245 research outputs found

    A trustworthy mobile agent infrastructure for network management

    Get PDF
    Despite several advantages inherent in mobile-agent-based approaches to network management as compared to traditional SNMP-based approaches, industry is reluctant to adopt the mobile agent paradigm as a replacement for the existing manager-agent model; the management community requires an evolutionary, rather than a revolutionary, use of mobile agents. Furthermore, security for distributed management is a major concern; agent-based management systems inherit the security risks of mobile agents. We have developed a Java-based mobile agent infrastructure for network management that enables the safe integration of mobile agents with the SNMP protocol. The security of the system has been evaluated under agent to agent-platform and agent to agent attacks and has proved trustworthy in the performance of network management tasks

    A Lightweight and Flexible Mobile Agent Platform Tailored to Management Applications

    Full text link
    Mobile Agents (MAs) represent a distributed computing technology that promises to address the scalability problems of centralized network management. A critical issue that will affect the wider adoption of MA paradigm in management applications is the development of MA Platforms (MAPs) expressly oriented to distributed management. However, most of available platforms impose considerable burden on network and system resources and also lack of essential functionality. In this paper, we discuss the design considerations and implementation details of a complete MAP research prototype that sufficiently addresses all the aforementioned issues. Our MAP has been implemented in Java and tailored for network and systems management applications.Comment: 7 pages, 5 figures; Proceedings of the 2006 Conference on Mobile Computing and Wireless Communications (MCWC'2006

    Using mobility and exception handling to achieve mobile agents that survive server crash failures

    Get PDF
    Mobile agent technology, when designed and used effectively, can minimize bandwidth consumption and autonomously provide a snapshot of the current context of a distributed system. Protecting mobile agents from server crashes is a challenging issue, since developers normally have no control over remote servers. Server crash failures can leave replicas, instable storage, unavailable for an unknown time period. Furthermore, few systems have considered the need for using a fault tolerant protocol among a group of collaborating mobile agents. This thesis uses exception handling to protect mobile agents from server crash failures. An exception model is proposed for mobile agents and two exception handler designs are investigated. The first exists at the server that created the mobile agent and uses a timeout mechanism. The second, the mobile shadow scheme, migrates with the mobile agent and operates at the previous server visited by the mobile agent. A case study application has been developed to compare the performance of the two exception handler designs. Performance results demonstrate that although the second design is slower it offers the smaller trip time when handling a server crash. Furthermore, no modification of the server environment is necessary. This thesis shows that the mobile shadow exception handling scheme reduces complexity for a group of mobile agents to survive server crashes. The scheme deploys a replica that monitors the server occupied by the master, at each stage of the itinerary. The replica exists at the previous server visited in the itinerary. Consequently, each group member is a single fault tolerant entity with respect to server crash failures. Other schemes introduce greater complexity and performance overheads since, for each stage of the itinerary, a group of replicas is sent to servers that offer an equivalent service. In addition, future research is established for fault tolerance in groups of collaborating mobile agents

    A Java Simulation-Based Performance Evaluation of Mobile Agent Platforms.

    Get PDF
    Mobile agents are emerging as a promising paradigm for the design and implementations of distributed applications .Manyof these Mobile Agent platforms have been developed, new one, and new versions of old agents, kept on appearing everyyear, so choosing the right or most suitable platform for a particular application area; based on their performance is achallenge for both the developers and the users. This paper carried out a qualitative comparison across three selected, Javabased Mobile Agent System, Aglet Tracy, and JADE. Two of them (Aglets and JADE) were selected for quantitativeevaluation on their time of transfer/retrieval of compressed data files. In our implementation, Aglet version 2.02 and JADE3.4.1 were used. A java simulation program was developed and used in measuring the performance of the two mobileagents, using transmission time and compressed time as performance metrics. In this paper work, a unique portnumber(2080) was chosen for the loading of classes and mobility of agents. Ten dummy data files (also refer to as Load orMessage) were created with sizes ranges from 100Kb to 1 Mb. A gzip compression tool was used to compress each of thesefiles and sent through the Aglet and JADE enabled network. The transmission time (in milliseconds) for each correspondingfiles size (in Bytes) in the two Mobile agents were recorded. We deduced from our qualitative results that, Tracy plug-infeatures give users room for reusability and extension. Aglets provide weak security and poorly scalable. JADE has astrong security, scalable and its multi agent feature will enrich its usage on the internet. Our quantitative results show thattransferring/retrieving of compressed data file is faster in JADE than in Aglets. The integrity of the files are also kept safe, inboth mobile agents, that is after decompressions they can still be reused.Keywords: Aglet, Gzip, JADE, Compression ratio, Mobile Agent Networ

    An Optimizing Java Translation Framework for Automated Checkpointing and Strong Mobility

    Get PDF
    Long-running programs, e.g., in high-performance computing, need to write periodic checkpoints of their execution state to disk to allow them to recover from node failure. Manually adding checkpointing code to an application, however, is very tedious. The mechanisms needed for writing the execution state of a program to disk and restoring it are similar to those needed for migrating a running thread or a mobile object. We have extended a source-to-source translation scheme that allows the migration of mobile Java objects with running threads to make it more general and allow it to be used for automated checkpointing. Our translation scheme allows serializable threads to be written to disk or migrated with a mobile agent to a remote machine. The translator generates code that maintains a serializable run-time stack for each thread as a Java data structure. While this results in significant run-time overhead, it allows the checkpointing code to be generated automatically. We improved the locking mechanism that is needed to protect the run-time stack as well as the translation scheme. Our experimental results demonstrate an speedup of the generated code over the original translator and show that the approach is feasible in practice

    An approach to rollback recovery of collaborating mobile agents

    Get PDF
    Fault-tolerance is one of the main problems that must be resolved to improve the adoption of the agents' computing paradigm. In this paper, we analyse the execution model of agent platforms and the significance of the faults affecting their constituent components on the reliable execution of agent-based applications, in order to develop a pragmatic framework for agent systems fault-tolerance. The developed framework deploys a communication-pairs independent check pointing strategy to offer a low-cost, application-transparent model for reliable agent- based computing that covers all possible faults that might invalidate reliable agent execution, migration and communication and maintains the exactly-one execution property

    Information Retrieval Using Mobile Agent (Aglet)

    Get PDF
    This project will present 3 objective in HPS (Hand Phone System) that help user to search for hand phone detail information by: [1] Brand such as Nokia, Samsung, and Sony Ericsson. [2] Version of the hand phone (model). [3] Price: User can input the price range. Instead of having to surf endlessly through the WWW (World Wide Web) and digesting huge amounts of possibly untrustworthy information, personalized mobile agents autonomously gather information about the item user want to see. Once they have found ihe destination or server (the piece ofsoftware): the agent can send the result back to the user. This project will be focusing on Information Retrieval and will be using mobile agent platform which is aglets, Java runtime, Jdkl.0.5_08, and Microsoft VisualJ++ 6.0 to design the GUI that build using Applet. This project will undergo 5stages which are; plan the hardware or software required for the project, then analyze and get the Product Requirement, next is design the process of implementing HPS System, implement the project by using mobile agent platform - aglets that involves programming activity and last is to test the product to ensure the product successfully completed and testify and fulfill the objectives of this project. The result and discussion about the system produced will highlights how the system works generally. Some other interested formula and idea from other project's discussion will also be used to further doing this project. As a conclusion, is project is aimed to create a simple HPS system using mobile agent technology and need to be improved in many aspects and that can be the recommendation for future work for expansion and continuation

    Behavioral pattern analysis of secure migration and communications in eCommerce using cryptographic protocols on a mobile MAS platform

    Get PDF
    Mobile Multi-Agent Systems (MAS) systems can be used with real success in a growing number of eCommerce applications nowadays. Security has been identified as numerous times by different researchers as a top criterion for the acceptance of mobile agent adoption. In this paper we present an in-depth analysis of behavior patterns of a mobile MAS platform when using different cryptographic protocols to assure communication and migration integrity and confidentiality. Different use case sceneries of eCommerce applications as well as many other aspects have been studied, such as overhead, different communication patterns, different loads and bandwidth issues. This work is also extensible to other mobile and non-mobile MAS platforms. The results obtained can be used and should be taken into account by designers and implementers of secure mobile and also non-mobile agent platforms and agents.European Union TeleCARE IST-2000-2760
    • …
    corecore