Communication models in mobile computing systems and mobile agents
Michael, James B.
MetadataShow full item record
This thesis study covers wired and wireless mobile computing environments, introduces the components of the mobile environment, discusses the constraints of mobility, and contains a taxonomy of the current techniques/ models that reduce the overheads associated with wireless mobile communication. One of the goals of this thesis study was to identify and define communication techniques and models that are used by mobile computing systems to minimize wireless communication cost. The following communication techniques and models have been covered in this study: caching, screen caching, differencing, protocol reduction, header reduction, data access profile, delayed writes, strict and loose reads, semantic callbacks and validators, data allocation, data compression, data scheduling, proxy process, adaptation strategy, resource revocation, auto connect/disconnect, and adaptive antennas. The trade-offs between these techniques/models have also been presented. Other goals of this study were to introduce scripts and mobile agents, and explore their security features in mobile computing environments. The usage of mobile agents in military applications has been investigated. Finally, conclusions and recommendations have been provided for wireless mobile computing and mobile agent technology.
Showing items related by title, author, creator and subject.
Oz, Ersoy (Monterey California. Naval Postgraduate School, 2004);Orthogonal frequency division multiplexing (OFDM) is being used by wireless local area network (WLAN) standards, such as IEEE 802.11a, and wireless metropolitan area network (MAN) standards, such as IEEE 802.16a. OFDM is ...
Enterprise implementations of wireless network technologies at the Naval Postgraduate School and other military educational institutions Roth, Joseph L. (Monterey, California. Naval Postgraduate School, 2002);The purpose of all information systems is to assist people in transitioning data into information, and then information into knowledge. In order to reach IT modernity, three things need to occur: a convergence of single ...
Wang, Yizhong (Monterey, California: Naval Postgraduate School, 2018);A wireless Internet of Things (IoT) network is used for military operations due to its low cost and ease of deployment; however, one of the primary challenges with IoT networks is their lack of cohesive security and privacy ...