Learn More
Providing users of multi-interface devices the ability to roam between different access networks is becoming a key requirement for service providers. The availability of multiple mobile broadband access technologies together with increasing use of real time multimedia applications is creating strong demand for handover solutions that can seamlessly and(More)
Ad hoc networking is the basis of the future military network-centric warfare architecture. Such networks are highly dynamic in nature, as mobile ad hoc networks are formed over wireless links that are susceptible to failure. Strict requirements on security and reliability combined with the dynamic nature of the network provide a strong motivation for(More)
The Internet is growing to the point of needing more serious, scalable management infrastructure. Telecommunications companies and Internet Service Providers alike face the pressures of upgrading and provisioning their networks while constraining their infrastructure costs to maintain profitability and to stay competitive in an industry that is financially(More)
We present DRAMA [1], a distributed policy-based network management system 1 , with a demonstration outline. This system was designed to manage mobile ad hoc networks, which pose various unprecedented network management challenges of different nature. To tackle these challenges, we craft a distributed management system and learn through experience that its(More)
In general, agent frameworks allow the functionality of their agents to be augmented with plug-ins, and agents in a multi-agent system collaborate with other agents to achieve their collective and/or individual goals. This model poses a few issues in terms of function coordination: (i) to allow the insertions of plug-ins on-the-fly, an agent framework needs(More)
The characteristics of ad hoc networks greatly increase the complexity of programming distributed applications with respect to both sending and receiving messages. This is because the network programming API based upon TCP and UDP was designed for the relatively stable, stationary Internet. The semantics of the API does not address the emerging issues from(More)
Zodiac (Zero Outage Dynamic Intrinsically Assurable Communities) is an implementation of a high-security MANET, resistant to multiple types of attacks, including Byzantine faults. The Zodiac architecture poses a set of unique system security, performance, and usability requirements to its policy-based management system (PBMS). In this paper, we identify(More)
Available bandwidth in a network path is an important performance criterion for evaluating the network performance. In this paper, we propose a new algorithm called Single Burst (SB) for measuring the available bandwidth between end hosts. Additionally, we provide mathematical analysis to derive approximate upper bounds on amount of exchanged data and(More)
Providing multi-interface device users the ability to roam between different access networks is becoming a key requirement for service providers. The availability of multiple mobile broadband access technologies together with increasing use of real time multimedia applications is creating strong demand for handover solutions that can seamlessly and securely(More)