簡易檢索 / 詳目顯示

研究生: 陸維廷
Wei-ting Lu
論文名稱: 派送與環境無關之行動代理人於不穩定網路之研究
A Study of Dispatching Context-Free Mobile Agents in Unstable Network
指導教授: 楊鍵樵
Chen-Chau Yang
口試委員: 呂永和
Yong-he Lyu
呂芳懌
fang-yi Lyu
學位類別: 碩士
Master
系所名稱: 電資學院 - 電子工程系
Department of Electronic and Computer Engineering
論文出版年: 2006
畢業學年度: 94
語文別: 中文
論文頁數: 91
中文關鍵詞: 派送路徑行動代理人自主性互補自我複製
外文關鍵詞: autonomous, mobile agent, self-replicate, complementary, dispatching path
相關次數: 點閱:209下載:1
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報

行動代理人(Mobile Agent, MA)之派送,一般多半建立在OSI七層網路架構中的應用層(Application layer)的網路上,因此應用層上MA之傳送都必須依賴底層來完成。這使得MA之派送受到網路擁塞或斷線極大的影響,這在以應用層來進行資料傳送上是無法避免的。而關於這篇論文,我們嘗試使用MA的自主性、自我複製等特性來減少MA之派送因網路問題造成的影響。

MA的派送,多半是以一個MA派送路徑來完成全部MA的派送任務。而此篇論文的方法,主要是使用兩個互補的MA派送路徑來執行任務,這樣不僅在網路發生問題時,可以藉由多個MA使用不同路徑,走訪同一組網路節點,來減少網路問題所帶來的影響,又能因為多個MA同時走訪同一組網路節點,來縮短任務的完成時間。未來如果有必要,我們更可以擴充此方法同時執行多個MA派送路徑,以面對更嚴苛的網路環境或再進一步加速MA之派送。


The dispatch of mobile agent (MA), is often built in application layer of the OSI 7-layer model. So, the transfer of MA in the application layer must rely on the lower layers to complete. This makes the MA dispatching affects severely by network congestion and link failure, and these effects are unavoidable in transmitting data in the application layer. About this paper, we attempt to make use of the properties of MA, such as autonomous and self-replicate, etc., to reduce the effects cause by the network problems.

The dispatch of MA often uses a single MA dispatching path to complete the overall MA dispatching mission. But in the method of this paper, two complementary MA dispatching paths are primarily used to execute the mission. Thus, when the network occurs problems, we not only can use many MAs to traverse the same set of destinations to reduce the effects incur by the network problems but also can shorten the mission complete time because numerous MAs traverse the same set of networking nodes. In future, if necessary, we can even extend this method to execute more MA dispatching paths concurrently either when we confront a more unstable network or speed up the dispatching of MA.

第一章 研究簡介 1.1 研究背景與動機 1.2 論文架構 第二章 行動代理人派送的相關研究 2.1 行動代理人的傳送工作 2.1.1 行動代理人的序列化 2.1.2 將資料編碼 2.1.3 MA傳送 2.2 行動代理人派送的方式 2.3 行動代理人派送的路徑 2.4 行動代理人派送的相關研究 2.5 網路問題對於行動代理人派送之討論 第三章 備用樹與互補樹 3.1 備用樹 3.2 兩派送路徑 3.3 互補樹 3.3.1 互補樹的簡介 3.3.2 找尋互補樹 3.3.3 互補樹的相關研究 第四章 利用互補樹派送行動代理人 4.1 找尋互補樹的問題定義 4.2 找尋互補樹的相關問題 4.3 以擴展樹為基礎的互補樹演算法 4.4 一個ST-CTA的例子 4.5 ST-CTA的互補特性 4.6 利用互補樹派送行動代理人 4.7 減少重覆移動到已走訪的代理人平台 第五章 派送行動代理人的模擬 5.1 J-SIM 模擬系統簡介 5.2 網路拓樸的模擬 5.3 網路斷線的模擬 5.4 模擬環境 5.5 模擬結果 5.5.1 不同錯誤率的比較 5.5.2 不同派送MAP數目的比較 第六章 結論與未來展望

[1] Antony Rowstron and Peter Druschel, "Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems.", IFIP/ACM International Conference on Distributed Systems Platforms. Lecture Notes in Computer Science, Volume 2218, Jan 2001, Page 329.(2001)

[2] Stefan Saroiu, P. Krishna Gummadi, Steven D. Gribble, "A Measurement Study of Peer-to-Peer File Sharing Systems", In MMCN, Jan (2002).

[3] K. Moizumi, "Mobile Agent Planning Problems", PhD. Thesis, Dartmouth College (1998).

[4] Jin-Wook Baek, Jae-Heung Yeo, Heon Y. Yeom, " Agent Chaining: An Approach to Dynamic Mobile Agent Planning", International Conference on Distributed Computing Systems(ICDCS) (July, 2002).

[5] Mengkun Yang, Zongming Fei, "A Proactive Approach to Reconstructing Overlay Multicast Trees", Proceedings of INFOCOM 2004, Hong Kong (March, 2004).

[6] S.G. Finn, M. Mdard, R.A. Barry, "A Novel Approach to Automatic Protection Switching Using Trees", IEEE (1997).

[7] Bo Yang, Dayou Liu, Kun Yang, Sheng-Sheng Wang. "Strategically migrating agents in itinerary graph", IEEE International Conference on Machine Learning and Cybernetics (2003).

[8] Moizumi, K; Cybenko, G, "The Traveling Agent Problem", Mathematics Of Control Signals and Systems (1998).

[9] B. Brewington, R. Gray, K. Moizumi, D. Kotz, G. Cybenko, and D. Rus. "Mobile Agents in Distributed Information Retrieval." In M. Klusch, editor, Intelligent Information Agents, chapter 12. Springer-Verlag (1999).

[10] Baek, J., Kim, G., Yeo, J., and Yeom, H., "Cost-Effective Mobile Agent Planning for Distributed Information Retrieval", The 21 st Int'l Conf. On Distributed Computing Systems (ICDCS-21), Phoenix (2001).

[11] Jin-Wook Baek, Gyu-Tae Kim, Heon-Young Yeom, "Cost Effective Planning of Timed Mobile Agents", International Conference on information Technology : Coding and Computing(ITCC), Las Vegas, Nevada, USA (2002).

[12] John G. Waclawsky, Ph.D., Tung Ouyang, Ph.D., "Practical TCP Traffic Flow Performance Analysis, Part 2", Boston (2000).

[13] 陳怡國,”跨異質性物件傳輸機制行動代理人平台之研究”, 台灣科技大學電子工程所碩士論文,2004

[14] Cui Weidong, Stoica I, Katz R H. "Backup path allocation based on a correlated link failure probability model in overlay networks". IEEE International Conference on Network Protocols, Paris, France (2002).

[15] T. Braun, V. Arya, T. Turletti., "A Backup Tree Algorithm for Multicast Overlay Networks", Poster at IFIP Networking, Waterloo Ontario, Canada, May 2005.

[16] M. Medard, SG Finn, RA Barry and RG Gallager, "Redundant trees for preplanned recovery in arbitrary vertex-redundant or edge-redundant graphs", IEEE/ACM Transactions on Networking. (Oct, 1999)

[17] X. Zhang, Q. Zhang, and W. ZHu, "Measurement-based Construction of Locality-Aware Overlay Networks", IEEE ICC (2004).

[18] O.Heckmann, M.Piringer, J.Schmitt, and R.Steinmetz. "On realistic network topologies for simulation". In Proceedings of ACM SIGCOMM MoMeTools, Karlsruhe, (2003).

[19] MA的簡介,
http://www.ascc.sinica.edu.tw/nl/91/1823/03.txt
http://www.ascc.sinica.edu.tw/nl/91/1824/02.txt

[20] Pstry, http://research.microsoft.com/~antr/Pastry/

[21] Scribe, http://research.microsoft.com/~antr/SCRIBE/default.htm

[22] Gnutella, http://rfc-gnutella.sourceforge.net/

[23] Bit Torrent Protocol Specification,
http://wiki.theory.org/BitTorrentSpecification

[24] J-Sim, http://www.j-sim.org

[25] Brite, http://www.cs.bu.edu/brite/

[26] Hamiltonian cycle, http://www.metafilter.com/mefi/22185

[27] ANDREW S. TANENBAUM, "Computer Networks fourth edition", Prentice Hall PTR, Upper Saddle River, New Jersey, pp.532-553 (2003).

QR CODE