Book description
Mobile agents are software nomads that act as your personal representative, working autonomously through networks. They are able to visit network nodes directly using available computing power and are not limited by platform. This emerging field is now poised to become a cornerstone for new Web-based ubiquitous computing environments. Mobile Agents provides a practical introduction to mobile agent technology and surveys the state of the art in mobile agent research. Students and researchers can use the book as an introduction to the concepts and possibilities of this field and as an overview of ongoing research. Developers can use it to identify the capabilities of the technology to decide if mobile agents are the right solution for them. Practioners can also gain hands-on experience in programming mobile agents through exploration of the source code for a complete mobile agent environment available through the companion website.*Summarizes the state of the art in mobile agent research
*Identifies the benefits and limitations of current mobile agent technology to help developers understand the possibilities of this new field
*Extensive mobile agents web portal (www.mobile-agents.org) with the Java source code for a complete industrial-quality environment for mobile agents, with significant parts of the system open source
Table of contents
- Front Cover
- Mobile Agents: Basic Concepts, Mobility Models, and the Tracy Toolkit
- Copyright Page (1/3)
- Copyright Page (2/3)
- Copyright Page (3/3)
- Contents
- Preface (1/3)
- Preface (2/3)
- Preface (3/3)
-
Part I: Motivation for and Introduction to Mobile Agents
- Chapter 1. Designing Innovative Distributed Systems
-
Chapter 2. From Client-Server to Mobile Agents
- 2.1 A First Look at Mobile Agents
- 2.2 A Short History of Mobile Agents (1/2)
- 2.2 A Short History of Mobile Agents (2/2)
- 2.3 Similar but Different Concepts
- 2.4 Why Are Mobile Agents a Good Idea?
- 2.5 Possible Application Domains of Mobile Agents (1/2)
- 2.5 Possible Application Domains of Mobile Agents (2/2)
-
Part II: Mobile Agents — Concepts, Functions, and Possible Problems
-
Chapter 3. Mobile Agent Migration
- 3.1 The Mobile Agent Migration Process (1/3)
- 3.1 The Mobile Agent Migration Process (2/3)
- 3.1 The Mobile Agent Migration Process (3/3)
- 3.2 Effective Migration as a Core Feature of Mobile Agent Toolkits (1/5)
- 3.2 Effective Migration as a Core Feature of Mobile Agent Toolkits (2/5)
- 3.2 Effective Migration as a Core Feature of Mobile Agent Toolkits (3/5)
- 3.2 Effective Migration as a Core Feature of Mobile Agent Toolkits (4/5)
- 3.2 Effective Migration as a Core Feature of Mobile Agent Toolkits (5/5)
- 3.3 Design Issues of Agent Migration (1/5)
- 3.3 Design Issues of Agent Migration (2/5)
- 3.3 Design Issues of Agent Migration (3/5)
- 3.3 Design Issues of Agent Migration (4/5)
- 3.3 Design Issues of Agent Migration (5/5)
- 3.4 Reasoning about Improved Mobility Models (1/7)
- 3.4 Reasoning about Improved Mobility Models (2/7)
- 3.4 Reasoning about Improved Mobility Models (3/7)
- 3.4 Reasoning about Improved Mobility Models (4/7)
- 3.4 Reasoning about Improved Mobility Models (5/7)
- 3.4 Reasoning about Improved Mobility Models (6/7)
- 3.4 Reasoning about Improved Mobility Models (7/7)
-
Chapter 4. Mobile Agent Communication
- 4.1 Introduction
- 4.2 Classification of Communication Models for Mobile Agents
- 4.3 Solutions to Provide Location-Transparent Communication (1/4)
- 4.3 Solutions to Provide Location-Transparent Communication (2/4)
- 4.3 Solutions to Provide Location-Transparent Communication (3/4)
- 4.3 Solutions to Provide Location-Transparent Communication (4/4)
-
Chapter 5. Mobile Agent Security
- 5.1 Security Requirements and Cryptographic Techniques (1/2)
- 5.1 Security Requirements and Cryptographic Techniques (2/2)
- 5.2 Taxonomy of Possible Attacks (1/2)
- 5.2 Taxonomy of Possible Attacks (2/2)
- 5.3 Introduction to the Proposed Solutions
- 5.4 Organizational Solutions
- 5.5 Protecting Mobile Agents (1/4)
- 5.5 Protecting Mobile Agents (2/4)
- 5.5 Protecting Mobile Agents (3/4)
- 5.5 Protecting Mobile Agents (4/4)
- 5.6 Protecting Agencies (1/4)
- 5.6 Protecting Agencies (2/4)
- 5.6 Protecting Agencies (3/4)
- 5.6 Protecting Agencies (4/4)
-
Chapter 3. Mobile Agent Migration
-
Part III: The Kalong Mobility Model — Specification and Implementation
-
Chapter 6. Specifications of the Kalong Mobility Model
- 6.1 Introduction
- 6.2 Kalong Vocabulary
- 6.3 Agent Model (1/2)
- 6.3 Agent Model (2/2)
- 6.4 Application Programming Interfaces (1/3)
- 6.4 Application Programming Interfaces (2/3)
- 6.4 Application Programming Interfaces (3/3)
- 6.5 The SATP Migration Protocol (1/3)
- 6.5 The SATP Migration Protocol (2/3)
- 6.5 The SATP Migration Protocol (3/3)
- Chapter 7. Using Kalong
- Chapter 8. Evaluation
-
Chapter 6. Specifications of the Kalong Mobility Model
- Part IV: The Tracy Mobile Agent Toolkit
- Bibliography (1/4)
- Bibliography (2/4)
- Bibliography (3/4)
- Bibliography (4/4)
- Index (1/5)
- Index (2/5)
- Index (3/5)
- Index (4/5)
- Index (5/5)
Product information
- Title: Mobile Agents
- Author(s):
- Release date: January 2005
- Publisher(s): Morgan Kaufmann
- ISBN: 9780080473482
You might also like
book
Designing Data-Intensive Applications
Data is at the center of many challenges in system design today. Difficult issues need to …
book
Generative Deep Learning, 2nd Edition
Generative AI is the hottest topic in tech. This practical book teaches machine learning engineers and …
book
Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow, 3rd Edition
Through a recent series of breakthroughs, deep learning has boosted the entire field of machine learning. …
audiobook
The Design of Everyday Things
First, businesses discovered quality as a key competitive edge; next came science. Now, Donald A. Norman, …