The use of agent to incorporate network awareness into dynamic proxy framework: an overview

Authors

  • KhongNeng Choong Department of Computer and Communication, Faculty of Engineering, Universiti Putra Malaysia, Serdang, Selangor, Malaysia
  • Borhanuddin M. Ali Department of Computer and Communication, Faculty of Engineering, Universiti Putra Malaysia, Serdang, Selangor, Malaysia
  • Veeraraghavan Prakash Department of Computer and Communication, Faculty of Engineering, Universiti Putra Malaysia, Serdang, Selangor, Malaysia
  • Elok R. Tee Department of Communication Technology and Networking, Faculty of Computer Science, Universiti Putra Malaysia, Serdang, Selangor, Malaysia
  • YokeChek Yee Global Software Group, Motorola Multimedia Sdn Bhd, 16th Floor Menara Luxor, 6B Jalan Persiaran Tropicana, 47410 Petaling Jaya, Selangor, Malaysia

Keywords:

dynamic proxy, agent, network awareness, application level active network

Abstract

It has been observed that research in mobile agent focused on the development of platforms and on the application of the concept. Network awareness is one of the applications of mobile agent, concerning of how agent determine and make the most efficient use of network resources. This paper describes the role and functionality of mobile agent in the context of a dynamic proxy framework named the Chek Proxy Framework (CPF). Attention is paid on setting out a multi-agent-based framework to enrich CPF with a Network Awareness Module (NAM), which is implemented in an agent named ObjectBasket (OB). NAM is a single framework that integrates resource discovery, load monitoring and migration, and fault management, to operate in a network with dynamic proxy servers. The main objective of NAM is to deliver robustness and best-effort QoS guarantees into the existing CPF system adaptively, based on the availability of resources in the network. In this paper, we present the architecture of NAM, status generation algorithm, implementation rules, and the management of faults and overloading.

Downloads

Download data is not yet available.

References

[1] A. Nakao, L. Peterson and A. Bavier, “Constructing End-to-end Paths for Playing Media Objects”, Elsevier Publ., Computer Networks, Vol.38, No.3, 2002, pp. 373-389.
[2] B. Knutsson and L. Peterson, “Transparent Proxy Signaling”, Journal of Communications and Networks, Korean Institute of Communication Sciences (KICS) Vol.3, No.2,
2001.
[3] M. Yarvis et al., “Conductor: A Framework for Distributed Adaptation”. IEEE Workshop on Hot Topics in Operating Systems, 1999, pp. 44-49.
[4] T. Sundsted, Alternative Deployment Methods, JavaWorld.com, July 2000.
[5] M.S. Greenberg et al., “Mobile Agents and Security”, IEEE Communications Magazine, Vol.36, No.7, 1998.
[6] A. Ghost, M. Fry and G. Maclarty, “An Infrastructure for Application Level Active Networking”, Elsevier Publ., Computer Networks, Vol.36, No.1, 2001, pp. 5-20.
[7] P. Francis et al., “IDMaps: A Global Internet Host Distance Estimation Service”, IEEE/ACM Transactions on Networking, Vol.10, No.4, 2001, pp. 525-540.
[8] SETI@home, available at http://setiathome.ssl.berkeley.edu, 2000.

Downloads

Published

2003-04-01

Issue

Section

Original Articles

How to Cite

[1]
“The use of agent to incorporate network awareness into dynamic proxy framework: an overview”, JCS&T, vol. 3, no. 01, pp. p. 13–19, Apr. 2003, Accessed: Jul. 08, 2025. [Online]. Available: https://journal.info.unlp.edu.ar/JCST/article/view/947

Similar Articles

1-10 of 292

You may also start an advanced similarity search for this article.