Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 管理學院
  3. 資訊管理學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/34949
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor莊裕澤(Yuh-Jzer Joung)
dc.contributor.authorYi-Chun Linen
dc.contributor.author林宜均zh_TW
dc.date.accessioned2021-06-13T06:37:26Z-
dc.date.available2006-01-26
dc.date.copyright2006-01-26
dc.date.issued2005
dc.date.submitted2005-10-05
dc.identifier.citation[1]Aglets. Project home. Retrieved 2005 from http://aglets.sourceforge.net/.
[2]aIsland Project home. Retrieved 2005 from http://aisland.jxta.org/.
[3]AJANTA – Mobile Agents Research Project. Retrieved 2005 from http://www.cs.umn.edu/Ajanta/
[4]Ap Grid. Retrieved 2005 from http://www.apgrid.org.
[5]APAN. Retrieved 2005 from http://www.apan.net.
[6]Yariv Aridor and Mitsuru Oshima. Infrastructure for mobile agents: Requirements and design. In Proceedings of the Second International Workshop on Mobile Agents (MA 1998), pages 38–49, Stuttgart, Germany, September 1998.
[7]Ozalp Babaoglu, Hein Meling, and Alberto Montresor. Anthill: A framework for the development of agent-based peer-to-peer systems. In Proceedings of the Twenty-second International Conference on Distributed Computing Systems (ICDCS 2002), pages 15-22, Vienna, Austria, July 2002.
[8]Jusung Baek. A design of a protocol for detecting a mobile agent clone and its correctness proof using coloured petri nets. Technical report, Technical Report TR-DIC-CSL-1998-002, Info. and Comm., K-JIST, 1998.
[9]Fabio Bellifemine, Agostino Poggi, and Giovanni Rimassa. JADE - A FIPA-compliant agent framework. In Proceedings of the Practical Applications of Intelligent Agents (PAAM '99), pages 97–108, April 1999.
[10]BitTorrent. Official BitTorrent web site. Retrived 2005 from http://bittorrent.com.
[11]Jiannong Cao, Xinyu Feng, Jian Lu, and Sajal K. Das. Mailbox-based scheme for designing mobile agent communication protocols. IEEE Computer, 35(9):54–60, September 2002.
[12]Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W. Hong. Freenet: A distributed anonymous information storage and retrieval system. In Proceedings of the 2000 International Workshop on Design Issues in Anonymity and Unobservability (DIAU 2000), volume 2009, pages 46-66, Berkeley, California, United States, July 2000.
[13]P. E. Clements, Todd Papaioannou, and John Edwards. Aglets: Enabling the Virtual Enterprise. Published and Presented at Managing Enterprises -- Stakeholders, Engineering, Logistics and Achievement (ME-SELA '97), page 425, 1997. Available at http://www.luckyspin.org/Docs/Papers/Mesela97.html.
[14]Frank Dabek, Ben Zhao, Peter Druschel, John Kubiatowicz, and Ion Stoica. Towards a Common API for Structured Peer-to-Peer Overlays. In Proceedings of the Second International Workshop on Peer-to-Peer Systems (IPTPS '03), pages 33–44, Berkeley, California, United States, February 2003.
[15]eMule. emule-project.net. Retrieved 2005 from http://www.emule-project.net.
[16]Chien-Tse Fang. Keyword Search in DHT-based Peer-to-Peer Networks. Master's thesis, National Taiwan University, Taipei, Taiwan, January 2004.
[17]Xinyu Feng, Jiannong Cao, Jian Lu, and Henry Chan. An efficient mailbox-based algorithm for message delivery in mobile agent systems. In Proceedings of the Fifth IEEE International Conference on Mobile Agents (MA 2001), pages 135–151, Atlanta, Georgia, United States, December 2001.
[18]FIPA- The Foundation for Intelligent Physical Agents. Retrieved 2005 from http://www.fipa.org/.
[19]Ian Foster and Carl Kesselman. The Grid: Blueprint for a New Computing Infrastructure. First edn. Morgan Kaufmann (1998)
[20]Ian Foster, Carl Kesselman, Jeffrey M. ~Nick, and Steven Tuecke. The Physiology of the Grid: An Open Grid Services Architecture for Distributed Systems Integration. Technical report, The Globus Alliance (2002) Available from http://www.globus.org/research/papers/ogsa.pdf.
[21]Gnutelliums LLC. Gnutelliums - Gnutella Download. Retrieved 2005 from http://www.gnutelliums.com/.
[22]Li Gong. Project JXTA: A Technology Overview. http://www.jxta.org/project/www/docs/jxtaview_01nov02.pdf, October 29, 2002.
[23]Robert S. Gray, G.eorge Cybenko, David Kotz, Donald A. Peterson and Daniela Rus. D’Agents: Applications and Performance of a Mobile-Agent System, Software - Practice and Experience, 32(6):543–573, May 2002.
[24]Torsten Illmann, Frank Kargl, Michael Weber, and Tilmann Kruger. Migration in java: problems, classifications and solutions. In Proceedings of the International ICSC Symposium on Multi-Agent and Mobile Agents in Virtual Organizations and E-Commerce (MAMA 2000), pages 281–287, Wollongong, Australia, December 2000.
[25]JADE. Java Agent Development Framework. Retrieved 2005 from http://jade.tilab.com/index.html.
[26]JADE Programmer's Guide. http://jade.tilab.com/doc/programmersguide.pdf.
[27]JXTA project. Sun Microsystems, Inc. Retrieved 2005 from http://www.jxta.org.
[28]JXTA v2.3.x: Java™ Programmer’s Guide. http://www.jxta.org/docs/JxtaProgGuide_v2.3.pdf, Jan 2005.
[29]Neeran M. Karnik, and Anand R. Tripathi. Agent Server Architecture for the Ajanta Mobile-Agent System. In Proceedings of the 1998 International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA'98), Las Vegas, July 1998.
[30]Neeran M. Karnik and Anand R. Tripathi. Security in the Ajanta mobile agent system. Software - Practice and Experience, 31(4):301–329, January 2001.
[31]Kazaa. Kazaa file sharing network. Retrieved 2005 from http://www.kazaa.com.
[32]Tak Cheung Lam and Wei Keh-Wei. Mobile agent clone detection using general transferable e-cash. In Proceedings of the International Symposium on Information Security (InforSecu '02), 2002.
[33]Danny B. Lange. Java Aglet Application Programming Interface (J-AAPI) White Paper - Draft 2, IBM Tokyo Research Laboratory, 1997.
[34]Tieyan Li, Zhigang Zhao, and Sizhen You. A-peer: An agent platform integrating peer-to-peer network. In Proceedings of the Third International Workshop on Agent based Cluster and Grid Computing, pages 614-618, Tokyo, Japan, May 2003.
[35]Meng-Kai Lin. Visitant: A Structured Agent-Based Peer-to-Peer System. Master's thesis, National Taiwan University, Taipei, Taiwan, July 2004.
[36]Peter Maymounkov and David Mazieres. Kademlia: A peer-to-peer information system based on the XOR metric. In Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS 2002), pages 53–65, Cambridge, USA, March 2002.
[37]Dejan S. Milojicic, William LaForge, and Deepika Chauhan. Mobile Objects and Agents (MOA). In Proceedings of the Fourth USENIX Conference on Object-Oriented Technologies and Systems (COOTS 1998), pages 179–194, Santa Fe, New Mexico, United States, April 1998.
[38]Napster Inc. The napster homepage. Retrieved 2005 from http://www.napster.com.
[39]Petr Novák, Milan Rollo, Michal Pìchouèek, and Tomáš Vlèek. X-SecurityArchitecture in AgentCities. http://jade.tilab.com/papers/EXP/x-security.pdf.
[40]Mitsuru Oshima, Guenter Karjoth, and Kouichi Ono. Aglets Specification 1.1 Draft. http://www.trl.ibm.com/aglets/spec11.htm, 1998.
[41]Ulrich Pinsdorf and Volker Roth. Mobile Agent Interoperability Patterns and Practice. In Proceedings of the 9th IEEE International Conference on Engineering of Computer-Based Systems (ECBS 2002), pages 238–244. IEEE Computer Society, 2002.
[42]Pacific Rim Applications and Grid Middleware Assembly. http://www.pragma-grid.net/
[43]Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp and Scott Schenker. A Scalable Content-Addressable Network. In Proceedings of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM 2001), pages 161-172. ACM Press, 2001.
[44]Volker Roth and Jan Peters. A Scalable and Secure Global Tracking Service for Mobile Agents. In Proceedings of the 5th International Conference on Mobile Agents (MA 2001), pages 169–181. Springer Verlag, 2001.
[45]Volker Roth and Mehrdad Jalali-Sohi. Concepts and Architecture of a Security-Centric Mobile Agent Server. In Proceedings of the Fifth International Symposium on Autonomous Decentralized Systems (ISADS 2001), pages 435–442. IEEE Computer Society, 2001.
[46]Volker Roth, Ulrich Pinsdorf, Jan Peters, Peter Ebinger, Patric Kabus, and Roger Hartmann. SeMoA Developer's Guide. http://www.semoa.org/docs/develop.pdf, 2003.
[47]Antony Rowstron and Peter Druschel. Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems. In Proceedings of the 2001 IFIP/ACM International Conference on Distributed Systems Platforms (Middleware 2001), Volume 2218, pages 329-350. Springer-Verlag, 2001.
[48]SeMoA. Retrieved 2005 from http://www.semoa.org/.
[49]Richard Smith. Internet Cryptography. Addison-Wesley, 1997.
[50]Ion Stoica, Robert Morris, David Karger, M.~Frans Kaashoek and Hari Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In Proceedings of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM 2001), pages 149-160. ACM Press, 2001.
[51]Niranjan Suri, Jeffrey M. Bradshaw, Maggie R. Breedy, Paul T. Groth, Gregory A. Hill, and Renia Jeffers. Strong mobility and fine-grained resource control in NOMADS. In Proceedings of the Second International Symposium on Agent Systems and Applications and Fourth International Symposium on Mobile Agents (ASA/MA2000), volume 1882, pages 2–15. Springer-Verlag, September 2000.
[52]Bernard Traversat, Mohamed Abdelaziz, and Eric Pouyoul Bernard. Project JXTA: A Loosely-Consistent DHT Rendezvous Walker. http://www.jxta.org/project/www/docs/jxta-dht.pdf, March 2003.
[53]Anand Tripathi, Neeran Karnik, Manish Vora, Tanvir Ahmed, and Ram Singh. Mobile Agent Programming in Ajanta. In Proceedings of the 19th International Conference on Distributed Computing Systems (ICDCS '99), page 190, 1999.
[54]Bill Venners. Under the hood: The architecture of aglets. Java World. http://www.javaworld.com/javaworld/jw-04-1997/jw-04-hood.html, April 1997.
[55]Tao Xianping, Feng Xinyu, Li Xin, and Zhang Guanqun. Communication mechanism in mogent system. Software, 11(8): pages 1060–1065, 2000.
[56]Ben Y. Zhao, John D. Kubiatowicz, and Anthony D. Joseph. Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and Routing. U. C. Berkeley Technical Report UCB//CSD-01-1141, April 2001.
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/34949-
dc.description.abstract在網際網路中有豐富的計算資源,如運算能力、網路頻寬以及儲存空間,但是這些資源大多數都是低利用率的。點對點運算能夠將網際網路變成單一的計算平台。此外,點對點運算能夠適應網際網路的動態環境,且在網路大小方面也能達到較佳的規模可伸縮性。然而現存的點對點系統只提供一些基本且簡單的服務,像是儲存空間與檔案的分享和即時訊息。移動式代理人技術能用來改善點對點運算的功能。但該技術也有移動性、通訊與安全性三個主要的議題需要被克服。
在此論文中,我們繼續Visitant的研究,Visitant是一個我們實驗室發展的以代理人為基礎的結構化點對點系統。我們增強了原有系統對於移動式代理人系統的三個主要議題的服務與機制,尤其是在可移動性與安全性議題方面。我們也提出一組較完整且有用的應用程式介面給使用者以移動式代理人的形式來開發其應用程式。最後,我們利用一個簡單的應用程式來展現如何以我們的系統撰寫一個移動式代理人程式。
zh_TW
dc.description.abstractIn the Internet, there are abundant computing resources such as computing power, network bandwidth, and data storage, but most of them have low utilization. P2P (Peer-to-Peer) computing can turn the Internet into a single computational platform. Besides, P2P computing is suitable for the dynamic environment of the Internet, and can achieve better scalability in the network size. The existent P2P systems, however, just provide some basic and simple service such as storage and file sharing, and instant messaging. Mobile agent technology can be used to improve the functionality of P2P computing. But it also has three mains issues, mobility, communication and security, should be conquered.
In this thesis, we continue with the research in Visitant, which is an agent-based structured P2P system developed by our laboratory. We enhance the services and mechanisms of the original system to solve the three main issues of mobile agent systems, especially in mobility and security issues. We also propose a more complete and useful set of APIs for programmers to use to develop their application by mobile agent format. At last, we use a simple application to demonstrate how to write a mobile agent with our system.
en
dc.description.provenanceMade available in DSpace on 2021-06-13T06:37:26Z (GMT). No. of bitstreams: 1
ntu-94-R92725026-1.pdf: 623915 bytes, checksum: 1005941e91a6d789be403d154e7e220f (MD5)
Previous issue date: 2005
en
dc.description.tableofcontents1 Introduction 1
1.1 Motivation 1
1.2 Objectives 4
1.3 Thesis Overview 4
2 Related Work 5
2.1 P2P System 5
2.1.1 Partially Centralized P2P Systems 5
2.1.2 Unstructured P2P Systems 7
2.1.3 Structured P2P Systems 7
2.1.4 JXTA 9
2.1.5 Summary 13
2.2 Issues of Mobile Agent Systems 13
2.2.1 Mobility Issues 13
2.2.2 Communication Issues 15
2.2.3 Security Issues 16
2.2.4 Summary 18
2.3 Existent Mobile Agent Systems 19
2.3.1 Aglets 19
2.3.2 Ajanta 22
2.3.3 SeMoA 25
2.3.4 Summary 28
2.4 Existent Agent-Based P2P Systems 28
2.4.1 Anthill 29
2.4.2 aIsland 30
2.4.3 JADE 32
2.4.4 Summary 36
2.5 Summary of This Chapter 37
3 System Design and Application Program Interface 38
3.1 System Overview 38
3.2 The Main Techniques 40
3.2.1 Solutions for Mobility Issues 41
3.2.2 Solution for Communication Issues 44
3.2.3 Solution for Security Issues 45
3.3 Mobile Agent Life Cycle 52
3.4 APIs for Mobile Agent Development 53
3.4.1 APIs for Initiation and Implementation 53
3.4.2 APIs for Control and Utilization 55
3.4.3 APIs of Useful Data Types 62
4 APIs Demonstration 74
4.1 Application Description 74
4.2 Implementation with Visitant 2 79
4.3 Implementation with Aglets 84
4.4 Implementation Comparison 89
5 Conclusion and Future Work 91
5.1 Conclusion 91
5.2 Future Work 92
Bibliography 93
dc.language.isoen
dc.subject應用程式介面zh_TW
dc.subject以代理人為基礎zh_TW
dc.subject點對點網路系統zh_TW
dc.subjectApplication Program Interfaceen
dc.subjectAgent-baseden
dc.subjectPeer-to-Peeren
dc.title以代理人為基礎之結構化點對點系統之應用程式介面zh_TW
dc.titleApplication Program Interface of Visitanten
dc.typeThesis
dc.date.schoolyear94-1
dc.description.degree碩士
dc.contributor.oralexamcommittee蔡益坤,許永真
dc.subject.keyword點對點網路系統,以代理人為基礎,應用程式介面,zh_TW
dc.subject.keywordPeer-to-Peer,Agent-based,Application Program Interface,en
dc.relation.page97
dc.rights.note有償授權
dc.date.accepted2005-10-07
dc.contributor.author-college管理學院zh_TW
dc.contributor.author-dept資訊管理學研究所zh_TW
顯示於系所單位:資訊管理學系

文件中的檔案:
檔案 大小格式 
ntu-94-1.pdf
  未授權公開取用
609.29 kBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved