• Title/Summary/Keyword: mobile distributed system

Search Result 416, Processing Time 0.02 seconds

Design and Implementation of an Object Migration System Using the Java Language (Java 언어를 이용한 객체이동시스템의 설계 및 구현)

  • Jeon, Byeong-Guk;Lee, Geun-Sang;Choe, Yeong-Geun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.1
    • /
    • pp.49-56
    • /
    • 1999
  • Distributed object Computing, owing to the development of distributed computing, has improved the performance of distributed processing conducted between homogeneous and heterogeneous systems in network. However, it has failed to solve fundamental problems such as network overload and enormous requests demands by servers and clients. In this paper, we propose to design and implement an Object Migration system that uses the java language to tackle the mentioned problems. As the first step of the implementation of the system, we justify the characteristics of t도 mobile object model that keeps codes and states of an object. Implemented Object Migration System would accept objects being migrated to a specific node and support the virtual place in which objects could be executed automatically. Therefore, the Object Migration system we suggest could not only solve problems imposed to traditional distributed computing but also offer transparency of object migration between homogeneous and heterogeneous systems.

  • PDF

Mobile Device-to-Device (D2D) Content Delivery Networking: A Design and Optimization Framework

  • Kang, Hye Joong;Kang, Chung Gu
    • Journal of Communications and Networks
    • /
    • v.16 no.5
    • /
    • pp.568-577
    • /
    • 2014
  • We consider a mobile content delivery network (mCDN) in which special mobile devices designated as caching servers (caching-server device: CSD) can provide mobile stations with popular contents on demand via device-to-device (D2D) communication links. On the assumption that mobile CSD's are randomly distributed by a Poisson point process (PPP), an optimization problem is formulated to determine the probability of storing the individual content in each server in a manner that minimizes the average caching failure rate. Further, we present a low-complexity search algorithm, optimum dual-solution searching algorithm (ODSA), for solving this optimization problem. We demonstrate that the proposed ODSA takes fewer iterations, on the order of O(log N) searches, for caching N contents in the system to find the optimal solution, as compared to the number of iterations in the conventional subgradient method, with an acceptable accuracy in practice. Furthermore, we identify the important characteristics of the optimal caching policies in the mobile environment that would serve as a useful aid in designing the mCDN.

Evolution and Maintenance of Proxy Networks for Location Transparent Mobile Agent and Formal Representation By Graph Transformation Rules

  • Kurihara, Masahito;Numazawa, Masanobu
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2001.01a
    • /
    • pp.151-155
    • /
    • 2001
  • Mobile agent technology has been the subject of much attention in the last few years, mainly due to the proliferation of distributed software technologies combined with the distributed AI research field. In this paper, we present a design of communication networks of agents that cooperate with each other for forwarding messages to the specific mobile agent in order to make the overall system location transparent. In order to make the material accessible to general intelligent system researchers, we present the general ideas abstractly in terms of the graph theory. In particular, a proxy network is defined as a directed acyclic graph satisfying some structural conditions. In turns out that the definition ensures some kind of reliability of the network, in the sense that as long as at most one proxy agent is abnormal, there agent exists a communication path, from every proxy agent to the target agent, without passing through the abnormal proxy. As the basis for the implementation of this scheme, an appropriate initial proxy network is specified and the dynamic nature of the network is represented by a set of graph transformation rules. It is shown that those rules are sound, in the sense that all graphs created from the initial proxy network by zero or more applications of the rules are guaranteed to be proxy networks. Finally, we will discuss some implementation issues.

  • PDF

Development of BioRobot System Based on Mobile Agent for Clinical Laboratory (임상병리검사를 위한 모바일 에이전트 기반의 바이오로봇 시스템 개발)

  • Choi, Byung-June;Jin, Sung-Moon;Sin, Seung-Hun;Koo, Ja-Choon;Kim, Min-Chul;Kim, Jin-Hyun;Son, Woong-Hee;Ahn, Ki-Tak;Chung, Wan-Kyun;Choi, Hyouk-Ryeol
    • The Journal of Korea Robotics Society
    • /
    • v.2 no.4
    • /
    • pp.317-326
    • /
    • 2007
  • Recently, robotic automation in clinical laboratory becomes of keen interest as a fusion of bio and robotic technology. In this paper, we present a new robotic platform for clinical tests suitable for small or medium sized laboratories using mobile robots. The mobile robot called Mobile Agent is designed as transfer system of blood samples, reagents, microplates, and any instruments. Also, the developed mobile agent can perform diverse tests simultaneously based on its cooperative and distributed ability. The driving circuits for the mobile agent are embedded in the robot, and each mobile agent communicates with other agents by using Bluetooth communication. The RFID system is used to recognize patient information. Also, the magnetic hall sensor is embedded to remove and compensate the cumulated error of locomotion at the bottom of mobile agent. The proposed mobile agent can be easily used for various applications because it is designed to be compatible with general software development tools. The Mobile agents are manufactured, and feasibility of the robot and localization of the agents using magnetic hall sensor are validated by preliminary experiments.

  • PDF

An Efficient Protocol for Causal Message Delivery in Distributed Mobile Systems (분산 이동 시스템에서 인과적 메시지 전달을 위한 효율적인 프로토콜)

  • 노성주;정광식;이화민;유헌창;황종선
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.143-154
    • /
    • 2003
  • There is a growing trend in developing system for distributed mobile system that supports services - job flow management, video conference, replicated data management and resource allocation. Supporting these services, applications have to use causally ordered message delivery. Previous proposals that provide causally ordered message delivery have problems such as communication overhead, message delaying, scalability, computing overload of mobile host. In this paper, we proposed efficient protocol for causally ordered message delivery using the methods that MSS maintains dependency information matrix between MSS and MH, Piggybacking dependency information about each immediate predecessor message. Proposed algorithm, when compared with previous proposals, provides a low message overhead, and low probability of unnecessary inhibition in delivering messages. Also, it consider resource restriction of MH and low bandwidth of wireless communication by computing most of algorithm at MSS, and reduce processing delay by executing causally ordered message delivery a unit of MH.

Appearance Based Object Identification for Mobile Robot Localization in Intelligent Space with Distributed Vision Sensors

  • Jin, TaeSeok;Morioka, Kazuyuki;Hashimoto, Hideki
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.4 no.2
    • /
    • pp.165-171
    • /
    • 2004
  • Robots will be able to coexist with humans and support humans effectively in near future. One of the most important aspects in the development of human-friendly robots is to cooperation between humans and robots. In this paper, we proposed a method for multi-object identification in order to achieve such human-centered system and robot localization in intelligent space. The intelligent space is the space where many intelligent devices, such as computers and sensors, are distributed. The Intelligent Space achieves the human centered services by accelerating the physical and psychological interaction between humans and intelligent devices. As an intelligent device of the Intelligent Space, a color CCD camera module, which includes processing and networking part, has been chosen. The Intelligent Space requires functions of identifying and tracking the multiple objects to realize appropriate services to users under the multi-camera environments. In order to achieve seamless tracking and location estimation many camera modules are distributed. They causes some errors about object identification among different camera modules. This paper describes appearance based object representation for the distributed vision system in Intelligent Space to achieve consistent labeling of all objects. Then, we discuss how to learn the object color appearance model and how to achieve the multi-object tracking under occlusions.

An Effective Authentication in Mobile Ad Hoc Networks (Mobile Ad Hoc Networks에서 효과적인 인증서비스)

  • Kim Yoon-Ho
    • The Journal of Society for e-Business Studies
    • /
    • v.10 no.1
    • /
    • pp.121-134
    • /
    • 2005
  • The MANET has many problems in security despite of its many advantages such as supporting the mobility of nodes, independence of the fixed infrastructure, and quick network establishment. In particular, in establishing security, the traditional certification service has many difficult problems in applying to the MANET because of its safety, expandability, and availability. In this paper, a secure and effective distributed certification service method was proposed using the Secret Sharing scheme and the Threshold Digital Signature scheme in providing certification services in the MANET. In the proposed distributed certification service, certain nodes of relatively high safety among the mobile nodes consisting of the MANET, were set as privileged nodes, from which the process of issuing a certification started. The proposed scheme solved problem that the whole network security would be damaged by the intrusion to one node in the Centralized Architecture and the Hierarchical Architecture. And it decreased the risk of the exposure of the personal keys also in the Fully Distributed Architecture as the number of the nodes containing the partial confidential information of personal keys decreased. By the network simulation, the features and availability of the proposed scheme was evaluated and the relation between the system parameters was analyzed.

  • PDF

Connection Management Scheme using Mobile Agent System

  • Lim, Hee-Kyoung;Bae, Sang-Hyun;Lee, Kwang-Ok
    • Journal of Integrative Natural Science
    • /
    • v.11 no.4
    • /
    • pp.192-196
    • /
    • 2018
  • The mobile agent paradigm can be exploited in a variety of ways, ranging from low-level system administration tasks to middle ware to user-level applications. Mobile agents can be useful in building middle-ware services such as active mail systems, distributed collaboration systems, etc. An active mail message is a program that interacts with its recipient using a multimedia interface, and adapts the interaction session based on the recipient's responses. The mobile agent paradigm is well suitable to this type of application, since it can carry a sender-defined session protocol along with the multimedia message. Mobile agent communication is possible via method invocation on virtual references. Agents can make synchronous, one-way, or future-reply type invocations. Multicasting is possible, since agents can be aggregated hierarchically into groups. A simple check-pointing facility has also been implemented. Another proposed solution is to use multi agent computer systems to access, filter, evaluate, and integrate this information. We will present the overall architectural framework, our agent design commitments, and agent architecture to enable the above characteristics. Besides, the each information needed a mobile agent system such as text, graphic, image, audio and video etc, constructed a great capacity multimedia database system. However, they have problems in establishing connections over multiple subnetworks, such as no end-to-end connections, transmission delay due to ATM address resolution, no QoS protocols. We propose a new connection management scheme in the thesis to improve the connection management involved of mobile agent systems.

P2P Network Simulation System for Performance Evaluation in Convergence Networks

  • Kim, Yu-Doo;Moon, Il-Young
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.4
    • /
    • pp.396-400
    • /
    • 2011
  • P2P(peer to Peer) network is a distributed network architecture composed of participants that make a portion of their resources directly available to other network participants, without the need for a central server. Currently, convergence network industry using wired and mobile are grows rapidly. So P2P protocols will be used between mobile and wired network. But current P2P protocols are focused on the wired networks only and there are no simulators for performance analysis of mobile P2P. In this paper, we design a P2P simulation system for performance analysis of P2P protocols in mobile, wired and convergence networks. It is constructed by a well-known mobile network simulator and wired based P2P protocol simulator. Finally we have implemented a smart TV test-bed using our P2P test-bed for convergence networks.

The Study of System Security Technique for Mobile Ad Hoc Network (Mobile Ad Hoc Network에서 시스템 보안 기법에 관한 연구)

  • Yang, Hwan-Seok
    • Journal of Digital Contents Society
    • /
    • v.9 no.1
    • /
    • pp.33-39
    • /
    • 2008
  • Mobile Ad Hoc Network is easy to be attacked because nodes are distributed not network based infrastructure. Intrusion detection system perceives the trust values of neighboring nodes and receives inspection on local security of nodes and observation ability. This study applied clustering mechanism to reduce overhead in intrusion detection. And, in order to measure the trust values, it associates the trust information cluster head received from member nodes with its own value and evaluates the trust of neighboring nodes. Secure data transmission is received by proposed concept because the trust of nodes on network is achieved accurately.

  • PDF