Introduction of Mobile Agents
#1

Introduction of Mobile Agents


.ppt   Introduction of Mobile Agents.ppt (Size: 2.6 MB / Downloads: 0)

What is an agent

A program (“software agent”), e.g.,
Personal assistant (mail filter, scheduling)
Information agent (tactical picture agent)
E-commerce agent (stock trader, bidder)
Recommendation agent (Firefly, Amazon.com)
A program that can
interact with users, applications, and agents
collaborate with the user
Software agents help with repetitive tasks

Definition

In a broad sense, an agent is any program that acts on behalf of a (human) user. A mobile agent then is a program which represents a user in a computer network, and is capable of migrating autonomously from node to node, to performs some computation on behalf of the user.

Assumptions about computer systems violated by mobile agents

Whenever a program attempts some action, we can easily identify a person to whom that action can be attributed, and it is safe to assume that that person intends the action to be taken.
Only persons that are know to the system can execute programs on the system.
There is one security domain corresponding to each user; all actions within that domain can be treated the same way.
Single-user systems require no security.
Essentially all programs are obtained from easily identifiable and generally trusted sources
The users of a given piece of software are restrained by law and custom from various actions against the manufacturer’s interests.
Significant security threats come from attackers running programs with the intent of accomplishing unauthorized results.
Programs cross administrative boundaries only rarely, and only when people intentionally transmit them.
A given instance of a program runs entirely on one machine; processes do not cross administrative boundaries at all.
A given program runs on only one particular operating system.
Computer security is provided by the operating system.


Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: introduction to 3g mobile technology, introduction of mobile voting, introduction of mobile hacking,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  broadband mobile full report project topics 7 23,313 27-02-2016, 12:32 PM
Last Post: Prupleannuani
  Mobile Train Radio Communication ( Download Full Seminar Report ) computer science crazy 10 27,934 01-05-2015, 03:36 PM
Last Post: seminar report asees
  Mobile Train Radio Communication Electrical Fan 5 14,706 11-03-2015, 07:27 PM
Last Post: Guest
  INTRODUCTION astru 0 908 27-09-2014, 05:50 PM
Last Post: astru
  INTRODUCTION OF INTRANET CHATTING computer girl 1 3,113 24-02-2014, 01:48 AM
Last Post: Guest
  Seminar Report On Mobile Networking For Smart Dust Computer Science Clay 1 11,616 24-12-2012, 02:27 PM
Last Post: seminar details
  AN EXTENDED ZONE ROUTING PROTOCOL FOR SERVICE DISCOVERY IN MOBILE AD HOC NETWORKS seminar presentation 1 9,306 24-12-2012, 12:47 PM
Last Post: seminar details
  A Secure Mobile Healthcare System using Trust-Based Multicast Scheme seminar class 3 7,951 22-12-2012, 10:54 AM
Last Post: seminar details
  mobile computing full report seminar topics 11 15,867 13-12-2012, 01:35 PM
Last Post: seminar details
  Opportunistic Networking: Data Forwarding in Disconnected Mobile Ad hoc Networks seminar surveyer 1 2,316 22-11-2012, 01:26 PM
Last Post: seminar details

Forum Jump: