Prof Bill Buchanan B.Buchanan@napier.ac.uk
Professor
Prof Bill Buchanan B.Buchanan@napier.ac.uk
Professor
M Naylor
Andrea Scott A.Scott@napier.ac.uk
Lecturer
Agent mobility addresses some limitations faced by classic client/server architecture, namely, in minimising bandwidth consumption, in supporting adaptive network load balancing and in solving problems caused by intermittent or unreliable network connections. There has been a great deal of attention on the potential productivity gains expected from so-called intelligent agents. These however require complex artificial intelligence (Al) functionality. Agents can realistically be of benefit in those areas concerned with autonomy and mobility. This is especially true of network management applications and this will be the focus of this paper. The paper discusses the usage of mobile agents and the advantages that these have over traditional client/server applications. It discusses the main characteristics of an agent, and shows how Java has the main components that allow mobile agents to be easily development. To show how agents are implemented it gives a practical implemented of an agent. Finally, the paper also discusses the main Java agent development systems, which are IBM aglets, Object Space Voyager and JATLite and outlines the advantages of using each of them
Buchanan, W. J., Naylor, M., & Scott, A. (2000, April). Enhancing network management using mobile agents
Start Date | Apr 7, 2000 |
---|---|
End Date | Apr 7, 2000 |
Publication Date | 2000 |
Deposit Date | Dec 22, 2010 |
Publicly Available Date | Dec 22, 2010 |
Peer Reviewed | Peer Reviewed |
Pages | 218-226 |
Book Title | Engineering of Computer Based Systems, 2000. (ECBS 2000) Proceedings. Seventh IEEE International Conference and Workshop on the |
ISBN | 0-7695-0604-6 |
DOI | https://doi.org/10.1109/ECBS.2000.839880 |
Keywords | Agent mobility; client/server architecture; bandwith consumption; adaptive network load balancing; intelligent agents; network management applications; |
Public URL | http://researchrepository.napier.ac.uk/id/eprint/3995 |
Contract Date | Dec 22, 2010 |
00839880.pdf
(240 Kb)
PDF
Publisher Licence URL
http://creativecommons.org/licenses/by-nc/4.0/
Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains
(2024)
Journal Article
Detection of Ransomware
(2024)
Patent
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
Apache License Version 2.0 (http://www.apache.org/licenses/)
Apache License Version 2.0 (http://www.apache.org/licenses/)
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search