請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/28771
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 莊裕澤(Yuh-Jzer Joung) | |
dc.contributor.author | Hong-Chi Chang | en |
dc.contributor.author | 張洪奇 | zh_TW |
dc.date.accessioned | 2021-06-13T00:21:57Z | - |
dc.date.available | 2007-07-30 | |
dc.date.copyright | 2007-07-30 | |
dc.date.issued | 2007 | |
dc.date.submitted | 2007-07-27 | |
dc.identifier.citation | [1]Aglets. Project home. Retrieved 2005 from http://aglets.sourceforge.net/.
[2]aIsland Project home. Retrieved 2005 from http://aisland.jxta.org/. [3]AJANTA – Mobile Agents Research Project. Retrieved 2005 from http://www.cs.umn.edu/Ajanta/ [4]Ap Grid. Retrieved 2005 from http://www.apgrid.org. [5]JADE. Java Agent Development Framework. Retrieved 2005 from http://jade.tilab.com/index.html. [6]Yariv Aridor and Mitsuru Oshima. Infrastructure for mobile agents: Requirements and design. In Proceedings of the Second International Workshop on Mobile Agents (MA 1998), pages 38–49, Stuttgart, Germany, September 1998. [7]Ozalp Babaoglu, Hein Meling, and Alberto Montresor. Anthill: A framework for the development of agent-based peer-to-peer systems. In Proceedings of the Twenty-second International Conference on Distributed Computing Systems (ICDCS 2002), pages 15-22, Vienna, Austria, July 2002. [8]Jusung Baek. A design of a protocol for detecting a mobile agent clone and its correctness proof using coloured petri nets. Technical report, Technical Report TR-DIC-CSL-1998-002, Info. and Comm., K-JIST, 1998. [9]Fabio Bellifemine, Agostino Poggi, and Giovanni Rimassa. JADE - A FIPA-compliant agent framework. In Proceedings of the Practical Applications of Intelligent Agents (PAAM '99), pages 97–108, April 1999. [10]BitTorrent. Official BitTorrent web site. Retrived 2005 from http://bittorrent.com. [11]Jiannong Cao, Xinyu Feng, Jian Lu, and Sajal K. Das. Mailbox-based scheme for designing mobile agent communication protocols. IEEE Computer, 35(9):54–60, September 2002. [12]Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W. Hong. Freenet: A distributed anonymous information storage and retrieval system. In Proceedings of the 2000 International Workshop on Design Issues in Anonymity and Unobservability (DIAU 2000), volume 2009, pages 46-66, Berkeley, California, United States, July 2000. [13]P. E. Clements, Todd Papaioannou, and John Edwards. Aglets: Enabling the Virtual Enterprise. Published and Presented at Managing Enterprises -- Stakeholders, Engineering, Logistics and Achievement (ME-SELA '97), page 425, 1997. Available at http://www.luckyspin.org/Docs/Papers/Mesela97.html. [14]Bill Venners. Under the hood: The architecture of aglets. Java World. http://www.javaworld.com/javaworld/jw-04-1997/jw-04-hood.html, April 1997. [15]eMule. emule-project.net. Retrieved 2005 from http://www.emule-project.net. [16]Anand Tripathi, Neeran Karnik, Manish Vora, Tanvir Ahmed, and Ram Singh. Mobile Agent Programming in Ajanta. In Proceedings of the 19th International Conference on Distributed Computing Systems (ICDCS '99), page 190, 1999. [17]Xinyu Feng, Jiannong Cao, Jian Lu, and Henry Chan. An efficient mailbox-based algorithm for message delivery in mobile agent systems. In Proceedings of the Fifth IEEE International Conference on Mobile Agents (MA 2001), pages 135–151, Atlanta, Georgia, United States, December 2001. [18]FIPA- The Foundation for Intelligent Physical Agents. Retrieved 2005 from http://www.fipa.org/. [19]Ian Foster and Carl Kesselman. The Grid: Blueprint for a New Computing Infrastructure. First edn. Morgan Kaufmann (1998) [20]Ian Foster, Carl Kesselman, Jeffrey M. ~Nick, and Steven Tuecke. The Physiology of the Grid: An Open Grid Services Architecture for Distributed Systems Integration. Technical report, The Globus Alliance (2002) Available from http://www.globus.org/research/papers/ogsa.pdf. [21]Gnutelliums LLC. Gnutelliums - Gnutella Download. Retrieved 2005 from http://www.gnutelliums.com/. [22]Li Gong. Project JXTA: A Technology Overview. http://www.jxta.org/project/www/docs/jxtaview_01nov02.pdf, October 29, 2002. [23]JXTA project. Sun Microsystems, Inc. Retrieved 2005 from http://www.jxta.org. [24]JXTA v2.3.x: Java™ Programmer’s Guide. http://www.jxta.org/docs/JxtaProgGuide_v2.3.pdf, Jan 2005. [25]Bernard Traversat, Mohamed Abdelaziz, and Eric Pouyoul Bernard. Project JXTA: A Loosely-Consistent DHT Rendezvous Walker. http://www.jxta.org/project/www/docs/jxta-dht.pdf, March 2003. [26]JADE Programmer's Guide. http://jade.tilab.com/doc/programmersguide.pdf. [27]Robert S. Gray, G.eorge Cybenko, David Kotz, Donald A. Peterson and Daniela Rus. D’Agents: Applications and Performance of a Mobile-Agent System, Software - Practice and Experience, 32(6):543–573, May 2002. [28]Torsten Illmann, Frank Kargl, Michael Weber, and Tilmann Kruger. Migration in java: problems, classifications and solutions. In Proceedings of the International ICSC Symposium on Multi-Agent and Mobile Agents in Virtual Organizations and E-Commerce (MAMA 2000), pages 281–287, Wollongong, Australia, December 2000. [29]Neeran M. Karnik, and Anand R. Tripathi. Agent Server Architecture for the Ajanta Mobile-Agent System. In Proceedings of the 1998 International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA'98), Las Vegas, July 1998. [30]Neeran M. Karnik and Anand R. Tripathi. Security in the Ajanta mobile agent system. Software - Practice and Experience, 31(4):301–329, January 2001. [31]Kazaa. Kazaa file sharing network. Retrieved 2005 from http://www.kazaa.com. [32]Tak Cheung Lam and Wei Keh-Wei. Mobile agent clone detection using general transferable e-cash. In Proceedings of the International Symposium on Information Security (InforSecu '02), 2002. [33]Danny B. Lange. Java Aglet Application Programming Interface (J-AAPI) White Paper - Draft 2, IBM Tokyo Research Laboratory, 1997. [34]Tieyan Li, Zhigang Zhao, and Sizhen You. A-peer: An agent platform integrating peer-to-peer network. In Proceedings of the Third International Workshop on Agent based Cluster and Grid Computing, pages 614-618, Tokyo, Japan, May 2003. [35]Tao Xianping, Feng Xinyu, Li Xin, and Zhang Guanqun. Communication mechanism in mogent system. Software, 11(8): pages 1060–1065, 2000. [36]Peter Maymounkov and David Mazieres. Kademlia: A peer-to-peer information system based on the XOR metric. In Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS 2002), pages 53–65, Cambridge, USA, March 2002. [37]Dejan S. Milojicic, William LaForge, and Deepika Chauhan. Mobile Objects and Agents (MOA). In Proceedings of the Fourth USENIX Conference on Object-Oriented Technologies and Systems (COOTS 1998), pages 179–194, Santa Fe, New Mexico, United States, April 1998. [38]Napster Inc. The napster homepage. Retrieved 2005 from http://www.napster.com. [39]Petr Novák, Milan Rollo, Michal Pìchouèek, and Tomáš Vlèek. X-SecurityArchitecture in AgentCities. http://jade.tilab.com/papers/EXP/x-security.pdf. [40]Mitsuru Oshima, Guenter Karjoth, and Kouichi Ono. Aglets Specification 1.1 Draft. http://www.trl.ibm.com/aglets/spec11.htm, 1998. [41]Ulrich Pinsdorf and Volker Roth. Mobile Agent Interoperability Patterns and Practice. In Proceedings of the 9th IEEE International Conference on Engineering of Computer-Based Systems (ECBS 2002), pages 238–244. IEEE Computer Society, 2002. [42]Ben Y. Zhao, John D. Kubiatowicz, and Anthony D. Joseph. Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and Routing. U. C. Berkeley Technical Report UCB//CSD-01-1141, April 2001. [43]Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp and Scott Schenker. A Scalable Content-Addressable Network. In Proceedings of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM 2001), pages 161-172. ACM Press, 2001. [44]Volker Roth and Jan Peters. A Scalable and Secure Global Tracking Service for Mobile Agents. In Proceedings of the 5th International Conference on Mobile Agents (MA 2001), pages 169–181. Springer Verlag, 2001. [45]Volker Roth and Mehrdad Jalali-Sohi. Concepts and Architecture of a Security-Centric Mobile Agent Server. In Proceedings of the Fifth International Symposium on Autonomous Decentralized Systems (ISADS 2001), pages 435–442. IEEE Computer Society, 2001. [46]Volker Roth, Ulrich Pinsdorf, Jan Peters, Peter Ebinger, Patric Kabus, and Roger Hartmann. SeMoA Developer's Guide. http://www.semoa.org/docs/develop.pdf, 2003. [47]Antony Rowstron and Peter Druschel. Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems. In Proceedings of the 2001 IFIP/ACM International Conference on Distributed Systems Platforms (Middleware 2001), Volume 2218, pages 329-㎏0. Springer-Verlag, 2001. [48]SeMoA. Retrieved 2005 from http://www.semoa.org/. [49]Richard Smith. Internet Cryptography. Addison-Wesley, 1997. [50]Ion Stoica, Robert Morris, David Karger, M.~Frans Kaashoek and Hari Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In Proceedings of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM 2001), pages 149-160. ACM Press, 2001. [51]Niranjan Suri, Jeffrey M. Bradshaw, Maggie R. Breedy, Paul T. Groth, Gregory A. Hill, and Renia Jeffers. Strong mobility and fine-grained resource control in NOMADS. In Proceedings of the Second International Symposium on Agent Systems and Applications and Fourth International Symposium on Mobile Agents (ASA/MA2000), volume 1882, pages 2–15. Springer-Verlag, September 2000. [52]Frank Dabek, Ben Zhao, Peter Druschel, John Kubiatowicz, and Ion Stoica. Towards a Common API for Structured Peer-to-Peer Overlays. In Proceedings of the Second International Workshop on Peer-to-Peer Systems (IPTPS ‘03), pages 33-44, Berkeley, California, United States, February 2003 | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/28771 | - |
dc.description.abstract | 在一些研究領域中,實驗所花費的時間冗長且需要的計算資源往往不是一台電腦就可以勝任的,像是醫療研發、電腦圖學、氣象學和粒子物理學等等。但是,我們卻可以發現在Internet裡存在著大量的計算資源,並沒有被有效的運用,如電腦的計算能力、網路頻寬和資料儲存空間等。但點對點系統具有連結網際網路上龐大資源的能力,而且有越來越普及的趨勢。然而,目前的點對點系統仍只提供基本及簡單的功能,像是檔案的分享或即時通訊等。我們希望能夠透過整合點對點系統和行動代理人技術,提供使用者客自行設計和發展客製化的服務,並充份運用網路上豐富的資源。
在此論文中,我們延續本實驗室對Visitant系統的開發,並加強行動代理人的在移動性、通訊性以及安全性三個主要議題上的功能。我們也提出一組完整的應用程式及易於操作的使用者介面,並提出二個範例程式做為開發行動代理人的參考。 | zh_TW |
dc.description.abstract | Some researches, such as molecular biology, computer graphics, meteorology, and particle physics, are difficult to be completed by a single computer and may spend too much time in experiments. In fact, there are abundant computing resources in the Internet, and most of them are not fully utilized. P2P systems, an increasingly popular technology, can aggregate resources shared from a large number of highly autonomous peers and coordinate these resources among peers. However, current P2P systems can only provide some simple services and functions, including file sharing and instance message. We attempt to integrate two different technologies, P2P platform and mobile agent, to support programmers to develop their customized services and utilize the enormous resources in the Internet.
In this thesis, we continue with the implementation of Visitant system, which is an agent-based structured P2P system and is developed by our laboratory. We implement the functions of Mobility, Communication, and Security issues which are the main issues of mobile agent technology. We also provide a set of APIs and user friendly GUIs for programmers to develop and deploy their mobile agents, and demonstrate two examples to explain how to program customized mobile agents in our system. | en |
dc.description.provenance | Made available in DSpace on 2021-06-13T00:21:57Z (GMT). No. of bitstreams: 1 ntu-96-R94725037-1.pdf: 3886225 bytes, checksum: 5dc67e4448bfb7eee71d46a60daf701d (MD5) Previous issue date: 2007 | en |
dc.description.tableofcontents | Chapter 1 緒論-----------------------1
論文簡介-----------------------------1 論文架構-----------------------------3 Chapter 2文獻探討--------------------4 2.1 P2P系統--------------------------4 2.1.1 部份集中式P2P系統--------------4 2.1.2 非結構化P2P系統----------------5 2.1.3 結構化P2P系統------------------6 2.1.4 JXTA---------------------------7 2.1.5 總結--------------------------10 2.2 行動代理人的議題----------------10 2.2.1 行動性------------------------10 2.2.2 通訊性議題--------------------11 2.2.3 安全議題----------------------12 2.2.4 總結--------------------------13 2.3 目前的行動代理人系統------------14 2.3.1 Aglets------------------------14 2.3.2 Ajanta------------------------17 2.3.3 SeMoA-------------------------19 2.3.4 總結--------------------------22 2.4 目前代理人式P2P系統-------------22 2.4.1 Anthill-----------------------22 2.4.2 aIsland-----------------------23 2.4.3 JADE--------------------------25 2.4.4 總結--------------------------28 2.5 本章總結------------------------28 Chapter 3 系統設計------------------30 3.1系統概觀-------------------------30 3.2結構化P2P層----------------------31 3.3 Visitant 系統層-----------------31 3.4 行動代理人層--------------------43 3.5 發展行動代理人的API-------------43 3.5.1 資料型態----------------------44 3.5.2 實作代理人的應用程式介面------49 Chapter 4 範例展示------------------53 4.1 操作流程說明--------------------53 4.2 範例描述------------------------56 4.3 範例一--------------------------57 4.4範例二---------------------------67 Chapter 5 結論與未來研究------------75 5.1 結論----------------------------75 5.2後續研究-------------------------76 參考文獻----------------------------77 | |
dc.language.iso | zh-TW | |
dc.title | 實作以代理人為基礎之結構化點對點系統 | zh_TW |
dc.title | Implementation of Application Program Interface of Visitant | en |
dc.type | Thesis | |
dc.date.schoolyear | 95-2 | |
dc.description.degree | 碩士 | |
dc.contributor.oralexamcommittee | 蔡益坤(Yih-Kuen Tsay),林宗男(Tsung-Nan Lin) | |
dc.subject.keyword | 點對點系統、行動代理人、應用程式介面, | zh_TW |
dc.subject.keyword | Peer-to-Peer, Agent-based, Application Program Interface, | en |
dc.relation.page | 81 | |
dc.rights.note | 有償授權 | |
dc.date.accepted | 2007-07-27 | |
dc.contributor.author-college | 管理學院 | zh_TW |
dc.contributor.author-dept | 資訊管理學研究所 | zh_TW |
顯示於系所單位: | 資訊管理學系 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-96-1.pdf 目前未授權公開取用 | 3.8 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。