Open Access
Subscription Access
Next Generation in Computing with Agent Oriented Distributed System: Protocols and Features
Distributed structure of programming and computing has evolved in all facets of development and spawned a new era of distributed computing. In these structures, the isolated processing nodes have been networked to form a powerful processing and communication device. Now, they need an integrated infrastructure for communication that is capable of providing and developing strong and secure mobility features. The mobile agent technology is becoming a promising solution for widely distributed systems like the Internet. Mobile agent based infrastructure is capable of forming migratory environment efficiently using the network resources. The mobile agent is software code capable of moving closer to the required resource in contrast to systems that incorporate the mobility of non-executable code only. It is also required for various agent-oriented languages to support architectural heterogeneity and less or no dependency on the previous system once an agent is transmitted to another system in the network. This paper reviews the architectural components that exist and required for agent-based systems. It also reviews various software components of universal mobile agent system and explores some aspects of migration and intercommunication of agent-oriented approaches.
Keywords
Agent Oriented Languages, Mobile Objects, Distributed Programming, Dynamic Itinerary, On-the-Fly Execution, Agent Migration.
User
Font Size
Information
- Shigeki Shiokawa, “Performance analysis for use of mobile agent in wireless multihop networks.” In 2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN), pp. 827-832. DOI: 10.1109/ ICUFN.2016.7537153, IEEE, 2016.
- S. Sobitha Ahila, and K. L. Shunmuganathan., “Overview of mobile agent security issues—Solutions.” In Information Communication and Embedded Systems (ICICES), 2014 International Conference on, pp. 1-6. IEEE, 2014.
- H. M. Eldegwi, M. B. Badawy, and Hamdy M. Kelash., “Building a Secure Decentralized Energy System with Remote Monitoring Using Mobile Agents.” In 2015 Fifth International Conference on e-Learning (econf), pp. 263-268. DOI: 10.1109/ECONF.2015.80, IEEE, 2015.
- Zhixin. Tie, “A Mobile Agent-Based System for Server Resource Monitoring.” Cybernetics and Information Technologies, Volume 13, Issue 4, Pages 104–117, ISSN (Print) 1314-4081, DOI: 10.2478/cait-2013-0057, December 2013.
- Rahul Singh Chowhan and Rajesh Purohit, “Study of mobile agent server architectures for homogeneous and heterogeneous distributed systems.” International Journal of Computer Applications. 2016; 156, no. 4: 32-37.
- Rahul Singh Chowhan, Amit Mishra, and Ajay Mathur, “Aglet and kerrighed as a tool for load balancing and scheduling in distributed environment.” In Recent Advances and Innovations in Engineering (ICRAIE), 2016 International Conference on, pp. 1-6. IEEE, 2016.
- Tina Setter, Andrea Gasparri, and Magnus Egerstedt. “Trust-based interactions in teams of mobile agents.” In 2016 American Control Conference (ACC), pp. 6158-6163. DOI: 10.1109/ACC.2016.7526637, IEEE, 2016.
- Youssef M. Essa, Gamal Attiya, and Ayman El-Sayed. "Mobile agent based new framework for improving big data analysis." In Cloud Computing and Big Data (CloudCom-Asia), 2013 International Conference on, pp. 381-386. DOI: 10.1109/CLOUDCOM-ASIA.2013.75, IEEE, 2013.
- Gaoyun Chen, Jun Lu, Jian Hhuang, and Zexu Wu. “Saaas-the mobile agent based service for cloud computing in internet environment.” In 2010 Sixth International Conference on Natural Computation, vol. 6, pp. 2935-2939. IEEE, 2010.
- Lingaraj. K, Rajashree V. Biradar, and V. C. Patil. “A survey on mobile-agent middleware design principals and itinerary planning algorithms.” In 2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), pp. 749-753. DOI: 10.1109/ICATCCT.2015.7456983, IEEE, 2015.
- Jeffrey T. McDonald, Alec Yyasinsac, and Willard C. Thompson III., “Mobile agent data integrity using multi-agent architecture” AIR FORCE INST OF TECH WRIGHT-PATTERSONAFB OH, 2004.
- Akinyokun Oluwole Charles, Ekuewa J. B., and Arekete S. A., “Development of agent-based system for monitoring software resources in a network environment.” Artificial Intelligence Research 3, DOI: 10.5430/air.v3n3p62, no. 3 (2014): p62
- H. M. Eldegwi, M. B. Badawy, and Hamdy M. Kelash., “Building a Secure Decentralized Energy System with Remote Monitoring Using Mobile Agents.” In 2015 Fifth International Conference on e-Learning (econf), pp. 263-268. DOI: 10.1109/ECONF.2015.80, IEEE, 2015.
- Mi Yyoung Jo and Keecheon Kim. “A research on the regional routing scheme based mobile agent for SDN.” In 2016 International Conference on Information Networking (ICOIN), pp. 211-213. DOI: 10.1109/ICOIN.2016.7427116, IEEE, 2016.
- Michail Fragkakis, and Nikolaos Alexandris. “Comparing the trust and security models of mobile agents.” Information Assurance and Security, 2007. IAS 2007. Third International Symposium on. IEEE, 2007.
- Imran Khan, Mohammad Nauman, Masoom Alam, and Furqan Aziz. “SAuthMash: mobile agent based self authorization in mashups.” In Proceedings of the 7th International Conference on Frontiers of Information Technology, p. 41. ACM, 2009.
- Marthie Schoeman, and Elsabé Cloete. “Architectural components for the efficient design of mobile agent systems.” In Proceedings of the 2003 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology, pp. 48-58. South African Institute for Computer Scientists and Information Technologists. ACM, 2003.
- Masayuki Hhigashino, Shin Osaki, Shinya Otagaki, Kenichi Takahashi, Takao Kawamura, and Kazunori Sugahara. “Debugging Mobile Agent Systems.” In Proceedings of International Conference on Information Integration and Web-based Applications & Services, p. 667. ACM, 2013.
- Ko-Hhsin Cindy Wang, “Massively multi-agent pathfinding made tractable, efficient, and with completeness guarantees.” In The 10th International Conference on Autonomous Agents and Multiagent Systems-Volume 3, pp. 1343-1344. International Foundation for Autonomous Agents and Multiagent Systems, ACM, 2011.
- Rui A. Martins, Manuel E. Correia, and Alexandre B. Augusto. “A literature review of security mechanisms employed by mobile agents.” In Information Systems and Technologies (CISTI), 2012 7th Iberian Conference on, pp. 1-4. IEEE, 2012.
- Mohamed A. Madkour, Fathy E. Eassa, Abdullah M. Ali, and Noor U. Qayyum. “Securing Mobile-Agent-Based Systems Against Malicious Hhosts'.”World Applied Sciences Journal. 2014; 29, no. 2: 287-297.
- Youssef M. Essa, Gamal Attiya, and Ayman El-Sayed. "Mobile agent based new framework for improving big data analysis." In Cloud Computing and Big Data (CloudCom-Asia), 2013 International Conference on, pp. 381-386. DOI: 10.1109/CLOUDCOM-ASIA.2013.75, IEEE, 2013.
- Gaoyun Chen, Jun Lu, Jian Hhuang, and Zexu Wu. “Saaas-the mobile agent based service for cloud computing in internet environment.” In 2010 Sixth International Conference on Natural Computation, vol. 6, pp. 2935-2939. IEEE, 2010.
- Behrooz Safarinejadian, and Kazem Hhasanpour., “Distributed Data Clustering Using Mobile Agents and EM Algorithm.” DOI: 10.1109/JSYST.2014.2337114, IEEE Systems Journal 10, no. 1 (2016): 281-289.
- Chowhan R.S., “Mobile Agent Based Workflow Management System (MAWFMS) for Information Flow and Business Processes”, DOI:10.13005/ojcst11.01.08, Orient. J. Comp. Sci. and Technol. 2018; 11(1):40-49.
Abstract Views: 219
PDF Views: 0