Nikos Migas
MARIAN: A framework using mobile agents for routing, topology discovery and automatic network reconfiguration in ad-hoc networks.
Migas, Nikos; Buchanan, William J; McArtney, Kevin
Abstract
The purpose of MARIAN is to investigate the degree of suitability for mobile agent technology in routing, topology discovery, and automatic network reconfiguration in ad-hoc networks. This research proposes to assess different models of the usage of static and mobile agents to determine the best route through ad-hoc networks. The determination of the best route is not an easy process, and requires research into the best metrics to identify the best path, such as network performance, processing power, node’s identification, costs, and so on. In this paper we present a framework for MARIAN. The architecture consists of three layers and shapes a pyramid. Each one of the layers is presented in detail in this paper. The bottom layer consists of all hosts in an ad-hoc networks. The middle layer implements a static and mobile approach. This is due to the fact that for a set of applications the static approach may be the most suitable while for another the mobile approach may be suitable. The top layer is the core layer and is a hybrid approach of static and mobile approach. These models will be appraised in terms of performance, reconfigurability, and easy of installation.
Citation
Migas, N., Buchanan, W. J., & McArtney, K. (2003). MARIAN: A framework using mobile agents for routing, topology discovery and automatic network reconfiguration in ad-hoc networks.
Conference Name | IADIS International Conference, WWW/Internet 2003 |
---|---|
Start Date | Nov 5, 2003 |
End Date | Nov 8, 2003 |
Publication Date | 2003-11 |
Deposit Date | Dec 22, 2010 |
Publicly Available Date | Dec 22, 2010 |
Peer Reviewed | Peer Reviewed |
Keywords | Mobile agents; stationary agents; wireless ad-hoc network; routing protocol; topology discovery;automatic network reconfiguration; |
Public URL | http://researchrepository.napier.ac.uk/id/eprint/3986 |
Contract Date | Dec 22, 2010 |
Files
200302C182.pdf
(113 Kb)
PDF
Publisher Licence URL
http://creativecommons.org/licenses/by-nc/4.0/
You might also like
Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains
(2024)
Journal Article
Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology
(2024)
Journal Article
Detection of Ransomware
(2024)
Patent
Downloadable Citations
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search