By Topic

Evaluating recovery protocols for mobile agents in network management applications

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Bruce, S. ; Sch. of Electr. Eng. & Comput. Sci., Central Florida Univ., Orlando, FL, USA ; Linton, D.G.

Reliable mobile agents (MAs) should be able to handle events that impede their normal operation, such as host or server failures. In this paper, we investigate four recovery protocols which support reliable mobile agents and have applications in network management. For each protocol, analytical models are developed for average response time (the time from when an MA is launched until it has visited or attempted to visit all of the hosts on its itinerary) and expected coverage (the number of hosts from the agent's itinerary it is able to visit and complete its task). Simulations are used to verify the analytical models for response time and coverage. The results from the verified analytical models are used to recommend the recovery protocols that best support a low response time and a high coverage under different network management applications. Simulation output using non-exponential repair laws lead to the same conclusions gleaned from the exponential repair law models

Published in:

Integrated Network Management Proceedings, 2001 IEEE/IFIP International Symposium on

Date of Conference: