• Title/Summary/Keyword: mobile agent

Search Result 876, Processing Time 0.027 seconds

Design of Mobile Agent Model Supporting the Intelligent Path Search (지능형 경로 탐색 이동 에아전트 모델 설계)

  • Ko, Hyun;Kim, Kwang-Jong;Lee, Yon-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.7
    • /
    • pp.993-1000
    • /
    • 2002
  • In this paper, we design the CORBA-based Mobile Agent Model (CMAM) which has the capability of the efficient work processing in distributed environment through sensing network traffic and searching the optimal path for migration nodes of mobile agent. In case existing mobile agent model is given various works from user, the network overhead and traffic are increased by increasing of execution module size. Also, if it happens a large quantity of traffics due to migration of nodes according to appointment of the passive host(below node) routing schedule by user, it needs much cost for node search time by traffic. Therefore, in this paper, we design a new mobile agent m()del that assures the reliability of agent's migration through dynamic act on the specific situation according to appointment of the active routing schedule and can minimize agent's work processing time through optimal path search. The proposed model assigns routing schedule of the migration nodes actively using an extended MAFFinder. Also, for decreasing overhead of network by agent's size, it separates the existing mobile agent object by mobile agent including only agent calling module and push agent with work executing module based on distributed object type of CORBA. Also, it reduces the required time for round works of mobile agent through the optimal path search of migration nodes.

Mobility Management Scheme Using Efficient Relay Agent in Nested Mobile Networks (중첩된 이동망에서 효율적 릴레이 에이전트를 사용하는 이동성 관리 기법)

  • 이재걸;홍충선;이재조
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.10A
    • /
    • pp.796-806
    • /
    • 2003
  • Mobile Node usually communicate with CN bia only it's own HA but Nested Mobile Networks correspond with CN bia all HA involved with them. when Mobile Network of a MR moves from its home link to a foreign link in the stationary network. then Mobile Network of another MR moves from its home link in stationary network to foreign link in previous mobile network. CN send Packet destined to the latter MR via both Home Agent of the former MR and the latter MR. There are two problem in this scenario. One is inefficient routing path that bypass via several HA. the other is waste of transmission resource and delay of Registration process which change of Nested Mobile Network Architecture cause Mobile Router. so We propose MRA(Mobile Relay Agent) to support effective routing by local mobility management.

A Study on Improving the Migration Performance of Mobile Agent using Integrated Security Manager (통합 보안 관리자를 이용한 이동 에이전트 이주 성능 향상 연구)

  • You, Eung-Gu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.5
    • /
    • pp.57-64
    • /
    • 2007
  • Mobile Agent has been known that it is an efficient communication paradigm for distributed applications and that a mobile agent provides higher flexibility and performance than existing communication paradigms. Despite these benefits, mobile agent is not used widely in the market because it is very vulnerable to a variety of attacks. To be applied to develop distributed applications, a mobile agent paradigm must consider both security and performance. In this paper, we propose and evaluate an improving method of a migration performance for a mobile agent model using ISM(Integrated Security Manager), which provides high-level security services and travel plan guide. In the proposed method. ISM offers the travel plan guide service which replies the accumulated results when a mobile agent has executed all migration plans related the trusted domain to be managed by ISM. Our method improved about $33{\sim}82%$ of total execution time than the existing method.

  • PDF

Design of the Workflow Interoperability System Using Mobile Agent (이동 에이전트를 이용한 워크플로우 상호운영시스템 설계)

  • 김선호;전수련
    • The Journal of Society for e-Business Studies
    • /
    • v.9 no.1
    • /
    • pp.197-208
    • /
    • 2004
  • As the structure of an enterprise becomes complicated and distributed, the interoperability between workflow systems for the process automation among partners or departments is rising as an important issue. For the interoperability between workflow systems, we propose a data exchange scenario based on mobile agents. The scenario includes sequence diagrams and methods defined by UML. The mobile agents are designed based on the mobile agent standard, MASIF, developed by OMG. In order to prove the applicability of the mobile agent technology to workflow interoperability, we have developed a prototype function which creates and transfers mobile agents.

  • PDF

Scalability of a Mobile Agents based Network Management Application

  • Rubinstein, M.G.;Duarte, O.C.M.B.;Pujolle, Guy
    • Journal of Communications and Networks
    • /
    • v.5 no.3
    • /
    • pp.240-248
    • /
    • 2003
  • This paper analyzes mobile agent performance in network management compared to the client-server model used in the Simple Network Management Protocol (SNMP). Prototypes of an application that gathers MIB-II (Management Information Base-II) variables have been created and tested on a LAN. After acquiring implementation parameters related to network management and to the mobile agent infrastructure, simulation results have been obtained on large topologies similar in shape to the Internet. Response time results show that mobile agents perform better than SNMP when the number of managed elements ranges between two specific limits, an inferior bound and a superior one, determined by the number of messages that pass through a backbone and by the mobile agent size which grows along with MIB-II variables collected on network elements. The results also show that a significant improvement is achieved when the mobile agent returns or sends data to the management station after visiting a fixed number of nodes.

Efficient Replication Protocols for Mobile Agent Systems (이동 에이전트 시스템을 위한 효율적인 중복 프로토콜)

  • Ahn, Jin-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.12
    • /
    • pp.907-917
    • /
    • 2006
  • In this paper, we propose a strategy to improve fault-tolerance and scalability of replicated services in mobile agent systems by applying an appropriate passive replication protocol for each replicated service according to whether the service is deterministic or non-deterministic. For this purpose, two passive replication protocols, PRPNS and PRPDS, are designed for non-deterministic and deterministic services respectively. They both allow visiting mobile agents to be forwarded to and execute their tasks on any node performing a service agent, not necessarily the primary agent. Especially, in the protocol PRPDS, after a backup service agent has received each mobile agent request and obtained its delivery sequence number from the primary service agent, the backup is responsible for processing the request and coordinating with the other replica service agents. Therefore, our strategy using the two proposed protocols can promise high scalability of replicated services a large number of mobile agents attempt to access in mobile agent systems. Our simulation results show that the proposed strategy performs much better than the one using only the traditional passive replication protocol.

A Structure of Users이 Context-Awareness and Service processing based P2P Mobile Agent using Collaborative Filtering (협력적 필터링 기법을 이용한 P2P 모바일 에이전트 기반 사용자 컨텍스트 인식 및 서비스 처리 구조)

  • Yun Hyo-Gun;Lee Sang-Yong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.1
    • /
    • pp.104-109
    • /
    • 2005
  • Context-awareness is an important element that can provide service of good quality according to users' surrounding environment and status in ubiquitous computing environment. Information gathering tools for context-awareness use small size mobile devices which have easy movement and a mobile agent in mobile device. Now, Mobile agents are consuming much times and expense to collect and recognize each users' context information. Therefore, needs research about structure for users' context information awareness in early time to reduce mobile agent's load. This paper proposes a P2P mobile agent structure that mikes filtering techniques and a P2P agent in mobile agent. The proposed structure analyzes each user's context information in same area, and groups users who have similar preference degree. Grouped users share information using a P2P mobile agent. Also this structure observes and learns to continue on users' action and service, and measures new interrelation.

Development of Personal Information Protection Model using a Mobile Agent

  • Bae, Seong-Hee;Kim, Jae-Joon
    • Journal of Information Processing Systems
    • /
    • v.6 no.2
    • /
    • pp.185-196
    • /
    • 2010
  • This paper proposes a personal information protection model that allows a user to regulate his or her own personal information and privacy protection policies to receive services provided by a service provider without having to reveal personal information in a way that the user is opposed to. When the user needs to receive a service that requires personal information, the user will only reveal personal information that they find acceptable and for uses that they agree with. Users receive desired services from the service provider only when there is agreement between the user's and the service provider's security policies. Moreover, the proposed model utilizes a mobile agent that is transmitted from the user's personal space, providing the user with complete control over their privacy protection. In addition, the mobile agent is itself a self-destructing program that eliminates the possibility of personal information being leaked. The mobile agent described in this paper allows users to truly control access to their personal information.

A Framework of Agent Protection Protocol for Secure Execution of Mobile Agent

  • Jung, Chang-Ryul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.2
    • /
    • pp.371-378
    • /
    • 2004
  • As an agent is applied into various fields, it is suggested as the paradigm of new application technology in the area of computer communication. However, the mobile agent brines the problem of security on an agent due to mobility. This study proposals the mobile agent protection protocol framework for more effective protection and safety. The designed Framework of protocol uses the public ky, the private key and the digital signature in PKI environment based on JAVA. This is the mechanism accomplishing safely the work of an agent by tracking the pattern of execution and the mobility plan through the VS(verification server). This also secures the suity and the flawlessness of an agent through the VS guaranteeing safety from malicious attacks.

A Study on an Overload Control Scheme for Intelligent Networks Based on Mobile Agent Technology (지능망에서의 이동 에이전트를 이용한 과부하제어 메커니즘에 관한 연구)

  • 이광현;박승균;박주희;오영환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.7C
    • /
    • pp.696-703
    • /
    • 2002
  • In traditional approaches to IN load control, there has been a focus on the protection of individual SCPs. On the other hand, the load control of network level can be achieved by using a mobile agent technology, which is a software element responsible for moving from one system to another and performing their task. In this thesis, we propose an mobile agent mechanism and two mobile agent migration procedures and analyze the performance of the Call Gapping mechanism and the mobile agent mechanism. The mobile agent mechanism showed that the SCP load control rate and attempt the number of attempted call failure were better than those of Call Gapping mechanism. Also, the amount of SS NO.7 traffics was reduced in the case of an overload condition.