Mobile Agents

Book description

Mobile agents are software nomads that act as your personal representative, working autonomously through networks. They are able to visit network nodes directly using available computing power and are not limited by platform. This emerging field is now poised to become a cornerstone for new Web-based ubiquitous computing environments. Mobile Agents provides a practical introduction to mobile agent technology and surveys the state of the art in mobile agent research. Students and researchers can use the book as an introduction to the concepts and possibilities of this field and as an overview of ongoing research. Developers can use it to identify the capabilities of the technology to decide if mobile agents are the right solution for them. Practioners can also gain hands-on experience in programming mobile agents through exploration of the source code for a complete mobile agent environment available through the companion website.

*Summarizes the state of the art in mobile agent research
*Identifies the benefits and limitations of current mobile agent technology to help developers understand the possibilities of this new field
*Extensive mobile agents web portal (www.mobile-agents.org) with the Java source code for a complete industrial-quality environment for mobile agents, with significant parts of the system open source

Table of contents

  1. Front Cover
  2. Mobile Agents: Basic Concepts, Mobility Models, and the Tracy Toolkit
  3. Copyright Page (1/3)
  4. Copyright Page (2/3)
  5. Copyright Page (3/3)
  6. Contents
  7. Preface (1/3)
  8. Preface (2/3)
  9. Preface (3/3)
  10. Part I: Motivation for and Introduction to Mobile Agents
    1. Chapter 1. Designing Innovative Distributed Systems
    2. Chapter 2. From Client-Server to Mobile Agents
      1. 2.1 A First Look at Mobile Agents
      2. 2.2 A Short History of Mobile Agents (1/2)
      3. 2.2 A Short History of Mobile Agents (2/2)
      4. 2.3 Similar but Different Concepts
      5. 2.4 Why Are Mobile Agents a Good Idea?
      6. 2.5 Possible Application Domains of Mobile Agents (1/2)
      7. 2.5 Possible Application Domains of Mobile Agents (2/2)
  11. Part II: Mobile Agents — Concepts, Functions, and Possible Problems
    1. Chapter 3. Mobile Agent Migration
      1. 3.1 The Mobile Agent Migration Process (1/3)
      2. 3.1 The Mobile Agent Migration Process (2/3)
      3. 3.1 The Mobile Agent Migration Process (3/3)
      4. 3.2 Effective Migration as a Core Feature of Mobile Agent Toolkits (1/5)
      5. 3.2 Effective Migration as a Core Feature of Mobile Agent Toolkits (2/5)
      6. 3.2 Effective Migration as a Core Feature of Mobile Agent Toolkits (3/5)
      7. 3.2 Effective Migration as a Core Feature of Mobile Agent Toolkits (4/5)
      8. 3.2 Effective Migration as a Core Feature of Mobile Agent Toolkits (5/5)
      9. 3.3 Design Issues of Agent Migration (1/5)
      10. 3.3 Design Issues of Agent Migration (2/5)
      11. 3.3 Design Issues of Agent Migration (3/5)
      12. 3.3 Design Issues of Agent Migration (4/5)
      13. 3.3 Design Issues of Agent Migration (5/5)
      14. 3.4 Reasoning about Improved Mobility Models (1/7)
      15. 3.4 Reasoning about Improved Mobility Models (2/7)
      16. 3.4 Reasoning about Improved Mobility Models (3/7)
      17. 3.4 Reasoning about Improved Mobility Models (4/7)
      18. 3.4 Reasoning about Improved Mobility Models (5/7)
      19. 3.4 Reasoning about Improved Mobility Models (6/7)
      20. 3.4 Reasoning about Improved Mobility Models (7/7)
    2. Chapter 4. Mobile Agent Communication
      1. 4.1 Introduction
      2. 4.2 Classification of Communication Models for Mobile Agents
      3. 4.3 Solutions to Provide Location-Transparent Communication (1/4)
      4. 4.3 Solutions to Provide Location-Transparent Communication (2/4)
      5. 4.3 Solutions to Provide Location-Transparent Communication (3/4)
      6. 4.3 Solutions to Provide Location-Transparent Communication (4/4)
    3. Chapter 5. Mobile Agent Security
      1. 5.1 Security Requirements and Cryptographic Techniques (1/2)
      2. 5.1 Security Requirements and Cryptographic Techniques (2/2)
      3. 5.2 Taxonomy of Possible Attacks (1/2)
      4. 5.2 Taxonomy of Possible Attacks (2/2)
      5. 5.3 Introduction to the Proposed Solutions
      6. 5.4 Organizational Solutions
      7. 5.5 Protecting Mobile Agents (1/4)
      8. 5.5 Protecting Mobile Agents (2/4)
      9. 5.5 Protecting Mobile Agents (3/4)
      10. 5.5 Protecting Mobile Agents (4/4)
      11. 5.6 Protecting Agencies (1/4)
      12. 5.6 Protecting Agencies (2/4)
      13. 5.6 Protecting Agencies (3/4)
      14. 5.6 Protecting Agencies (4/4)
  12. Part III: The Kalong Mobility Model — Specification and Implementation
    1. Chapter 6. Specifications of the Kalong Mobility Model
      1. 6.1 Introduction
      2. 6.2 Kalong Vocabulary
      3. 6.3 Agent Model (1/2)
      4. 6.3 Agent Model (2/2)
      5. 6.4 Application Programming Interfaces (1/3)
      6. 6.4 Application Programming Interfaces (2/3)
      7. 6.4 Application Programming Interfaces (3/3)
      8. 6.5 The SATP Migration Protocol (1/3)
      9. 6.5 The SATP Migration Protocol (2/3)
      10. 6.5 The SATP Migration Protocol (3/3)
    2. Chapter 7. Using Kalong
      1. 7.1 Introduction
      2. 7.2 Using the Kalong Component (1/4)
      3. 7.2 Using the Kalong Component (2/4)
      4. 7.2 Using the Kalong Component (3/4)
      5. 7.2 Using the Kalong Component (4/4)
      6. 7.3 Extending Kalong (1/4)
      7. 7.3 Extending Kalong (2/4)
      8. 7.3 Extending Kalong (3/4)
      9. 7.3 Extending Kalong (4/4)
    3. Chapter 8. Evaluation
      1. 8.1 Related Work
      2. 8.2 Methodology
      3. 8.3 Results of the Basic Experiments (1/6)
      4. 8.3 Results of the Basic Experiments (2/6)
      5. 8.3 Results of the Basic Experiments (3/6)
      6. 8.3 Results of the Basic Experiments (4/6)
      7. 8.3 Results of the Basic Experiments (5/6)
      8. 8.3 Results of the Basic Experiments (6/6)
  13. Part IV: The Tracy Mobile Agent Toolkit
    1. Chapter 9. Running a Tracy Agency
      1. 9.1 Welcome to Tracy
      2. 9.2 Installation of Tracy (1/2)
      3. 9.2 Installation of Tracy (2/2)
      4. 9.3 Starting and Stopping a Tracy Agency
      5. 9.4 Installation and Usage of Basic Plugins (1/3)
      6. 9.4 Installation and Usage of Basic Plugins (2/3)
      7. 9.4 Installation and Usage of Basic Plugins (3/3)
    2. Chapter 10. Programming Agents with Tracy
      1. 10.1 The First Agent
      2. 10.2 Survival
      3. 10.3 Place
      4. 10.4 Messaging
      5. 10.5 Migration (1/5)
      6. 10.5 Migration (2/5)
      7. 10.5 Migration (3/5)
      8. 10.5 Migration (4/5)
      9. 10.5 Migration (5/5)
      10. 10.6 Managing Logical-Agency Networks (1/2)
      11. 10.6 Managing Logical-Agency Networks (2/2)
  14. Bibliography (1/4)
  15. Bibliography (2/4)
  16. Bibliography (3/4)
  17. Bibliography (4/4)
  18. Index (1/5)
  19. Index (2/5)
  20. Index (3/5)
  21. Index (4/5)
  22. Index (5/5)

Product information

  • Title: Mobile Agents
  • Author(s): Peter Braun, Wilhelm R. Rossak
  • Release date: January 2005
  • Publisher(s): Morgan Kaufmann
  • ISBN: 9780080473482