SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
David C. Wyld (Eds) : ICCSEA, SPPR, CSIA, WimoA, NECO - 2013
pp. 369–374, 2013. © CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3538
SECURE & FAULT TOLERANCE HANDOFF
IN VANET USING SPECIAL MOBILE
AGENT
Shivani Jain1,
HimanshuTyagi2
, Charu Gupta3
2
Rajkumar Goel Institute of Technology for Women, Ghaziabad
1
Meerut Institute of Engineering &Technology, Meerut
3
ABES Engineering College, Ghaziabad
ABSTRACT
Vehicular Traffic poses an emerging issue nowadays. The critical factors for the data
communication are speed and time tradeoffs. For data communication, gathering and retrieving
information many cost-effective and tested techniques are required in VANET. Client server
architectures being coercive are commonly used in spite of having drawbacks of fault and time
in-effectiveness. This paper elaborates a proposed method in VANET for fault tolerance
information retrieval based on theory of bandwidth and timestamp. Mobile Agents, with the
feature of autonomy, social ability, learning, and most importantly mobility, regarded as an
appropriate technology to build applications for instance information retrieval system in mobile
computing environment.
KEYWORDS
VANET, Mobile agent, handoff.
1. INTRODUCTION
Vehicular Ad-Hoc network is an applied science which consists of moving vehicles as an
elementary node for the wireless networks to act as a mobile network. It is one of the wireless ad
hoc networks which allow communications between vehicles and close roadside equipments. It is
appearing as an uprising technology to combine recent generation wireless networking and
vehicles [1].VANET offers: (1) ubiquitous connectivity and (2) efficient vehicle-to-vehicle
communications which supports the Intelligent Transportation Systems (ITS) [1-3]. VANET’s
are desired to provide high speed and limited degrees of freedom in movement of nodes being
distributed, self constructing communication networks. To create high-presentation, extremely
measurable and secured technologies of VANET shows an unusual challenge like handoff to the
investigate community of wireless [9]. For the handoff mechanism and information retrieval, the
software that aims to provide mobility at the programming level is the Mobile Agent.
370 Computer Science & Information Technology (CS & IT)
A mobile agent is a program, which epitomize a user in a computer network, and is capable of
migrating independently from node to node, to perform some computation on behalf of the user.
MA is defined as objects that have behavior, state, and location [4]. Mobile code, and in
particular mobile agents, will be an essential tool for allowing such access. Mobile agents are
considered as a program, though they have some special properties that differentiate them from
the principal programs like mandatory and orthogonal (optional) properties [5-7]. Agents can
work without the human interruption or others, reactive or proactive decision making. Agents are
an active process which aims to achieve the end objectives.
The call should be transferred to the new cell’s base station while a vehicular node travels in a
cell (network) during the call else the call will be dropped. This mechanism is termed as handoff.
The handover process performed by introducing delays due to discovery, configuration,
authentication and binding update procedures associated with a mobility event [17, 18].
Consistent Handoffs (VHO) [10] between heterogeneous nodes in VANET required being fault
tolerant to provide smooth roaming, supporting service continuity and Quality of Service (QoS).
The network scenario and the basic functionalities required in the system for content request and
delivery [3]. The need to support such group operations is bringing together the requirements of
(i) a set of transport services that address the group paradigm and provide Quality of Service
based broadcast/multicast and the adequate level of fault tolerance, and, (ii), a broadcast/
multicast routing platform to efficiently route packets to the entire population of the network
nodes or to a subset [12]. Information retrieval (IR) defines the systems for identifying and
presenting documents to relate to mobile environment needs.
2. RELATED WORK
The two major issues in implementing the mobile agents in VANET were Agent naming
and mobility[3]. An agent should be uniquely defined that their communication should be
controlled during the travel in network [13]. Quality of service (QoS) is the assessment of a
service provided by the network to the end user. The more deterministic network performance
could be achieved with the mobile agents, so that information processed by the network can be
better conveyed and network resources can be effectively used. Qualities of Service (QoS)
management parameters are important for alleviating multimedia services in a network. A typical
QoS architecture should support the following: configuration, prediction, and management of
QoS at all the levels of abstraction (user, system and network level); management, control, and
processing of a flow must be distinct activities; application must be transparent from
establishment and management; asynchronous resource management of different components;
and performance enhancement. An agent based QoS architecture do supports all these features
[14]. Mobile agents can better address these issues in VANET [1-3]. In this technique, we
propose an intelligent agent based network that can be provides [3].
In paper [15], for the MA based handoff in wireless network, it is very important to employ the
call admission control (CAC) mechanism in the mesh router. First, call admission control is a
critical step for the provision of QoS guaranteed service In this paper, a proportional threshold
based optimal access bandwidth policy for CAC on the mesh router is deployed, which adopts
threshold structure and gives handoff calls and new calls different priorities. In paper [15], the set
of all possible proportional threshold structured CAC policies can be described as a space of all
possible CAC policy vectors. To achieve Optimal Statistical Access Bandwidth, a straightforward
method is to employ brute-force search. However, the method of brute-force search usually has
Computer Science & Information Technology (CS & IT) 371
tremendous computational complexity. Genetic algorithm (GA) to search for the near-optimal
solution. A genetic algorithm is an adaptive heuristic search program that applies the principles of
evolution found in nature. The results show that, our GA algorithm can reach the convergence
after 20 generations, thus can guarantee an efficient implementation.
For seamless handoff it is a challenging task to provide mobile users with QoS guaranteed
service, especially when the traffic load in WMN is heavy. That is, handoff calls have to be given
more preference than new calls in the CAC process, since users are much more sensitive to call
dropping than to call blocking.
In [16], proposed the mobile agent architecture to provide application service in mobile
computing environment. Even though, paper [16] is to compare the performance of client server
architecture and fault tolerance mobile agent system, and cared about security aspects too. A
mobile agent is created and dispatched to the certificate authority [7, 16].
Mobile agent is dispatched to the mobile server if request is accepted. Mobile server gets the
location of the server system corresponds to the user request from server selection database.
Mobile agent is dispatched to the server system for required processing. It is retracted from the
mobile server and replica agent (RA) is created. It also has the functionality for monitoring with
the mobile host when it returns a mobile agent. If the mobile host is currently lost, the replica
agent is set to the inactive status. After the mobile host is connected to mobile server, replica
agent is set to active status and it is migrated from the mobile server to the mobile host. Mobile
server knows that mobile host had already moved to the cell of another mobile server using
IETF’s IP mobility Support [5]. To implement, we selected Aglet as a mobile agent platform
after analyzing different mobile agent platforms such as Aglets, Grasshopper, Voyager etc
[6].
3. PROPOSED WORK
In [1], VANET parallel mobile agent architecture is used to perform the better transmission of
mobile agents, the client initiates multiple MAs, each of which visits a number of nodes in
VANET. The MAs then return to the client and collect their results to complete the task. When
the traffic load in VANET is heavy, many researchers believe that (Call Admission Control) CAC
[2] aims handoff calls have to be given more preference than new calls, since users are much
more sensitive to call dropping than to call blocking [2].
We adopt a proportional threshold based optimal access threshold structure to implement CAC
which, gives Seamless handoff calls and new calls different priorities, and offers high access
bandwidth [9]. We apply mobile agent technology to VANET, each vehicular node is assigned a
“C_MA” (Client’s Mobile Agent), to provide seamless handoff. The mesh client places its C_MA
in the mesh router that it registers with [3]. If the C_MA moves from the range of one vehicular
node to that of another vehicular node too. When a vehicular node wants to handoff, it will
inform its current MH first.
372 Computer Science & Information Technology (CS & IT)
Fig. Special mobile agent.
Then the current MH (Mobile Host) transfers the C_MA to the different MH for information
retrieval for better handoff in neighborhood. To get the complete benefit of mobile agent system,
a suitable information retrieval system for fault tolerance should be taken.
For fault tolerance mechanism, check pointing and replication system is adapted to increase the
reliability of the system. All the C_MA makes a duplicate copy of data at each vehicular node
called IM_node, makes the system fault tolerance, when they migrates until the destination not
found. In this paper we use timestamp ‘Ti’ and threshold ‘Th’ for making the system time
consuming and reliable, that after a timestamp the data will be invalid.
When C_MA reaches its final node then the communication operations between clients and
replicated database servers are implemented using Mobile Agents, takes queries from other
vehicular nodes and returning results to them. During the communication system the system must
be secure. In this paper we use an authentication system for the secure communication. This
authentication system uses a handshaking mechanism, when mobile agent sends request to the
MH (vehicular node) for duplicate copy the server first check for the authentication by knowing
the digital signature of the agent migrates for.
Mechanism:
{
If C_MA==active
//Mobile Agent migrates in the network for //data for handoff
For all IM_nodes
If IM_node! = vehicle
{
MH_data = C_MA_data;
//Make a copy of data at //MH
}
// make a time stamp ‘Ti’
For all C_MA i=1 to n
If (C_MA_lifetime<= Ti && C_MA>=Th)
{
Security ();
Use data for handoff.
}
Else
C_MA++
Computer Science & Information Technology (CS & IT) 373
}
Security(data)
{
For all MA
If (D_sig[MAi]==D_sig)
//Use hash/digital signature function for //authentication
{
Return;
}
}
4. CONCLUSION AND FUTURE SCOPE
In VANET, for better and dynamic data communication, a fault tolerance handoff mechanism
plays an important role in the handover process between the vehicular nodes during the vehicles
are running on the road then mobile agent plays a important role in retrieving the information
during the handoff process. Our research gives a mechanism for fault tolerant mobile agent based
information retrieval system with security improvements. A method for fault tolerance
information retrieval is given in VANET while traffic is moving with random speeds for random
time intervals. Special Mobile agents are considered a suitable technology to develop applications
such as information retrieval system for mobile computing environment.
REFERENCES
[1] Chess, D., Harrison, C., and Kershenbaum, A.: „Mobile agents: are they a good idea?‟. IBM Research
Division, T.J. Watson Research Center, Yorktown Heights, New York, March 1995.
[2] Lange, D.B., and Oshima, M.: „Seven good reasons for mobile agents‟, Commun. ACM, 1999, 42,
pp. 88– 89.
[3] Mobile Agent as an Approach to Improve QoS in Vehicular Ad Hoc Network Rakesh Kumar, Dr.
Mayank Dave
[4] Alfonso Fuggetta, Gian Pietro Picco and Giovanni Vigna, "Understanding Code Mobility ", IEEE
Transactions on Software Engineering, vol. 24(5), 1998.
[5] S.S. Manvi, P. Venkataram, “Applications of agent technology in communications: a review”,
Computer Communications 27 (2004), 1493–1508.
[6] G. Weiss, Multiagent systems a modern approach to distributed artificial intelligence, MIT Press,
Boston, 2001.
[7] R. Chadha, G. Lapiotis, S. Wright, “Policy-Based Networking”, IEEE Network special issue,
March/April 2002, Vol. 16 No. 2, guest editors.
[8] R.-H. Hwang and K.-L. Chiu. Communication Framework for Vehicle Ad Hoc Networks on
Freeways. In Preparation.
[9] Seamless Handoff through Information Retrieval in VANET Using Mobile Agent, Himanshu Tyagi,
A. K. Vatsa.
[10] Vertical Handoff Decision Algorithms for Providing Optimized Performance in Heterogeneous
Wireless Networks SuKyoung Lee, Kotikalapudi Sriram, Kyungsoo Kim, Yoon Hyuk Kim, and Nada
Golmie
[11] Policy Based Fast Handoff Mechanism for MANET Ankur Gupta, A. K. Vatsa
[12] Providing reliable and fault tolerant broadcast delivery in mobile ad-hoc networks Elena Pagani and
Gian Paolo Rossi
[13] Neeran M. Karnik and Anand R. Tripathi “Design Issues in Mobile-Agent Programming Systems”,
IEEE Concurrency, July-September, 1998 pp 52-61.
374 Computer Science & Information Technology (CS & IT)
[14] T. Bheemarjuna Reddy, I. Karthigeyan, B.S. Manoj, C. Siva Ram Murthy “Quality of service
provisioning in ad hoc wireless networks: a survey of issues and solutions” Ad Hoc Networks VOL.
4, 83–124, (2006).
[15] Call Admission Control for Mobile Agent Based Handoff in Wireless Mesh Networks Bo Rong, Yi
Qian, Kejie Lu, and Michel Kadoch
[16] A Fault Tolerant Mobile Agent Information Retrieval System 1R. Punithavathi and 2K. Duraiswamy
[17] An Introduction to Handoff in Mobile Cellular Communications
“http://people.seas.harvard.edu/~jones/cscie129/nu_lectures/ lecture7/cellular/handoff/handoff.htm1“
[18] Ashutosh Dutta • Subir Das,“Seamless proactive handover across heterogeneous access.
[19] V. Pham, A. Karmouch, “Mobile software agents: An overview”, IEEE Communications Magazine,
36 (1998) 25–37.
[20] D.B. Lange, M. Oshima, “Seven good reasons for mobile agents”, Communications of ACM, 42
(1999) 88–89.
[21] Monica Vladoiu, Zoran Constantinescu, “U-Learning within a context aware multiagent
environment”, International Journal of Computer Networks & Communications (IJCNC), .3 (2011).
[22] Lange, D.B. and M. Oshima, 1998, Programming and Deploying Mobile Agents with Aglets.
Addison- Wesley, USA., ISBN: 020132582.
[23] Lyu, M.R., X. Chem and T.Y. Wong, 2004. Design and evaluation of a fault tolerant mobile agent
system. IEEE Intell. Syst., 19: 32-38. DOI: 10.1109/MIS.2004.40
[24] Ma, Q., W. Hao, W. Li, M. Tu and I.L. Yen, 2003. Pe Agent-a mobile agent system to support secure
internet and web applications. Proceedings of Annual International Computer Software and
Applications Conference, Nov. 3-6, IEEE Computer Society, USA., pp: 690. DOI:
10.1109/CMPSAC.2003.1245418.
[25] Pleisch, S. and A. Schiper, 2003. Fault-tolerant mobile agent execution. IEEE Trans. Comput., 52:
209-222. DOI: 10.1109/TC.2003.117 6987
Bibliography:
Shivani Jain pursuing Master in Technology in Computer Science from Meerut Institute of Engineering
and Technology , Meerut, Ghaziabad affiliated by MTU, Uttar Pradesh . She has done his B.Tech in
Information Technology from BIT Meerut. She has coordinated and attended various National Conferences
and Workshops at university level. Her area of interest includes Wireless Network, Computer Network,
Computer Organization, Operating System and Software Engineering
Charu Gupta pursuing Master in Technology in Computer Science from ABES Engineering College,
Ghaziabad affiliated by MTU, Uttar Pradesh . She has done his B.Tech in Information Technology from
ABES Engineering College. She has coordinated and attended various National Conferences and
Workshops at university level. Her area of interest includes Wireless Network, Computer Network,
Computer Organization, Operating System and Software Engineering.
Himanshu Tyagi is working as Assistant Professor in Rajkumar Goel Institute of Technology for women,
He obtained his M-Tech (C.E.) from Shobhit University He has been member of several academic and
administrative bodies. During his teaching he has coordinated several Technical fests and National
Conferences at Institute and University Level. He has attended several seminars, workshops and
conferences at various levels. His several papers are published in various national and international
conferences and journals. His area of research includes MANET (Mobile Ad-Hoc network), Congestion
Control, Network Security and VOIP-SIP(Voice over IP), Cloud Computing.

Mais conteúdo relacionado

Mais procurados

BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKSBIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
ijwmn
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
4 Sw 2009 Ieee Abstracts Dot Net, Ncct Chennai
4   Sw   2009 Ieee Abstracts   Dot Net, Ncct Chennai4   Sw   2009 Ieee Abstracts   Dot Net, Ncct Chennai
4 Sw 2009 Ieee Abstracts Dot Net, Ncct Chennai
ncct
 

Mais procurados (16)

On the real time hardware implementation feasibility of joint radio resource ...
On the real time hardware implementation feasibility of joint radio resource ...On the real time hardware implementation feasibility of joint radio resource ...
On the real time hardware implementation feasibility of joint radio resource ...
 
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREIMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
 
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREIMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
 
Improvements for DMM in SDN and Virtualization-Based Mobile Network Architecture
Improvements for DMM in SDN and Virtualization-Based Mobile Network ArchitectureImprovements for DMM in SDN and Virtualization-Based Mobile Network Architecture
Improvements for DMM in SDN and Virtualization-Based Mobile Network Architecture
 
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKSBIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Kd3118761881
Kd3118761881Kd3118761881
Kd3118761881
 
IRJET- An Incentive Framework for Cellular Traffic Offloading
IRJET-  	  An Incentive Framework for Cellular Traffic OffloadingIRJET-  	  An Incentive Framework for Cellular Traffic Offloading
IRJET- An Incentive Framework for Cellular Traffic Offloading
 
10
1010
10
 
Reducing handoff delay by adaptive threshold
Reducing handoff delay by adaptive thresholdReducing handoff delay by adaptive threshold
Reducing handoff delay by adaptive threshold
 
A Novel Handoff Necessity Estimation Approach Based on Travelling Distance
A Novel Handoff Necessity Estimation Approach Based on Travelling DistanceA Novel Handoff Necessity Estimation Approach Based on Travelling Distance
A Novel Handoff Necessity Estimation Approach Based on Travelling Distance
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
 
QOS-APCVS: AN ENHANCED EPS-IMS PCC ARCHITECTURE PROPOSAL TO IMPROVE MOBILE SE...
QOS-APCVS: AN ENHANCED EPS-IMS PCC ARCHITECTURE PROPOSAL TO IMPROVE MOBILE SE...QOS-APCVS: AN ENHANCED EPS-IMS PCC ARCHITECTURE PROPOSAL TO IMPROVE MOBILE SE...
QOS-APCVS: AN ENHANCED EPS-IMS PCC ARCHITECTURE PROPOSAL TO IMPROVE MOBILE SE...
 
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRESHYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
 
4 Sw 2009 Ieee Abstracts Dot Net, Ncct Chennai
4   Sw   2009 Ieee Abstracts   Dot Net, Ncct Chennai4   Sw   2009 Ieee Abstracts   Dot Net, Ncct Chennai
4 Sw 2009 Ieee Abstracts Dot Net, Ncct Chennai
 

Destaque

Destaque (15)

PosterGeosciences (2)
PosterGeosciences (2)PosterGeosciences (2)
PosterGeosciences (2)
 
Morfo presentacion copia
Morfo presentacion   copiaMorfo presentacion   copia
Morfo presentacion copia
 
Innovation team november 2015
Innovation team november 2015Innovation team november 2015
Innovation team november 2015
 
Sar ice image classification using parallelepiped classifier based on gram sc...
Sar ice image classification using parallelepiped classifier based on gram sc...Sar ice image classification using parallelepiped classifier based on gram sc...
Sar ice image classification using parallelepiped classifier based on gram sc...
 
Everyone is a leader
Everyone is a leaderEveryone is a leader
Everyone is a leader
 
Open cl programming using python syntax
Open cl programming using python syntaxOpen cl programming using python syntax
Open cl programming using python syntax
 
Gpt 2015 conference exhibitor slide show
Gpt 2015 conference exhibitor slide showGpt 2015 conference exhibitor slide show
Gpt 2015 conference exhibitor slide show
 
Kayla money's pp
Kayla money's ppKayla money's pp
Kayla money's pp
 
eriviauthorguidelines
eriviauthorguidelineseriviauthorguidelines
eriviauthorguidelines
 
Kelly kesler gpt savannah aiha
Kelly kesler gpt savannah aihaKelly kesler gpt savannah aiha
Kelly kesler gpt savannah aiha
 
Pso based optimized security scheme for image authentication and tamper proofing
Pso based optimized security scheme for image authentication and tamper proofingPso based optimized security scheme for image authentication and tamper proofing
Pso based optimized security scheme for image authentication and tamper proofing
 
Ellen bolch & max stachura advanced telehomecare
Ellen bolch & max stachura advanced telehomecareEllen bolch & max stachura advanced telehomecare
Ellen bolch & max stachura advanced telehomecare
 
Jessica aspinwall mumc telemedicine presentation
Jessica aspinwall mumc telemedicine presentationJessica aspinwall mumc telemedicine presentation
Jessica aspinwall mumc telemedicine presentation
 
Performance comparison on java technologies a practical approach
Performance comparison on java technologies   a practical approachPerformance comparison on java technologies   a practical approach
Performance comparison on java technologies a practical approach
 
Gpt logo slide
Gpt logo slideGpt logo slide
Gpt logo slide
 

Semelhante a Secure & fault tolerance handoff in vanet using special mobile agent

Performance evaluation of the mobility management towards 4 g wireless netwo
Performance evaluation of the mobility management towards 4 g wireless netwoPerformance evaluation of the mobility management towards 4 g wireless netwo
Performance evaluation of the mobility management towards 4 g wireless netwo
IAEME Publication
 
Mobility Management on 5G Vehicular Cloud Computing Systems
Mobility Management on 5G Vehicular Cloud Computing SystemsMobility Management on 5G Vehicular Cloud Computing Systems
Mobility Management on 5G Vehicular Cloud Computing Systems
University of Piraeus
 
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs ApplicationsBlockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
IJCNCJournal
 
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONSBLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
IJCNCJournal
 
Volume 2-issue-6-2021-2029
Volume 2-issue-6-2021-2029Volume 2-issue-6-2021-2029
Volume 2-issue-6-2021-2029
Editor IJARCET
 
Volume 2-issue-6-2021-2029
Volume 2-issue-6-2021-2029Volume 2-issue-6-2021-2029
Volume 2-issue-6-2021-2029
Editor IJARCET
 

Semelhante a Secure & fault tolerance handoff in vanet using special mobile agent (20)

A044030110
A044030110A044030110
A044030110
 
Applications Drive Secure Lightpath Creation Across Heterogeneous Domains
Applications Drive Secure Lightpath Creation Across Heterogeneous DomainsApplications Drive Secure Lightpath Creation Across Heterogeneous Domains
Applications Drive Secure Lightpath Creation Across Heterogeneous Domains
 
Performance evaluation of the mobility management towards 4 g wireless netwo
Performance evaluation of the mobility management towards 4 g wireless netwoPerformance evaluation of the mobility management towards 4 g wireless netwo
Performance evaluation of the mobility management towards 4 g wireless netwo
 
IRJET- Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
IRJET-  Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...IRJET-  Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
IRJET- Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
 
Fuzzy Based Vertical Handoff Decision Controller for Future Networks
Fuzzy Based Vertical Handoff Decision Controller for Future NetworksFuzzy Based Vertical Handoff Decision Controller for Future Networks
Fuzzy Based Vertical Handoff Decision Controller for Future Networks
 
Mobility Management on 5G Vehicular Cloud Computing Systems
Mobility Management on 5G Vehicular Cloud Computing SystemsMobility Management on 5G Vehicular Cloud Computing Systems
Mobility Management on 5G Vehicular Cloud Computing Systems
 
Towards automated service-oriented lifecycle management for 5G networks
Towards automated service-oriented lifecycle management for 5G networksTowards automated service-oriented lifecycle management for 5G networks
Towards automated service-oriented lifecycle management for 5G networks
 
Networking IEEE 2014 Projects
Networking IEEE 2014 ProjectsNetworking IEEE 2014 Projects
Networking IEEE 2014 Projects
 
Networking ieee-2014-projects
Networking ieee-2014-projectsNetworking ieee-2014-projects
Networking ieee-2014-projects
 
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs ApplicationsBlockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications
 
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONSBLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONS
 
Volume 2-issue-6-2021-2029
Volume 2-issue-6-2021-2029Volume 2-issue-6-2021-2029
Volume 2-issue-6-2021-2029
 
Volume 2-issue-6-2021-2029
Volume 2-issue-6-2021-2029Volume 2-issue-6-2021-2029
Volume 2-issue-6-2021-2029
 
Intelligent GIS-Based Road Accident Analysis and Real-Time Monitoring Automat...
Intelligent GIS-Based Road Accident Analysis and Real-Time Monitoring Automat...Intelligent GIS-Based Road Accident Analysis and Real-Time Monitoring Automat...
Intelligent GIS-Based Road Accident Analysis and Real-Time Monitoring Automat...
 
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...
 
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...Learning-based Orchestrator for Intelligent Software-defined Networking Contr...
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...
 
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
 
Quality of experience aware network selection model for service provisioning...
Quality of experience aware network selection model for service  provisioning...Quality of experience aware network selection model for service  provisioning...
Quality of experience aware network selection model for service provisioning...
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Affinity based virtual machine migration (AVM) approach for effective placeme...
Affinity based virtual machine migration (AVM) approach for effective placeme...Affinity based virtual machine migration (AVM) approach for effective placeme...
Affinity based virtual machine migration (AVM) approach for effective placeme...
 

Último

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Secure & fault tolerance handoff in vanet using special mobile agent

  • 1. David C. Wyld (Eds) : ICCSEA, SPPR, CSIA, WimoA, NECO - 2013 pp. 369–374, 2013. © CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3538 SECURE & FAULT TOLERANCE HANDOFF IN VANET USING SPECIAL MOBILE AGENT Shivani Jain1, HimanshuTyagi2 , Charu Gupta3 2 Rajkumar Goel Institute of Technology for Women, Ghaziabad 1 Meerut Institute of Engineering &Technology, Meerut 3 ABES Engineering College, Ghaziabad ABSTRACT Vehicular Traffic poses an emerging issue nowadays. The critical factors for the data communication are speed and time tradeoffs. For data communication, gathering and retrieving information many cost-effective and tested techniques are required in VANET. Client server architectures being coercive are commonly used in spite of having drawbacks of fault and time in-effectiveness. This paper elaborates a proposed method in VANET for fault tolerance information retrieval based on theory of bandwidth and timestamp. Mobile Agents, with the feature of autonomy, social ability, learning, and most importantly mobility, regarded as an appropriate technology to build applications for instance information retrieval system in mobile computing environment. KEYWORDS VANET, Mobile agent, handoff. 1. INTRODUCTION Vehicular Ad-Hoc network is an applied science which consists of moving vehicles as an elementary node for the wireless networks to act as a mobile network. It is one of the wireless ad hoc networks which allow communications between vehicles and close roadside equipments. It is appearing as an uprising technology to combine recent generation wireless networking and vehicles [1].VANET offers: (1) ubiquitous connectivity and (2) efficient vehicle-to-vehicle communications which supports the Intelligent Transportation Systems (ITS) [1-3]. VANET’s are desired to provide high speed and limited degrees of freedom in movement of nodes being distributed, self constructing communication networks. To create high-presentation, extremely measurable and secured technologies of VANET shows an unusual challenge like handoff to the investigate community of wireless [9]. For the handoff mechanism and information retrieval, the software that aims to provide mobility at the programming level is the Mobile Agent.
  • 2. 370 Computer Science & Information Technology (CS & IT) A mobile agent is a program, which epitomize a user in a computer network, and is capable of migrating independently from node to node, to perform some computation on behalf of the user. MA is defined as objects that have behavior, state, and location [4]. Mobile code, and in particular mobile agents, will be an essential tool for allowing such access. Mobile agents are considered as a program, though they have some special properties that differentiate them from the principal programs like mandatory and orthogonal (optional) properties [5-7]. Agents can work without the human interruption or others, reactive or proactive decision making. Agents are an active process which aims to achieve the end objectives. The call should be transferred to the new cell’s base station while a vehicular node travels in a cell (network) during the call else the call will be dropped. This mechanism is termed as handoff. The handover process performed by introducing delays due to discovery, configuration, authentication and binding update procedures associated with a mobility event [17, 18]. Consistent Handoffs (VHO) [10] between heterogeneous nodes in VANET required being fault tolerant to provide smooth roaming, supporting service continuity and Quality of Service (QoS). The network scenario and the basic functionalities required in the system for content request and delivery [3]. The need to support such group operations is bringing together the requirements of (i) a set of transport services that address the group paradigm and provide Quality of Service based broadcast/multicast and the adequate level of fault tolerance, and, (ii), a broadcast/ multicast routing platform to efficiently route packets to the entire population of the network nodes or to a subset [12]. Information retrieval (IR) defines the systems for identifying and presenting documents to relate to mobile environment needs. 2. RELATED WORK The two major issues in implementing the mobile agents in VANET were Agent naming and mobility[3]. An agent should be uniquely defined that their communication should be controlled during the travel in network [13]. Quality of service (QoS) is the assessment of a service provided by the network to the end user. The more deterministic network performance could be achieved with the mobile agents, so that information processed by the network can be better conveyed and network resources can be effectively used. Qualities of Service (QoS) management parameters are important for alleviating multimedia services in a network. A typical QoS architecture should support the following: configuration, prediction, and management of QoS at all the levels of abstraction (user, system and network level); management, control, and processing of a flow must be distinct activities; application must be transparent from establishment and management; asynchronous resource management of different components; and performance enhancement. An agent based QoS architecture do supports all these features [14]. Mobile agents can better address these issues in VANET [1-3]. In this technique, we propose an intelligent agent based network that can be provides [3]. In paper [15], for the MA based handoff in wireless network, it is very important to employ the call admission control (CAC) mechanism in the mesh router. First, call admission control is a critical step for the provision of QoS guaranteed service In this paper, a proportional threshold based optimal access bandwidth policy for CAC on the mesh router is deployed, which adopts threshold structure and gives handoff calls and new calls different priorities. In paper [15], the set of all possible proportional threshold structured CAC policies can be described as a space of all possible CAC policy vectors. To achieve Optimal Statistical Access Bandwidth, a straightforward method is to employ brute-force search. However, the method of brute-force search usually has
  • 3. Computer Science & Information Technology (CS & IT) 371 tremendous computational complexity. Genetic algorithm (GA) to search for the near-optimal solution. A genetic algorithm is an adaptive heuristic search program that applies the principles of evolution found in nature. The results show that, our GA algorithm can reach the convergence after 20 generations, thus can guarantee an efficient implementation. For seamless handoff it is a challenging task to provide mobile users with QoS guaranteed service, especially when the traffic load in WMN is heavy. That is, handoff calls have to be given more preference than new calls in the CAC process, since users are much more sensitive to call dropping than to call blocking. In [16], proposed the mobile agent architecture to provide application service in mobile computing environment. Even though, paper [16] is to compare the performance of client server architecture and fault tolerance mobile agent system, and cared about security aspects too. A mobile agent is created and dispatched to the certificate authority [7, 16]. Mobile agent is dispatched to the mobile server if request is accepted. Mobile server gets the location of the server system corresponds to the user request from server selection database. Mobile agent is dispatched to the server system for required processing. It is retracted from the mobile server and replica agent (RA) is created. It also has the functionality for monitoring with the mobile host when it returns a mobile agent. If the mobile host is currently lost, the replica agent is set to the inactive status. After the mobile host is connected to mobile server, replica agent is set to active status and it is migrated from the mobile server to the mobile host. Mobile server knows that mobile host had already moved to the cell of another mobile server using IETF’s IP mobility Support [5]. To implement, we selected Aglet as a mobile agent platform after analyzing different mobile agent platforms such as Aglets, Grasshopper, Voyager etc [6]. 3. PROPOSED WORK In [1], VANET parallel mobile agent architecture is used to perform the better transmission of mobile agents, the client initiates multiple MAs, each of which visits a number of nodes in VANET. The MAs then return to the client and collect their results to complete the task. When the traffic load in VANET is heavy, many researchers believe that (Call Admission Control) CAC [2] aims handoff calls have to be given more preference than new calls, since users are much more sensitive to call dropping than to call blocking [2]. We adopt a proportional threshold based optimal access threshold structure to implement CAC which, gives Seamless handoff calls and new calls different priorities, and offers high access bandwidth [9]. We apply mobile agent technology to VANET, each vehicular node is assigned a “C_MA” (Client’s Mobile Agent), to provide seamless handoff. The mesh client places its C_MA in the mesh router that it registers with [3]. If the C_MA moves from the range of one vehicular node to that of another vehicular node too. When a vehicular node wants to handoff, it will inform its current MH first.
  • 4. 372 Computer Science & Information Technology (CS & IT) Fig. Special mobile agent. Then the current MH (Mobile Host) transfers the C_MA to the different MH for information retrieval for better handoff in neighborhood. To get the complete benefit of mobile agent system, a suitable information retrieval system for fault tolerance should be taken. For fault tolerance mechanism, check pointing and replication system is adapted to increase the reliability of the system. All the C_MA makes a duplicate copy of data at each vehicular node called IM_node, makes the system fault tolerance, when they migrates until the destination not found. In this paper we use timestamp ‘Ti’ and threshold ‘Th’ for making the system time consuming and reliable, that after a timestamp the data will be invalid. When C_MA reaches its final node then the communication operations between clients and replicated database servers are implemented using Mobile Agents, takes queries from other vehicular nodes and returning results to them. During the communication system the system must be secure. In this paper we use an authentication system for the secure communication. This authentication system uses a handshaking mechanism, when mobile agent sends request to the MH (vehicular node) for duplicate copy the server first check for the authentication by knowing the digital signature of the agent migrates for. Mechanism: { If C_MA==active //Mobile Agent migrates in the network for //data for handoff For all IM_nodes If IM_node! = vehicle { MH_data = C_MA_data; //Make a copy of data at //MH } // make a time stamp ‘Ti’ For all C_MA i=1 to n If (C_MA_lifetime<= Ti && C_MA>=Th) { Security (); Use data for handoff. } Else C_MA++
  • 5. Computer Science & Information Technology (CS & IT) 373 } Security(data) { For all MA If (D_sig[MAi]==D_sig) //Use hash/digital signature function for //authentication { Return; } } 4. CONCLUSION AND FUTURE SCOPE In VANET, for better and dynamic data communication, a fault tolerance handoff mechanism plays an important role in the handover process between the vehicular nodes during the vehicles are running on the road then mobile agent plays a important role in retrieving the information during the handoff process. Our research gives a mechanism for fault tolerant mobile agent based information retrieval system with security improvements. A method for fault tolerance information retrieval is given in VANET while traffic is moving with random speeds for random time intervals. Special Mobile agents are considered a suitable technology to develop applications such as information retrieval system for mobile computing environment. REFERENCES [1] Chess, D., Harrison, C., and Kershenbaum, A.: „Mobile agents: are they a good idea?‟. IBM Research Division, T.J. Watson Research Center, Yorktown Heights, New York, March 1995. [2] Lange, D.B., and Oshima, M.: „Seven good reasons for mobile agents‟, Commun. ACM, 1999, 42, pp. 88– 89. [3] Mobile Agent as an Approach to Improve QoS in Vehicular Ad Hoc Network Rakesh Kumar, Dr. Mayank Dave [4] Alfonso Fuggetta, Gian Pietro Picco and Giovanni Vigna, "Understanding Code Mobility ", IEEE Transactions on Software Engineering, vol. 24(5), 1998. [5] S.S. Manvi, P. Venkataram, “Applications of agent technology in communications: a review”, Computer Communications 27 (2004), 1493–1508. [6] G. Weiss, Multiagent systems a modern approach to distributed artificial intelligence, MIT Press, Boston, 2001. [7] R. Chadha, G. Lapiotis, S. Wright, “Policy-Based Networking”, IEEE Network special issue, March/April 2002, Vol. 16 No. 2, guest editors. [8] R.-H. Hwang and K.-L. Chiu. Communication Framework for Vehicle Ad Hoc Networks on Freeways. In Preparation. [9] Seamless Handoff through Information Retrieval in VANET Using Mobile Agent, Himanshu Tyagi, A. K. Vatsa. [10] Vertical Handoff Decision Algorithms for Providing Optimized Performance in Heterogeneous Wireless Networks SuKyoung Lee, Kotikalapudi Sriram, Kyungsoo Kim, Yoon Hyuk Kim, and Nada Golmie [11] Policy Based Fast Handoff Mechanism for MANET Ankur Gupta, A. K. Vatsa [12] Providing reliable and fault tolerant broadcast delivery in mobile ad-hoc networks Elena Pagani and Gian Paolo Rossi [13] Neeran M. Karnik and Anand R. Tripathi “Design Issues in Mobile-Agent Programming Systems”, IEEE Concurrency, July-September, 1998 pp 52-61.
  • 6. 374 Computer Science & Information Technology (CS & IT) [14] T. Bheemarjuna Reddy, I. Karthigeyan, B.S. Manoj, C. Siva Ram Murthy “Quality of service provisioning in ad hoc wireless networks: a survey of issues and solutions” Ad Hoc Networks VOL. 4, 83–124, (2006). [15] Call Admission Control for Mobile Agent Based Handoff in Wireless Mesh Networks Bo Rong, Yi Qian, Kejie Lu, and Michel Kadoch [16] A Fault Tolerant Mobile Agent Information Retrieval System 1R. Punithavathi and 2K. Duraiswamy [17] An Introduction to Handoff in Mobile Cellular Communications “http://people.seas.harvard.edu/~jones/cscie129/nu_lectures/ lecture7/cellular/handoff/handoff.htm1“ [18] Ashutosh Dutta • Subir Das,“Seamless proactive handover across heterogeneous access. [19] V. Pham, A. Karmouch, “Mobile software agents: An overview”, IEEE Communications Magazine, 36 (1998) 25–37. [20] D.B. Lange, M. Oshima, “Seven good reasons for mobile agents”, Communications of ACM, 42 (1999) 88–89. [21] Monica Vladoiu, Zoran Constantinescu, “U-Learning within a context aware multiagent environment”, International Journal of Computer Networks & Communications (IJCNC), .3 (2011). [22] Lange, D.B. and M. Oshima, 1998, Programming and Deploying Mobile Agents with Aglets. Addison- Wesley, USA., ISBN: 020132582. [23] Lyu, M.R., X. Chem and T.Y. Wong, 2004. Design and evaluation of a fault tolerant mobile agent system. IEEE Intell. Syst., 19: 32-38. DOI: 10.1109/MIS.2004.40 [24] Ma, Q., W. Hao, W. Li, M. Tu and I.L. Yen, 2003. Pe Agent-a mobile agent system to support secure internet and web applications. Proceedings of Annual International Computer Software and Applications Conference, Nov. 3-6, IEEE Computer Society, USA., pp: 690. DOI: 10.1109/CMPSAC.2003.1245418. [25] Pleisch, S. and A. Schiper, 2003. Fault-tolerant mobile agent execution. IEEE Trans. Comput., 52: 209-222. DOI: 10.1109/TC.2003.117 6987 Bibliography: Shivani Jain pursuing Master in Technology in Computer Science from Meerut Institute of Engineering and Technology , Meerut, Ghaziabad affiliated by MTU, Uttar Pradesh . She has done his B.Tech in Information Technology from BIT Meerut. She has coordinated and attended various National Conferences and Workshops at university level. Her area of interest includes Wireless Network, Computer Network, Computer Organization, Operating System and Software Engineering Charu Gupta pursuing Master in Technology in Computer Science from ABES Engineering College, Ghaziabad affiliated by MTU, Uttar Pradesh . She has done his B.Tech in Information Technology from ABES Engineering College. She has coordinated and attended various National Conferences and Workshops at university level. Her area of interest includes Wireless Network, Computer Network, Computer Organization, Operating System and Software Engineering. Himanshu Tyagi is working as Assistant Professor in Rajkumar Goel Institute of Technology for women, He obtained his M-Tech (C.E.) from Shobhit University He has been member of several academic and administrative bodies. During his teaching he has coordinated several Technical fests and National Conferences at Institute and University Level. He has attended several seminars, workshops and conferences at various levels. His several papers are published in various national and international conferences and journals. His area of research includes MANET (Mobile Ad-Hoc network), Congestion Control, Network Security and VOIP-SIP(Voice over IP), Cloud Computing.