SlideShare a Scribd company logo
1 of 21
Mobile Agents
2
Mobile (transportable) agents
An agent is “an independent software
program, which runs on behalf of a network
user”.
A mobile agent is a program that, once it is
launched by a user, can travel from node to
node autonomously, and can continue to
function even if the user is disconnected from
the network.
3
Agent
Server
Agent
Server
Agent server
File server
...
A mobile agent performs work
on behalf of a user as it
travels to multiple locations
on the network.
user
Database server
What is mobile agent ?
-Program that can migrate : where and how ?
-Performs some processing at each host
-Agent decides when and where to move next
-How it Move : on just three steps
*Save state
*Transport
*Resume
A Mobile Agent Dissected
AttributesStateCode
Program inProgram in
a suitablea suitable
LanguageLanguage
to defineto define
TheThe
behavior ofbehavior of
AgentAgent
-Set the-Set the
internalinternal
variablesvariables
-Resume-Resume
its activityits activity
afterafter
moving tomoving to
anotheranother
hosthost
-info-info
describingdescribing
the agentthe agent
-Its origin,-Its origin,
ownerowner
-Movement-Movement
historyhistory
--
AuthenticatAuthenticat
ion keyion key
6
Advantages of Mobile Agents
They allow efficient and economical use of
communication channels that may have low
bandwidth, high latency, and may be error-
prone.
They enable the use of portable, low-cost,
personal communications devices to perform
complex tasks even when the device is
disconnected from the network.
They allow asynchronous operations and true
decentralization
7
Mobile Agent Paradigm vs.
Client-Server Paradigm
. . .
T h e c l i e n t - s e r v e r p a r a d i g m
T h e m o b i l e a g e n t p a r a d i g m
c l i e n t h o s t s e r v e r h o s t
h o s t A
h o s t B
c o m m u n ic a t io n
d a t a
a g e n t
t r a n s p o r t a t io n
8
Basic Architecture
An agent server process runs on each
participating host.
Participating hosts are networked through
links that can be low-bandwidth and
unreliable.
An agent is a serializable object whose
execution state can be frozen for
transportation and reconstituted upon arrival
at a remote site.
9
Basic Architecture
a g e n t
s e r v e r
a g e n t s e r v e r
h o s t
m o b ile a g e n t
10
What’s in the Agent?
An agent is an object, hence it contains state data and
methods.
Among the instance data is an itinerary of the sites to be
visited, which may be dynamically constructed or
adjusted.
Other data may include an agent ID or other
authentication data.
The agent’s behavior at each stop can be pre-
programmed and dynamically adjusted.
Events in Mobile Agent
12
 Creation: a brand new agent is born and its state is
initialized.
 Cloning: a twin agent is born and the current state
of the original is duplicated in the clone.
 Dispatch: an agent travels to a new host.
 Deactivation: an agent is put to sleep and its state
is saved in persistent storage.
 Activation: a deactivated agent is brought back to
life and its state is restored from persistent storage.
13
 Retraction: an agent is brought back from a remote
host along with its state to the home machine.
 Disposal: an agent is terminated and its state is lost
forever.
 Communication: Notifies the agent to handle
messages incoming from other agents , which is the
primary means of inter-agent correspondence.
Why mobile agent ?
-They reduce the network load
-they overcome network
latency
-they encapsulate protocols
-they adapt dynamically
-they execute asynchronously
and autonomously
-they are natural heterogeneous
-they are fault tolerance
15
Mobile-agent applications
Information retrieval
Monitoring
Virtual market-place/ meeting room
Shareware
Mobile Agents in Java
A mobile agent in Java is called an “Aglet”
– Light weight agent
Why use Java
– Platform independence!
– Create once, go anywhere
– Price ….. FREE TOOLKITS ( ASDK )
– Hosts can provide an environment for the aglet to
execute within
Levels of mobility
Weak
-when moving a mobile
agent Carrier (Code +
DateState)
-global or instance variables
-on moving , execution starts
from the beginning
Strong
-when moving a mobile agent
Carrier (Code + DateState +
Execution State)
-global or instance variables
- Execution State :local
variables and threads
-on moving : execution can be
continued from the point it is
stopped previously
18
Security in Mobile Agent Systems
• Security concern is the primary deterrent of
deploying the mobile-agent technology.
• There are concerns for both the agent hosts and
the mobile agents.
– Agent host concerns:
Malicious/unauthorized agents can misuse/destroy
system resources (e.g., worms).
– Agent concerns:
Malicious hosts can destroy or alter an agent’s logic,
( e.g., Mobile agent’s route can be altered.)
19
Security in Mobile Agent Systems
Measures:
Authentication – an agent must
authenticate itself to the host, and an agent
server must authenticate itself to the agent.
Encryption – an agent encrypts its
sensitive data.
Resource access – a host enforces strict
access control to its resources.
Current Areas of Work
mobile agent theories: Pi-calculus extensions, Mobile
Ambients, Agent Itineraries
mobile agent model: some component-based, AI-
based
mobile agent infrastructure: environment supporting
mobile agents - security, naming, domain crossing,
etc
mobile agent programming: languages, toolkits,
abstractions
mobile agent applications: mobile agent standards:
OMG’s MASIF, FIPA
Research Issues
Security: protect host from agents, protect agents
from agents, protect agents from host
Performance: if Java or Python, performance
penalties with interpretation (esp. for performance
critical applications), but not for long?
Strong mobility: move full execution state (stacks
etc), stacks not accessible with current Java?
MA management:
– how control and manage deployed agents
– issues: fault tolerance (e.g., agent fails, host
fails), recalling agents, tracking agents, servicing
agents (esp. longer living agents)

More Related Content

What's hot

Umts system architecture
Umts system architectureUmts system architecture
Umts system architectureMidhun S
 
Leaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingLeaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingVimal Dewangan
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
 
Mobile Computing (Part-1)
Mobile Computing (Part-1)Mobile Computing (Part-1)
Mobile Computing (Part-1)Ankur Kumar
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...Pallepati Vasavi
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc NetworksJagdeep Singh
 

What's hot (20)

Mobile Agent
Mobile AgentMobile Agent
Mobile Agent
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Umts system architecture
Umts system architectureUmts system architecture
Umts system architecture
 
Trends in distributed systems
Trends in distributed systemsTrends in distributed systems
Trends in distributed systems
 
Leaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingLeaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shaping
 
Wireless application protocol ppt
Wireless application protocol  pptWireless application protocol  ppt
Wireless application protocol ppt
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Google App Engine ppt
Google App Engine  pptGoogle App Engine  ppt
Google App Engine ppt
 
Mobile computing
Mobile computing Mobile computing
Mobile computing
 
Mobile Computing (Part-1)
Mobile Computing (Part-1)Mobile Computing (Part-1)
Mobile Computing (Part-1)
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
It6601 mobile computing unit 4
It6601 mobile computing unit 4It6601 mobile computing unit 4
It6601 mobile computing unit 4
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 
Bluetooth
BluetoothBluetooth
Bluetooth
 

Viewers also liked

Java card technology
Java card technologyJava card technology
Java card technologyAmol Kamble
 
PPT on Basic of Gateway
PPT on Basic of GatewayPPT on Basic of Gateway
PPT on Basic of GatewayNaveen Karn
 
Mobile Computing UNIT-8
Mobile Computing UNIT-8Mobile Computing UNIT-8
Mobile Computing UNIT-8Ramesh Babu
 
Introduction to Mobile programming(J2ME)
Introduction to Mobile programming(J2ME)Introduction to Mobile programming(J2ME)
Introduction to Mobile programming(J2ME)Wambua Wambua
 
Mobile Computing UNIT-I TO III
Mobile Computing UNIT-I TO IIIMobile Computing UNIT-I TO III
Mobile Computing UNIT-I TO IIIRamesh Babu
 

Viewers also liked (8)

Java card technology
Java card technologyJava card technology
Java card technology
 
Java card technology
Java card technologyJava card technology
Java card technology
 
PPT on Basic of Gateway
PPT on Basic of GatewayPPT on Basic of Gateway
PPT on Basic of Gateway
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
WAP 2.0
WAP 2.0WAP 2.0
WAP 2.0
 
Mobile Computing UNIT-8
Mobile Computing UNIT-8Mobile Computing UNIT-8
Mobile Computing UNIT-8
 
Introduction to Mobile programming(J2ME)
Introduction to Mobile programming(J2ME)Introduction to Mobile programming(J2ME)
Introduction to Mobile programming(J2ME)
 
Mobile Computing UNIT-I TO III
Mobile Computing UNIT-I TO IIIMobile Computing UNIT-I TO III
Mobile Computing UNIT-I TO III
 

Similar to Mobile agents

International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Middleware.pptx
Middleware.pptxMiddleware.pptx
Middleware.pptxyudragispi
 
An enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents fromAn enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents fromeSAT Publishing House
 
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...Vivek Garhewal
 
10 mobile agents
10 mobile agents10 mobile agents
10 mobile agentsAnkit Anand
 
10 mobile agents
10 mobile agents10 mobile agents
10 mobile agentsAnkit Anand
 
AULT : Agent based User simulation
AULT : Agent based User simulationAULT : Agent based User simulation
AULT : Agent based User simulationOm Narayan
 
Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mumbai Academisc
 
DEVELOPING MOBILE AGENT FOR INTRUSION DETECTION
DEVELOPING MOBILE AGENT FOR INTRUSION DETECTIONDEVELOPING MOBILE AGENT FOR INTRUSION DETECTION
DEVELOPING MOBILE AGENT FOR INTRUSION DETECTIONijcsit
 
Introduction to Offensive Security.pptx
Introduction to Offensive Security.pptxIntroduction to Offensive Security.pptx
Introduction to Offensive Security.pptxMaaitrayoDas
 
Cryptography and system security
Cryptography and system securityCryptography and system security
Cryptography and system securityGary Mendonca
 

Similar to Mobile agents (20)

Mobile Agents
Mobile AgentsMobile Agents
Mobile Agents
 
Mobile Agents
Mobile AgentsMobile Agents
Mobile Agents
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
P0704085089
P0704085089P0704085089
P0704085089
 
Middleware.pptx
Middleware.pptxMiddleware.pptx
Middleware.pptx
 
An enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents fromAn enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents from
 
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
 
10 mobile agents
10 mobile agents10 mobile agents
10 mobile agents
 
10 mobile agents
10 mobile agents10 mobile agents
10 mobile agents
 
Collcom2005 agent basedft
Collcom2005 agent basedftCollcom2005 agent basedft
Collcom2005 agent basedft
 
Introductionto agents
Introductionto agentsIntroductionto agents
Introductionto agents
 
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROLAPPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
 
AULT : Agent based User simulation
AULT : Agent based User simulationAULT : Agent based User simulation
AULT : Agent based User simulation
 
Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)
 
Agent-Based Technologies (Mobile-C) - IK
Agent-Based Technologies (Mobile-C) - IKAgent-Based Technologies (Mobile-C) - IK
Agent-Based Technologies (Mobile-C) - IK
 
DEVELOPING MOBILE AGENT FOR INTRUSION DETECTION
DEVELOPING MOBILE AGENT FOR INTRUSION DETECTIONDEVELOPING MOBILE AGENT FOR INTRUSION DETECTION
DEVELOPING MOBILE AGENT FOR INTRUSION DETECTION
 
Introduction to Offensive Security.pptx
Introduction to Offensive Security.pptxIntroduction to Offensive Security.pptx
Introduction to Offensive Security.pptx
 
Cryptography and system security
Cryptography and system securityCryptography and system security
Cryptography and system security
 
Agent-based System - Introduction
Agent-based System - IntroductionAgent-based System - Introduction
Agent-based System - Introduction
 
Agent-based System - Introduction
Agent-based System - IntroductionAgent-based System - Introduction
Agent-based System - Introduction
 

Recently uploaded

Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionSneha Padhiar
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Communityprachaibot
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfManish Kumar
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptxmohitesoham12
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptJohnWilliam111370
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Romil Mishra
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsResearcher Researcher
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 
STATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectSTATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectGayathriM270621
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSsandhya757531
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewsandhya757531
 
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxTriangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxRomil Mishra
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Coursebim.edu.pl
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdfsahilsajad201
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHSneha Padhiar
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmDeepika Walanjkar
 

Recently uploaded (20)

Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based question
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Community
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptx
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending Actuators
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 
STATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectSTATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subject
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overview
 
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxTriangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Course
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdf
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
 

Mobile agents

  • 2. 2 Mobile (transportable) agents An agent is “an independent software program, which runs on behalf of a network user”. A mobile agent is a program that, once it is launched by a user, can travel from node to node autonomously, and can continue to function even if the user is disconnected from the network.
  • 3. 3 Agent Server Agent Server Agent server File server ... A mobile agent performs work on behalf of a user as it travels to multiple locations on the network. user Database server
  • 4. What is mobile agent ? -Program that can migrate : where and how ? -Performs some processing at each host -Agent decides when and where to move next -How it Move : on just three steps *Save state *Transport *Resume
  • 5. A Mobile Agent Dissected AttributesStateCode Program inProgram in a suitablea suitable LanguageLanguage to defineto define TheThe behavior ofbehavior of AgentAgent -Set the-Set the internalinternal variablesvariables -Resume-Resume its activityits activity afterafter moving tomoving to anotheranother hosthost -info-info describingdescribing the agentthe agent -Its origin,-Its origin, ownerowner -Movement-Movement historyhistory -- AuthenticatAuthenticat ion keyion key
  • 6. 6 Advantages of Mobile Agents They allow efficient and economical use of communication channels that may have low bandwidth, high latency, and may be error- prone. They enable the use of portable, low-cost, personal communications devices to perform complex tasks even when the device is disconnected from the network. They allow asynchronous operations and true decentralization
  • 7. 7 Mobile Agent Paradigm vs. Client-Server Paradigm . . . T h e c l i e n t - s e r v e r p a r a d i g m T h e m o b i l e a g e n t p a r a d i g m c l i e n t h o s t s e r v e r h o s t h o s t A h o s t B c o m m u n ic a t io n d a t a a g e n t t r a n s p o r t a t io n
  • 8. 8 Basic Architecture An agent server process runs on each participating host. Participating hosts are networked through links that can be low-bandwidth and unreliable. An agent is a serializable object whose execution state can be frozen for transportation and reconstituted upon arrival at a remote site.
  • 9. 9 Basic Architecture a g e n t s e r v e r a g e n t s e r v e r h o s t m o b ile a g e n t
  • 10. 10 What’s in the Agent? An agent is an object, hence it contains state data and methods. Among the instance data is an itinerary of the sites to be visited, which may be dynamically constructed or adjusted. Other data may include an agent ID or other authentication data. The agent’s behavior at each stop can be pre- programmed and dynamically adjusted.
  • 11.
  • 12. Events in Mobile Agent 12  Creation: a brand new agent is born and its state is initialized.  Cloning: a twin agent is born and the current state of the original is duplicated in the clone.  Dispatch: an agent travels to a new host.  Deactivation: an agent is put to sleep and its state is saved in persistent storage.  Activation: a deactivated agent is brought back to life and its state is restored from persistent storage.
  • 13. 13  Retraction: an agent is brought back from a remote host along with its state to the home machine.  Disposal: an agent is terminated and its state is lost forever.  Communication: Notifies the agent to handle messages incoming from other agents , which is the primary means of inter-agent correspondence.
  • 14. Why mobile agent ? -They reduce the network load -they overcome network latency -they encapsulate protocols -they adapt dynamically -they execute asynchronously and autonomously -they are natural heterogeneous -they are fault tolerance
  • 16. Mobile Agents in Java A mobile agent in Java is called an “Aglet” – Light weight agent Why use Java – Platform independence! – Create once, go anywhere – Price ….. FREE TOOLKITS ( ASDK ) – Hosts can provide an environment for the aglet to execute within
  • 17. Levels of mobility Weak -when moving a mobile agent Carrier (Code + DateState) -global or instance variables -on moving , execution starts from the beginning Strong -when moving a mobile agent Carrier (Code + DateState + Execution State) -global or instance variables - Execution State :local variables and threads -on moving : execution can be continued from the point it is stopped previously
  • 18. 18 Security in Mobile Agent Systems • Security concern is the primary deterrent of deploying the mobile-agent technology. • There are concerns for both the agent hosts and the mobile agents. – Agent host concerns: Malicious/unauthorized agents can misuse/destroy system resources (e.g., worms). – Agent concerns: Malicious hosts can destroy or alter an agent’s logic, ( e.g., Mobile agent’s route can be altered.)
  • 19. 19 Security in Mobile Agent Systems Measures: Authentication – an agent must authenticate itself to the host, and an agent server must authenticate itself to the agent. Encryption – an agent encrypts its sensitive data. Resource access – a host enforces strict access control to its resources.
  • 20. Current Areas of Work mobile agent theories: Pi-calculus extensions, Mobile Ambients, Agent Itineraries mobile agent model: some component-based, AI- based mobile agent infrastructure: environment supporting mobile agents - security, naming, domain crossing, etc mobile agent programming: languages, toolkits, abstractions mobile agent applications: mobile agent standards: OMG’s MASIF, FIPA
  • 21. Research Issues Security: protect host from agents, protect agents from agents, protect agents from host Performance: if Java or Python, performance penalties with interpretation (esp. for performance critical applications), but not for long? Strong mobility: move full execution state (stacks etc), stacks not accessible with current Java? MA management: – how control and manage deployed agents – issues: fault tolerance (e.g., agent fails, host fails), recalling agents, tracking agents, servicing agents (esp. longer living agents)