Mobile Agent - Paper Presentation
#1
Photo 

Mobile Agent - Paper Presentation

In computer science, a mobile agent is a composition of computer software and data which is able to migrate (move) from one computer to another autonomously and continue its execution on the destination computer.

Mobile Agent, namely, is a type of software agent, with the feature of autonomy, social ability, learning, and most important, mobility. When the term mobile agent is used, it refers to a process that can transport its state from one environment to another, with its data intact, and still being able to perform appropriately in the new environment.

Mobile agents decide when and where to move next, which is evolved from RPC. So how exactly does a mobile agent move? Just like a user doesn t really visit a website but only make a copy of it, a mobile agent accomplishes this move through data duplication. When a mobile agent decides to move, it saves its own state and transports this saved state to next host and resume execution from the saved state.

Mobile agents are a specific form of mobile code and software agents paradigms. However, in contrast to the Remote evaluation and Code on demand paradigms, mobile agents are active in that they may choose to migrate between computers at any time during their execution. This makes them a powerful tool for implementing distributed applications in a computer network.

Advantages:

1) Move computation to data, reducing network load.

2) Asynchronous execution on multiple heterogeneous network hosts.

3) Dynamic adaptation - actions are dependent on the state of the host environment.

4) Tolerant to network faults - able to operate without an active connection between client and server.

5) Flexible maintenance - to change an agent s actions, only the source (rather than the computation hosts) must be updated

Applications:

1) Resource availability, discovery, monitoring

2) Information retrieval

3) Network management

4) Dynamic software deploymen
Reply
#2
[attachment=6757]

Mobile Agents


By
Olga Gelbart



What is an agent?

A program (“software agent”), e.g.,
Personal assistant (mail filter, scheduling)
Information agent (tactical picture agent)
E-commerce agent (stock trader, bidder)
Recommendation agent (Firefly, Amazon.com)
A program that can
interact with users, applications, and agents
collaborate with the user
Software agents help with repetitive tasks
Reply
#3
PRESENTED By
K Srikanth Chetty

[attachment=9509]
What is an agent?
A program that can
interact with users, applications, and agents
collaborate with the user
Software agents help with repetitive tasks
A program (“software agent”), e.g.,
Personal assistant (mail filter, scheduling)
E-commerce agent (stock trader, bidder)
Is everything an “agent”?
Not all programs are agents
Agents are
cooperative
autonomous
adaptive
What is a mobile agent?
Definition
In a broad sense, an agent is any program that acts on behalf of a (human) user. A mobile agent then is a program which represents a user in a computer network, and is capable of migrating autonomously from node to node, to performs some computation on behalf of the user.
ARCHITECTURE
Part-View of Agent Topology
How it works?
Mobile Agent Attributes
Code
State
Execution state
Object state
Name
Identifier
Authority
Agent system type
Location
Client-Server Versus Mobile Agents
Benefits of mobile agents
Bandwidth conservation
Reduction of latency
Reduction of completion time
Asynchronous (disconnected) communications
Load balancing
Bandwidth conservation
Reduce latency
Reduce Completion Time
Load balancing
Threats posed by mobile agents
 Destruction of
 data, hardware, current environment
 Denial of service
 block execution
 take up memory
 prevention of access to resources/network
 Breach of privacy / theft of resources
 obtain/transmit privileged information
 use of covert channels
 Harassment
 Display of annoying/offensive information
 screen flicker
 Repudiation
 ability to deny an event / action ever happened
Protection methods against malicious mobile agents
 Authenticating credentials
 certificates and digital signatures
 Access Control and Authorization
 Reference monitor
 security domains
 policies
 Monitoring
 auditing of agent’s activities
 setting limits
 Code Verification - proof-carrying code
Possible attacks on mobile agents
 Denial of service
 Replay
 Eavesdropping
 Communication
 Code & data
 Tamper attack
 Communication
 Code & data
Protection of mobile agents
Encryption
code
payload
Code obfuscation
Application: Technical reports
Application: Military
Application: e-commerce
Reply
#4
i want project details as well as circuit diagram
Reply
#5
The mobile agent is a software and hence does not have any circuit diagram. The necessary details about the project has been described in this thread.
Reply
#6
Presented By
Gohel Himanshu Ashokbhai

[attachment=10092]
INTRODUCTION
As the Internet constantly expands, the amount of available on-line information expands correspondingly. The issue of how to efficiently find, gather and retrieve this information has led to the research and development of systems and too that attempt to provide a solution to this problem. These systems and tools are based on the use of MAs’ technology. Mobile agents are processes (e.g. executing programs) that can migrate from one machine of a system to another machine (usually in the same system) in order to satisfy requests made by their clients . Mainly, a mobile agent executes on a machine that hopefully provides the resource or service that it needs to perform its job. If the machine does not contain the needed resource/service, or if the mobile agent requires a different resource/service on another machine, the state information of the mobile agent is saved in pre-defined manner, then transfer to a machine containing the necessary resource/service is initiated, and the mobile agent resumes execution at the new machine. Advantages of using MAs include low network bandwidth since they only move when they need to continue execution even disconnected from the network (typically for disconnected mode), ability to clone itself to perform parallel execution, easy implementation, deployment, and reliability. The rest of the paper is organised as follows.
What Is SoftWare Agent ?
Agents can be autonomous entities, deciding their next step without the interference of a user ,or they can be controllable ,serving as a me diary between the user and another agent, thereby having some amount of Artificial Intelligence. An agent is simply another kind of software abstraction, an abstraction in the same way that methods, functions, and objects are software abstractions. An object is a high-level abstraction that describes methods and attributes of a software component.. We may also say that” Agents can exist in a structure as complex as the global Internet or one as simple as a module of a common program.”
Types Of SoftWare Agent
 CHARACTERTICS OF AGENTS

There are many possible conceptions of Agent . Characteristics . of Agents Include:-
• Proactive ness:-The agent has an agenda to pursue and will persist in trying to achieve its aims.
• Autonomy:-It enables an agent to perform a job or step without direct intervention of its user and it has full control over its actions and internal state.
• Mobility:-It can passes the ability to move from place to place in a network like Internet .It can move itself and execute afresh at a new location.
Sometimes an agent performs a task at one location ,saves the state ,migrates to a new location and restores its execution state to continue where it left off
• Intelligence:- An agent displays intelligence by reasoning from the goal and knowledge it has . It can learn from its environment and change its behavior through experience and adapt itself.
Application of Agent technology
Information Retrieval Agents
Although the architecture diagram shown in Figure may appear at first glance to be rather similar to that of the first class of system discussed in the previous section, the inclusion of the arrow indicating a flow of communication from the interface agent to the information resources reflects a significant step up in sophistication. This is the first class of system that exhibits a significant degree of proactively. The extra arrow on the reference architecture indicates that the interface agent requests particular pieces of information from the information sources, rather than passively filtering information presented to it.
This approach lends itself particularly nicely to being implemented using a multi-agent system. Using this approach each separate information source would be modeled by an agent and the interface agent would broadcast a request for information. Upon receipt of such a request each information agent would reply with a Message containing all the information they have access too with relevance to the initial request. The interface agent, having received all these separate pieces of information, is responsible fo aggregating the information sensibly and presenting the information in a unified and easy to access fashion. This approach brings with it a number of benefits to compensate for the added complexity. Chiefly it allows us to deal with distributed sources of information effectively, for example the World Wide Web. It also brings benefits in terms of scalability in that the problems associated with incorporating a new knowledge source are greatly reduced as we simply need to design a new agent and slot it in. Systems of this complexity are very thin on the ground. It is clearly of importance that the information requested satisfies the users query or goals. Thus the request sent by the interface agent must be based both on the information obtained directly from the interface and also upon any user model the system has managed to build up. This involves the provision of multimedia kiosks at several sites around Ireland drawing social welfare and employment information from a number of distributed knowledge sources. A number of systems attempt to provide virtual newspapers which draw information from a number of different sources based upon a user’s expressed interests. This type of system differs from the traditional newspapers in that the user of the system explicitly chooses what information should be present in their own personal newspaper. This allows the newspapers to remain up to date although typically at the expense of the in-depth analysis of the relevant issues mentioned earlier. Newshound provides a somewhat different service which is charged for. Here the users enter keywords which tell the system what news items they are, possibly are and definitely are not interested in. Again the system returns news articles drawn from a variety of online news sources (mainly newswires).
• E-Commerce
software agents are an integral part of the overall system and method of approach. There are user agents acting on behalf of the consumer and business agents representing the suppliers. Although currently beyond the state of the art, it will not be long before users will be able to delegate to their software agent the task of getting cinema tickets to see one of the latest releases on Saturday night and then booking a meal in a nearby restaurant afterwards. Given this objective and knowledge of its user’s preferences (eg vegetarian, no spicyfood, comedies rather than action films, etc.), the proxy will enter the appropriate electronic marketplace where it will encounter the business agents
Reply
#7

to get information about the topic mobile agents in network management full report ppt and related topic refer the page link bellow

http://studentbank.in/report-mobile-agen...esentation

http://studentbank.in/report-mobile-agen...4#pid42734

http://studentbank.in/report-mobile-agents-and-security

http://seminarsprojects.in/showthread.ph...+&pid=2767
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: presentation convent aberdeen, a4 4ring presentation, pollutation presentation, security agent security trustee, presentation paper vs, mobile agent multimedia, presentation saints football,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  broadband mobile full report project topics 7 23,588 27-02-2016, 12:32 PM
Last Post: Prupleannuani
  Mobile Train Radio Communication ( Download Full Seminar Report ) computer science crazy 10 28,044 01-05-2015, 03:36 PM
Last Post: seminar report asees
  Mobile Train Radio Communication Electrical Fan 5 14,733 11-03-2015, 07:27 PM
Last Post: Guest
  Bluetooth Security Full Download Seminar Report and Paper Presentation computer science crazy 21 26,209 07-08-2014, 11:32 PM
Last Post: [email protected]
  Adaptive Replacement Cache Full Download Seminar Report and Paper Presentation computer science crazy 1 2,992 19-04-2014, 07:01 PM
Last Post: Guest
  Human Robot Interaction in Multi-Agent Systems pdf computer topic 0 1,211 25-03-2014, 09:43 PM
Last Post: computer topic
  Computerized Paper Evaluation using Neural Network computer science crazy 12 17,854 17-07-2013, 04:08 PM
Last Post: Guest
  Social networking sites presentation project topics 4 9,602 27-03-2013, 10:59 AM
Last Post: computer topic
  Seminar Report On Mobile Networking For Smart Dust Computer Science Clay 1 11,621 24-12-2012, 02:27 PM
Last Post: seminar details
  AN EXTENDED ZONE ROUTING PROTOCOL FOR SERVICE DISCOVERY IN MOBILE AD HOC NETWORKS seminar presentation 1 9,320 24-12-2012, 12:47 PM
Last Post: seminar details

Forum Jump: