thorough analysis and qualitative evaluation of the different technologies, standards and works presented in the literature related to the Simplicity system to be developed

    Machining feature-based system for supporting step-compliant milling process

    Get PDF
    STEP standards aims at setting up a standard description method for product data and providing a neutral exchanging mechanism that is independent of all the information processing systems for product information model. STEP Part 21 is the first implementation method from EXPRESS language and implemented successfully in CAD data. However, this text file consists of purely geometrical and topological data is hardly to be applied in machining process planning which requires machining features enriched data. The aim of this research is developing a new methodology to translate the EXPRESS language model of CAD STEP data into a new product data representation and enriched in machining features which is more beneficial to machining process planning. In this research, a target Database Management System (DBMS) was proposed for developing this system by using its fourth-generation tools that allow rapid development of applications through the provision of nonprocedural query language, reports generators, form generators, graphics generators, and application generators. The use of fourth-generation tools can improve productivity significantly and produce program that are easier to maintain. From this research, a new product data representation in a compact new table format is generated. Then this new product data representation has gone through a series of data enrichment process, such as normal face direction generation, edge convexity/concavity determination and machining features with transition feature recognition. Lastly, this new enriched product data representation is verified by generating to a new STEP standard data format which is according to ISO1030-224 standard format and providing an important part of solution for supporting STEP-compliant process planning and applications in milling process

    A general purpose programming framework for ubiquitous computing environments

    Get PDF
    It is important to note that the need to support ad-hoc and potentially mobile arrangements of devices in ubiquitous environments does not fit well within the traditional client/server architecture. We believe peer-to-peer communication offers a preferable alternative due to its decentralised nature, removing dependence on individual nodes. However, this choice adds to the complexity of the developers task. In this paper, we describe a two-tiered approach to address this problem: A lower tier employing peer-to-peer interactions for managing the network infrastructure and an upper tier providing a mobile agent based programming framework. The result is a general purpose framework for developing ubiquitous applications and services, where the underlying complexity is hidden from the developer. This paper discusses our on-going work; presenting our design decisions, features supported by our framework, and some of the challenges still to be addressed in a complex programming environment

    Mobility Management in beyond 3G-Environments

    Get PDF
    Beyond 3G-environments are typically defined as environments that integrate different wireless and fixed access network technologies. In this paper, we address IP based Mobility Management (MM) in beyond 3G-environments with a focus on wireless access networks, motivated by the current trend of WiFi, GPRS, and UMTS networks. The GPRS and UMTS networks provide countrywide network access, while the WiFi networks provide network access in local areas such as city centres and airports. As a result, mobile end-users can be always on-line and connected to their preferred network(s), these network preferences are typically stored in a user profile. For example, an end-user who wishes to be connected with highest bandwidth could be connected to a WiFi network when available and fall back to GPRS when moving outside the hotspot area.\ud In this paper, we consider a combination of MM for legacy services (like web browsing, telnet, etc.) using Mobile IP and multimedia services using SIP. We assume that the end-user makes use of multi-interface terminals with the capability of selecting one or more types of access networks\ud based on preferences. For multimedia sessions, like VoIP or streaming video, we distinguish between changes in network access when the end-user is in a session or not in a session. If the end-user is not in a session, he or she needs to be able to start new sessions and receive invitations for new sessions. If the end-user is in a session, the session needs to be handed over to the new access network as seamless as possible from the perspective of the end-user. We propose an integrated but flexible solution to these problems that facilitates MM with a customizable transparency to applications and end-users

    Towards trusted volunteer grid environments

    Full text link
    Intensive experiences show and confirm that grid environments can be considered as the most promising way to solve several kinds of problems relating either to cooperative work especially where involved collaborators are dispersed geographically or to some very greedy applications which require enough power of computing or/and storage. Such environments can be classified into two categories; first, dedicated grids where the federated computers are solely devoted to a specific work through its end. Second, Volunteer grids where federated computers are not completely devoted to a specific work but instead they can be randomly and intermittently used, at the same time, for any other purpose or they can be connected or disconnected at will by their owners without any prior notification. Each category of grids includes surely several advantages and disadvantages; nevertheless, we think that volunteer grids are very promising and more convenient especially to build a general multipurpose distributed scalable environment. Unfortunately, the big challenge of such environments is, however, security and trust. Indeed, owing to the fact that every federated computer in such an environment can randomly be used at the same time by several users or can be disconnected suddenly, several security problems will automatically arise. In this paper, we propose a novel solution based on identity federation, agent technology and the dynamic enforcement of access control policies that lead to the design and implementation of trusted volunteer grid environments.Comment: 9 Pages, IJCNC Journal 201

    A Survey on Service Composition Middleware in Pervasive Environments

    Get PDF
    The development of pervasive computing has put the light on a challenging problem: how to dynamically compose services in heterogeneous and highly changing environments? We propose a survey that defines the service composition as a sequence of four steps: the translation, the generation, the evaluation, and finally the execution. With this powerful and simple model we describe the major service composition middleware. Then, a classification of these service composition middleware according to pervasive requirements - interoperability, discoverability, adaptability, context awareness, QoS management, security, spontaneous management, and autonomous management - is given. The classification highlights what has been done and what remains to do to develop the service composition in pervasive environments
    • 

    corecore