A Model for Mobile Code Computing Paradigms in Computer Networks

Journal Title: Journal of Information Systems and Telecommunication - Year 2017, Vol 5, Issue 1

Abstract

This paper presents a reliable model for mobile codes in distributed networks, which represents reliable mobile agent execution. The model ensures non-blocking mobile agent execution and forces the once property without relying on correct fault detection. A mobile agent execution is blocking if a fault of agent prevents the agent from continuing in its execution. The once problem is related to non-blocking in the sense that solutions to the latter may lead to multiple executions of the mobile agent. A solution to reliable mobile agent execution needs to ensure both the non-blocking and once properties. The analytical results show new theoretical perceptions into the statistical behaviors of mobile agents and provide useful tools for executing mobile agents in networks. The results show that agents' behavior is influenced by places' characteristics and the agents' behavior can be managed to network. In this paper, we analyzed the average time consuming of mobile agents between two places. The approach, Fault-Tolerant approach for mobile codes offers a user-transparent fault tolerance which can be selected by the user for every single application given to the environment. Thereby, the user can decide for every application weather it has to be treated fault-tolerant or not. We proposed a reliable execution model of mobile codes and analyzed the life expectancy, including the average time consuming of mobile agents between two places, the average number of places agents will visit, and the agents' life expectancy.

Authors and Affiliations

Hodjat Hamidi, Maryam Parvini

Keywords

Related Articles

Joint Source and Channel Analysis for Scalable Video Coding Using Vector Quantization over OFDM System

Conventional wireless video encoders employ variable-length entropy encoding and predictive coding to achieve high compression ratio but these techniques render the extremely sensitive encoded bit-stream to channel error...

Identification of a Nonlinear System by Determining of Fuzzy Rules

In this article the hybrid optimization algorithm of differential evolution and particle swarm is introduced for designing the fuzzy rule base of a fuzzy controller. For a specific number of rules, a hybrid algorithm for...

Automatic Construction of Domain Ontology Using Wikipedia and Enhancing it by Google Search Engine

The foundation of the Semantic Web are ontologies. Ontologies play the main role in the exchange of information and development of the Lexical Web to the Semantic Web. Manual construction of ontologies is time-consuming,...

Trust evaluation in unsupervised network: A fuzzy logic approach

Because of the possibility of anonymity and impersonation in social networks, trust plays an important role in these networks. Pear to pear networks, by eliminating the supervisor roles, besides its benefit in decreasing...

Node to Node Watermarking in Wireless Sensor Networks for Authentication of Self Nodes

In order to solve some security issues in Wireless Sensor Networks (WSNs), node to node authentication method based on digital watermarking technique for verification of relative nodes is proposed. In the proposed method...

Download PDF file
  • EP ID EP183824
  • DOI -
  • Views 154
  • Downloads 0

How To Cite

Hodjat Hamidi, Maryam Parvini (2017). A Model for Mobile Code Computing Paradigms in Computer Networks. Journal of Information Systems and Telecommunication, 5(1), 7-15. https://europub.co.uk./articles/-A-183824