SlideShare a Scribd company logo
1 of 21
Download to read offline
Mobile Agents
2
Mobile (transportable) agents
An agent is “an independent software
program, which runs on behalf of a network
user”.
A mobile agent is a program that, once it is
launched by a user, can travel from node to
node autonomously, and can continue to
function even if the user is disconnected from
the network.
3
Agent
Server
Agent
Server
Agent server
File server
...
A mobile agent performs work
on behalf of a user as it
travels to multiple locations
on the network.
user
Database server
What is mobile agent ?
-Program that can migrate : where and how ?
-Performs some processing at each host
-Agent decides when and where to move next
-How it Move : on just three steps
*Save state
*Transport
*Resume
A Mobile Agent Dissected
AttributesStateCode
Program inProgram in
a suitablea suitable
LanguageLanguage
to defineto define
TheThe
behavior ofbehavior of
AgentAgent
-Set the-Set the
internalinternal
variablesvariables
-Resume-Resume
its activityits activity
afterafter
moving tomoving to
anotheranother
hosthost
-info-info
describingdescribing
the agentthe agent
-Its origin,-Its origin,
ownerowner
-Movement-Movement
historyhistory
--
AuthenticatAuthenticat
ion keyion key
6
Advantages of Mobile Agents
They allow efficient and economical use of
communication channels that may have low
bandwidth, high latency, and may be error-
prone.
They enable the use of portable, low-cost,
personal communications devices to perform
complex tasks even when the device is
disconnected from the network.
They allow asynchronous operations and true
decentralization
7
Mobile Agent Paradigm vs.
Client-Server Paradigm
. . .
T h e c l i e n t - s e r v e r p a r a d i g m
T h e m o b i l e a g e n t p a r a d i g m
c l i e n t h o s t s e r v e r h o s t
h o s t A
h o s t B
c o m m u n ic a t io n
d a t a
a g e n t
t r a n s p o r t a t io n
8
Basic Architecture
An agent server process runs on each
participating host.
Participating hosts are networked through
links that can be low-bandwidth and
unreliable.
An agent is a serializable object whose
execution state can be frozen for
transportation and reconstituted upon arrival
at a remote site.
9
Basic Architecture
a g e n t
s e r v e r
a g e n t s e r v e r
h o s t
m o b ile a g e n t
10
What’s in the Agent?
An agent is an object, hence it contains state data and
methods.
Among the instance data is an itinerary of the sites to be
visited, which may be dynamically constructed or
adjusted.
Other data may include an agent ID or other
authentication data.
The agent’s behavior at each stop can be pre-
programmed and dynamically adjusted.
Mobile agents
Events in Mobile Agent
12
 Creation: a brand new agent is born and its state is
initialized.
 Cloning: a twin agent is born and the current state
of the original is duplicated in the clone.
 Dispatch: an agent travels to a new host.
 Deactivation: an agent is put to sleep and its state
is saved in persistent storage.
 Activation: a deactivated agent is brought back to
life and its state is restored from persistent storage.
13
 Retraction: an agent is brought back from a remote
host along with its state to the home machine.
 Disposal: an agent is terminated and its state is lost
forever.
 Communication: Notifies the agent to handle
messages incoming from other agents , which is the
primary means of inter-agent correspondence.
Why mobile agent ?
-They reduce the network load
-they overcome network
latency
-they encapsulate protocols
-they adapt dynamically
-they execute asynchronously
and autonomously
-they are natural heterogeneous
-they are fault tolerance
15
Mobile-agent applications
Information retrieval
Monitoring
Virtual market-place/ meeting room
Shareware
Mobile Agents in Java
A mobile agent in Java is called an “Aglet”
– Light weight agent
Why use Java
– Platform independence!
– Create once, go anywhere
– Price ….. FREE TOOLKITS ( ASDK )
– Hosts can provide an environment for the aglet to
execute within
Levels of mobility
Weak
-when moving a mobile
agent Carrier (Code +
DateState)
-global or instance variables
-on moving , execution starts
from the beginning
Strong
-when moving a mobile agent
Carrier (Code + DateState +
Execution State)
-global or instance variables
- Execution State :local
variables and threads
-on moving : execution can be
continued from the point it is
stopped previously
18
Security in Mobile Agent Systems
• Security concern is the primary deterrent of
deploying the mobile-agent technology.
• There are concerns for both the agent hosts and
the mobile agents.
– Agent host concerns:
Malicious/unauthorized agents can misuse/destroy
system resources (e.g., worms).
– Agent concerns:
Malicious hosts can destroy or alter an agent’s logic,
( e.g., Mobile agent’s route can be altered.)
19
Security in Mobile Agent Systems
Measures:
Authentication – an agent must
authenticate itself to the host, and an agent
server must authenticate itself to the agent.
Encryption – an agent encrypts its
sensitive data.
Resource access – a host enforces strict
access control to its resources.
Current Areas of Work
mobile agent theories: Pi-calculus extensions, Mobile
Ambients, Agent Itineraries
mobile agent model: some component-based, AI-
based
mobile agent infrastructure: environment supporting
mobile agents - security, naming, domain crossing,
etc
mobile agent programming: languages, toolkits,
abstractions
mobile agent applications: mobile agent standards:
OMG’s MASIF, FIPA
Research Issues
Security: protect host from agents, protect agents
from agents, protect agents from host
Performance: if Java or Python, performance
penalties with interpretation (esp. for performance
critical applications), but not for long?
Strong mobility: move full execution state (stacks
etc), stacks not accessible with current Java?
MA management:
– how control and manage deployed agents
– issues: fault tolerance (e.g., agent fails, host
fails), recalling agents, tracking agents, servicing
agents (esp. longer living agents)

More Related Content

What's hot

Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocolPradeep Kumar TS
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network LayerRahul Hada
 
Cellular network
Cellular networkCellular network
Cellular networkshreb
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptxAcad
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithmBushra M
 
Basics of Network Traffic Management
Basics of Network Traffic ManagementBasics of Network Traffic Management
Basics of Network Traffic ManagementPuneet Bawa
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksChandra Meena
 
Wireless transmission
Wireless transmissionWireless transmission
Wireless transmissionRajapriya82
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksKhushbooGupta145
 
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSMOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSPallepati Vasavi
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksjuno susi
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc NetworksJagdeep Singh
 
Distance Vector Routing Protocols
Distance Vector Routing ProtocolsDistance Vector Routing Protocols
Distance Vector Routing ProtocolsKABILESH RAMAR
 
Agent discovery& registration
Agent discovery& registrationAgent discovery& registration
Agent discovery& registrationrajisri2
 

What's hot (20)

Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocol
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
 
Manet
ManetManet
Manet
 
Cellular network
Cellular networkCellular network
Cellular network
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptx
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Basics of Network Traffic Management
Basics of Network Traffic ManagementBasics of Network Traffic Management
Basics of Network Traffic Management
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networks
 
Wireless transmission
Wireless transmissionWireless transmission
Wireless transmission
 
Advance Networking Course Details PPT
Advance Networking Course Details PPTAdvance Networking Course Details PPT
Advance Networking Course Details PPT
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor Networks
 
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSMOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 
Distance Vector Routing Protocols
Distance Vector Routing ProtocolsDistance Vector Routing Protocols
Distance Vector Routing Protocols
 
Agent discovery& registration
Agent discovery& registrationAgent discovery& registration
Agent discovery& registration
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
MANET
MANETMANET
MANET
 

Viewers also liked

Java card technology
Java card technologyJava card technology
Java card technologyAmol Kamble
 
PPT on Basic of Gateway
PPT on Basic of GatewayPPT on Basic of Gateway
PPT on Basic of GatewayNaveen Karn
 
Mobile Computing UNIT-8
Mobile Computing UNIT-8Mobile Computing UNIT-8
Mobile Computing UNIT-8Ramesh Babu
 
Introduction to Mobile programming(J2ME)
Introduction to Mobile programming(J2ME)Introduction to Mobile programming(J2ME)
Introduction to Mobile programming(J2ME)Wambua Wambua
 
Mobile Computing UNIT-I TO III
Mobile Computing UNIT-I TO IIIMobile Computing UNIT-I TO III
Mobile Computing UNIT-I TO IIIRamesh Babu
 

Viewers also liked (8)

Java card technology
Java card technologyJava card technology
Java card technology
 
Java card technology
Java card technologyJava card technology
Java card technology
 
PPT on Basic of Gateway
PPT on Basic of GatewayPPT on Basic of Gateway
PPT on Basic of Gateway
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
WAP 2.0
WAP 2.0WAP 2.0
WAP 2.0
 
Mobile Computing UNIT-8
Mobile Computing UNIT-8Mobile Computing UNIT-8
Mobile Computing UNIT-8
 
Introduction to Mobile programming(J2ME)
Introduction to Mobile programming(J2ME)Introduction to Mobile programming(J2ME)
Introduction to Mobile programming(J2ME)
 
Mobile Computing UNIT-I TO III
Mobile Computing UNIT-I TO IIIMobile Computing UNIT-I TO III
Mobile Computing UNIT-I TO III
 

Similar to Mobile agents

International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Middleware.pptx
Middleware.pptxMiddleware.pptx
Middleware.pptxyudragispi
 
An enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents fromAn enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents fromeSAT Publishing House
 
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...Vivek Garhewal
 
10 mobile agents
10 mobile agents10 mobile agents
10 mobile agentsAnkit Anand
 
10 mobile agents
10 mobile agents10 mobile agents
10 mobile agentsAnkit Anand
 
AULT : Agent based User simulation
AULT : Agent based User simulationAULT : Agent based User simulation
AULT : Agent based User simulationOm Narayan
 
Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mumbai Academisc
 
DEVELOPING MOBILE AGENT FOR INTRUSION DETECTION
DEVELOPING MOBILE AGENT FOR INTRUSION DETECTIONDEVELOPING MOBILE AGENT FOR INTRUSION DETECTION
DEVELOPING MOBILE AGENT FOR INTRUSION DETECTIONijcsit
 
Introduction to Offensive Security.pptx
Introduction to Offensive Security.pptxIntroduction to Offensive Security.pptx
Introduction to Offensive Security.pptxMaaitrayoDas
 
Cryptography and system security
Cryptography and system securityCryptography and system security
Cryptography and system securityGary Mendonca
 

Similar to Mobile agents (20)

Mobile Agents
Mobile AgentsMobile Agents
Mobile Agents
 
Mobile Agents
Mobile AgentsMobile Agents
Mobile Agents
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
P0704085089
P0704085089P0704085089
P0704085089
 
Middleware.pptx
Middleware.pptxMiddleware.pptx
Middleware.pptx
 
Mobile Agent
Mobile AgentMobile Agent
Mobile Agent
 
An enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents fromAn enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents from
 
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
 
10 mobile agents
10 mobile agents10 mobile agents
10 mobile agents
 
10 mobile agents
10 mobile agents10 mobile agents
10 mobile agents
 
Collcom2005 agent basedft
Collcom2005 agent basedftCollcom2005 agent basedft
Collcom2005 agent basedft
 
Introductionto agents
Introductionto agentsIntroductionto agents
Introductionto agents
 
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROLAPPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
 
AULT : Agent based User simulation
AULT : Agent based User simulationAULT : Agent based User simulation
AULT : Agent based User simulation
 
Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)
 
Agent-Based Technologies (Mobile-C) - IK
Agent-Based Technologies (Mobile-C) - IKAgent-Based Technologies (Mobile-C) - IK
Agent-Based Technologies (Mobile-C) - IK
 
DEVELOPING MOBILE AGENT FOR INTRUSION DETECTION
DEVELOPING MOBILE AGENT FOR INTRUSION DETECTIONDEVELOPING MOBILE AGENT FOR INTRUSION DETECTION
DEVELOPING MOBILE AGENT FOR INTRUSION DETECTION
 
Introduction to Offensive Security.pptx
Introduction to Offensive Security.pptxIntroduction to Offensive Security.pptx
Introduction to Offensive Security.pptx
 
Cryptography and system security
Cryptography and system securityCryptography and system security
Cryptography and system security
 
Agent-based System - Introduction
Agent-based System - IntroductionAgent-based System - Introduction
Agent-based System - Introduction
 

Recently uploaded

GENERAL CONDITIONS FOR CONTRACTS OF CIVIL ENGINEERING WORKS
GENERAL CONDITIONS  FOR  CONTRACTS OF CIVIL ENGINEERING WORKS GENERAL CONDITIONS  FOR  CONTRACTS OF CIVIL ENGINEERING WORKS
GENERAL CONDITIONS FOR CONTRACTS OF CIVIL ENGINEERING WORKS Bahzad5
 
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...amrabdallah9
 
Design of Clutches and Brakes in Design of Machine Elements.pptx
Design of Clutches and Brakes in Design of Machine Elements.pptxDesign of Clutches and Brakes in Design of Machine Elements.pptx
Design of Clutches and Brakes in Design of Machine Elements.pptxYogeshKumarKJMIT
 
Clutches and brkesSelect any 3 position random motion out of real world and d...
Clutches and brkesSelect any 3 position random motion out of real world and d...Clutches and brkesSelect any 3 position random motion out of real world and d...
Clutches and brkesSelect any 3 position random motion out of real world and d...sahb78428
 
Multicomponent Spiral Wound Membrane Separation Model.pdf
Multicomponent Spiral Wound Membrane Separation Model.pdfMulticomponent Spiral Wound Membrane Separation Model.pdf
Multicomponent Spiral Wound Membrane Separation Model.pdfGiovanaGhasary1
 
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...Amil baba
 
Guardians and Glitches: Navigating the Duality of Gen AI in AppSec
Guardians and Glitches: Navigating the Duality of Gen AI in AppSecGuardians and Glitches: Navigating the Duality of Gen AI in AppSec
Guardians and Glitches: Navigating the Duality of Gen AI in AppSecTrupti Shiralkar, CISSP
 
Modelling Guide for Timber Structures - FPInnovations
Modelling Guide for Timber Structures - FPInnovationsModelling Guide for Timber Structures - FPInnovations
Modelling Guide for Timber Structures - FPInnovationsYusuf Yıldız
 
Summer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdf
Summer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdfSummer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdf
Summer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdfNaveenVerma126
 
SUMMER TRAINING REPORT ON BUILDING CONSTRUCTION.docx
SUMMER TRAINING REPORT ON BUILDING CONSTRUCTION.docxSUMMER TRAINING REPORT ON BUILDING CONSTRUCTION.docx
SUMMER TRAINING REPORT ON BUILDING CONSTRUCTION.docxNaveenVerma126
 
Dev.bg DevOps March 2024 Monitoring & Logging
Dev.bg DevOps March 2024 Monitoring & LoggingDev.bg DevOps March 2024 Monitoring & Logging
Dev.bg DevOps March 2024 Monitoring & LoggingMarian Marinov
 
Mohs Scale of Hardness, Hardness Scale.pptx
Mohs Scale of Hardness, Hardness Scale.pptxMohs Scale of Hardness, Hardness Scale.pptx
Mohs Scale of Hardness, Hardness Scale.pptxKISHAN KUMAR
 
Engineering Mechanics Chapter 5 Equilibrium of a Rigid Body
Engineering Mechanics  Chapter 5  Equilibrium of a Rigid BodyEngineering Mechanics  Chapter 5  Equilibrium of a Rigid Body
Engineering Mechanics Chapter 5 Equilibrium of a Rigid BodyAhmadHajasad2
 
Technology Features of Apollo HDD Machine, Its Technical Specification with C...
Technology Features of Apollo HDD Machine, Its Technical Specification with C...Technology Features of Apollo HDD Machine, Its Technical Specification with C...
Technology Features of Apollo HDD Machine, Its Technical Specification with C...Apollo Techno Industries Pvt Ltd
 
UNIT4_ESD_wfffffggggggggggggith_ARM.pptx
UNIT4_ESD_wfffffggggggggggggith_ARM.pptxUNIT4_ESD_wfffffggggggggggggith_ARM.pptx
UNIT4_ESD_wfffffggggggggggggith_ARM.pptxrealme6igamerr
 
Transforming Process Safety Management: Challenges, Benefits, and Transition ...
Transforming Process Safety Management: Challenges, Benefits, and Transition ...Transforming Process Safety Management: Challenges, Benefits, and Transition ...
Transforming Process Safety Management: Challenges, Benefits, and Transition ...soginsider
 
sdfsadopkjpiosufoiasdoifjasldkjfl a asldkjflaskdjflkjsdsdf
sdfsadopkjpiosufoiasdoifjasldkjfl a asldkjflaskdjflkjsdsdfsdfsadopkjpiosufoiasdoifjasldkjfl a asldkjflaskdjflkjsdsdf
sdfsadopkjpiosufoiasdoifjasldkjfl a asldkjflaskdjflkjsdsdfJulia Kaye
 

Recently uploaded (20)

GENERAL CONDITIONS FOR CONTRACTS OF CIVIL ENGINEERING WORKS
GENERAL CONDITIONS  FOR  CONTRACTS OF CIVIL ENGINEERING WORKS GENERAL CONDITIONS  FOR  CONTRACTS OF CIVIL ENGINEERING WORKS
GENERAL CONDITIONS FOR CONTRACTS OF CIVIL ENGINEERING WORKS
 
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...
 
Design of Clutches and Brakes in Design of Machine Elements.pptx
Design of Clutches and Brakes in Design of Machine Elements.pptxDesign of Clutches and Brakes in Design of Machine Elements.pptx
Design of Clutches and Brakes in Design of Machine Elements.pptx
 
Clutches and brkesSelect any 3 position random motion out of real world and d...
Clutches and brkesSelect any 3 position random motion out of real world and d...Clutches and brkesSelect any 3 position random motion out of real world and d...
Clutches and brkesSelect any 3 position random motion out of real world and d...
 
Multicomponent Spiral Wound Membrane Separation Model.pdf
Multicomponent Spiral Wound Membrane Separation Model.pdfMulticomponent Spiral Wound Membrane Separation Model.pdf
Multicomponent Spiral Wound Membrane Separation Model.pdf
 
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...
 
Lecture 4 .pdf
Lecture 4                              .pdfLecture 4                              .pdf
Lecture 4 .pdf
 
Guardians and Glitches: Navigating the Duality of Gen AI in AppSec
Guardians and Glitches: Navigating the Duality of Gen AI in AppSecGuardians and Glitches: Navigating the Duality of Gen AI in AppSec
Guardians and Glitches: Navigating the Duality of Gen AI in AppSec
 
Modelling Guide for Timber Structures - FPInnovations
Modelling Guide for Timber Structures - FPInnovationsModelling Guide for Timber Structures - FPInnovations
Modelling Guide for Timber Structures - FPInnovations
 
Lecture 2 .pdf
Lecture 2                           .pdfLecture 2                           .pdf
Lecture 2 .pdf
 
Summer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdf
Summer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdfSummer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdf
Summer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdf
 
SUMMER TRAINING REPORT ON BUILDING CONSTRUCTION.docx
SUMMER TRAINING REPORT ON BUILDING CONSTRUCTION.docxSUMMER TRAINING REPORT ON BUILDING CONSTRUCTION.docx
SUMMER TRAINING REPORT ON BUILDING CONSTRUCTION.docx
 
Litature Review: Research Paper work for Engineering
Litature Review: Research Paper work for EngineeringLitature Review: Research Paper work for Engineering
Litature Review: Research Paper work for Engineering
 
Dev.bg DevOps March 2024 Monitoring & Logging
Dev.bg DevOps March 2024 Monitoring & LoggingDev.bg DevOps March 2024 Monitoring & Logging
Dev.bg DevOps March 2024 Monitoring & Logging
 
Mohs Scale of Hardness, Hardness Scale.pptx
Mohs Scale of Hardness, Hardness Scale.pptxMohs Scale of Hardness, Hardness Scale.pptx
Mohs Scale of Hardness, Hardness Scale.pptx
 
Engineering Mechanics Chapter 5 Equilibrium of a Rigid Body
Engineering Mechanics  Chapter 5  Equilibrium of a Rigid BodyEngineering Mechanics  Chapter 5  Equilibrium of a Rigid Body
Engineering Mechanics Chapter 5 Equilibrium of a Rigid Body
 
Technology Features of Apollo HDD Machine, Its Technical Specification with C...
Technology Features of Apollo HDD Machine, Its Technical Specification with C...Technology Features of Apollo HDD Machine, Its Technical Specification with C...
Technology Features of Apollo HDD Machine, Its Technical Specification with C...
 
UNIT4_ESD_wfffffggggggggggggith_ARM.pptx
UNIT4_ESD_wfffffggggggggggggith_ARM.pptxUNIT4_ESD_wfffffggggggggggggith_ARM.pptx
UNIT4_ESD_wfffffggggggggggggith_ARM.pptx
 
Transforming Process Safety Management: Challenges, Benefits, and Transition ...
Transforming Process Safety Management: Challenges, Benefits, and Transition ...Transforming Process Safety Management: Challenges, Benefits, and Transition ...
Transforming Process Safety Management: Challenges, Benefits, and Transition ...
 
sdfsadopkjpiosufoiasdoifjasldkjfl a asldkjflaskdjflkjsdsdf
sdfsadopkjpiosufoiasdoifjasldkjfl a asldkjflaskdjflkjsdsdfsdfsadopkjpiosufoiasdoifjasldkjfl a asldkjflaskdjflkjsdsdf
sdfsadopkjpiosufoiasdoifjasldkjfl a asldkjflaskdjflkjsdsdf
 

Mobile agents

  • 2. 2 Mobile (transportable) agents An agent is “an independent software program, which runs on behalf of a network user”. A mobile agent is a program that, once it is launched by a user, can travel from node to node autonomously, and can continue to function even if the user is disconnected from the network.
  • 3. 3 Agent Server Agent Server Agent server File server ... A mobile agent performs work on behalf of a user as it travels to multiple locations on the network. user Database server
  • 4. What is mobile agent ? -Program that can migrate : where and how ? -Performs some processing at each host -Agent decides when and where to move next -How it Move : on just three steps *Save state *Transport *Resume
  • 5. A Mobile Agent Dissected AttributesStateCode Program inProgram in a suitablea suitable LanguageLanguage to defineto define TheThe behavior ofbehavior of AgentAgent -Set the-Set the internalinternal variablesvariables -Resume-Resume its activityits activity afterafter moving tomoving to anotheranother hosthost -info-info describingdescribing the agentthe agent -Its origin,-Its origin, ownerowner -Movement-Movement historyhistory -- AuthenticatAuthenticat ion keyion key
  • 6. 6 Advantages of Mobile Agents They allow efficient and economical use of communication channels that may have low bandwidth, high latency, and may be error- prone. They enable the use of portable, low-cost, personal communications devices to perform complex tasks even when the device is disconnected from the network. They allow asynchronous operations and true decentralization
  • 7. 7 Mobile Agent Paradigm vs. Client-Server Paradigm . . . T h e c l i e n t - s e r v e r p a r a d i g m T h e m o b i l e a g e n t p a r a d i g m c l i e n t h o s t s e r v e r h o s t h o s t A h o s t B c o m m u n ic a t io n d a t a a g e n t t r a n s p o r t a t io n
  • 8. 8 Basic Architecture An agent server process runs on each participating host. Participating hosts are networked through links that can be low-bandwidth and unreliable. An agent is a serializable object whose execution state can be frozen for transportation and reconstituted upon arrival at a remote site.
  • 9. 9 Basic Architecture a g e n t s e r v e r a g e n t s e r v e r h o s t m o b ile a g e n t
  • 10. 10 What’s in the Agent? An agent is an object, hence it contains state data and methods. Among the instance data is an itinerary of the sites to be visited, which may be dynamically constructed or adjusted. Other data may include an agent ID or other authentication data. The agent’s behavior at each stop can be pre- programmed and dynamically adjusted.
  • 12. Events in Mobile Agent 12  Creation: a brand new agent is born and its state is initialized.  Cloning: a twin agent is born and the current state of the original is duplicated in the clone.  Dispatch: an agent travels to a new host.  Deactivation: an agent is put to sleep and its state is saved in persistent storage.  Activation: a deactivated agent is brought back to life and its state is restored from persistent storage.
  • 13. 13  Retraction: an agent is brought back from a remote host along with its state to the home machine.  Disposal: an agent is terminated and its state is lost forever.  Communication: Notifies the agent to handle messages incoming from other agents , which is the primary means of inter-agent correspondence.
  • 14. Why mobile agent ? -They reduce the network load -they overcome network latency -they encapsulate protocols -they adapt dynamically -they execute asynchronously and autonomously -they are natural heterogeneous -they are fault tolerance
  • 16. Mobile Agents in Java A mobile agent in Java is called an “Aglet” – Light weight agent Why use Java – Platform independence! – Create once, go anywhere – Price ….. FREE TOOLKITS ( ASDK ) – Hosts can provide an environment for the aglet to execute within
  • 17. Levels of mobility Weak -when moving a mobile agent Carrier (Code + DateState) -global or instance variables -on moving , execution starts from the beginning Strong -when moving a mobile agent Carrier (Code + DateState + Execution State) -global or instance variables - Execution State :local variables and threads -on moving : execution can be continued from the point it is stopped previously
  • 18. 18 Security in Mobile Agent Systems • Security concern is the primary deterrent of deploying the mobile-agent technology. • There are concerns for both the agent hosts and the mobile agents. – Agent host concerns: Malicious/unauthorized agents can misuse/destroy system resources (e.g., worms). – Agent concerns: Malicious hosts can destroy or alter an agent’s logic, ( e.g., Mobile agent’s route can be altered.)
  • 19. 19 Security in Mobile Agent Systems Measures: Authentication – an agent must authenticate itself to the host, and an agent server must authenticate itself to the agent. Encryption – an agent encrypts its sensitive data. Resource access – a host enforces strict access control to its resources.
  • 20. Current Areas of Work mobile agent theories: Pi-calculus extensions, Mobile Ambients, Agent Itineraries mobile agent model: some component-based, AI- based mobile agent infrastructure: environment supporting mobile agents - security, naming, domain crossing, etc mobile agent programming: languages, toolkits, abstractions mobile agent applications: mobile agent standards: OMG’s MASIF, FIPA
  • 21. Research Issues Security: protect host from agents, protect agents from agents, protect agents from host Performance: if Java or Python, performance penalties with interpretation (esp. for performance critical applications), but not for long? Strong mobility: move full execution state (stacks etc), stacks not accessible with current Java? MA management: – how control and manage deployed agents – issues: fault tolerance (e.g., agent fails, host fails), recalling agents, tracking agents, servicing agents (esp. longer living agents)