A Novel Fast Link Setup Method Based on Mobile Agents for Mobile IP Communication Networks

Author(s):  
Yuan Li ◽  
Kecheng Yang ◽  
Wei Li ◽  
Xiaojun Liang
Author(s):  
Yasushi Kambayashi ◽  
Yasuhiro Tsujimura ◽  
Hidemi Yamachi ◽  
Munehiro Takimoto

This chapter presents a framework using novel methods for controlling mobile multiple robots directed by mobile agents on a communication networks. Instead of physical movement of multiple robots, mobile software agents migrate from one robot to another so that the robots more efficiently complete their task. In some applications, it is desirable that multiple robots draw themselves together automatically. In order to avoid excessive energy consumption, we employ mobile software agents to locate robots scattered in a field, and cause them to autonomously determine their moving behaviors by using a clustering algorithm based on the Ant Colony Optimization (ACO) method. ACO is the swarm-intelligence-based method that exploits artificial stigmergy for the solution of combinatorial optimization problems. Preliminary experiments have provided a favorable result. Even though there is much room to improve the collaboration of multiple agents and ACO, the current results suggest a promising direction for the design of control mechanisms for multi-robot systems. In this chapter, we focus on the implementation of the controlling mechanism of the multi-robot system using mobile agents.


Author(s):  
J. Soldatos ◽  
D.D. Vergados ◽  
N. Protopsaltis ◽  
C. Lykou ◽  
G. Kormentzas ◽  
...  

Author(s):  
Yasushi Kambayashi ◽  
Munehiro Takimoto

This chapter presents a framework for controlling intelligent robots connected by communication networks. This framework provides novel methods to control coordinated systems using higher-order mobile agents. Higher-order mobile agents are hierarchically structured agents that can contain other mobile agents. By using higher-order mobile agents, intelligent robots in action can acquire new functionalities dynamically as well as exchange their roles with other colleague robots. The higher-order property of the mobile agents enables them to be organized hierarchically and dynamically. In addition to the advantages described above, higher-order mobile agents require minimum communication. They only need connection to be established when they perform migration.


Author(s):  
Ana Goulart ◽  
Anna Zacchi ◽  
Bharath Chintapatla ◽  
Walt Magnussen

The technology used in citizen-to-authority emergency calls is based on traditional telephony, that is, circuit-switched systems. However, new standards and protocols are being developed by the Internet Engineering Task Force (IETF) to allow emergency communications over packet switched networks, such as the Internet. This architecture is known as Next Generation-9-1-1 (NG-911). In this paper, the authors present lessons learned from experiments on the IETF standard called Location to Service Translation protocol (LoST). LoST maps the user’s location to the address of the emergency call center that serves that location. After implementing the standards in a test-bed with real-world systems, spatial databases, and communication networks, the authors observed performance issues that users may experience. Based on their observations, the authors propose practical ideas to improve the performance of the NG-911 system and LoST protocol operation for mobile users.


2012 ◽  
Vol 8 (2) ◽  
pp. 127-152
Author(s):  
Sazia Parvin ◽  
Farookh Khadeer Hussain ◽  
Sohrab Ali

Similar to wired communication, Mobile IP communication is susceptible to various kinds of attacks. Of these attacks, Denial of Service (DoS) attack is considered as a great threat to mobile IP communication. The number of approaches hitherto proposed to prevent DoS attack in the area of mobile IP communication is much less compared to those for the wired domain and mobile ad hoc networks. In this work, the effects of Denial of Service attack on mobile IP communication are analyzed in detail. We propose to use packet filtering techniques that work in different domains and base stations of mobile IP communication to detect suspicious packets and to improve the performance. If any packet contains a spoofed IP address which is created by DoS attackers, the proposed scheme can detect this and then filter the suspected packet. The proposed system can mitigate the effect of Denial of Service (DoS) attack by applying three methods: (i) by filtering in the domain periphery router (ii) by filtering in the base station and (iii) by queue monitoring at the vulnerable points of base-station node. We evaluate the performance of our proposed scheme using the network simulator NS-2. The results indicate that the proposed scheme is able to minimize the effects of Denial of Service attacks and improve the performance of mobile IP communication.


Sign in / Sign up

Export Citation Format

Share Document