Mobile Agent Community Service Place Jeff Schott CS590L Spring 2004.

Slides:



Advertisements
Similar presentations
Agents & Mobile Agents.
Advertisements

Layer 3 Switching. Routers vs Layer 3 Switches Both forward on the basis of IP addresses But Layer 3 switches are faster and cheaper However, Layer 3.
Chapter 16: Multiagent Systems Service-Oriented Computing: Semantics, Processes, Agents – Munindar P. Singh and Michael N. Huhns, Wiley, 2005.
P. Bellavista, A. Corradi, C. Stefanelli - ISADS'99 - Tokyo, 22 March A Secure and Open Mobile Agent (SOMA) Programming Environment Paolo Bellavista,
資 管 Lee Lesson 12 IPv6 Mobility. 資 管 Lee Lesson Objectives Components of IPv6 mobility IPv6 mobility messages and options IPv6 mobility data structures.
Network Layer and Transport Layer.
Distributed Network and System Management Based on Intelligent and Mobile Agents Jianguo Ding 25/03/2002 DVT-DatenVerarbeitungsTechnik FernUniversität.
1 On the Duality of Operating System Structures by Hugh C. Lauer, Xerox Corporation and Roger M. Needham, Cambridge University Presented by Scott Fletcher.
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
COS 420 Day 20. Agenda Group Project Discussion Protocol Definition Due April 12 Paperwork Due April 29 Assignment 3 Due Assignment 4 is posted Last Assignment.
Managing Agent Platforms with the Simple Network Management Protocol Brian Remick Thesis Defense June 26, 2015.
Managing Agent Platforms with SNMP Brian Remick Research Proposal Defense June 27, 2015.
Supervisor : Gil Zussman Dror Barash Eran Golani.
JADE Java Agent Development Framework An Overview.
Tcl Agent : A flexible and secure mobile-agent system Paper by Robert S. Gray Dartmouth College Presented by Vipul Sawhney University of Pennsylvania.
Color Aware Switch algorithm implementation The Computer Communication Lab (236340) Spring 2008.
Distributed process management: Distributed deadlock
Module 14: Scalability and High Availability. Overview Key high availability features available in Oracle and SQL Server Key scalability features available.
Service Broker Lesson 11. Skills Matrix Service Broker Service Broker, provides a solution to common problems with message delivery and consistency that.
Event-Driven Architecture Team 4 – Idris Callins, Jestin Keaton, Bill Pegg, Steven Ng.
OSI Model. Open Systems Interconnection (OSI) is a set of internationally recognized, non-proprietary standards for networking and for operating system.
Switching Techniques Student: Blidaru Catalina Elena.
Inter-process Communication and Coordination Chaitanya Sambhara CSC 8320 Advanced Operating Systems.
Presented by Robert Zaremba.  Remote messages must be sent to a message queue so that components are decoupled  Both sides of a communication must be.
Middleware-Based OS Distributed OS Networked OS 1MEIT Application Distributed Operating System Services Application Network OS.
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
IPv6 Mobility Milo Liu SW2 R&D ZyXEL Communications, Inc.
1 A Mutual Exclusion Algorithm for Ad Hoc Mobile networks Presentation by Sanjeev Verma For COEN th Nov, 2003 J. E. Walter, J. L. Welch and N. Vaidya.
Direct Project Direct + Policy Enablement. 12/06/10 Overview Policy Role In Direct Policy Enablement Security and Trust Support Architecture Tool Demo.
Software Agents: An Overview by Hyacinth S. Nwana and Designing Behaviors for Information Agents by Keith Decker, Anandeep Pannu, Katia Sycara and Mike.
Professor OKAMURA Laboratory. Othman Othman M.M. 1.
A Study of Live Video Streaming over Highway Vehicular Ad hoc Networks Meenakshi Mittal ©2010 International Journal of Computer Applications ( )Volume.
UbiStore: Ubiquitous and Opportunistic Backup Architecture. Feiselia Tan, Sebastien Ardon, Max Ott Presented by: Zainab Aljazzaf.
Object Management Group (OMG) Specifies open standards for every aspect of distributed computing Multiplatform Model Driven Architecture (MDA)
MagicNET: Security Architecture for Creation, Classification, and Validation of Trusted Mobile Agents Presented By Mr. Muhammad Awais Shibli.
Switching breaks up large collision domains into smaller ones Collision domain is a network segment with two or more devices sharing the same Introduction.
User Datagram Protocol (UDP) Chapter 11. Know TCP/IP transfers datagrams around Forwarded based on destination’s IP address Forwarded based on destination’s.
Chapter 2: System Models. Objectives To provide students with conceptual models to support their study of distributed systems. To motivate the study of.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Delivery, Forwarding, and Routing of IP Packets
CSCI 465 D ata Communications and Networks Lecture 15 Martin van Bommel CSCI 465 Data Communications & Networks 1.
MagicNET: Security System for Protection of Mobile Agents.
1 Network Layer Lecture 16 Imran Ahmed University of Management & Technology.
Chapter 5 Concurrency: Mutual Exclusion and Synchronization Operating Systems: Internals and Design Principles, 6/E William Stallings Patricia Roy Manatee.
Structured Control for Autonomous Robots Reid G. Simmons Carnegie Mellon University Uday Rajanna.
CS533 - Concepts of Operating Systems 1 The Mach System Presented by Catherine Vilhauer.
Understanding IPv6 Slide: 1 Lesson 12 IPv6 Mobility.
DEAS2005Michael Shin Copyright1 Connector-Based Self-Healing Mechanism for Components of a Reliable System Michael E. Shin Department of Computer Science.
Chapter 5 Concurrency: Mutual Exclusion and Synchronization Operating Systems: Internals and Design Principles, 6/E William Stallings Patricia Roy Manatee.
Allocating IP Addressing by Using Dynamic Host Configuration Protocol.
Agent Overview. Topics Agent and its characteristics Architectures Agent Management.
NEMO Lightweight Mobile Agent Technology. Outline Mobile Agents What are they ? Advantages and Applications NEMO Architecture Details Demo: Mobile ePlazza.
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
Institute for Visualization and Perception Research 1 © Copyright 1999 Haim Levkowitz Java-based mobile agents.
Enterprise Network Systems TCP Mark Clements. 3 March 2008ENS 2 Last Week – Client/ Server Cost effective way of providing more computing power High specs.
1 SERVICE ORIENTED ARCHITECTURE ANTHONY GACHANGO D61/70547/2008 DIS 601.
Foundation For Intelligent Physical Agents FIPA Abstract Architecture Specification Presented by Michal Zaremba DERI.
REVIEW OF “ON THE DUALITY OF OPERATING SYSTEM STRUCTURES” Paper by Hugh C. Lauer and Roger M. Needham Presentation by Erin Chapman.
EEL 5937 Mobile agents (2) EEL 5937 Multi Agent Systems Lotzi Bölöni.
UDP: User Datagram Protocol Chapter 12. Introduction Multiple application programs can execute simultaneously on a given computer and can send and receive.
MagicNET: XACML Authorization Policies for Mobile Agents Mr. Awais Shibli.
Real-Time Systems Laboratory Seolyoung, Jeong JADE (Java Agent DEvelopment framework )
COMP8330/7330/7336 Advanced Parallel and Distributed Computing Communication Costs in Parallel Machines Dr. Xiao Qin Auburn University
Development of concurrent and distributed programs with the Actor model and Akka César Aguilera Padilla Thematic CERN School of Computing Split, 27th of.
Data Transport to the Cloud
ARP and RARP Objectives Chapter 7 Upon completion you will be able to:
Chapter 3 Part 3 Switching and Bridging
Switching Techniques.
Chapter 3 Part 3 Switching and Bridging
Presentation transcript:

Mobile Agent Community Service Place Jeff Schott CS590L Spring 2004

Mobile Agents Autonomous, Mobile Software Processes Seek out resources to carry out a task Based on current state, can plan future actions

Mobile Agent Standards Foundation for Intelligent Physical Agents (FIPA) –Agents –Directory Services –Messages Object Management Group (OMG) Mobile Agent System Interoperability Facilities (MASIF) –Agents –Agent Systems (Made up of Places) –Communication Infrastructure

Hybrid Community Agents Directory Services Service Places Messages Agent Communication?

Why Follow Standards? They’re Standard Narrow Scope

A Potential Problem - Starvation Focused Overload or “Flash Crowd” –Incorrect Service Advertisement –Correct but Popular Service Advertisement General Congestion

Potential Solutions for Starvation OS-Type Priority Mechanism –Escalating Priority Based on Age –Preemption Move to Another Node –Decision Based On: Conditions in Current Node Other Available Services “Eat” Other Agents

Who Facilitates the Solutions? Service Place

Service Place Architecture Extendible –New services can be added Modular –Services can be “plugged in to” base Service Place Modifiable –Service can be changed –Service can be completely removed

Example Services Docking Queuing and Task Execution Next Hop Determination Undocking

Some Considerations Where is the queue data structure kept? How can it be accessed? Starvation control mechanism may depend on data structure How do modules communicate with each other? Do they need to? Should there be a base service place? Maybe just a queue and queue management system A Go/No Go module could be added as a secondary starvation control mechanism

Example Architecture Queue Management System Docking Task Execution Next Hop Resolution Undocking

Architectural Components Docking - listen at incoming port. Store arriving agents in data structure. Pass to QMS. QMS - holds queue data structure. Enqueue agents. Dequeue agents for service. Handle priority mechanism. Task Execution - service next agent from QMS. Send to next hop resolution if done. Send to QMS if not. Next Hop Resolution - working in concert with directory services, helps agent to determine next destination. Send to undocking. Undocking - Place agent on outgoing port to next destination.