O'Reilly logo

Mobile Agents by Wilhelm R. Rossak, Peter Braun

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

436 Index
Persistence plugin, 331
personal digital assistants (PDAs), 5
PersonaLink, 176
pervasive computing, 4
ping message, 237–238
defined, 246
parameter, 246
See also SATP messages
ping-pong migration time
compression and, 303
defined, 296
in different WANs, 301
high-bandwidth networks and, 299
ISDN connection and, 300
security extensions and, 306
transmission protocols and, 306
See also migration times
pipeline steps
configuration, 373–374
defined, 369
execution, 373
mandatory, 373–374
modification at runtime, 370
processing, 370
registration, 372–373
See also MDL plugin
Place plugin, 361–363
defined, 331
example, 362–363
methods, 361–362
purpose, 361
See also plugins; Tracy toolkit
place service, 361–363
API, 361
context object of, 363
plugins
agency commands for, 345–346
AgencyShell, 331, 340, 341–348
AgentLauncher, 331, 341, 348–349
AgentPolicy, 331
Blackboard, 331
configuring, 336
defined, 330, 332
directory, 334, 336
DomainManager, 331, 393–399
Email, 331
installation, 334, 340–349
Key, 331
Message, 331, 363–368
Migration, 331, 368–391
Persistence, 331
Place, 331, 361–363
resources, 399
Survival, 331, 359–361
Taas, 332, 341
usage, 340–349
WebService, 332
See also Tracy toolkit
Pointer to Child (PTC), 155
combined with forwarding pointers, 157
defined, 156
message delivery, 156
migration in, 156
See also hierarchical approaches
Pointer to Leaf (PTL), 155
defined, 155
message delivery, 156
migration in, 156
See also hierarchical approaches
point-to-multi-point communication, 138
point-to-point communication, 137
policy files, 201
port numbers, 377, 378
port resolution service, 79
prepare message, 253
prevention, attack, 178–184
encrypted functions, 178–179
environmental key generation,
181–184
time-limited black boxes, 179–181
See also attacks; security
private keys, 163, 284, 285, 287
profiling, 320–321
defined, 320
dynamic, 320
static, 320–321
programming
Kalong scripts, 383–385
languages, 40–41
migration strategies, 385–391
programming mobile agents, 374–382
data items, 380–382
migration errors, 378–380
simple migration, 374–378
proof-carrying code (PCC), 205–206
as alternative technique, 205
defined, 205
multi-threaded programs and, 206

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required