Application of Mobile Agents in Network Management
CHAPTER ONE
MSย ANDย OBJECTIVESย OFย THEย RESEARCH
Overall, this project work tries to solve the problems listed in section 1.2 by applying a distributed management mechanism which overcomes the limitations posed by the traditional centralized Client/Server architecture as presented by SNMP. The work demonstrates that mobile agents could be used to perform network management functions more efficiently in terms of bandwidth utilization as compared to the traditional SNMP approach that requires a lot of communication bandwidth which effectively reduces its utilization span in terms of network size. According to Bivens etย al (1999);ย Gavalasย etย al.,ย (2000);ย Paliafitoย andย Tomarchioย (2000);ย Bohorisย etย al.,ย (2000);ย andย Griffinย etย al.,ย (2001); Mobile Agents could be used as a decentralized approach to network management which greatly reduces the workload at the management server location by otherwise delegating network management responsibilities to the network elements being managed. To be able to achieve these desired objectives, the following approaches to network management were extensively reviewed:
- Remote Monitoring (RMON);
- Management by Delegation (MbD); and
- Mobile
CHAPTER TWO
LITERATUREย REVIEW
An introduction to some backgroundย knowledgeย relatedย to this research is provided inย thisย chapter.ย Itย beginsย withย aย generalย overviewย ofย theย presentย systemย ofย networkย management,ย namely,ย Simpleย Networkย Managementย Protocolย (SNMP).ย Aย briefย descriptionย of Remote Monitoringย (RMON);ย Managementย by delegationย (MbD);ย andย Mobileย Agentsย (MA)ย follows.ย Finally,ย aย detailedย overviewย ofย theย agentsย softwareย developmentย platform,ย JADEย (Javaย Agentsย Developmentย Environment)ย usedย toย implementย theย proposedย system isย given.
OVERVIEWย OFย NETWORKย MANAGEMENT
Accordingย toย Bohorisย etย al.,ย (2000),ย networkย managementย hasย beenย theย subjectย ofย intense research over the last decade, with the relevant progress being twofold: on oneย hand,ย architecturesย andย algorithmsย forย solvingย managementย problemsย haveย beenย devised; on the other hand, different management technologies have been proposed andย standardized.
Currently, the network management systems adopt a centralized paradigm, represented by SNMP. Because of its simplicity, it has been adopted worldwide as a standard protocol for managing network objects such as network routers, Local Area Network (LAN) switches, bridges, hubs, workstations, servers, printers, and so forth. Although SNMP is a standard protocol, it has many limitations and inefficiencies. Most of these problems are rooted in SNMPโs centralized architecture. The rational approach to overcome most of these limitations is to distribute the network management operations. There are several ways which have been under investigation, namely, Management by Delegation (MbD), Remote Monitoring (RMON), and the use of Mobile Agents (MA). The following will give brief overviews of those approaches.
Simpleย Networkย Managementย Protocolย
The Simple Network Management Protocol (SNMP) was developed in the late 1980โs to Provide network operators with a simple tool they could use to manage their networks. It has gained widespread acceptance since 1993, making it a standard to manage TCP/IP Networks, including individual network devices, and devices in aggregate. The more sophisticated Common Management Information Protocol (CMIP) never replaced SNMP. CMIP has only been deployed in the telecommunication networks and not IP networks. Case etย al.,ย (1990) used Figure 1 below to depict the architectureย ofย SNMP.ย Itย definesย aย centralizedย client/serverย relationship.
CHAPTER THREE
MATERIALSย ANDย METHODS
Thisย chapterย describesย theย designย andย implementationย ofย theย mobileย agent-basedย network management system. First, the chapter describedย the system architecture andย design; then, presented the implementation details. This system is created on top of theย JADEย agentย platform.ย Theย entireย codeย isย writtenย inย Java.
SYSTEMย ARCHITECTURE
As initially proposed by Bieszczad et al., (1998) and depicted on Figure 3, the system consists of two main parts: Network Manager (NM), and Network Element (NE). At the NM, there is a Manager Agent which first needs to be created and started up. Network administrator uses it to monitor the network status and control the manipulation of the system through its Graphical User Interface (GUI). At each NE, there is a daemon agent which is dispatched by the NM when the NE registers itself into the management domain. At the NM, there are also Mobile Agent Generators (MAG) which could be used to create customized mobile agents.
CHAPTER FOUR
RESULTSย ANDย DISCUSSION
Advertisements
Theย currentย prototypeย hasย demonstratedย theย usefulnessย ofย theย propertiesย providedย byย MA to help NM to do the network management. In this Chapter, some related problemsย that have arisen during the work have been discussed. There are also several interestingย futureย directionsย thatย couldย beย exploredย asย anย extensionย ofย thisย work.ย Theseย are:
- security problem, and
- Scalability
SECURITYย PROBLEM
Network management normally involves transferring many important management data through the network. Some are critical to the network safe status and disasters may happen if they are eavesdropped and improperly set by malicious users. Reiser and Vogt (2000) assert that introducing the MA into this picture brings new security problems because automatically executing code on any host is potentially dangerous. Thus, security plays a decisive role in terms of acceptance and applicability of agent-based network management system.
CHAPTER FIVE
SUMMARY,ย CONCLUSIONย ANDย RECOMMENDATION
SUMMARY
Traditionalย networkย managementย basedย onย centralizedย architectureย wasย observedย toย haveย some infeasibility andย inefficiency problem when the managed networks areย largeย inย scale.ย MAย basedย approachesย haveย beenย widelyย investigatedย toย solveย thoseย problems.ย Itย hasย severalย benefitsย comparedย toย theย centralizedย system:
- Distribution of Management Workload
One of the problems of theย centralizedย systemย isย that most of the workย needs toย beย doneย atย theย centralย manager.ย Itย needsย toย fetchย andย analyzeย aย lotย ofย theย management data. If aย largeย number of NEs areย involved, theย manager becomesย theย systemย bottleneck.ย MAsย couldย beย launchedย withย theย taskย delegatedย toย it,ย whichย willย automaticallyย finishย itsย jobย andย onlyย returnย thoseย resultsย toย theย manager.ย Inย thisย way,ย theย managerย isย notย asย loadedย andย canย doย moreย thingsย simultaneously.ย Theย other goodย effectย is thatย many managementย decision couldย be taken locally, thus avoiding the transfer of large amount of data back to theย manager.ย Asย aย result,ย theย networkย bandwidthย usageย mayย alsoย beย reduced.
- Adaptability and Flexibility
Dueย toย itsย intrinsicย mobilityย andย noย needย forย pre-installation,ย mobileย agentsย represent a promising technology toย cope with changing environment andย userย mobility.
- Programmability and Customization
Mobile agent could be created and customized according to the userโs request, enabling dynamic programmable functionality to be provided. According to, Bohoris et al., (2000), the customization of mobile agent behavior can provide aย powerful mechanism for โintelligence on demandโ. In this thesis, it was outlinedย how users could use class inheritance to customize basic performance monitoringย functionsย toย theirย needs.
CONCLUSION
While mobile agent has many superior features over centralized network management approach, it has some performance overhead and other related problems. Due to the agent migration, normally Remote Method Invocation (RMI), serialization and de- serialization, these create some latency, which might be a problem. Security is also a crucial issue of mobile agent, especially in the network management domain where more secure environment needs to be provided.
In conclusion,ย itย is believedย thatย mobile agent,ย asย a promisingย approach toย networkย management,ย couldย provide aย newย range of opportunitiesย in the future.ย But a lot ofย researchย isย stillย neededย toย reachย an acceptableย usageย of MAย technology inย networkย managementย domain.
RECOMMENDATIONย ANDย FUTUREย WORK
As described in chapter 4, some efforts have been made to make the system more secure. But given the extensive scope of security as it relates to network management as a whole, a complete software implementation of the system is beyond the scope of thisย work. A detailed design and implementation of the whole secure framework should beย considered asย aย futureย work.
The current system implemented is only used for network status monitoring and some performance management applications. Enormous number of potential services are possible in the area of network fault and configuration management. More researchers and manufacturers are interested in combining intelligent agents and mobile agents in the area of proactive fault management. To, allow mobile agent to have some properties of intelligence and self-healing might help the automation of network management.
REFERENCES
- Baldiย M.,ย Gai,ย S.ย andย Picco,ย G.ย P.ย (1997).ย Exploitingย Codeย Mobilityย inย Decentralizedย andย Flexibleย Networkย Management.ย Lectureย Notesย inย Computerย Science,ย volumeย 1219;ย PP.ย 13-26.
- Bellifemine,ย F., Caire,ย G., Trucco, T., andย Rimassa, G. (2010). JADE Programmerโsย Guide.ย Retrievedย Januaryย 24,ย 2011,ย fromย http://sharon.cselt.it/projects/jade.
- Bellifemine,ย F.,ย Poggi,ย A.ย andย Rimassa,ย G.ย (2001).ย Developingย multiย agentย systemsย withย a FIPA-compliant agentย framework.ย In Software – Practice Experience,ย volumeย 31,ย PP.ย 103-128.
- Bellifemine,ย F.,ย Rimassa,ย G.ย andย Poggi,ย A.ย (1999).ย JADE,ย Aย FIPA-Compliantย Agentย Framework.ย In: Proceedings of the 4thย International Conference andย Exhibitionย onย theย Practicalย Applicationย ofย Intelligentย Agentsย andย Multi-Agentsย Technology,ย Unitedย Kingdom.ย PP.ย 1-12
- Bieszczad,ย A.,ย Pagurek,ย B.,ย andย White,ย T.ย (1998).ย Mobileย Agentsย forย Networkย Management.ย Communicationsย Surveysย &ย Tutorials,ย IEEEย Volย 1(1),ย PP.ย 2-9
- Bivens,ย A.,ย Fry,ย P.ย H.,ย Gao,ย L.,ย Hulber,ย M.ย F.ย andย Szymanski,ย B.K.ย (1999).ย Agent-ย Basedย Networkย Monitoring.ย In:ย Proceedingsย ofย theย Agentย basedย Highย Performanceย Computingย Workshop,ย Agentย โ99ย Conference,ย Seattle;ย Washington,ย United State.ย PP.ย 41-53.
- Bohoris,ย C.,ย Pavlou,ย G.,ย andย Cruickshank,ย H.ย (2000).ย Usingย mobileย agentsย forย networkย performance management.ย IEEE/IFIPย Network Operations andย Managementย Symposiumย (NOMS’00),ย Honolulu,ย Hawaii,ย Unitedย States,ย PP.ย 637-652.