Mobile agents are concerned with self-contained and identifiable computer programs that can move within a network and can act on behalf of the user and another entity. To reduce information overload and to efficiently use network resources, most current research work on the mobile agent paradigm has
Mobile Agents for Telecommunication Applications
- Publisher
- Kogan Page Science
- Year
- 2003
- Tongue
- English
- Leaves
- 139
- Series
- Innovative technology series. Information systems and networks
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Provides an overview of how the mobile code can be used in networking with the aim of developing further intelligent information retrieval, network and mobility management, and network services.
โฆ Table of Contents
Mobile Agents for
Telecommunication
Applications......Page 3
Copyright......Page 6
Contents......Page 7
Foreword Eric Horlait......Page 9
1. Introduction......Page 11
2.1 Using probabilistic encryption......Page 13
2.2 Protocols based on oblivious transfer......Page 14
2.3 Autonomous protocols......Page 16
2.4 Using group- oriented cryptography......Page 17
3. Trust versus communication overhead......Page 20
3.1 A trusted third party......Page 21
3.3 A virtual trusted third party......Page 22
4. Case study: second price auctions......Page 24
5. Conclusion......Page 25
1. Introduction......Page 29
2. Supporting QoS protocols with software agents......Page 30
3. Resource allocation in network domains......Page 31
3.1 Negotiation phase......Page 32
3.3 Adaptation phase......Page 34
4. Domain agency architecture......Page 35
4.1 Domain Resource Reservation Agent......Page 36
4.3 Domain Admission Control Agent......Page 37
5. Domain agency communications protocol......Page 38
5.1 Interactions between domain agencies......Page 39
5.2 Status of current ( immediate and advance) reservations......Page 40
6.1 Simulation experience......Page 41
6.2 Implementation directions......Page 44
7. Conclusion......Page 45
1. Introduction......Page 49
2. Related work......Page 52
3. The need for terminal adaptation......Page 55
4. Adaptation by partitioning......Page 56
4.2 How to partition an application......Page 57
4.3 Starting the application......Page 61
4.4 Repartitioning......Page 62
4.6 An example scenario......Page 65
5. Conclusions and future work......Page 67
1. Introduction......Page 71
2. Related work......Page 72
3. Mobile code toolkit......Page 73
3.1 Toolkit design......Page 74
3.3 Toolkit performance......Page 75
3.4 Automatic agent identification......Page 76
4. Case study......Page 77
5. Scalability......Page 78
6. Conclusions and future work......Page 82
1. Introduction......Page 87
2.1 Node Operating System......Page 89
2.2 Active transport......Page 91
2.3 Execution Environments, Active Applications and User Applications......Page 92
3.1 Odyssey architecture......Page 94
3.2 Active Network Node......Page 96
3.3 Active Reservation Protocol......Page 97
3.4 ANTS......Page 99
3.6 The YAAP active platform......Page 100
4. Conclusions......Page 102
1. Introduction......Page 105
2. Background......Page 106
2.2 Active networks......Page 107
2.3 Mobile agents and active networks......Page 109
2.4 Resource management......Page 110
3. Resource trading model......Page 112
3.1 Resource manager agents......Page 113
3.2 Capsules as reactive user agents......Page 114
4. Congestion control for a concast audio mixer......Page 118
5. Simulations......Page 121
6. Conclusions and future work......Page 126
Index......Page 131
๐ SIMILAR VOLUMES
This book constitutes the refereed proceedings of the Third International Workshop on Mobile Agents for Telecommunication Applications, MATA 2001, held in Montreal, Canada in August 2001. The 26 revised full papers presented were carefully reviewed and selected for inclusion in the volume. Among the
<P>This book constitutes the refereed proceedings of the 5th International Workshop on Mobile Agents for Telecommunications Applications, MATA 2003, held in Marrakech, Morocco in October 2003.</P><P></P><P>The 27 revised full papers presented were carefully reviewed and selected for inclusion in the