SlideShare a Scribd company logo
1 of 26
PRESENTED BY:
ABDALLA ELAOGALI
Mobile Agents
THE LIBYAN ACADEMY
COMPUTER SCIENCE
Agent Systems
Fall 2013
Outline
Introduction
What are Agents?
What is a Mobile Agent
Static and Mobile Agent
More about Mobile Agents
Why use Mobile Agents?
Working of Mobile Agents
The life cycle of a Mobile Agen
Outline - cont
Agent Migration Strategies
oStrong Migration
oWeak Migration
Properties of Mobile Agents
Agent Communication Strategies
Applications of Mobile Agents
Advantages of Mobile Agents
Disadvantages of Mobile Agents
Security Issues
Conclusions
References
What are Agents?
The concept of agents is not an unfamiliar one. The
precepts of agent technology have existed in many
of the applications we use today and take for
granted. For example, your e-mail client.
Recently, intelligent agents have come to vogue.
One of the most interesting and much vaunted
category of agents is mobile agents.
Anand Tripathi, University of Minnesota
5
Mobile Agents
A mobile agent is an object capable of autonomously
migrating from one host to another in a distributed
system to perform actions on behalf of its creator.
Client
agent
(code+data)
Mobile Agent
Server 1
Server 3 Server 2
Static and Mobile Agents
Static agents achieve their goal by executing on a
single machine.
mobile agents migrate from one computer to another
in the network and execute on several machines.
Mobility increases the functionality of the mobile
agent and allows the mobile agent to perform tasks
beyond the scope of static agents.
Figure 1
More about Mobile Agents
A mobile agent is an active object that can move both
data and functionality (code) to multiple places
within a distributed system.
A mobile agent should be able to execute on any
machine within a network, regardless of the
processor type or operating system.
Figure 1
Why use Mobile Agents?
User passivity/data timeliness
Multi-staged/multi-processed calculations
Untrusted collaborators
Low-reliability/partially-disconnected networks
Figure 1
Working of Mobile Agents
A mobile agent consists of the program code and the
program execution.
Initially a mobile agent resides on a computer called
the home machine.
The agent is then dispatched to execute on a remote
computer called a mobile agent host.
The life cycle of a Mobile Agent
• Creation: a brand new agent is born and its state is
initialized.
• Dispatch: an agent travels to a new host.
• Cloning: a twin agent is born and the current state
of the original is duplicated in the clone.
• Deactivation: an agent is put to sleep and its state
is saved in persistent storage.
• Activation: a deactivated agent is brought back to
life and its state is restored from persistent storage.
Cont,
• Retraction: an agent is brought back from a
remote host along with its state to the home
machine.
• Disposal: an agent is terminated and its state is
lost forever.
• Communication: Notifies the agent to handle
messages incoming from other agents , which
is the primary means of inter-agent
correspondence.
Agent Migration Strategies
Strong Migration
The code, data and execution state are migrated to
the next host.
Weak Migration
Involves only the migration of the code and data
state of the mobile agent.
Properties of Mobile Agents
Adaptive Learning
Mobile agents can learn from experiences and
adapt themselves to the environment
Autonomy
Mobile agents can take some decisions on its own.
Mobility
Mobile agents have the ability to move from one
host to another in the network.
Agent Communication Strategies
a mobile agent should interacts and cooperates with
others.
To communicate with a remote mobile agent:
owe must find the location of the agent and route the
message to it.
oA naming scheme is needed to identify agents in a
unique fashion.
oOne mechanism such as message passing, streams,
events, proxies, blackboard mechanism and CORBA
as a communication protocol.
Applications of Mobile Agents
Mobile Agents are suitable for the following applications
Parallel Computing.
Data Collection .
E-commerce.
Mobile Computing.
Advantages of Mobile Agents
 Reduction in bandwidth usage.
 Reduce total time.
 Reduce Latency.
 Disconnected Operation.
 Load Balancing.
 Dynamic Deployment.
Reduction in bandwidth usage
Dataset
Dataset
Dataset
Dynamicall
y selected
proxy site
Merged and
filtered data
stream
Server
Dataset
Proxy
Proxy
Server
Dataset
Reduction in bandwidth usage
cont,
Overcome total time
Dataset
Dataset
Dataset
Fact
• Sending an agent avoids remote interaction.
Goal
• Avoiding remote interaction leads to faster completion
times.
Current Systems
• Do not meet the goal in all network environments
• Tradeoff: Local interaction vs. interpretive overhead
Reduction in latency
Sumatra chat server
[RASS97]
1. Observe
high average
latency to
clients
2. Move to
better location
2 to 4 times
smaller latency
in trial runs
Disconnected Operation
Dataset
Dataset
Dataset
Dynamicall
y selected
proxy site
X
Agent continues its task even
if the link to its home
machine goes down
(temporarily).
Load Balancing
Machine A Machine B
Machine A Machine B
Agent moves to
balance load
Dynamic Deployment
Dataset
Dataset
Disadvantages of Mobile Agents
The main drawback of mobile agents is the security
risk involved in using mobile agents.
Security risks in a mobile computing environment
are twofold.
Conclusions
Distributed computing involving several computers
in a network can be achieved using message passing
or remote procedure calls (RPC).
References
Strategies of Mobile Agent for Handling a
Task.ISSN: 2277-3754 ISO 9001:2008 Certified
International Journal of Engineering and Innovative
Technology (IJEIT) Volume 2, Issue 1, July 2012 244
Cornell University, Department of Computer
Science.
http://www.cs.cornell.edu
WIKIPEDIA The Free Encyclopedia
http://en.wikipedia.org/wiki/Mobile_agent
Mole - Concepts of a Mobile Agent System
Dipl.-Inform. J. Baumann, Dipl.-Inform. F. Hohl, Prof. Dr.
K. Rothermel, Dipl.-Inform. M. Straßer
Security Issues in Mobile Code Systems
David M. Chess
http://klynch.com/documents/agents/#Refs

More Related Content

Viewers also liked

Jordan Transcript- sscrubbed
Jordan Transcript- sscrubbedJordan Transcript- sscrubbed
Jordan Transcript- sscrubbedJerry Jordan
 
KlientBoost and Wishpond Present: Website Popups [infographic]
KlientBoost and Wishpond Present: Website Popups [infographic]KlientBoost and Wishpond Present: Website Popups [infographic]
KlientBoost and Wishpond Present: Website Popups [infographic]KlientBoost
 
методика проведения круглого стола
методика проведения круглого столаметодика проведения круглого стола
методика проведения круглого столаalena2277
 
10 Food Myths that Are Keeping You Overweight
10 Food Myths that Are Keeping You Overweight10 Food Myths that Are Keeping You Overweight
10 Food Myths that Are Keeping You OverweightSerfronya Wallace
 
IMPERIAL COMPANY PRESENTATION
IMPERIAL COMPANY PRESENTATIONIMPERIAL COMPANY PRESENTATION
IMPERIAL COMPANY PRESENTATIONIrhan Nisametdin
 
Grupo Faro Desarrollos Inmobiliarios
Grupo Faro  Desarrollos InmobiliariosGrupo Faro  Desarrollos Inmobiliarios
Grupo Faro Desarrollos InmobiliariosJorge Rojas
 
Modal asing luar negri
Modal asing luar negriModal asing luar negri
Modal asing luar negriabdul ajid
 
ابحاث د.لطفي حامد مدكور
ابحاث د.لطفي حامد مدكورابحاث د.لطفي حامد مدكور
ابحاث د.لطفي حامد مدكورAl Baha University
 
Presenacion las plantas y sus propiedade medicinales
Presenacion las plantas y sus propiedade medicinalesPresenacion las plantas y sus propiedade medicinales
Presenacion las plantas y sus propiedade medicinalesAngeles Molina López
 

Viewers also liked (11)

Jordan Transcript- sscrubbed
Jordan Transcript- sscrubbedJordan Transcript- sscrubbed
Jordan Transcript- sscrubbed
 
KlientBoost and Wishpond Present: Website Popups [infographic]
KlientBoost and Wishpond Present: Website Popups [infographic]KlientBoost and Wishpond Present: Website Popups [infographic]
KlientBoost and Wishpond Present: Website Popups [infographic]
 
методика проведения круглого стола
методика проведения круглого столаметодика проведения круглого стола
методика проведения круглого стола
 
10 Food Myths that Are Keeping You Overweight
10 Food Myths that Are Keeping You Overweight10 Food Myths that Are Keeping You Overweight
10 Food Myths that Are Keeping You Overweight
 
hamesh CV New
hamesh CV Newhamesh CV New
hamesh CV New
 
IMPERIAL COMPANY PRESENTATION
IMPERIAL COMPANY PRESENTATIONIMPERIAL COMPANY PRESENTATION
IMPERIAL COMPANY PRESENTATION
 
Grupo Faro Desarrollos Inmobiliarios
Grupo Faro  Desarrollos InmobiliariosGrupo Faro  Desarrollos Inmobiliarios
Grupo Faro Desarrollos Inmobiliarios
 
Modal asing luar negri
Modal asing luar negriModal asing luar negri
Modal asing luar negri
 
Portales educativos para exponer
Portales educativos para exponerPortales educativos para exponer
Portales educativos para exponer
 
ابحاث د.لطفي حامد مدكور
ابحاث د.لطفي حامد مدكورابحاث د.لطفي حامد مدكور
ابحاث د.لطفي حامد مدكور
 
Presenacion las plantas y sus propiedade medicinales
Presenacion las plantas y sus propiedade medicinalesPresenacion las plantas y sus propiedade medicinales
Presenacion las plantas y sus propiedade medicinales
 

Similar to Mobile Agents

10 mobile agents
10 mobile agents10 mobile agents
10 mobile agentsAnkit Anand
 
10 mobile agents
10 mobile agents10 mobile agents
10 mobile agentsAnkit Anand
 
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...Vivek Garhewal
 
Middleware.pptx
Middleware.pptxMiddleware.pptx
Middleware.pptxyudragispi
 
Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mumbai Academisc
 
Mobile Apps Performance Testing Using Open Source Tool JMeter
Mobile Apps Performance Testing Using Open Source Tool JMeterMobile Apps Performance Testing Using Open Source Tool JMeter
Mobile Apps Performance Testing Using Open Source Tool JMeterDevendra Singh
 
User Profiling and Technology
User Profiling and TechnologyUser Profiling and Technology
User Profiling and TechnologyJonathan Daniels
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Network Robots - Abhijeet
Network Robots - AbhijeetNetwork Robots - Abhijeet
Network Robots - AbhijeetAbhijeet Kalsi
 
Collation of Mobile operatives
Collation of Mobile operativesCollation of Mobile operatives
Collation of Mobile operativesIJERA Editor
 
Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureDetect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureeSAT Publishing House
 
Distributed Objects and Remote Invocation
Distributed Objects and Remote InvocationDistributed Objects and Remote Invocation
Distributed Objects and Remote InvocationMedicaps University
 
An enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents fromAn enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents fromeSAT Publishing House
 
Comodo my dlp_techpresentation_060615_v3
Comodo my dlp_techpresentation_060615_v3Comodo my dlp_techpresentation_060615_v3
Comodo my dlp_techpresentation_060615_v3Truong Minh Yen
 

Similar to Mobile Agents (20)

P0704085089
P0704085089P0704085089
P0704085089
 
10 mobile agents
10 mobile agents10 mobile agents
10 mobile agents
 
10 mobile agents
10 mobile agents10 mobile agents
10 mobile agents
 
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
Examination of Technologies(Bluetooth, WiFi &WiMax) related to data streaming...
 
Middleware.pptx
Middleware.pptxMiddleware.pptx
Middleware.pptx
 
Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)
 
Mobile Apps Performance Testing Using Open Source Tool JMeter
Mobile Apps Performance Testing Using Open Source Tool JMeterMobile Apps Performance Testing Using Open Source Tool JMeter
Mobile Apps Performance Testing Using Open Source Tool JMeter
 
Agent-Based Technologies (Mobile-C) - IK
Agent-Based Technologies (Mobile-C) - IKAgent-Based Technologies (Mobile-C) - IK
Agent-Based Technologies (Mobile-C) - IK
 
Introductionto agents
Introductionto agentsIntroductionto agents
Introductionto agents
 
User Profiling and Technology
User Profiling and TechnologyUser Profiling and Technology
User Profiling and Technology
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
395 401
395 401395 401
395 401
 
Network Robots - Abhijeet
Network Robots - AbhijeetNetwork Robots - Abhijeet
Network Robots - Abhijeet
 
Collation of Mobile operatives
Collation of Mobile operativesCollation of Mobile operatives
Collation of Mobile operatives
 
Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureDetect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructure
 
Ao03302460251
Ao03302460251Ao03302460251
Ao03302460251
 
Distributed Objects and Remote Invocation
Distributed Objects and Remote InvocationDistributed Objects and Remote Invocation
Distributed Objects and Remote Invocation
 
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROLAPPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
 
An enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents fromAn enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents from
 
Comodo my dlp_techpresentation_060615_v3
Comodo my dlp_techpresentation_060615_v3Comodo my dlp_techpresentation_060615_v3
Comodo my dlp_techpresentation_060615_v3
 

Recently uploaded

英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
How To Manage Restaurant Staff -BTRESTRO
How To Manage Restaurant Staff -BTRESTROHow To Manage Restaurant Staff -BTRESTRO
How To Manage Restaurant Staff -BTRESTROmotivationalword821
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf31events.com
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentationvaddepallysandeep122
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Rob Geurden
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfYashikaSharma391629
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identityteam-WIBU
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZABSYZ Inc
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Angel Borroy López
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Developmentvyaparkranti
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 

Recently uploaded (20)

英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
How To Manage Restaurant Staff -BTRESTRO
How To Manage Restaurant Staff -BTRESTROHow To Manage Restaurant Staff -BTRESTRO
How To Manage Restaurant Staff -BTRESTRO
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentation
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZ
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Development
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 

Mobile Agents

  • 1. PRESENTED BY: ABDALLA ELAOGALI Mobile Agents THE LIBYAN ACADEMY COMPUTER SCIENCE Agent Systems Fall 2013
  • 2. Outline Introduction What are Agents? What is a Mobile Agent Static and Mobile Agent More about Mobile Agents Why use Mobile Agents? Working of Mobile Agents The life cycle of a Mobile Agen
  • 3. Outline - cont Agent Migration Strategies oStrong Migration oWeak Migration Properties of Mobile Agents Agent Communication Strategies Applications of Mobile Agents Advantages of Mobile Agents Disadvantages of Mobile Agents Security Issues Conclusions References
  • 4. What are Agents? The concept of agents is not an unfamiliar one. The precepts of agent technology have existed in many of the applications we use today and take for granted. For example, your e-mail client. Recently, intelligent agents have come to vogue. One of the most interesting and much vaunted category of agents is mobile agents.
  • 5. Anand Tripathi, University of Minnesota 5 Mobile Agents A mobile agent is an object capable of autonomously migrating from one host to another in a distributed system to perform actions on behalf of its creator. Client agent (code+data) Mobile Agent Server 1 Server 3 Server 2
  • 6. Static and Mobile Agents Static agents achieve their goal by executing on a single machine. mobile agents migrate from one computer to another in the network and execute on several machines. Mobility increases the functionality of the mobile agent and allows the mobile agent to perform tasks beyond the scope of static agents. Figure 1
  • 7. More about Mobile Agents A mobile agent is an active object that can move both data and functionality (code) to multiple places within a distributed system. A mobile agent should be able to execute on any machine within a network, regardless of the processor type or operating system. Figure 1
  • 8. Why use Mobile Agents? User passivity/data timeliness Multi-staged/multi-processed calculations Untrusted collaborators Low-reliability/partially-disconnected networks Figure 1
  • 9. Working of Mobile Agents A mobile agent consists of the program code and the program execution. Initially a mobile agent resides on a computer called the home machine. The agent is then dispatched to execute on a remote computer called a mobile agent host.
  • 10. The life cycle of a Mobile Agent • Creation: a brand new agent is born and its state is initialized. • Dispatch: an agent travels to a new host. • Cloning: a twin agent is born and the current state of the original is duplicated in the clone. • Deactivation: an agent is put to sleep and its state is saved in persistent storage. • Activation: a deactivated agent is brought back to life and its state is restored from persistent storage.
  • 11. Cont, • Retraction: an agent is brought back from a remote host along with its state to the home machine. • Disposal: an agent is terminated and its state is lost forever. • Communication: Notifies the agent to handle messages incoming from other agents , which is the primary means of inter-agent correspondence.
  • 12. Agent Migration Strategies Strong Migration The code, data and execution state are migrated to the next host. Weak Migration Involves only the migration of the code and data state of the mobile agent.
  • 13. Properties of Mobile Agents Adaptive Learning Mobile agents can learn from experiences and adapt themselves to the environment Autonomy Mobile agents can take some decisions on its own. Mobility Mobile agents have the ability to move from one host to another in the network.
  • 14. Agent Communication Strategies a mobile agent should interacts and cooperates with others. To communicate with a remote mobile agent: owe must find the location of the agent and route the message to it. oA naming scheme is needed to identify agents in a unique fashion. oOne mechanism such as message passing, streams, events, proxies, blackboard mechanism and CORBA as a communication protocol.
  • 15. Applications of Mobile Agents Mobile Agents are suitable for the following applications Parallel Computing. Data Collection . E-commerce. Mobile Computing.
  • 16. Advantages of Mobile Agents  Reduction in bandwidth usage.  Reduce total time.  Reduce Latency.  Disconnected Operation.  Load Balancing.  Dynamic Deployment.
  • 17. Reduction in bandwidth usage Dataset Dataset Dataset Dynamicall y selected proxy site Merged and filtered data stream
  • 19. Overcome total time Dataset Dataset Dataset Fact • Sending an agent avoids remote interaction. Goal • Avoiding remote interaction leads to faster completion times. Current Systems • Do not meet the goal in all network environments • Tradeoff: Local interaction vs. interpretive overhead
  • 20. Reduction in latency Sumatra chat server [RASS97] 1. Observe high average latency to clients 2. Move to better location 2 to 4 times smaller latency in trial runs
  • 21. Disconnected Operation Dataset Dataset Dataset Dynamicall y selected proxy site X Agent continues its task even if the link to its home machine goes down (temporarily).
  • 22. Load Balancing Machine A Machine B Machine A Machine B Agent moves to balance load
  • 24. Disadvantages of Mobile Agents The main drawback of mobile agents is the security risk involved in using mobile agents. Security risks in a mobile computing environment are twofold.
  • 25. Conclusions Distributed computing involving several computers in a network can be achieved using message passing or remote procedure calls (RPC).
  • 26. References Strategies of Mobile Agent for Handling a Task.ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 1, July 2012 244 Cornell University, Department of Computer Science. http://www.cs.cornell.edu WIKIPEDIA The Free Encyclopedia http://en.wikipedia.org/wiki/Mobile_agent Mole - Concepts of a Mobile Agent System Dipl.-Inform. J. Baumann, Dipl.-Inform. F. Hohl, Prof. Dr. K. Rothermel, Dipl.-Inform. M. Straßer Security Issues in Mobile Code Systems David M. Chess http://klynch.com/documents/agents/#Refs