Journal of Network and Systems Management

, Volume 18, Issue 1, pp 97–116 | Cite as

Autonomic Application-Level Message Delivery Using Virtual Magnetic Fields

  • Luiz A. P. LimaJr.
  • Alcides Calsavara


Mobility has emerged as an important new trend in the arena of distributed computing bringing along deep social and technical transformations. These changes have created an increasing demand for applications and middleware that exploit and support mobility. This article proposes the use of the concept of magnetic fields borrowed from physics to enable self-organizing message forwarding on overlay networks over physical networks with possibly mobile nodes. Though autonomic, a network that employs the proposed message forwarding mechanism still needs a cognitive management to accomplish end-to-end goals. After formalizing the generic model of virtual magnetic fields, a distributed self-stabilizing propagation algorithm is defined and applied to the load-balancing problem. Simulation results are then discussed and implementation issues are detailed considering extensions of existing platforms. At last, conclusions are drawn and the main future works are listed.


Mobile computing Message forwarding Middleware Virtual magnetic fields Cognitive networks 


  1. 1.
    Henning, M., Vinoski, S.: Advanced CORBA programming with C++. Addison-Wesley, Reading (1999)Google Scholar
  2. 2.
    Lima, L.A.P., Calsavara, A.: A framework for CORBA interoperability in Ad Hoc networks. In: Proceedings of the 2007 ACM Symposium on Applied Computing (ACM SIGAPP 2007), pp. 930–934. Seoul, Korea, March 2007Google Scholar
  3. 3.
    Wang, N., et al.: Evaluating meta-programming mechanisms for ORB middleware. IEEE Commun. Mag. 39(10), 102–113 (2001)CrossRefGoogle Scholar
  4. 4.
    Fortuna, C., Mohorcic, M.: Trends in the development of communication networks: cognitive networks. Comput. Netw. 53(9), 1354–1376 (2009)CrossRefGoogle Scholar
  5. 5.
    Fall, K.: A delay-tolerant network architecture for challenged internets. In: Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM ‘03), pp. 27–34, August 2003Google Scholar
  6. 6.
    Kate, A., Zaverucha, G., Hengartner, U.: Anonymity and security in delay-tolerant networks. In: Proceedings of the Third International Conference on Security and Privacy in Communications Networks and the Workshops (SecureComm 2007), pp. 504–513, September 2007Google Scholar
  7. 7.
    Sun Microsystems. JXTA—Java Micro Edition Project, Accessed September 2007
  8. 8.
    Murphy, A.L., Picco, G.P., Roman, G.-C.: LIME: a coordination model and middleware supporting mobility of hosts and agents. ACM Trans. Softw. Eng. Methodol. 15(6), 279–328 (2006)CrossRefGoogle Scholar
  9. 9.
    Ting, Y.-W., Chang, Y.-K.: A novel cooperative caching scheme for wireless Ad Hoc networks: group caching. In: Proceedings of the International Conference on Networking, Architecture, and Storage (NAS 2007), pp. 62–68, July 2007Google Scholar
  10. 10.
    Godfrey, B., Lakshminarayanan, K., Surana, S., Karp, R., Stoica, I.: Load balancing in dynamic structured peer-to-peer systems. Perform. Eval. 63(3), 217–240 (2006)CrossRefGoogle Scholar
  11. 11.
    Lenders, V., May, M., Plattner, B.: Service discovery in mobile Ad Hoc networks: a field theoretic approach. In: Proceedings of the Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM 2005), pp. 120–130, June 2005Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2009

Authors and Affiliations

  1. 1.Graduate Program on Computer Science (PPGIa)Pontifical Catholic University of Paraná (PUCPR)CuritibaBrazil

Personalised recommendations