Mobile Agent PDF
Mobile Agent PDF
1
Outline
• Introduction to Mobile Agent(MA)
• Introduction to Mobile Agent
System(MAS)
• Some issues of Mobile Agent
• Mobile Agent application
• Concluding remarks
2
What is mobile agent?
• Mobile agents are defined as active objects (or
clusters of objects) that have behavior, state and
location.
• Mobility: Agents that can travel in network
• Autonomy: Agent itself decides when and
where to migrate next
• Opposite :
• Stationary agent
• Mobile code (Applets)
3
Comparison of 3 Network
computing paradigm
Client-Server Paradigm Code-on-Demand Paradigm
Download
Server (Applet) Know
Client Client how Server
Know- Know-
how how
Host Host
4
A Mobile Agent Dissected
5
Events in Mobile Agent’s
life-time
• Creation: a brand new agent is born and its state is
initialized.
8
9
Requirement of a MAS
• Agent Execution Support,
• Management Support,
• Security Support,
• Mobility Support,
• Unique Identification of Agents Support,
• Transaction Support, and
• Communication Support.
10
Object mobility
• Strong Mobility
• Migration of agent code, data and execution state
• Weak Mobility
• Migration of only the agent code and data
11
Support Languages for
mobile agent
• The first language for programming mobile
agents called TeleScript was introduced in
1994.
• Mobile agent could be implement by various
languages, but java language is the most
popular because:
• Platform independence.
• Create once, go everywhere.
• Object-oriented feature
• Security model
12
Security issue - host
security
• Authentication of user
• Determination of whether the user has
the authorization to execute
• Determination of agents ability to pay
for the service provided by the server
13
Trusted and un-trusted
mobile agent
• Some MA platform treat trusted and
untrusted agent differently
• Untrusted agents are prohibited to run
dangerous command.
14
Agent Security- agent
security
• Example:
• An agent roams around the Internet to look for the
lowest price of a air ticket; it remembers the lowest
price it finds most recently
• Data tampering: change of execution state of
agents by malicious hosts (“brain-flush” the agent
of the lowest price it remembers)
• Solution:
• Agent tampering detection (e.g. cryptographic
watermarks)
• Prevention (e.g. execution of encrypted functions)
15
Virus detection
16
Standardization of
mobile agent
• There are various mobile agent system
available such as AgentTcl , Aglets,
MOA, Grasshopper and Odyssey.
• These differ widely in architecture and
implementation. thereby impeding
interoperability, rapid proliferation of
agent technology
17
Standardization of
mobile agent (contd)
• MASIF is a Standardization effort by the
Object Management Group (OMG) to enable
different mobile agent systems to
interoperate.
• MASIF provide 2 sets of interfaces to
standardizes:
• Agent Management
• Agent Transfer
• Agent and Agent System Names.
• Agent System Type and Location Syntax.
18
Standardization of
mobile agent (contd)
19
other issues related to
mobile agent
• Execution performance
Execution performance is often sacrificed
in order to achieve portability via code
interpretation. Justintime compilation is one
way towards better performance.
• Robustness.
Adding robustness involves fault tolerance
schemes (e.g., coping with hosts crashing)
and is key for trust and acceptance of the
technology in companies.
20
Competing Technologies
21
Mobile Agent vs. Remote
Procedure Call(RPC)
RPC:
• using Synchronous protocol-High Efficiency
and low latency
• Scaling -- Multiple servers
Mobile Agent:
• Messaging(Asynchronous) :Robustness,
especially in wide area network
• Every node is a server
22
Application Areas for
Mobile Agents
• Data collection from many places
• Monitoring
• Negotiating
23
Application area for
Mobile Agent(cont’)
• Bartering
• Parallel processing
• Entertainment
24
Potential usage for
mobile client
• Mobile clients’ feature:
1. They only intermittently connected to a network,
2. Even when connected they have limited bandwidth
3. They have limited storage and processing
capability
• Mobile agents’ feature:
1. Reduction of Network traffic
2. Asynchronous interaction
3. Remote searching and filtering
25
Concluding Remarks
Achievement:
• MA can effectively reduce network load and overcome network
latency.
• MA can improve both flexibility and communication robustness.
• MA has proved to be beneficial to information collection and
monitoring.
Open issue:
• Security, secrecy and complexity(easy to deploy but hard to
debug), and execution performance remain a big challenge for
its industrial use.
• Limited availability of quantitative performance evaluation
• Further standardization work still required for heterogeneous
environments
26
Reference
• http://www.cnri.reston.va.us/home/koe/index.html
• http://www.ikv.de/products/grasshopper/
• http://www.cs.dartmouth.edu/˜agent/
• http://mole.informatik.uni-stuttgart.de/
• http://www.jumpingbeans.com
• http://www.dsg.technion.ac.il/fargo/
• http://sun195.iit.unict.it/MAP
• http://www.trl.ibm.com/aglets/
27