2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN) 2016
DOI: 10.1109/icufn.2016.7537153
|View full text |Cite
|
Sign up to set email alerts
|

Performance analysis for use of mobile agent in wireless multihop networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…In [17], mobile agent-based implementation is compared with client/server method, and a comparative evaluation is made. The mobile agent also finds application in wireless multihop networks [18]. It is argued that traditional implementation is not scale-able because it is centralized, and if network management is performed through a mobile agent, it is having high performance and better fault tolerance.…”
Section: Existing Workmentioning
confidence: 99%
“…In [17], mobile agent-based implementation is compared with client/server method, and a comparative evaluation is made. The mobile agent also finds application in wireless multihop networks [18]. It is argued that traditional implementation is not scale-able because it is centralized, and if network management is performed through a mobile agent, it is having high performance and better fault tolerance.…”
Section: Existing Workmentioning
confidence: 99%
“…Code on demand is a specific use of mobile code under the field of code mobility. The internet has various kinds of platforms that communicate very frequently with each other by wired or wireless media (Schoeman et al, 2003). This kind of system often requires an interoperable platform that can allow communication over different platforms.…”
Section: Features Of Mobilitymentioning
confidence: 99%
“…Firstly, the transformation of internal data on the current machine is required to be represented in external data form such as in the string of bytes or in the binary form. That is why, marshaling and un-marshaling of mobile agents is required to be carried out before their migration [16].…”
Section: Agent Marshaling and Migrationmentioning
confidence: 99%