이동 에이전트 시스템을 위한 효율적인 중복 프로토콜

Efficient Replication Protocols for Mobile Agent Systems

  • 발행 : 2006.12.15

초록

본 논문에서는 각 중복서비스의 수행형태가 결정적이냐 비결정적이냐에 따라 알맞은 수동형중복 프로토콜을 적용함으로써 이동 에이전트 시스템에서 중복 서비스의 결함포용성과 확장성을 향상시키는 새로운 전략을 제안한다. 이러한 목적을 위해 두 개의 수동형 중복 프로토콜들인 PRPNS과 PRPDS를 각각 비결정적 중복 서비스와 결정적 중복 서비스를 위해 설계한다. 이 두 프로토콜들은 모두 방문 이동 에이전트들이 반드시 주 서비스 에이전트만이 아니라 보조 서비스 에이전트를 수행하는 임의의 노드로 전달되어 수행될 수 있도록 한다. 특히, 프로토콜 PRPDS는 임의의 보조 서비스 에이전트가 이동 에이전트 요구 메시지를 수신하고, 주 서비스 에이전트로부터 그 요구 메시지의 전달 일련번호를 얻은 후에, 그 보조 서비스 에이전트가 해당 요구 메시지를 처리하고 다른 중복 서비스 에이전트들과의 조정역할을 할 수 있도록 한다. 따라서, 이 두 프로토콜들을 사용하는 본 논문의 전략은 이동 에이전트 시스템에서 매우 많은 수의 이동 에이전트들이 동시에 접근하고자 하는 중복서비스의 높은 확장성을 보장할 수 있다. 본 시뮬레이션 결과는 제안된 전략이 기존의 수동형 중복프로토콜만을 사용하는 전략에 비해 매우 향상된 성능을 발휘한다는 것을 보여준다.

In this paper, we propose a strategy to improve fault-tolerance and scalability of replicated services in mobile agent systems by applying an appropriate passive replication protocol for each replicated service according to whether the service is deterministic or non-deterministic. For this purpose, two passive replication protocols, PRPNS and PRPDS, are designed for non-deterministic and deterministic services respectively. They both allow visiting mobile agents to be forwarded to and execute their tasks on any node performing a service agent, not necessarily the primary agent. Especially, in the protocol PRPDS, after a backup service agent has received each mobile agent request and obtained its delivery sequence number from the primary service agent, the backup is responsible for processing the request and coordinating with the other replica service agents. Therefore, our strategy using the two proposed protocols can promise high scalability of replicated services a large number of mobile agents attempt to access in mobile agent systems. Our simulation results show that the proposed strategy performs much better than the one using only the traditional passive replication protocol.

키워드

참고문헌

  1. Pleisch, S. and Schiper, A, 'Fault-Tolerant Mobile Agent Execution,' IEEE Transactions on Compu-ters, Vol.52, No.2, pp. 209-222, 2003 https://doi.org/10.1109/TC.2003.1176987
  2. Rothermel, K. and Strasser, M., 'A Fault-Tolerant Protocol for Providing the Exactly-Once Property of Mobile Agents,' Proc. of the 17th IEEE Symposium on Reliable Distributed Systems, pp. 100-108, 1998 https://doi.org/10.1109/RELDIS.1998.740480
  3. Picco, G., 'Mobile Agents: An Introduction,' Journal of Microprocessors and Microsystems, Vol.25, No.2, pp. 65-74, April 2001 https://doi.org/10.1016/S0141-9331(01)00099-0
  4. Li. Z. and Parashar, M., 'A Decentralized Agent Framework for Dynamic Composition and Coordination for Autonomic Applications,' Proc. of the 3rd International Workshop on Self-Adaptive and Autonomic Computing Systems, Copenhagen, Denmark, pp. 165-169, August 2005. https://doi.org/10.1109/DEXA.2005.10
  5. Curino, C., Giani, M., Giorgetta, M., Giusti, A, Murphy, A. and Picco, G., 'Mobile Data Collection in Sensor Networks: The TinyLime Middleware,' Journal of Pervasive and Mobile Computing, Vol.4, No.1, pp. 446-469, December 2005 https://doi.org/10.1016/j.pmcj.2005.08.003
  6. Fukuda, M., Kashiwagi, K., Kobayashi, S., 'AgentTeamwork: Coordinating Grid-Computing Jobs with Mobile Agents,' In Special Issue on Agent-Based Grid Computing, International Jour-nal of Applied Intelligence, to appear in 2006 https://doi.org/10.1007/s10489-006-9653-6
  7. Guerraoui, R. and Schiper, A, 'Software-Based Replication for Fault Tolerance,' IEEE Computer, Vol.30, pp. 68-74, 1997 https://doi.org/10.1109/2.585156
  8. Marchetti, C., Piergiovanni, S. and Baldoni, R., 'A Three-tier Active Replication Protocol for Large Scale Distributed Systems,' IEICE TRANSAC-TIONS on Information and Systems Vol.E86-D, No.12, pp.2544-2552, Dec. 2003
  9. Schneider, F., 'Implementing fault-tolerant services using the state machine approach: A tutorial,' ACM Computing Surveys, Vol.22, pp. 299-319, 1990 https://doi.org/10.1145/98163.98167
  10. Budhiraja, N., Marzullo, K., Schneider, F. and Toueg, S., Distributed Systems, 2nd Ed., pp, 199-216, Addison-Wesley, 1993
  11. Defago, X. and Schiper, A., 'Semi-passive Repli-cation and Lazy Consensus,' Journal of Parallel and Distributed Computing Systems, Vol.64, No.12, pp.1380-1398, 2004 https://doi.org/10.1016/j.jpdc.2004.08.006
  12. Fischer, M. J., Lynch, N. A. and Paterson, M. S., 'Impossibility of distributed consensus with one faulty process,' Journal of ACM, Vol.32, pp. 374-382, 1985 https://doi.org/10.1145/3149.214121
  13. Chandra, T. D. and Toueg, S., 'Unreliable failure detectors for reliable distributed systems,' Journal of ACM, Vol.43, No.2, pp. 225-267, 1996 https://doi.org/10.1145/226643.226647
  14. Schlichting, R. D. and Schneider, F. B., 'Fail-stop processors: an approach to designing fault-tolerant distributed computing systems,' ACM Transactions on Computer Systems, Vol.1, pp. 222-238, 1985 https://doi.org/10.1145/357369.357371
  15. Schiper, A. and Sandoz, A., 'Uniform reliable multicast in a virtually synchronous environment,' In Proc. of the 13rd International Conference on Distributed Computing Systems, pp. 561-568, 1993 https://doi.org/10.1109/ICDCS.1993.287667
  16. Bagrodia, R., Meyer, R., Takai, M., Chen, Y., Zeng, X., Martin, J. and Song, H. Y., 'Parsec: A Parallel Simulation Environment for Complex Systems,' IEEE Computer, pp. 77-85, 1998 https://doi.org/10.1109/2.722293
  17. Powell, D., Chereque, M. and Drackley, D., 'Fault-tolerance in Delta-4,' ACM Operating Systems Review, Vol.25, pp. 122-125, 1991 https://doi.org/10.1145/122120.122137
  18. Birman, K. P., Joseph, T. A., Raeuchle, T. and Abbadi, A. E., 'Implementing fault-tolerant distri-buted objects,' IEEE Transactions on Software Engineering, Vol.11, No.6, pp. 502-528, 1985 https://doi.org/10.1109/TSE.1985.232242
  19. Bryhni, H., Klovning, E. and Kure, O., 'A Com-parison of Load Balancing Techniques for Scalable Web Servers,' IEEE Network, Vol.14, pp. 58-64, 2000 https://doi.org/10.1109/65.855480
  20. Yueming, L., Yuefeng, J., Wenjie, W., Aibo, L., 'Design and Implementation of a Secure Execution Environment for the Mobile Agent,' In Proc. of the International e-Conference on Computer Science, appear in July 2006
  21. Jansen, W., 'Countermeasures for mobile agent security,' Computer Communications, Vol.23, No.17, pp. 1667-1676, Nov. 2000 https://doi.org/10.1016/S0140-3664(00)00253-X
  22. Claessens, J., Preneel, B., Vandewalle, J., '(How) can mobile agents do secure electronic trans-actions on untrusted hosts? A survey of the security issues and the current solutions,' ACM Transactions on Internet Technology, Vol.3, No.1, pp. 28-48, Feb. 2003 https://doi.org/10.1145/643477.643479