Mobile Agents - A Solution for Network Monitoring.
ABSTRACT Currently, most network management systems operate on SNMP. This protocol use the management station that provides a user interface to the network manager and interacts with agents that manage remote access to the Management Information base. In certain circumstances (e.g. at times of network stress), this interaction generates significant traffic that overloads the management station. A distributed paradigm is a revised way to perform management functions when networks grow significantly. In this sense, use of mobile agents is an option to distribute the network management. These agents move to the place where data are stored and select information which the user wants. They decentralize processing and control and as a consequence, reduce the traffic around the management station and distribute processing load. The main purpose of this work is to use mobile agents paradigm to implement the network monitoring(Instead of using the conventional client-server approach) to alleviate load created by network management protocols and to investigate the performance of network. This paper proposes a security model for communicating through Mobile agents. This paper proposes to implement the network performance monitoring using mobile agents. Some principle parameters that are to be monitored are: source ip, destination ip, no of packets, startup time, down time and bandwidth utilization of the network component. These parameters provide useful information to model the traffic through the network for further enhancements. The model is very robust when compared with SNMP. The model performance is tested for security using ForEx agents.
Conference Paper: Agent Based System for Network Availability and Vulnerability Monitoring[Show abstract] [Hide abstract]
ABSTRACT: Monitoring of distributed systems for management purposes is a complex task aggravated by heterogeneity and distribution of resources and tools. This paper describes implementation of the agent-based system for network (Internet) services monitoring. The system is designed in a modular fashion to provide easy and efficient inclusion of diverse network services' monitoring components. Software agents are implemented aimed at verification of accessibility of network services, as well as their potential vulnerability. Specialized services and verifiers for the web and e-mail services are also implemented. The system implementation is based on the XJAF agent framework and the Java EE technology.9th IEEE International Symposium on Intelligent Systems and Informatics (SISY), Subotica, Serbia; 01/2011
- [Show abstract] [Hide abstract]
ABSTRACT: In the current network communication infrastructure, there is a tremendous growth in heterogeneous computer network and proliferation of network traffic which demands efficient and secure network monitoring and network management. Mostly SNMP (Simple Network Management Protocol) based client server architecture is used for network management which uses SNMP as a protocol to provide centralized approach of network management which is quite efficient in terms of performance. Foremost problems related to this architecture are heterogeneity in networks, limited amount of bandwidth, lack of resources, lack of fault tolerance capability and huge amount of traffic generated on central server which can degrade the performance of network. In this paper we proposed distributed and decentralized approach for the purpose of network monitoring and management which reduces the traffic around management station and alleviate processing load created by management protocol like SNMP. To facilitate distributed and decentralized monitoring, we proposed a secured multi-agent based architecture in which, we created different mobile agents for the purpose of getting network related information. Mobile agents retrieve network related information, which act as an input for network administrator. Network administrator uses this information to enhance the performance of network by managing network traffic and bandwidth utilization of network. Since security risk is the main drawback of mobile agent paradigm, so for this we have used ECC (Elliptical Curve Cryptography) which provides authentication as well as confidentiality to the monitoring process.Computer and Communication Technology (ICCCT), 2010 International Conference on; 10/2010
- [Show abstract] [Hide abstract]
ABSTRACT: Management of large computer systems and networking environments usually demand huge investments and lot of human resources. It is almost impossible to calculate minimum investments needed to maintain high level of availability and functionality. The gap between needed and acquired investments in equipment and human resources may lead to degraded performance and functionalities. The possibility to use collected data from monitoring tools and to combine them with inventory data of the same equipment can become an essential analysis tool for the system owners and/or maintainers. A model is presented in this paper, with which current status of an system can be determined based on the age and utilization of the system, as needed and sufficient factors. Presented approach can be used for complex systems, as well as for simple - single product systems.Information & Communication Technology Electronics & Microelectronics (MIPRO), 2013 36th International Convention on; 01/2013