Mobile Agent - Paper Presentation
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Computer Science Clay
Active In SP

Posts: 712
Joined: Jan 2009
01-03-2009, 10:39 AM

Mobile Agent - Paper Presentation

In computer science, a mobile agent is a composition of computer software and data which is able to migrate (move) from one computer to another autonomously and continue its execution on the destination computer.

Mobile Agent, namely, is a type of software agent, with the feature of autonomy, social ability, learning, and most important, mobility. When the term mobile agent is used, it refers to a process that can transport its state from one environment to another, with its data intact, and still being able to perform appropriately in the new environment.

Mobile agents decide when and where to move next, which is evolved from RPC. So how exactly does a mobile agent move? Just like a user doesn t really visit a website but only make a copy of it, a mobile agent accomplishes this move through data duplication. When a mobile agent decides to move, it saves its own state and transports this saved state to next host and resume execution from the saved state.

Mobile agents are a specific form of mobile code and software agents paradigms. However, in contrast to the Remote evaluation and Code on demand paradigms, mobile agents are active in that they may choose to migrate between computers at any time during their execution. This makes them a powerful tool for implementing distributed applications in a computer network.


1) Move computation to data, reducing network load.

2) Asynchronous execution on multiple heterogeneous network hosts.

3) Dynamic adaptation - actions are dependent on the state of the host environment.

4) Tolerant to network faults - able to operate without an active connection between client and server.

5) Flexible maintenance - to change an agent s actions, only the source (rather than the computation hosts) must be updated


1) Resource availability, discovery, monitoring

2) Information retrieval

3) Network management

4) Dynamic software deploymen
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
project report helper
Active In SP

Posts: 2,270
Joined: Sep 2010
22-10-2010, 04:10 PM

.ppt   agents.ppt (Size: 2.6 MB / Downloads: 393)

Mobile Agents

Olga Gelbart

What is an agent?

A program (“software agent”), e.g.,
Personal assistant (mail filter, scheduling)
Information agent (tactical picture agent)
E-commerce agent (stock trader, bidder)
Recommendation agent (Firefly,
A program that can
interact with users, applications, and agents
collaborate with the user
Software agents help with repetitive tasks
seminar class
Active In SP

Posts: 5,361
Joined: Feb 2011
04-03-2011, 11:06 AM

K Srikanth Chetty

.ppt   mobile.ppt (Size: 2.98 MB / Downloads: 109)
What is an agent?
A program that can
interact with users, applications, and agents
collaborate with the user
Software agents help with repetitive tasks
A program (“software agent”), e.g.,
Personal assistant (mail filter, scheduling)
E-commerce agent (stock trader, bidder)
Is everything an “agent”?
Not all programs are agents
Agents are
What is a mobile agent?
In a broad sense, an agent is any program that acts on behalf of a (human) user. A mobile agent then is a program which represents a user in a computer network, and is capable of migrating autonomously from node to node, to performs some computation on behalf of the user.
Part-View of Agent Topology
How it works?
Mobile Agent Attributes
Execution state
Object state
Agent system type
Client-Server Versus Mobile Agents
Benefits of mobile agents
Bandwidth conservation
Reduction of latency
Reduction of completion time
Asynchronous (disconnected) communications
Load balancing
Bandwidth conservation
Reduce latency
Reduce Completion Time
Load balancing
Threats posed by mobile agents
 Destruction of
 data, hardware, current environment
 Denial of service
 block execution
 take up memory
 prevention of access to resources/network
 Breach of privacy / theft of resources
 obtain/transmit privileged information
 use of covert channels
 Harassment
 Display of annoying/offensive information
 screen flicker
 Repudiation
 ability to deny an event / action ever happened
Protection methods against malicious mobile agents
 Authenticating credentials
 certificates and digital signatures
 Access Control and Authorization
 Reference monitor
 security domains
 policies
 Monitoring
 auditing of agent’s activities
 setting limits
 Code Verification - proof-carrying code
Possible attacks on mobile agents
 Denial of service
 Replay
 Eavesdropping
 Communication
 Code & data
 Tamper attack
 Communication
 Code & data
Protection of mobile agents
Code obfuscation
Application: Technical reports
Application: Military
Application: e-commerce
Swetha Jain 150991
Active In SP

Posts: 7
Joined: Feb 2011
05-03-2011, 12:56 PM

i want project and implimentation details as well as circuit diagram
seminar project explorer
Active In SP

Posts: 231
Joined: Feb 2011
06-03-2011, 09:44 AM

The mobile agent is a software and hence does not have any circuit diagram. The necessary details about the project and implimentation has been described in this thread.
seminar class
Active In SP

Posts: 5,361
Joined: Feb 2011
12-03-2011, 02:53 PM

Presented By
Gohel Himanshu Ashokbhai

.doc   MobileAgent.doc (Size: 3.43 MB / Downloads: 50)
As the Internet constantly expands, the amount of available on-line information expands correspondingly. The issue of how to efficiently find, gather and retrieve this information has led to the research and development of systems and too that attempt to provide a solution to this problem. These systems and tools are based on the use of MAs’ technology. Mobile agents are processes (e.g. executing programs) that can migrate from one machine of a system to another machine (usually in the same system) in order to satisfy requests made by their clients . Mainly, a mobile agent executes on a machine that hopefully provides the resource or service that it needs to perform its job. If the machine does not contain the needed resource/service, or if the mobile agent requires a different resource/service on another machine, the state information of the mobile agent is saved in pre-defined manner, then transfer to a machine containing the necessary resource/service is initiated, and the mobile agent resumes execution at the new machine. Advantages of using MAs include low network bandwidth since they only move when they need to continue execution even disconnected from the network (typically for disconnected mode), ability to clone itself to perform parallel execution, easy implementation, deployment, and reliability. The rest of the paper is organised as follows.
What Is SoftWare Agent ?
Agents can be autonomous entities, deciding their next step without the interference of a user ,or they can be controllable ,serving as a me diary between the user and another agent, thereby having some amount of Artificial Intelligence. An agent is simply another kind of software abstraction, an abstraction in the same way that methods, functions, and objects are software abstractions. An object is a high-level abstraction that describes methods and attributes of a software component.. We may also say that” Agents can exist in a structure as complex as the global Internet or one as simple as a module of a common program.”
Types Of SoftWare Agent

There are many possible conceptions of Agent . Characteristics . of Agents Include:-
• Proactive ness:-The agent has an agenda to pursue and will persist in trying to achieve its aims.
• Autonomy:-It enables an agent to perform a job or step without direct intervention of its user and it has full control over its actions and internal state.
• Mobility:-It can passes the ability to move from place to place in a network like Internet .It can move itself and execute afresh at a new location.
Sometimes an agent performs a task at one location ,saves the state ,migrates to a new location and restores its execution state to continue where it left off
• Intelligence:- An agent displays intelligence by reasoning from the goal and knowledge it has . It can learn from its environment and change its behavior through experience and adapt itself.
Application of Agent technology
Information Retrieval Agents
Although the architecture diagram shown in Figure may appear at first glance to be rather similar to that of the first class of system discussed in the previous section, the inclusion of the arrow indicating a flow of communication from the interface agent to the information resources reflects a significant step up in sophistication. This is the first class of system that exhibits a significant degree of proactively. The extra arrow on the reference architecture indicates that the interface agent requests particular pieces of information from the information sources, rather than passively filtering information presented to it.
This approach lends itself particularly nicely to being implemented using a multi-agent system. Using this approach each separate information source would be modeled by an agent and the interface agent would broadcast a request for information. Upon receipt of such a request each information agent would reply with a Message containing all the information they have access too with relevance to the initial request. The interface agent, having received all these separate pieces of information, is responsible fo aggregating the information sensibly and presenting the information in a unified and easy to access fashion. This approach brings with it a number of benefits to compensate for the added complexity. Chiefly it allows us to deal with distributed sources of information effectively, for example the World Wide Web. It also brings benefits in terms of scalability in that the problems associated with incorporating a new knowledge source are greatly reduced as we simply need to design a new agent and slot it in. Systems of this complexity are very thin on the ground. It is clearly of importance that the information requested satisfies the users query or goals. Thus the request sent by the interface agent must be based both on the information obtained directly from the interface and also upon any user model the system has managed to build up. This involves the provision of multimedia kiosks at several sites around Ireland drawing social welfare and employment information from a number of distributed knowledge sources. A number of systems attempt to provide virtual newspapers which draw information from a number of different sources based upon a user’s expressed interests. This type of system differs from the traditional newspapers in that the user of the system explicitly chooses what information should be present in their own personal newspaper. This allows the newspapers to remain up to date although typically at the expense of the in-depth analysis of the relevant issues mentioned earlier. Newshound provides a somewhat different service which is charged for. Here the users enter keywords which tell the system what news items they are, possibly are and definitely are not interested in. Again the system returns news articles drawn from a variety of online news sources (mainly newswires).
• E-Commerce
software agents are an integral part of the overall system and method of approach. There are user agents acting on behalf of the consumer and business agents representing the suppliers. Although currently beyond the state of the art, it will not be long before users will be able to delegate to their software agent the task of getting cinema tickets to see one of the latest releases on Saturday night and then booking a meal in a nearby restaurant afterwards. Given this objective and knowledge of its user’s preferences (eg vegetarian, no spicyfood, comedies rather than action films, etc.), the proxy will enter the appropriate electronic marketplace where it will encounter the business agents
seminar paper
Active In SP

Posts: 6,455
Joined: Feb 2012
05-03-2012, 12:18 PM

to get information about the topic mobile agents in network management full report ppt and related topic refer the link bellow




seminar and presentationproject and implimentationsshowthread.php?tid=2634&google_seo=EPCw+++++++++++++++++++++&pid=2767

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  vowifi presentation jaseelati 0 217 02-03-2015, 01:29 PM
Last Post: jaseelati
  abstract cybercrime and security paper presentation jaseelati 0 291 13-02-2015, 02:01 PM
Last Post: jaseelati
  advantages and disadvantages of mobile phones in telugu jaseelati 0 233 07-02-2015, 02:21 PM
Last Post: jaseelati
  ethical hacking research paper pdf jaseelati 0 239 31-01-2015, 01:48 PM
Last Post: jaseelati
  mobile phone based attendance tracking system ppt jaseelati 0 330 30-01-2015, 01:57 PM
Last Post: jaseelati
  mobile advantages and disadvantages in hindi wikipedia jaseelati 0 653 29-01-2015, 01:49 PM
Last Post: jaseelati
  mobile data internetworking standards jaseelati 0 334 29-01-2015, 01:15 PM
Last Post: jaseelati
  smart quill IEEE paper 2 443 16-01-2015, 04:44 PM
Last Post: mkaasees
  google glass ieee paper pdf jaseelati 0 423 01-01-2015, 04:25 PM
Last Post: jaseelati
  sniffer for detecting lost mobiles ieee paper jaseelati 0 217 23-12-2014, 01:32 PM
Last Post: jaseelati