SlideShare a Scribd company logo
1 of 21
Mobile Agents
2
Mobile (transportable) agents
An agent is “an independent software
program, which runs on behalf of a network
user”.
A mobile agent is a program that, once it is
launched by a user, can travel from node to
node autonomously, and can continue to
function even if the user is disconnected from
the network.
3
Agent
Server
Agent
Server
Agent server
File server
...
A mobile agent performs work
on behalf of a user as it
travels to multiple locations
on the network.
user
Database server
What is mobile agent ?
-Program that can migrate : where and how ?
-Performs some processing at each host
-Agent decides when and where to move next
-How it Move : on just three steps
*Save state
*Transport
*Resume
A Mobile Agent Dissected
AttributesStateCode
Program inProgram in
a suitablea suitable
LanguageLanguage
to defineto define
TheThe
behavior ofbehavior of
AgentAgent
-Set the-Set the
internalinternal
variablesvariables
-Resume-Resume
its activityits activity
afterafter
moving tomoving to
anotheranother
hosthost
-info-info
describingdescribing
the agentthe agent
-Its origin,-Its origin,
ownerowner
-Movement-Movement
historyhistory
--
AuthenticatAuthenticat
ion keyion key
6
Advantages of Mobile Agents
They allow efficient and economical use of
communication channels that may have low
bandwidth, high latency, and may be error-
prone.
They enable the use of portable, low-cost,
personal communications devices to perform
complex tasks even when the device is
disconnected from the network.
They allow asynchronous operations and true
decentralization
7
Mobile Agent Paradigm vs.
Client-Server Paradigm
. . .
T h e c l i e n t - s e r v e r p a r a d i g m
T h e m o b i l e a g e n t p a r a d i g m
c l i e n t h o s t s e r v e r h o s t
h o s t A
h o s t B
c o m m u n ic a t io n
d a t a
a g e n t
t r a n s p o r t a t io n
8
Basic Architecture
An agent server process runs on each
participating host.
Participating hosts are networked through
links that can be low-bandwidth and
unreliable.
An agent is a serializable object whose
execution state can be frozen for
transportation and reconstituted upon arrival
at a remote site.
9
Basic Architecture
a g e n t
s e r v e r
a g e n t s e r v e r
h o s t
m o b ile a g e n t
10
What’s in the Agent?
An agent is an object, hence it contains state data and
methods.
Among the instance data is an itinerary of the sites to be
visited, which may be dynamically constructed or
adjusted.
Other data may include an agent ID or other
authentication data.
The agent’s behavior at each stop can be pre-
programmed and dynamically adjusted.
Events in Mobile Agent
12
 Creation: a brand new agent is born and its state is
initialized.
 Cloning: a twin agent is born and the current state
of the original is duplicated in the clone.
 Dispatch: an agent travels to a new host.
 Deactivation: an agent is put to sleep and its state
is saved in persistent storage.
 Activation: a deactivated agent is brought back to
life and its state is restored from persistent storage.
13
 Retraction: an agent is brought back from a remote
host along with its state to the home machine.
 Disposal: an agent is terminated and its state is lost
forever.
 Communication: Notifies the agent to handle
messages incoming from other agents , which is the
primary means of inter-agent correspondence.
Why mobile agent ?
-They reduce the network load
-they overcome network
latency
-they encapsulate protocols
-they adapt dynamically
-they execute asynchronously
and autonomously
-they are natural heterogeneous
-they are fault tolerance
15
Mobile-agent applications
Information retrieval
Monitoring
Virtual market-place/ meeting room
Shareware
Mobile Agents in Java
A mobile agent in Java is called an “Aglet”
– Light weight agent
Why use Java
– Platform independence!
– Create once, go anywhere
– Price ….. FREE TOOLKITS ( ASDK )
– Hosts can provide an environment for the aglet to
execute within
Levels of mobility
Weak
-when moving a mobile
agent Carrier (Code +
DateState)
-global or instance variables
-on moving , execution starts
from the beginning
Strong
-when moving a mobile agent
Carrier (Code + DateState +
Execution State)
-global or instance variables
- Execution State :local
variables and threads
-on moving : execution can be
continued from the point it is
stopped previously
18
Security in Mobile Agent Systems
• Security concern is the primary deterrent of
deploying the mobile-agent technology.
• There are concerns for both the agent hosts and
the mobile agents.
– Agent host concerns:
Malicious/unauthorized agents can misuse/destroy
system resources (e.g., worms).
– Agent concerns:
Malicious hosts can destroy or alter an agent’s logic,
( e.g., Mobile agent’s route can be altered.)
19
Security in Mobile Agent Systems
Measures:
Authentication – an agent must
authenticate itself to the host, and an agent
server must authenticate itself to the agent.
Encryption – an agent encrypts its
sensitive data.
Resource access – a host enforces strict
access control to its resources.
Current Areas of Work
mobile agent theories: Pi-calculus extensions, Mobile
Ambients, Agent Itineraries
mobile agent model: some component-based, AI-
based
mobile agent infrastructure: environment supporting
mobile agents - security, naming, domain crossing,
etc
mobile agent programming: languages, toolkits,
abstractions
mobile agent applications: mobile agent standards:
OMG’s MASIF, FIPA
Research Issues
Security: protect host from agents, protect agents
from agents, protect agents from host
Performance: if Java or Python, performance
penalties with interpretation (esp. for performance
critical applications), but not for long?
Strong mobility: move full execution state (stacks
etc), stacks not accessible with current Java?
MA management:
– how control and manage deployed agents
– issues: fault tolerance (e.g., agent fails, host
fails), recalling agents, tracking agents, servicing
agents (esp. longer living agents)

More Related Content

What's hot (20)

GSM: Handovers
GSM: HandoversGSM: Handovers
GSM: Handovers
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
Group Communication (Distributed computing)
Group Communication (Distributed computing)Group Communication (Distributed computing)
Group Communication (Distributed computing)
 
Umts system architecture
Umts system architectureUmts system architecture
Umts system architecture
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayer
 
Transport layer
Transport layerTransport layer
Transport layer
 
Peer to Peer services and File systems
Peer to Peer services and File systemsPeer to Peer services and File systems
Peer to Peer services and File systems
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
Agent discovery& registration
Agent discovery& registrationAgent discovery& registration
Agent discovery& registration
 
Gprs architecture
Gprs architectureGprs architecture
Gprs architecture
 
Google App Engine
Google App EngineGoogle App Engine
Google App Engine
 
Mobile computing unit-5
Mobile computing unit-5Mobile computing unit-5
Mobile computing unit-5
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile Computing
 
Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)
 
Cs8601 3
Cs8601 3Cs8601 3
Cs8601 3
 
M-commerce in mobile computing
M-commerce in mobile computingM-commerce in mobile computing
M-commerce in mobile computing
 
JINI Technology
JINI TechnologyJINI Technology
JINI Technology
 

Viewers also liked

Java card technology
Java card technologyJava card technology
Java card technologyAmol Kamble
 
PPT on Basic of Gateway
PPT on Basic of GatewayPPT on Basic of Gateway
PPT on Basic of GatewayNaveen Karn
 
Mobile Computing UNIT-8
Mobile Computing UNIT-8Mobile Computing UNIT-8
Mobile Computing UNIT-8Ramesh Babu
 
Introduction to Mobile programming(J2ME)
Introduction to Mobile programming(J2ME)Introduction to Mobile programming(J2ME)
Introduction to Mobile programming(J2ME)Wambua Wambua
 

Viewers also liked (8)

Mobile agent
Mobile agent Mobile agent
Mobile agent
 
Java card technology
Java card technologyJava card technology
Java card technology
 
Java card technology
Java card technologyJava card technology
Java card technology
 
PPT on Basic of Gateway
PPT on Basic of GatewayPPT on Basic of Gateway
PPT on Basic of Gateway
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
WAP 2.0
WAP 2.0WAP 2.0
WAP 2.0
 
Mobile Computing UNIT-8
Mobile Computing UNIT-8Mobile Computing UNIT-8
Mobile Computing UNIT-8
 
Introduction to Mobile programming(J2ME)
Introduction to Mobile programming(J2ME)Introduction to Mobile programming(J2ME)
Introduction to Mobile programming(J2ME)
 

Similar to Mobile agents

International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Middleware.pptx
Middleware.pptxMiddleware.pptx
Middleware.pptxyudragispi
 
An enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents fromAn enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents fromeSAT Publishing House
 
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...Vivek Garhewal
 
10 mobile agents
10 mobile agents10 mobile agents
10 mobile agentsAnkit Anand
 
10 mobile agents
10 mobile agents10 mobile agents
10 mobile agentsAnkit Anand
 
AULT : Agent based User simulation
AULT : Agent based User simulationAULT : Agent based User simulation
AULT : Agent based User simulationOm Narayan
 
Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mumbai Academisc
 
DEVELOPING MOBILE AGENT FOR INTRUSION DETECTION
DEVELOPING MOBILE AGENT FOR INTRUSION DETECTIONDEVELOPING MOBILE AGENT FOR INTRUSION DETECTION
DEVELOPING MOBILE AGENT FOR INTRUSION DETECTIONijcsit
 
Introduction to Offensive Security.pptx
Introduction to Offensive Security.pptxIntroduction to Offensive Security.pptx
Introduction to Offensive Security.pptxMaaitrayoDas
 
Cryptography and system security
Cryptography and system securityCryptography and system security
Cryptography and system securityGary Mendonca
 

Similar to Mobile agents (20)

Mobile Agents
Mobile AgentsMobile Agents
Mobile Agents
 
Mobile Agents
Mobile AgentsMobile Agents
Mobile Agents
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
P0704085089
P0704085089P0704085089
P0704085089
 
Middleware.pptx
Middleware.pptxMiddleware.pptx
Middleware.pptx
 
Mobile Agent
Mobile AgentMobile Agent
Mobile Agent
 
An enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents fromAn enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents from
 
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
 
10 mobile agents
10 mobile agents10 mobile agents
10 mobile agents
 
10 mobile agents
10 mobile agents10 mobile agents
10 mobile agents
 
Collcom2005 agent basedft
Collcom2005 agent basedftCollcom2005 agent basedft
Collcom2005 agent basedft
 
Introductionto agents
Introductionto agentsIntroductionto agents
Introductionto agents
 
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROLAPPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
 
AULT : Agent based User simulation
AULT : Agent based User simulationAULT : Agent based User simulation
AULT : Agent based User simulation
 
Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)
 
Agent-Based Technologies (Mobile-C) - IK
Agent-Based Technologies (Mobile-C) - IKAgent-Based Technologies (Mobile-C) - IK
Agent-Based Technologies (Mobile-C) - IK
 
DEVELOPING MOBILE AGENT FOR INTRUSION DETECTION
DEVELOPING MOBILE AGENT FOR INTRUSION DETECTIONDEVELOPING MOBILE AGENT FOR INTRUSION DETECTION
DEVELOPING MOBILE AGENT FOR INTRUSION DETECTION
 
Introduction to Offensive Security.pptx
Introduction to Offensive Security.pptxIntroduction to Offensive Security.pptx
Introduction to Offensive Security.pptx
 
Cryptography and system security
Cryptography and system securityCryptography and system security
Cryptography and system security
 
Agent-based System - Introduction
Agent-based System - IntroductionAgent-based System - Introduction
Agent-based System - Introduction
 

Recently uploaded

Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 

Recently uploaded (20)

Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 

Mobile agents

  • 2. 2 Mobile (transportable) agents An agent is “an independent software program, which runs on behalf of a network user”. A mobile agent is a program that, once it is launched by a user, can travel from node to node autonomously, and can continue to function even if the user is disconnected from the network.
  • 3. 3 Agent Server Agent Server Agent server File server ... A mobile agent performs work on behalf of a user as it travels to multiple locations on the network. user Database server
  • 4. What is mobile agent ? -Program that can migrate : where and how ? -Performs some processing at each host -Agent decides when and where to move next -How it Move : on just three steps *Save state *Transport *Resume
  • 5. A Mobile Agent Dissected AttributesStateCode Program inProgram in a suitablea suitable LanguageLanguage to defineto define TheThe behavior ofbehavior of AgentAgent -Set the-Set the internalinternal variablesvariables -Resume-Resume its activityits activity afterafter moving tomoving to anotheranother hosthost -info-info describingdescribing the agentthe agent -Its origin,-Its origin, ownerowner -Movement-Movement historyhistory -- AuthenticatAuthenticat ion keyion key
  • 6. 6 Advantages of Mobile Agents They allow efficient and economical use of communication channels that may have low bandwidth, high latency, and may be error- prone. They enable the use of portable, low-cost, personal communications devices to perform complex tasks even when the device is disconnected from the network. They allow asynchronous operations and true decentralization
  • 7. 7 Mobile Agent Paradigm vs. Client-Server Paradigm . . . T h e c l i e n t - s e r v e r p a r a d i g m T h e m o b i l e a g e n t p a r a d i g m c l i e n t h o s t s e r v e r h o s t h o s t A h o s t B c o m m u n ic a t io n d a t a a g e n t t r a n s p o r t a t io n
  • 8. 8 Basic Architecture An agent server process runs on each participating host. Participating hosts are networked through links that can be low-bandwidth and unreliable. An agent is a serializable object whose execution state can be frozen for transportation and reconstituted upon arrival at a remote site.
  • 9. 9 Basic Architecture a g e n t s e r v e r a g e n t s e r v e r h o s t m o b ile a g e n t
  • 10. 10 What’s in the Agent? An agent is an object, hence it contains state data and methods. Among the instance data is an itinerary of the sites to be visited, which may be dynamically constructed or adjusted. Other data may include an agent ID or other authentication data. The agent’s behavior at each stop can be pre- programmed and dynamically adjusted.
  • 11.
  • 12. Events in Mobile Agent 12  Creation: a brand new agent is born and its state is initialized.  Cloning: a twin agent is born and the current state of the original is duplicated in the clone.  Dispatch: an agent travels to a new host.  Deactivation: an agent is put to sleep and its state is saved in persistent storage.  Activation: a deactivated agent is brought back to life and its state is restored from persistent storage.
  • 13. 13  Retraction: an agent is brought back from a remote host along with its state to the home machine.  Disposal: an agent is terminated and its state is lost forever.  Communication: Notifies the agent to handle messages incoming from other agents , which is the primary means of inter-agent correspondence.
  • 14. Why mobile agent ? -They reduce the network load -they overcome network latency -they encapsulate protocols -they adapt dynamically -they execute asynchronously and autonomously -they are natural heterogeneous -they are fault tolerance
  • 16. Mobile Agents in Java A mobile agent in Java is called an “Aglet” – Light weight agent Why use Java – Platform independence! – Create once, go anywhere – Price ….. FREE TOOLKITS ( ASDK ) – Hosts can provide an environment for the aglet to execute within
  • 17. Levels of mobility Weak -when moving a mobile agent Carrier (Code + DateState) -global or instance variables -on moving , execution starts from the beginning Strong -when moving a mobile agent Carrier (Code + DateState + Execution State) -global or instance variables - Execution State :local variables and threads -on moving : execution can be continued from the point it is stopped previously
  • 18. 18 Security in Mobile Agent Systems • Security concern is the primary deterrent of deploying the mobile-agent technology. • There are concerns for both the agent hosts and the mobile agents. – Agent host concerns: Malicious/unauthorized agents can misuse/destroy system resources (e.g., worms). – Agent concerns: Malicious hosts can destroy or alter an agent’s logic, ( e.g., Mobile agent’s route can be altered.)
  • 19. 19 Security in Mobile Agent Systems Measures: Authentication – an agent must authenticate itself to the host, and an agent server must authenticate itself to the agent. Encryption – an agent encrypts its sensitive data. Resource access – a host enforces strict access control to its resources.
  • 20. Current Areas of Work mobile agent theories: Pi-calculus extensions, Mobile Ambients, Agent Itineraries mobile agent model: some component-based, AI- based mobile agent infrastructure: environment supporting mobile agents - security, naming, domain crossing, etc mobile agent programming: languages, toolkits, abstractions mobile agent applications: mobile agent standards: OMG’s MASIF, FIPA
  • 21. Research Issues Security: protect host from agents, protect agents from agents, protect agents from host Performance: if Java or Python, performance penalties with interpretation (esp. for performance critical applications), but not for long? Strong mobility: move full execution state (stacks etc), stacks not accessible with current Java? MA management: – how control and manage deployed agents – issues: fault tolerance (e.g., agent fails, host fails), recalling agents, tracking agents, servicing agents (esp. longer living agents)