Pages
49
Words
10,122
Chapters
5
Payment Methods
NOTE: It's highly recommended to before making a purchase to enjoy the benefits as a registered user.
A REVIEW ON THE USES OF MOBILE AGENT TECHNOLOGY ON MAINTAINING COMMUNICATION NETWORK
Categories
Table of contents
TABLE OF CONTENTS
Title Page i
Certification ii
Dedication iii
Acknowledgement iv
Abstract vi
Table of Content vii
CHAPTER ONE: Introduction 1
1.0 Background to the Study 1
1.1 Aim and Objectives of the Project 3
1.2 Justification for Research 3
1.3 Scope of the Study 4
1.4 Methodology/Research Procedures 4
1.5 Definition of Terms 4
1.6 Organisation of the Project 5
CHAPTER TWO: Literature Review 6
2.1 Agent 6
2.2 Agent Property 7
2.3 How an Agent Functions 10
2.3.1 Logical Topology 11
2.3.2 Physical Topology 11
2.4 Kinds of Agents 12
2.5 Agents Communication 13
2.5.1 Message Passing System 13
2.5.2 Remote Method Invocation 14
2.5.3 Common Object Request Broker Architecture (CORBA) 14
2.6 Mobile Agent System 15
2.6.1 Agent Model 16
2.6.2 Life-Cycle Model 17
2.6.3 Computational Model 18
2.6.4 Security Model 18
2.6.4.1. Protection of Hosts from Malicious Agents 19
2.6.4.2. Protection of Agents from Malicious Host 20
2.6.5. Communication Model 21
2.6.6. Navigation Model 21
2.7 Mobile Agent Environment 22
2.8 Trends Leading to Mobile Agent 22
2.8.1 Bandwidth 23
2.8.2 Mobile Devices 23
2.8.3 Mobile User 24
2.8.4 Intranets 24
2.8.5 Information Overload 24
2.8.6 Customization 24
2.8.7 Proxies 25
2.9 Technical Hurdles in Using Mobile Agent 28
2.9.1 Performance and Scalability 28
2.9.2 Portability and Standardization 29
2.9.3 Security 30
2.10 Non-Technical Hurdles 30
2.10.1 Lack of a Killer Application 30
2.10.2 Getting Ahead of the Evolutionary Path 31
2.10.3 Revenue and Image 32
CHAPTER THREE: Implementation of a Mobile Agent 33
3.1 System Requirement 33
3.2 Result 34
CHAPTER FOUR: SYSTEM DESIGN 36
4.1 Design of Mobile Agent 36
4.2 Performance Management System Architecture, Design and Implementation 36
4.3 Why the Use of Java Programming Language 37
CHAPTER FIVE: Summary and Recommendation 38
5.1 Summary 38
5.2 Recommendation 38
5.3 Conclusion 38
References 39
LIST OF FIGURES
Figure Title Page
2.1: Basic Agent Architecture 7
2.2: Classification of Autonomous Agent 8
2.3 Difference between RPC Paradigm and the Mobile
Agent Approach 15
2.4 Basic Mobile Agent Architecture 16
2.5: The Trends Leading To Mobile Agents 26
LIST OF TABLE
Table Title Pages
2.1 Classification of Agent 9
Abstract
ABSTRACT
A mobile agent is a program that can migrate from machine to machine in a heterogeneous network. It can be viewed as an intelligent entity that carries the message as opposed to the plain message data transmitted in a network protocol implementation. An agent may stay in a machine waiting for the connection to another machine, many mobile agent system reduce an agent access right when it arrives from a machine that is not trusted, even if it was launched from a trusted user at a trusted site. The concern is that the agent may have been maliciously modified at the untrusted site. This research therefore focused on how to use mobile agent to maintain communication in a network.
Please Note:
We represent an esteemed online resource center duly registered with the Corporate Affairs Commission (CAC). Our commitment to integrity and reliability underscores our ethos, ensuring that our services are delivered with utmost trustworthiness. It is our solemn assurance that we conduct our operations with the highest ethical standards, thereby precluding any possibility of deception or fraudulent activities. Guided by our reverence for ethical conduct, we pledge to uphold the principles of honesty and transparency in all our dealings. Rest assured, upon confirmation of your payment, our dedicated team endeavors to promptly furnish you with the requisite project materials within a timeframe of 30 minutes.
We further emphasize that the materials provided are intended for reference purposes, and it is incumbent upon the buyer to adapt and tailor the content to meet their specific requirements. It is imperative to exercise due diligence in ensuring that any utilization of the project or research content is in accordance with academic integrity standards, thus mitigating the risk of plagiarism
Projects are sent in MS word format within 30 minutes - 60 minutes of payment confirmation. For questions and complaints call or WhatsApp: +2348062235854 or +2348166784138
NOTE: By ordering for this material, you have read and agreed with our Terms of use
Payment Methods
NOTE: It's highly recommended to before making a purchase to enjoy the benefits as a registered user.
Feature Project Topics
-
CORRUPTION AND ECONOMIC CRIMES IN NIGERIA: A CASE STUDY OF ECONOMIC AND FINANCIAL CRIMES COMMISSION (EFCC)
Political Science and Public Admin49
9,219
5
-
COMPARATIVE ANALYSIS BETWEEN THE WESTERN AND THE TRADITIONAL YORUBA VIEW OF EVIL
Philosophy52
12,355
4
-
EFFECT OF SMALL SCALE BUSINESS ON EMPLOYMENT GENERATION IN OGUN STATE
Business Administration54
9,102
5
-
CAMPYLOBACTER INFECTION: TREATMENT, CONTROL AND PREVENTION
Microbiology Seminar38
9,510
4
-
READING HABITS AND COMPREHENSION AMONG SECONDARY STUDENTS AND THEIR EFFECTS ON LEARNING OUTCOMES IN ENGLISH LANGUAGE COMPREHENSION
Education31
5,294
5