Design of a Mobile Agents Based Solution to Distributional Management of Computer Networks, Taking into Account the Security Mechanisms
Mobile agents (MAs) is one of the technologies considered in the recent years to perform management processes. This technology provides the ability to move code in distributed environments and to connect with other resources and agents locally which makes it an appropriate technology in the development of software applications of distributed network, especially management systems. For using mobile agent technology, an infrastructure for the management of MAs is needed. In this project, an infrastructure called MCT management is introduced for network management. In this infrastructure, some protocols like SNMP are used to get management data for the network administrator. With respect to management ability, MAs can dynamically access the database SNMP (i.e. MIB) and extract the data required by the managers. Most well-known methods are characterized by being static relative to code and location in which components cannot modify their location or code in a lifetime. However, the MAs method can dynamically increase communications, reduce costs and overcome certain limitations by changing location and components.
Keywords:design, Mobile Agent, security mechanisms, MCT
K. Fall, K.Varadhan, NS Notes and Documentation, VINT project,2015
A. Campeau, Managing Networks with Mobile Code, Tech. Report SCE-97-O9, Carleton University, 1997
S. Green, L. Hurst, B. Nangle, P. Cunningham, Software agents: A review, Trinity College Dublin, 1997
G. Goldszmidt, Y. Yemini, “Distributed management by delegation, Distributed Computing Systems”, 15th IEEE International Conference on Distributed Computing Systems, pp. 333-340, 1995
T. White, A. Bieszczad, B. Pagurek, “Distributed fault location in networks using mobile agents”, in: Intelligent Agents for Telecommunication Applications, Springer Berlin Heidelberg, 1998 DOI: https://doi.org/10.1007/BFb0053949
A. Bieszczad, B. Pagurek, T. White, “Mobile agents for network management”, Communications Surveys, Vol. 1, No. 1, pp. 2-9, 1998 DOI: https://doi.org/10.1109/COMST.1998.5340400
A. Fuggetta, G. P. Picco, G. Vigna, “Understanding Code Mobility”, IEEE Transactions on Software Engineering, Vol. 24, No. 5, pp. 342-366, 1998 DOI: https://doi.org/10.1109/32.685258
W. A. Arokiasami, P. Vadakkepat, K. C. Tan, D. Srinivasan, “Interoperable multi-agent framework for unmanned aerial/ground vehicles: towards robot autonomy”, Complex & Intelligent Systems, Vol. 2, No. 1, pp. 45-59, 2016 DOI: https://doi.org/10.1007/s40747-016-0014-8
P. D. O'Brien, R. C. Nicol, “FIPA—towards a standard for software agents”, BT Technology Journal, Vol. 16, No. 3, pp. 51-59, 1998 DOI: https://doi.org/10.1023/A:1009621729979
S. Javanmardi, M. Shojafar, S. Shariatmadari, S. S. Ahrabi, “Fr trust: a fuzzy reputation–based model for trust management in semantic p2p grids”, International Journal of Grid and Utility Computing, Vol. 6, No. 1, pp. 57-66, 2014 DOI: https://doi.org/10.1504/IJGUC.2015.066397
Z. S. Daliri, S. Shamshirband, M. Amiribesheli, “Railway security through the use of wireless sensor networks based on fuzzy logic”, International Journal of Physical Sciences, Vol. 6, No. 3, pp. 448-458, 2011
M. Shojafar, S. Javanmardi, S. Abolfazli, N. Cordeschi, “FUGE: A joint meta-heuristic approach to cloud job scheduling algorithm using fuzzy theory and a genetic method”, Cluster Computing, Vol. 18, No. 2, pp. 829-844, 2015 DOI: https://doi.org/10.1007/s10586-014-0420-x
S. Shamshirband, S. Kalantari, Z. Sam Daliri, L. Ng, “Expert security system in wireless sensor networks based on fuzzy discussion multi-agent systems”, Scientific Research and Essays, Vol. 5, No. 24, pp.3840-3849, 2010
How to Cite
MetricsAbstract Views: 502
PDF Downloads: 273
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.