Design of a Mobile Agents Based Solution to Distributional Management of Computer Networks, Taking into Account the Security Mechanisms


  • S. Bahrami Department of Science, Farhangian University, Qazvin, Iran
Volume: 7 | Issue: 5 | Pages: 2026-2029 | October 2017 |


Mobile agents (MAs) is one of the technologies considered in the recent years to perform management processes. This technology provides the ability to move code in distributed environments and to connect with other resources and agents locally which makes it an appropriate technology in the development of software applications of distributed network, especially management systems. For using mobile agent technology, an infrastructure for the management of MAs is needed. In this project, an infrastructure called MCT management is introduced for network management. In this infrastructure, some protocols like SNMP are used to get management data for the network administrator. With respect to management ability, MAs can dynamically access the database SNMP (i.e. MIB) and extract the data required by the managers. Most well-known methods are characterized by being static relative to code and location in which components cannot modify their location or code in a lifetime. However, the MAs method can dynamically increase communications, reduce costs and overcome certain limitations by changing location and components.


design, Mobile Agent, security mechanisms, MCT


Download data is not yet available.


K. Fall, K.Varadhan, NS Notes and Documentation, VINT project,2015

A. Campeau, Managing Networks with Mobile Code, Tech. Report SCE-97-O9, Carleton University, 1997

S. Green, L. Hurst, B. Nangle, P. Cunningham, Software agents: A review, Trinity College Dublin, 1997

G. Goldszmidt, Y. Yemini, “Distributed management by delegation, Distributed Computing Systems”, 15th IEEE International Conference on Distributed Computing Systems, pp. 333-340, 1995

T. White, A. Bieszczad, B. Pagurek, “Distributed fault location in networks using mobile agents”, in: Intelligent Agents for Telecommunication Applications, Springer Berlin Heidelberg, 1998 DOI:

A. Bieszczad, B. Pagurek, T. White, “Mobile agents for network management”, Communications Surveys, Vol. 1, No. 1, pp. 2-9, 1998 DOI:

A. Fuggetta, G. P. Picco, G. Vigna, “Understanding Code Mobility”, IEEE Transactions on Software Engineering, Vol. 24, No. 5, pp. 342-366, 1998 DOI:

W. A. Arokiasami, P. Vadakkepat, K. C. Tan, D. Srinivasan, “Interoperable multi-agent framework for unmanned aerial/ground vehicles: towards robot autonomy”, Complex & Intelligent Systems, Vol. 2, No. 1, pp. 45-59, 2016 DOI:

P. D. O'Brien, R. C. Nicol, “FIPA—towards a standard for software agents”, BT Technology Journal, Vol. 16, No. 3, pp. 51-59, 1998 DOI:

S. Javanmardi, M. Shojafar, S. Shariatmadari, S. S. Ahrabi, “Fr trust: a fuzzy reputation–based model for trust management in semantic p2p grids”, International Journal of Grid and Utility Computing, Vol. 6, No. 1, pp. 57-66, 2014 DOI:

Z. S. Daliri, S. Shamshirband, M. Amiribesheli, “Railway security through the use of wireless sensor networks based on fuzzy logic”, International Journal of Physical Sciences, Vol. 6, No. 3, pp. 448-458, 2011

M. Shojafar, S. Javanmardi, S. Abolfazli, N. Cordeschi, “FUGE: A joint meta-heuristic approach to cloud job scheduling algorithm using fuzzy theory and a genetic method”, Cluster Computing, Vol. 18, No. 2, pp. 829-844, 2015 DOI:

S. Shamshirband, S. Kalantari, Z. Sam Daliri, L. Ng, “Expert security system in wireless sensor networks based on fuzzy discussion multi-agent systems”, Scientific Research and Essays, Vol. 5, No. 24, pp.3840-3849, 2010


How to Cite

S. Bahrami, “Design of a Mobile Agents Based Solution to Distributional Management of Computer Networks, Taking into Account the Security Mechanisms”, Eng. Technol. Appl. Sci. Res., vol. 7, no. 5, pp. 2026–2029, Oct. 2017.


Abstract Views: 543
PDF Downloads: 331

Metrics Information