Cover image for Mobile Agents in Networking and Distributed Computing.
Mobile Agents in Networking and Distributed Computing.
Title:
Mobile Agents in Networking and Distributed Computing.
Author:
Cao, Jiannong.
ISBN:
9781118135587
Personal Author:
Edition:
1st ed.
Physical Description:
1 online resource (347 pages)
Series:
Wiley Series in Agent Technology ; v.3

Wiley Series in Agent Technology
Contents:
Mobile Agents in Networking and Distributed computing -- Contents -- Foreword -- Preface -- Contributors -- Part I: Introduction -- 1: Mobile Agents and Applications in Networking and Distributed Computing -- 1.1: Introduction -- 1.2: Mobile Agent Platforms -- 1.2.1: FIPA -- 1.2.2: OMG-MASIF -- 1.3: Representative MAPs -- 1.3.1: IBM Aglets Workbench (1997-2001) -- 1.3.2: Agent Tcl (1994-2002, later known as D'Agents) -- 1.3.3: Grasshopper (1998) -- 1.3.4: Concordia (1997) -- 1.3.5: In Mole (1997) -- 1.3.6: The Odyssey -- 1.4: Some Applications -- 1.5: Overview of the Book -- References -- Part II: Principles of Applying Mobile Agents -- 2: Mobile Agent Communications -- 2.1: Introduction -- 2.2: Importance of Remote Communication between Mobile Agents -- 2.3: Requirements Analysis of Communication between Mobile Agents -- 2.4: Several Schemes for Communication between Mobile Agents -- 2.4.1: Naming Scheme -- 2.4.2: Tracking Mechanisms -- 2.4.3: Efforts on Reliable Message Routing -- 2.4.4: Adaptive Protocols -- 2.5: Mailbox-Based Framework for Designing Mobile Agent Message Delivery Protocols -- 2.5.1: System Model and Assumptions -- 2.5.2: Three-Dimensional Design Model -- 2.5.3: Parameter Combinations -- 2.6: Concluding Remarks and Further Research -- References -- 3: Distributed Security Algorithms for Mobile Agents -- 3.1: Introduction -- 3.2: Black-Hole Search -- 3.2.1: The Problem and Its Setting -- 3.2.2: Background Problem: Safe Exploration -- 3.2.3: Basic Properties and Tools for Black-Hole Search -- 3.2.4: Impact of Knowledge -- 3.2.5: Special Topologies -- 3.2.6: Using Tokens -- 3.2.7: Synchronous Networks -- 3.2.8: Rendezvous in Spite of Black Hole -- 3.3: Intruder Capture and Network Decontamination -- 3.3.1: The Problem -- 3.3.2: Background Problem: Graph Search -- 3.3.3: Models for Decontamination.

3.3.4: Results in Specific Topologies -- 3.3.5: Different Contamination Rules -- 3.4: Conclusions -- Acknowledgments -- References -- 4: Mobile Agent Coordination -- 4.1: Introduction -- 4.2: Mobile Agent Coordination: General Overview -- 4.2.1: Case Study -- 4.2.2: A First General Taxonomy -- 4.3: Linda-Like Coordination Models: Some Evaluation Criteria -- 4.3.1: Some Criteria to Compare Tuple-Based Systems -- 4.4: Overview of Some Modern Tuple-Based Approaches -- 4.4.1: JavaSpaces -- 4.4.2: SwarmLinda -- 4.4.3: LIME -- 4.4.4: TuCSoN -- 4.4.5: MARS -- 4.4.6: TOTA -- 4.5: Roles for Mobile Agent Coordination -- 4.5.1: Roles -- 4.5.2: Applying Roles to Agents -- 4.5.3: Roles and Mobility -- 4.5.4: Running Examples -- 4.6: Future Directions in Mobile Agent Coordination -- References -- 5: Cooperating Mobile Agents -- 5.1: Introduction -- 5.2: Model -- 5.3: Mapping a Network -- 5.3.1: Exploring Undirected Graphs -- 5.3.2: Optimal Graph Exploration -- 5.3.3: Collective Tree Exploration with Multiple Agents -- 5.3.4: Deterministic Rendezvous in Arbitrary Graphs -- 5.3.5: Polynomial Deterministic Rendezvous in Arbitrary Graphs -- 5.3.6: Asynchronous Deterministic Rendezvous in Graphs -- 5.4: Concurrent Reading and Writing -- 5.4.1: One-Reader and One-Writer Cases -- 5.4.2: One-Reader Protocol -- 5.4.3: One-Writer Protocol -- 5.4.4: Concurrent Reading and Writing -- 5.5: Fault Tolerance -- 5.5.1: BHS in Anonymous Ring -- 5.5.2: BHS in Arbitrary Networks -- 5.5.3: BHS in Tree Networks -- 5.5.4: Multiple-Agent Rendezvous in a Ring in Spite of a Black Hole -- 5.5.5: BHS in Asynchronous Rings Using Tokens -- 5.6: Stabilization Using Cooperating Mobile Agents -- 5.6.1: Stabilizing Spanning Tree Construction Using a Single Agent -- 5.6.2: Agent Failure -- 5.6.3: Spanning Tree Construction Using Multiple Agents -- 5.7: Conclusion -- References.

Part III: Mobile Agent Based Techniques and Applications -- 6: Network Routing -- 6.1: Introduction -- 6.2: Background and Literature Review -- 6.3: Network Routing Problem -- 6.3.1: Data Structures and Function -- 6.3.2: User Equilibrium Routing -- 6.3.3: System Optimal Routing -- 6.4: Survey of Agent-Based Routing Algorithms -- 6.4.1: Classification System -- 6.4.2: Algorithms Based on Q-Learning -- 6.4.3: Algorithms Based on "Actor-Critic" Approach -- 6.4.4: Other Reinforcement Learning-Based Algorithms -- 6.4.5: Ant-Based Routing Algorithms -- 6.4.6: System Optimal Routing Algorithms -- 6.4.7: Algorithms for Mobile Ad Hoc Networks -- 6.5: Comparison of Routing Algorithms -- 6.6: New Directions: Hybrid Agent-Based Algorithms -- 6.7: Conclusions -- Acknowledgments -- References -- 7: Resource and Service Discovery -- 7.1: Introduction -- 7.2: Mobility and Resource/Service Discovery -- 7.2.1: Definitions and Concepts -- 7.2.2: Suitability of Mobile Code Technologies for Discovery Solutions -- 7.3: Related Work -- 7.3.1: Low-Mobility Discovery Solutions -- 7.3.2: Medium-Mobility Discovery Solutions -- 7.3.3: High-Mobility Discovery Solutions -- 7.4: Emerging Solution Guidelines -- 7.4.1: Mediator-Based Discovery Infrastructures -- 7.4.2: Location Awareness -- 7.4.3: Context Awareness -- 7.4.4: Mobile Discovery Proxies with Location and Context Awareness: CARMEN Case Study -- 7.5: Concluding Remarks and "Hot Topics" in Current Research -- Acknowledgments -- References -- 8: Distributed Control -- 8.1: Introduction -- 8.2: MAWSG Framework -- 8.2.1: System Model -- 8.2.2: MAWSG Framework -- 8.2.3: Simulation Environment -- 8.3: Mobile Agent-Assisted Scheme for Distributed Consensus -- 8.3.1: Mobile Agent-Based Consensus Algorithm -- 8.3.2: Performance and Simulation -- 8.4: Mobile Agent-Assisted Distributed Dynamic Load Balancing.

8.4.1: Mobile Agent-Enabled Load-Balancing Scheme -- 8.4.2: Preliminary Evaluation -- 8.5: Mobile Agent-Enabled Scheme for Checkpointing and Rollback -- 8.5.1: The Mobile Agent-Enabled Scheme -- 8.5.2: Performance Evaluation -- 8.6: Conclusion -- References -- 9: Distributed Databases and Transaction Processing -- 9.1: Introduction -- 9.2: Mobile Agent Architectures for Database Access -- 9.2.1: Agent-Based Software Architectures -- 9.2.2: Mobile Agents for Web Database Access -- 9.2.3: Peer-to-Peer Computing -- 9.3: Querying with Agents -- 9.3.1: Query Processing -- 9.3.2: View Materialization -- 9.4: Transaction Management -- 9.4.1: Agents and Transactions -- 9.4.2: Fault Tolerance -- 9.4.3: Transactional Models -- 9.5: Summary -- References -- 10: Mobile Agents in Mobile and Wireless Computing -- 10.1: Introduction -- 10.2: Mobile Computing Middleware -- 10.2.1: Lightweight -- 10.2.2: Asynchronous Communication -- 10.2.3: Context Awareness -- 10.3: Mobile Agent in Mobile Computing -- 10.3.1: Mobile Agent-Based Mobile Computing Middleware -- 10.3.2: Mobile Agent for Mobile Applications -- 10.4: Mobile Agent for Pervasive Computing -- 10.4.1: Seamless Mobility -- 10.4.2: Self-Adaptation -- 10.5: Related Work -- 10.6: Conclusion -- References -- Part IV: Design and Evaluation -- 11: Naplet: Microkernel and Pluggable Design of Mobile Agent Systems -- 11.1: Introduction -- 11.2: Design Goals and Naplet Architecture -- 11.2.1: Design Goals -- 11.2.2: Naplet Class -- 11.2.3: NapletServer Architecture -- 11.3: Structured Itinerary Mechanism -- 11.3.1: Primitive Itinerary Constructs -- 11.3.2: Itinerary Programming Interfaces -- 11.3.3: Implementations of Itinerary Constructs -- 11.4: Naplet Tracking and Internaplet Communication -- 11.4.1: Naplet Location Service -- 11.4.2: Internaplet Communication -- 11.5: Security and Resource Management.

11.5.1: Naplet Security Architecture -- 11.5.2: Resource Management -- 11.6: Programming for Network Management in Naplet -- 11.6.1: Privileged Service for Naplet Access to MIB -- 11.6.2: Naplet for Network Management -- 11.7: Related Work -- 11.8: Concluding Remarks -- Acknowledgments -- References -- 12: Performance Evaluation of Mobile Agent Platforms and Comparison with Client-Server Technologies -- 12.1: Introduction -- 12.2: Brief Description of James Platform -- 12.3: Brief Description of Other Platforms -- 12.3.1: Aglets SDK -- 12.3.2: Concordia -- 12.3.3: Voyager -- 12.3.4: Odyssey -- 12.3.5: Jumping Beans -- 12.3.6: Grasshopper -- 12.3.7: Swarm -- 12.4: Benchmarking Study: Comparing Agent Platforms -- 12.4.1: Test Environment -- 12.4.2: Application Benchmark -- 12.4.3: Test Parameters -- 12.4.4: Methodology of Benchmarking -- 12.4.5: Experimental Results -- 12.4.6: Concluding Overview about the Platforms -- 12.5: Comparing Agents with RMI, CORBA and Servlets -- 12.5.1: Test Environment -- 12.5.2: Application Benchmark -- 12.5.3: Five Different Versions of the Application -- 12.5.4: Test Parameters -- 12.5.5: Methodology of the Performance Study -- 12.5.6: Experimental Results -- 12.6: Final Remarks -- References -- Index.
Abstract:
This book simplifies the development of networks and distributed systems and improves their performance using mobile agent technology Mobile Agents in Networking and Distributed Computing explores mobile agents, sophisticated computer programs that can autonomously migrate between network sites and between computers. The authors begin with an overview of the most current mobile agent technology in use today. Next, they guide readers through the key concepts and principles of mobile agents. Finally, they present the most recent applications of mobile agents in networking and distributed computing, including e-commerce, information retrieval, process coordination, mobile computing, personal assistance, and network management. Key Features: Explains how mobile agents streamline the development of networks and distributed systems Shows how mobile agents can dramatically improve the performance of networks and distributed systems Explores a broad range of mobile agent applications in networks and distributed systems Offers a systematic overview of the latest mobile agent technology Introduces all of the key concepts and principles that readers need to know in order to take full advantage of mobile agents This book is recommended for graduate students in telecommunications, networking, and distributed computing fields. Presenting all the latest technology, it also serves as a reference for professionals in the field.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Added Author:
Electronic Access:
Click to View
Holds: Copies: