Design of a Mobile Agents Based Solution to Distributional Management of Computer Networks, Taking into Account the Security Mechanisms

S. Bahrami

Abstract


Mobile agents (MAs) is one of the technologies considered in the recent years to perform management processes. This technology provides the ability to move code in distributed environments and to connect with other resources and agents locally which makes it an appropriate technology in the development of software applications of distributed network, especially management systems. For using mobile agent technology, an infrastructure for the management of MAs is needed. In this project, an infrastructure called MCT management is introduced for network management. In this infrastructure, some protocols like SNMP are used to get management data for the network administrator. With respect to management ability, MAs can dynamically access the database SNMP (i.e. MIB) and extract the data required by the managers. Most well-known methods are characterized by being static relative to code and location in which components cannot modify their location or code in a lifetime. However, the MAs method can dynamically increase communications, reduce costs and overcome certain limitations by changing location and components.


Keywords


design; Mobile Agent; security mechanisms; MCT

Full Text:

PDF

References


K. Fall, K.Varadhan, NS Notes and Documentation, VINT project,2015

A. Campeau, Managing Networks with Mobile Code, Tech. Report SCE-97-O9, Carleton University, 1997

S. Green, L. Hurst, B. Nangle, P. Cunningham, Software agents: A review, Trinity College Dublin, 1997

G. Goldszmidt, Y. Yemini, “Distributed management by delegation, Distributed Computing Systems”, 15th IEEE International Conference on Distributed Computing Systems, pp. 333-340, 1995

T. White, A. Bieszczad, B. Pagurek, “Distributed fault location in networks using mobile agents”, in: Intelligent Agents for Telecommunication Applications, Springer Berlin Heidelberg, 1998

A. Bieszczad, B. Pagurek, T. White, “Mobile agents for network management”, Communications Surveys, Vol. 1, No. 1, pp. 2-9, 1998

A. Fuggetta, G. P. Picco, G. Vigna, “Understanding Code Mobility”, IEEE Transactions on Software Engineering, Vol. 24, No. 5, pp. 342-366, 1998

W. A. Arokiasami, P. Vadakkepat, K. C. Tan, D. Srinivasan, “Interoperable multi-agent framework for unmanned aerial/ground vehicles: towards robot autonomy”, Complex & Intelligent Systems, Vol. 2, No. 1, pp. 45-59, 2016

P. D. O'Brien, R. C. Nicol, “FIPA—towards a standard for software agents”, BT Technology Journal, Vol. 16, No. 3, pp. 51-59, 1998

S. Javanmardi, M. Shojafar, S. Shariatmadari, S. S. Ahrabi, “Fr trust: a fuzzy reputation–based model for trust management in semantic p2p grids”, International Journal of Grid and Utility Computing, Vol. 6, No. 1, pp. 57-66, 2014

Z. S. Daliri, S. Shamshirband, M. Amiribesheli, “Railway security through the use of wireless sensor networks based on fuzzy logic”, International Journal of Physical Sciences, Vol. 6, No. 3, pp. 448-458, 2011

M. Shojafar, S. Javanmardi, S. Abolfazli, N. Cordeschi, “FUGE: A joint meta-heuristic approach to cloud job scheduling algorithm using fuzzy theory and a genetic method”, Cluster Computing, Vol. 18, No. 2, pp. 829-844, 2015

S. Shamshirband, S. Kalantari, Z. Sam Daliri, L. Ng, “Expert security system in wireless sensor networks based on fuzzy discussion multi-agent systems”, Scientific Research and Essays, Vol. 5, No. 24, pp.3840-3849, 2010




eISSN: 1792-8036     pISSN: 2241-4487