Mobile agents for wireless computing: The convergence of wireless computational models with mobile-agent technologies
Date
2004ISSN
1383-469XSource
Mobile Networks and ApplicationsVolume
9Issue
5Pages
517-528Google Scholar check
Keyword(s):
Metadata
Show full item recordAbstract
Wireless mobile computing breaks the stationary barrier and allows users to compute and access information from anywhere and at anytime. However, this new freedom of movement does not come without new challenges. The mobile computing environment is constrained in many ways. Mobile elements are resource-poor and unreliable. Their network connectivity is often achieved through low-bandwidth wireless links. Furthermore, connectivity is frequently lost for variant periods of time. The difficulties raised by these constraints are compounded by mobility that induces variability in the availability of both communication and computational resources. These severe restrictions have a great impact on the design and structure of mobile computing applications and motivate the development of new software models. To this end, a number of extensions to the traditional distributed system architectures have been proposed [26]. These new software models, however, are static and require a priori set up and configuration. This in effect limits their potential in dynamically serving the mobile client the client cannot access a site at which an appropriate model is not configured in advance. The contribution of this paper is twofold. First, the paper shows how an implementation of the proposed models using mobile agents eliminates this limitation and enhances the utilization of the models. Second, new frameworks for Web-based distributed access to databases are proposed and implemented.
Collections
Cite as
Related items
Showing items related by title, author, creator and subject.
-
Article
Requirements for the transmission of streaming video in mobile wireless networks
Vassiliou, Vasos; Antoniou, Pavlos Ch.; Giannakou, Iraklis; Pitsillides, Andreas (2006)The ability to transmit video and support related real-time multimedia applications is considered important in mobile networks. Video streaming, video conferencing, online interactive gaming, and mobile TV are only a few ...
-
Conference Object
Vulnerability assessment of intrusion recovery countermeasures in wireless sensor networks
Stavrou, Eliana; Pitsillides, Andreas (2011)Wireless sensor networks (WSNs) have become a hot research topic in recent years and are considered to be one of the building blocks of pervasive computing. Many diverse, mission-critical applications are deployed, including ...
-
Article
mPERSONA: Personalized portals for the wireless user: An agent approach
Panayiotou, Christoforos; Samaras, George S. (2004)The needs of the wireless and mobile user regarding information access and services are quite different than those of the desktop user. This need is not about browsing the Web but about receiving personalized services that ...