skip to main content
article

Opportunistic exploitation of knowledge to increase predictability of agent interactions in MANETs

Published:15 May 2005Publication History
Skip Abstract Section

Abstract

Mobile Ad hoc Networks (MANETs) are dynamic environments where frequent changes in the network topology due to physical mobility of hosts result in unpredictable, sporadic and transient connectivity. Due to this high level of uncertainty, only limited guarantees can be given for interactions among agents that run on the mobile hosts. This is not desirable as any interaction among agents on different hosts is susceptible to interruption. In this paper, we explore means to alleviate the level of uncertainty in a MANET by having hosts and agents share knowledge of their non-functional attributes such as location, velocity, etc. with each other. This shared knowledge can be used to compute, for example, the points in space and time when two hosts are likely to be within communication range. This information can then be provided to individual agents, making them more aware of the constraints within which they operate and thereby giving them a chance to tailor their behavior so that they are less affected by unpredictable disconnections. The contributions of this paper are a minimalist formalism for knowledge exchange, a software architecture supporting knowledge exchange, and an empirical evaluation of the benefits of exploiting knowledge to increase the predictability of interactions.

References

  1. Fok, C. L., Roman, G. C., Hackmann, G.: A lightweight coordination middleware for mobile computing. In: Proceedings of the COORDINATION 2004. Volume 2949 of LNCS. (2004) 135--151.Google ScholarGoogle ScholarCross RefCross Ref
  2. Storey, M., Blair, G. S., Friday, A.: Mare: Resource discovery and configuration in ad hoc networks. Mobile Networks and Applications (MONET) 7 (2002) 377--387. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Handorean, R., Gill, C., Roman, G. C.: Accommodating Transient Connectivity in Ad Hoc and Mobile Settings. In: Proceedings of The Second International Conference on Pervasive Computing (Pervasive 04). Number 3001 in LNCS (2004) 305--322.Google ScholarGoogle Scholar
  4. Microsystems, S.: Personal java page. http://java.sun.com/products/personaljava/index.jsp (2005)Google ScholarGoogle Scholar
  5. Murphy, A., Picco, G., Roman, G. C.: Lime: A middleware for physical and logical mobility. In: Proceedings of the 21st International Conference on Distributed Computing Systems. (2001) 524--533. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Sultanik, E., Artz, D., Anderson, G., Kam, M., Regli, W., Peysakhov, M., Sevy, J., Belov, N., Morizio, N., Mroczkowski, A.: Secure mobile agents on ad hoc wireless networks. In: ZDNet White Paper. (2003)Google ScholarGoogle Scholar
  7. Perkins, C. E., Royer, E. M.: Ad hoc on-demand distance vector routing. In: Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications. (1999) 90--100. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Gray, R. S., Cybenko, G., Kotz, D., Peterson, R. A., Rus, D.: D'Agents: Applications and performance of a mobile-agent system. Software--- Practice and Experience 32 (2002) 543--573 Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Opportunistic exploitation of knowledge to increase predictability of agent interactions in MANETs

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM SIGSOFT Software Engineering Notes
        ACM SIGSOFT Software Engineering Notes  Volume 30, Issue 4
        July 2005
        1514 pages
        ISSN:0163-5948
        DOI:10.1145/1082983
        Issue’s Table of Contents
        • cover image ACM Other conferences
          SELMAS '05: Proceedings of the fourth international workshop on Software engineering for large-scale multi-agent systems
          May 2005
          92 pages
          ISBN:1595931163
          DOI:10.1145/1082960

        Copyright © 2005 Copyright is held by the owner/author(s)

        Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 15 May 2005

        Check for updates

        Qualifiers

        • article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader