Mobile agent paradigm derives from two basic disciplines –artificial intelligence from where the concept of an agent
originated and distributed systems that define the notion of code mobility having found applications in several areas. However, the
implementation of an agent-based system can be through any client/server technology, it is different from classical client/server
systems because there is no clear distinction between a client and a server. The mobile agent technology offers several unique
capabilities to address the challenges in this area. The objective of this research is to; design a Mobile Agent System for monitoring
and evaluating security applications in a network environment and develop a mobile agent capable of increasing the performance of
the mobile agent by reducing the size of the agent and also to develop a mobile agent that will be acceptable to all hosts.
Published In:IJCSN Journal Volume 6, Issue 6
Date of Publication : December 2017
Pages : 826-834
Figures :06
Tables : 02
Amosa Babalola : is a Chief
Lecturer at the Federal Polytechnic, Ede, Nigeria
Holds a Ph.D. in Computer Science, and he is
presently at San Juan de la Cruz, University,
San Jose, Costa Rica. His area of specialization
includes; Mobile Agents, Health informatics,
Databases and Steganography. He has published
a number of referred papers at local and
international levels.
Onyeka Ndidi : Department of Computer Science, Federal Polytechnic, Ede. Nigeria.
Olaniyi Busayo : Department of Computer Science, Federal Polytechnic, Ede. Nigeria.
Babafemi Olusola : Department of Computer Science, Federal Polytechnic, Ede. Nigeria .
Mobile Agent, Performance, Computer Network, Code Mobility, Security Monitoring
In this research, we have presented how the
performance of mobile agent can be increased. The
major idea behind the model is to reduce the size of the
mobile agent. The model allows the mobile agents to
visit all the available places during the migration.
During migration, some nodes may refuse the mobile
agents because their sizes are large and not acceptable
to store them. The model can help in this situation. Two
experiments have been performed and according to the
result, the model proved its efficiency in reducing the
mobile agent size.
[1] S. A. Arekete, “Development of Mobile Agent for
Monitoring and Evaluation of User Activities in a
Network Environment”, Ph.D. thesis, Department of
Computer Science, Federal University of
Technology, Akure, Nigeria, 2013.
[2] D. Milojicic, “Agent Systems and Applications”.
IEEE Concurrency. Vol. 8, Issue 2, 2000, pp. 22-23.
[3] S. A. Arekete, O. C. Akinyokun, O. Olabode, and
B. K. Alese, “Design of a Mobile Agent for
Monitoring Activities of Users”. Computer
Engineering and Intelligent Systems. ISSN 2222-
1719, Vol. 4, No 3, 2013, pp. 12-24.
[4] L. Allan, and F. Karen, Network Management: A
Practical Perspective, Addison Wesley, 1993.
[5] B. Jean-Chrysostome, “Characterizing End-to-End
Delay and Packet Loss in the Internet,” Journal of
High-speed Networks. Available at
http://ils.unc.edu/dempsey/186500/bolot.pdf, 1993.
[6] K. Lai, and M. Baker, Measuring Link Bandwidths
using a Deterministic Model of Packet Delay, ACM
SIGCOMM Computer Communication Review,
2000.
[7] H. Saito, and T. Cusho, Design and Implementation
of a Network Performance Evaluation System
through Client Observation, Meiji University,
Japan, 2002.
[8] B. Troy, Network Performance Evaluation
Throughput, Computer Science Department, School
of Engineering, California Polytechnic State
University, California, 1998, pp. 1-20.
Available at;
http://www.ee.calpoly.edu/3comproject/seniorprojects/Bennett-Troy.pdf.
[9] F. Kamangar, D. Levine, G.V. Zaruba, and N.
Chitturi, “Distributed Network Monitoring Using
Mobile Agents Paradigm”, Proceedings of the
International Conference on Parallel and
Distributed Processing Techniques and Applications
(PDPTA’03), Arabnia H.R. and Mun Y.
(Eds.), 2003, pp. 951-957.
[10] A. A, Imianvan, “Development of a mobile agent
for evaluating the use of bandwidth in a computer
network.” A Ph.D. thesis in the Department of
Computer Science, Federal The university of
Technology, Akure, Nigeria, 2008.
[11]. O, C. Akinyokun, and A.A. Imianvan, “Mobile
Agent System for Computer Network
Management.” International Conference on
Advances in Engineering and Technology, 2009,
pp. 796-808.
[12] M. R. Genesereth, and S. P. Ketchpel, Software
Agents. In: Communication of the ACM, 37(7),
1994, pp. 48-53.
[13] V.R. Olga, K. Vladimir, J. Anupam, F. Tim, and Y.
Yelena, "Agents2go: An Infrastructure for
Location-Dependent Service Discovery in the
Mobile Electronic Commerce Environment": In
Proceedings, ACM Mobile Commerce Workshop,
2001.
[14] K. Lalana, "A Policy-Based Approach to Governing
Autonomous Behavior in Distributed
Environments": Ph.D. thesis, University of
Maryland Baltimore, 2004.
[15] C. Qiang, and A. Marshall, “Network Management
Performance Analysis and Scalability Tests: SNMP
vs. COBRA”. IEEE/IFIP Network Operations and
Management Symposium, NOMS, South Korea,
2004.
[16] S. Yashpal, G. Kapil, and S. Niranjan, “Dimensions
and Issues of Mobile Agent Technology”.
International Journal of Artificial Intelligence &
Applications. Vol. 3, No 5, 2012, pp.51-61.
[17] C. Lin, and V. Varadharajan, “Mobile trust: a trust
enhanced security architecture for Mobile Agent
Systems”. International Journal of Information
Security. Vol. 9, Issue 3, 2010, pp.153-178.
[18] R. Hassan, and A. Hair, “Towards a New security
Architecture of Mobile Agents”. International
Journal of Soft Computing and Engineering. Vol. 3,
Issue 6, 2014, pp. 55-60.
[19] R. Heady, G. Luger, A. Maccabe, and M. Servilla,
The architecture of a network Level Intrusion
detection system. Technical Report, University of
New Mexico, Department of Computer Science,
1990.
[20] T. Zhixin, “A mobile Agent-Based Server System
for Server Resources Monitoring”. Cybernetics and
Information Technologies Vol. 13, No4, 2013, pp.
104-117.
[21] L. S. Zeng, and H. Wang, “Generating Automatic
Fuzzy System from Relational Database System for
Estimating Null values”. Cybernetics and Systems.
40(6), 2009, pp.528-548.
[22] L. Yucheng, and L. Yubin, “A Monitoring System
Design Program Based on B/S Mode”. Proceedings
of 1st International Joint Conference on Intelligent
Computation Technology and Automation, China,
Changsha, 2010, pp.184-187.
[23] A, K. Sharma, A. Mishra, and V. Singh, “An
Intelligent Mobile-Agent Based Scalable Network
Management Architecture for Large-Scale
Enterprise System”. Int., Journal of Computer
Networks & Communications, Vol. 4, No 1, 2012,
pp.79-95.
[24] M. Breugst, and T. Magedanz, “On the usage of
Mobile Agent Platforms in Telecommunication
Environments”, 5th IS &N Conference, Antwerpen,
Belgium, 1998, pp. 25-28.
[25] P. Morreale, “Agents on the move, Spectrum”,
IEEE, Vol. 35, Issue 4, 1998, pp. 34 –41.
[26] OMG, Agent technology, Green Paper, Technical
Report ec#2000-03-01, Object Management Group,
March 2000. URL:
http://www.jamesodell.com/ec2000-08-01.pdf.
[27] O. Brousse, J. Guillot, G. Sassatelli, T. Gil, F.
Grize, and M. Robert, “Mobile Computing
Framework for Pervasive Adaptive Computing
Platforms”. International Journal of Distributed
Sensor Networks, 2012, pp.1-15.
[28] A. Mihailovic, A. Kousaridas, A. Jaron, P.
Pangalos, N. Alonistioti, and H. Aghvami, “ SelfManagement
for Access Points Coverage
Optimization and Mobility Agents Configuration in
Future Access Networks”. Wireless Personal
Communications. Vol. 72, Issue 1, 2013, pp.343-
374.
[29] R, Sedgewick, and K. Wayne, Algorithms. Fourth
edition. Addison-Wesley Professional,
Massachusetts, 2011.
[30] G. Ciobanu, and L. Juravle, “Flexible software
architecture and language for Mobile Agents”.
Concurrency & Computation: Practice &
Experience. Vol.24, Issue 6, 2012, pp. 559-571.
[31] R. Boutaba, and J. Xiao, Network Management:
State of Art. Edited by B.V. Kluwer. Proceedings of
the IFIP17th World Computer Congress – TC6
Stream on Communication Systems: The State of
the Art. 2002, pp. 127 – 146.
[32] S. William, SNMP, SNMPv2, SNMPv3, and
RMON 1 and 2. Addison-Wesley. MA, 1999.
[33] R. Pinheiro, A. Poylisher, and H. Caldwell, “Mobile
Agents for Aggregation of Network Management
Data”. In First International Symposium on Agents
and Applications, and Third International
Symposium on Mobile Agents, 1999, pp. 130–140.
[34] M. Crosbie, and E. Spafford, Defending a Computer
System using Autonomous Agents. Computer
Science Technical Reports, Paper 1200, 1995,
http://docs.lib.prudue.edu/cstech/1200.
[35] J. Zhang, “A mobile Agent-based Tool Supporting
Web Services Testing”. Wireless personal
communications. Vol. 56, Issue 1, 2011, pp.147-
172.
[36] Y. El-Gamal, E. Khalid and S. Magdy, “A
Comparative Performance Evaluation Model of
Mobile Agent Versus Remote Method Invocation
for Information Retrieval.” World Academy of
Science, Engineering, and Technology, 2007, pp.
286-291.
[37] M.A. Tarig, “Increasing Mobile Agent Performance
by using Free Areas Mechanism”. Journal of Object
Technology, Vol.6, No 4, 2007, pp. 125-140.
[38] O.C. Akinyokun, J.B. Ekuewa, and S.A. Arekete,
“Development of Agent-based system for
monitoring software resources in a network
environment”. Artificial Intelligence Research. Vol.
3, No 3, 2014, pp. 62 – 74.
[39] B.M.G. Amosa, A.A. Sobowale, T. Adepoju, M.A.
Hammed, and N. Onyeka, “An Agent Based System
for Monitoring Loan Defaulters in Commercial
Banks”. Academic Journal of Science. Vol. 7, No2,
2017, pp. 45-54.
[40] J, Osborn, Deep Inside C#: An Interview with
Microsoft Chief Architect Anders Hejlsberg.
O'Reilly Media, 2000.
[41] W. Wylie, Why Microsoft's C# isn't. CNET: CBS
Interactive, 2002.
[42] M. Torgersen, New features in C# 4.0, Microsoft
Press, 2009.
[43] N. Hamilton, The A-Z of Programming Languages:
C#". Computerworld, 2008.
[44] A. Derezinska, Specification of mutation operators
Specialized for C# code. ICS Res. Paport 2/05
WUT, 2005.
[45] D. Marshall, Programming Microsoft Visual C#:
The Language, 2nd Edition. Microsoft Press, 2008.
[46] H. Scott, C# for the Dynamic Keyword – Whirlwind
Tour around. Net 4, 2010. [47] G.A Aderounmu, A. Adekiigbe, and J.S Iyilade,
“An Evaluation of Mobile Agent Paradign”. The
Journal Computer Science and its Application.
2004,
pp. 107 – 116.