Professional Documents
Culture Documents
Mobile
Agent Computing
Part-l .. (135J - 155J)
134 (IT-8) J
135 (IT-8) J
Mobile Computing
PART- 1
Questions-Answers
Answer
Mobile agent :
1 An agent is a person whose job is to0 act for, or manage the affairs of
other people.
2 In context of computers, software agents refer to the programs that
perform certain tasks on behalf of the user.
3 Software agents have some propertiee, which distinguish them from
other programs, such as autonomy, responsiveness, communicative
ability, adaptability.
4 Amobile agent is a type of software agent, with the feature of autonomy,
social ability, learning and most importantly mobility.
136 (IT-8) J Mobile Agent Computing
5 In computer science, a mobile agent is a composition of computer software
and data which is able to move from one computer t0 another
autonomously and continue its execution on the destination computer.
6.
More specifically, amobile agent is aprocess that can transport its state
from one environment to another, with its data intact, and be capable of
performing appropriately in the new environment.
7. Mobile agents decide when and where to move.
8 Movement is often evolved from RPC methods.
9 When a mobile agent decides to move, it saves its own state, transport
this saved state to the new host and resumes execution from the saved
state.
10. Software agents can be classified as static agents and mobile agents.
11. Static agents achieve the goal by executing on a single machine.
12. On the other hand, mobile agents migrate from one computer to another
in the network and execute on several machines.
13. Mobility increases the functionality of the mobile agent and allows the
mobile agent to perform tasks beyond the scope of static agents.
Characteristics of mobile agent :
Following are the characteristics of mobile agent:
1. Situatedness: It means that an agent receives sensory input from its
environment and it can perform actions which change the environment
in some way.
2 Autonomy :It means that an agent is able to act without the direct
intervention of humans (or other agents) and it has control over its own
actions and internal states.
3. Flexibility : It can be defined to include the following properties :
a.
Responsive :Itrefers to an agent abilitytoperceive its environment
and respond in a timely fashion tochanges that occur in it.
b. Proactive : Agents are able to exhibit opportunistic, goal-driven
behaviour and take the initiative where appropriate.
C. Social: Agent[ should be able to interact, when appropriate, with
other agents and human in order to solve their own problems and
to help others with their activities.
4. Rationality : The assumption that an agent will not act in a manner
that prevents it from achieving its goals.
5. Mobility: The ability for an agent to move across networks and between
different hosts to fulfill its goal.
Que 4.2. State the advantages and disadvantages of mobile
agents.
137 (IT-8)J
Mobile Computing
Answer
Advantages of mobile agents :
They facilitate high quality, high performance, economical mobile
1.
applications.
2 Bandwidth :
communications protocols that
Distributed systems often rely on
a given task.
involve multiple interactions to accomplish
measures are enabled.
b. This is especially true when security
traffic.
C. The result is a lot of network
conversation and dispatching it to
d Mobile agents allow packaging a
interactions can take place locally, as
a destination host where the
shown in Fig. 4.2.1.
comes to reducing the flow of
e Mobile agents are also useful when it
raw data in the network.
stored at remote hosts, these
When very large volumes of data are
f
locality of the data rather that
data should be processed in the
transferred over the network.
Service
App
RPC-Based approach
Host B
Host A
Service
App
Mobile Agent-Based approach
network load.
Fig. 4.2.1, Mobile agents reduce
computations to the data rather
The motto is simple : move the
than the data to the computations.
: By migrating to the location of the resource, a mobile agent
3. Latency faster than from across the network.
much
can interact with the resource
Asynchronous task execution
4.
5. Fault tolerance
They enable use of portable, low cost personalcommunications.
6.
7. Peer topeer communication networks.
8. They permit secure intranet
style communications on public
Disadvantages of mobile agents :
1. The main drawback of
mobile agents isthe security risk involved in
using mobile agents.
A viruscan be disguised as mobile agents and distributed in the network
2. execute the agent.
causing damage to the host machines that
138 (IT-8) J
Mobile Agent Computing
3. Mobile agent tools are still new and may have security bugs and
vulnerabilities that are yet unknown.
4 Network test suites tend to be relatively large. Managing many light
weight agents introduces additional communication and control
overhead.
5. Mobile agents are not a mature technology and most agent development
tools are alpha or beta version.
Que 4.3. Explain the working and lifecycle of a mobile agent.
Answer
1 The mobile agent is created in the home machine.
2 The mobile agent is dispatched to the host machine 'A' for execution.
3. The agent executes on host machine A'.
4. After execution the agent is cloned to create two copies, one copy is
dispatched to host machine Band the other is dispatched to host machine
C.
Host machine
7
(M.A) (M.A)
(M.A)
Host machine A
3
(M.A) (M.A (M.A
(M.A
Fig. 4.3.1,
5. The cloned copies execute on their respective hosts.
6 After execution,host machine Band Csend the mobile agent received
by them back to the home machine.
7. The home machine interacts with the agents and the data brought by
the agents is analyzed. The agents are then disposed.
Amobile agent experiences the following events in its life cycle:
1. Creation : Abrand new agent is born and its state is initialized.
139 (IT-8) J
Mobile Computing
2. Dispatch :An agent
travels to new host.
original is
Cloning : A twin agent is born and the current state of the
3.
duplicated in the clone.
Deactivation: An agent is brought back from aremote host along with
4.
its state to the source machine.
state is lost forever.
5. Disposal: An agent is terminated and its
incoming
6 Communication:Notifies the agent to handle messages inter-agent
primary means of
from other agents, which is the
correspondence.
Que 4.4. Discuss the various mobile agent systems.
Answer
Mobile agent systems :
prevalent systems which are currently
The following systems are the most
available:
1. Agent TCL:
Agent TCL, a product of Dartmouth College, provides an agent
agents implemented in secure
a.
TCP/IP E-mail
Folder1 Folder2
Briefcase,
Mobile Agent,
Answer
1 There are many technical challenges to implement mobile agent systems.
2 Most ofthese problems are in the structure of the computational medium,
the environment the agents operate in.
3. Servers must be designed, implemented, and deployed that not only
allow mobile agents to run, but allow them to run safely.
a. Portability:
i. Mobile agent code itself must be portable; when an agent arrives
at a server the server needs to be able to execute that agent.
Most mobile agent systems under development now rely, at
least in part on virtual machines to standardize the execution
environment.
b. Ubiquity :
i In order for mobile agents to be successful they need access to
many different computer resources.
i. Servers for agents must be at common place; there needs to be
awidely accepted framework for executing mobile agents
deployed on many machines across the internet.
C. Network communication:
Mobile agents that live in the network need to be written in a
language that makes network access simple.
ii. It must be easy totransfer objects across the network and to
invoke methods of remote objects.
d. Server security :
Amajor concern specific to mobile agents is the protection of
the servers running the agents.
i. Running arbitrary programs on a machine is dangerous, a
hostile program could destroy the hard drive, steal data, or do
all sorts of other undesirable things.
142 (IT-8) J Mobile Agent Computing
ii. Two types of security are possible to protect servers from
malfunctioning and hostile agents :physical and social.
1. Physical security refers to building servers for agents in
such a way that the agents cannot harm the server.
2 A second approach to server security is using social
enforcement mechanisms to punish the creators of
harmful agents.
e. Agent security :
The complement of server security is agent security; whether
the agent can bust the server on which it is executing.
i. A mobile agent might contain secret information, such as
proprietary data and algorithms.
f. Resource accounting :
1. If economic control and incentive are going to be factors in
netwide resource, use some mechanism to account for the
resources that an agent uses anda way for receiving payment
for those resources is necessary.
Answer
Mobile agent : Refer Q. 4.1, Page 135J, Unit-4.
Server architecture : Refer Q. 4.4, Page 139J, Unit-4.
Security threats :
1. Agent-to-Platform:The agent-to-platform category represents the
set of threats in which agents exploit security weakness of an agent
platform or launch attacks against an agent platform.
Following are the set of threats :
a Masquerading :
i When an unauthorized agent claims the identity of another
agent it is said to be masquerading.
ii. The masquerading agent may pose as an authorized agent in
an effort to gain access to services and resources to which it is
not entitled.
ii. The masquerading agent may als0 pose as another
unauthorized agent in an effort to shift the blame for any
actions for which it does not want to be held accountable.
b. Denial of service :
i In this, an agent may attempt to consume or corrupt a host
resource to preclude other agents from accessing the host's
services.
143 (IT-8) J
Mobile Computing
ii. These denial of service attacks can be launched intentionally
by running attack scripts to exploit system vulnerabilities, or
unintentionally through programming errors.
ii. As a mobile computing paradigm requires an agent platform to
accept and execute an agent whose code may have been
developed outside its organization.
iv. This type of agent may carry malicious code that is designed to
disrupt the services offered by the agent platform, degrade the
performance of the platform, or extract information for which
it has no authorization to access.
C. Unauthorized access :
In this, an agent can obtain access to sensitive data by exploiting
security weakness.
ü. Applying the proper access control mechanism requires the
platform or agent to first authenticate a mobile agent's identity
before it is instantiated on the platform.
iii. An agent that has access to platform and its services without
having the proper authorization can harm other agents and
platform itself.
2 Agent-to-Agent: Agent-to-Agent category represents the set of threats
in which agents exploit security weakness of other agents or launch
attacks against other agents. This set of threats includes the following :
a. Masquerade :
Agent-to-Agent communication can take place directly between
two agents or may require the participation of the underlying
platform and the agent services it provides.
In either case, an agent may attempt to disguise its identity in
an effort to deceive the agent with which it is communicating.
ii. For example, an agent may pose as a well-known vendor of
goods and services, and try to convince another unsuspecting
agent to provide it with credit card numbers, bank account
information and digital cash or other private information.
b. Denial of service:
i Agents can also launch denial of service attacks against other
agents.
For example, repeatedly sending messages to another agent,
or spamming agents with messages, may place undue burden
on the message handling routines of the recipient.
ii. Agents that are being spammed may choose to block messages
from unauthorized agents, but even this task requires some
processing by the agent or its communication proxy.
144 (IT-8) J Mobile Agent Computing
C. Repudiation:
i. Repudiation occurs when an agent, participating in a
transaction or communication, later claims that the transaction
or communication never took place.
Whether the cause for repudiation is deliberate or accidental,
repudiation can lead to serious disputes that may not be easily
resolved unless the proper counter measures are in place.
d. Unauthorized access :
mechanisms in
i. If the agent platform has weak or no control
place, an agent can directly interfere with another agent by
invoking its public methods (for example, attempt buffer
overflow, reset to initial state etc.), or by accessing and
modifying the agent's data or code.
3 Platform-to-Agent : The platform-to-agent category represents the
set of threats in which platform compromise the security of agents. This
set of threats includes the following:
Masquerade :
in
One agent platfornm can masquerade as another platform
destination
an effort to deceive a mobile agent as to its true
and corresponding security domain.
i. An agent platform masquerading as trusted third
party may
and
be able to cheat unsuspecting agents to the platform
extract sensitive information from these agents.
both the visiting agent
ii. The masquerading platform may harm assumed.
and the platform whose identity it has
b. Denial of service :
the
i When an agent arrives at an agent platform, it expects
provide fair
platform to execute the agent's request faithfully,
allocation of resources and abide by the quality of service
agreements.
service
iü. Amalicious agent platform however may ignore agent such
requests, introduce unacceptable delays for critical tasks
execute
simply not
as placing market orders in a stock market, without
the agent's code or even terminate the agent
notification.
c. Eavesdropping :
and
i. The eavesdropping threat involves the interception
monitoring of secret communications.
In eavesdropping, agent platforms cannot only monitor
communications, but als0 can monitor every instruction
executed by the agent, all the unencrypted or public data it
brings to the platform, and all the subsequent data generated
on the platform.
Mobile Computing 145 (IT-8) J
ii. Since the platform has access to the agent's code, state and
data, the visiting agent must be wary of the fact that it may be
exposing proprietary algorithms, trade secrets, negotiation
strategiesor other sensitive information.
iv. Even though the agent may not be directly exposing secret
information, the platform may be ahble to infer meaning from
the types of services requested and from the identity of the
agents with which it communicates.
d. Alteration :
i When an agent arrives at an agent platform it is exposing its
code, state and data to the platform.
ii. Since an agent may visit several platforms under various
security domains throughout its lifetime, mechanisms must
be in place to ensure the integrity of an agent's code, state and
data.
üi. Acompromised or malicious platform must be prevented from
modifying an agent's code, state or data without being detected.
iv. Modification of an agents code, and thus the subsequent
behaviour of the agent on other platforms, can be detected by
having the original author digitally sign the agent's code.
4 Other-to-Agent Platform : The other-to-agent platform category
represents the set of threats, in which external entities, including agents
and agent platforms, threaten the security of an agent platiorm. This
set of threats includes the following:
a. Masquerade :
i
F: Agents can request platform services both remotely and locally.
An agent on a remote platform can masquerade as another
agent and request services and resources for which it is not
authorized.
iii. Agents masquerading as other agents may act in conjunction
with a malicious plYtform to help deceive another remote
platform or they may act alone.
iv. Aremote platform can also masquerade as another platform
and mislead unsuspecting platforms or agents about its true
identity.
b. Unauthorized access :
1
Remote users, processes, and agents may request resources
for which they are not authorized.
i. Remote access to the platform and the host machine itself
must be carefully protected, since conventional attack seripts
freely available on the internet can be used to subvert the
operating system and directly gain control of all resources.
146 (IT-8)J
Mobile Agent Computing
or security
iüi. Remote administration of the platform's attributesresponsible
policy may be desirable for an administrator that is
remote
for several distributed platforms, but allowing account
administration may make the system administrator's
or session the target of an attack.
C. Denial of service:
remotely and
Agent platform services.can be accessed both
locally.
inter-platform
The agent services offered by the platform and
communications can be disrupted by common denial of service
attacks.
iii. Agent platforms are also susceptible to all the conventional
denial of service attacks aimed at the underlying operating
system or communication protocols.
the
These attacks are tracked by organizations such as
Computer Emergency Response Team (CERT) at the Carnegie
Mellon University and the Federal Computer Incident Response
Capability (FedCIRC).
Answer
Traditional systems vulnerabilities :
1. As the internet is increasingly becoming part of the corporate network,
the organizations information systems have become vulnerable to actions
from outsiders.
2. The architecture of traditional web-based application typically includes
a web client, a server and corporate information systems linked to back
end databases.
3. Each of these components is exposed to security challenges and
vulnerabilities due to their connection to the internet.
4. For example, a database that has been used internally for several years
but is now connected to the internet.
5. This new connection will expose the database to a much larger and
more varied set of users (including hackers) than ever before.
Wireless and mobile systems :
1. The security in a mobile code environment cannot rely on trust
relationship between the server and an agent because they are generally
not part of the same administrative domain.
2. In addition, the problem of protecting the agent and its results from
malicious and faulty servers arises.
147 (IT-8) J
Mobile Computing
3. Increased use of wireless communications further increases the chances
of eavesdropping and of compromising the integrity of information being
transferred between sources and destinations.
Answer
Security requirements in mobile agent :
1 The users of networked computer system have four main security
requirements: confidentiality, integrity, accountability and availability.
have these same
2 The users of agent and mobile agent frameworks also
security requirements.
This section provides a brief overview of these security
requirements
3.
and how they apply to agent frameworks:
a, Confidentiality :
i Any private data stored on a platform or carried by an agent
must remain confidential.
Agent frameworks must be able to ensure that their intra
and inter-platform communications remain confidential.
iüi. Eavesdroppers can gather information about an agent's
activities not only from the content of the messages exchanged,
but also from the message flow from one agent to another
agent or agents.
b. Integrity :
The agent platform must protect agents from unauthorized
modification of their code, state, and data and ensure that only
authorized agents or processes carry out any modification of
shared data.
The agent itself cannot prevent a malicious agent platform
from tampering with its code, state, and data, but the agent
can take measures to detect this tampering.
C. Accountability :
Each process, human user, or agent on a given platform must
be held accountable for their actions.
i. In order to be held accountable, each process, human user, or
agent must be uniquely identified, authenticated and audited.
148 (IT-8) J Mobile Agent Computing
ii. Examples of the actions for which they must be held
accountable include: access to an object such as a file, or
making administrative changes to a platform security
mechanism.
iv. Accountability requires maintaining an audit log of security,
relevant events that have occurred and listing each event and
the agent or process responsible for that event.
d. Availability :
i The agent platform must be able to ensure the availability of
both data and services to local and remote agents.
The agent platform must be able to provide controlled
concurrency, support for simultaneous access, deadlock
management and exclusive access as required.
iii. Agent platform must be able to detect and recover from system
software and hardware failures.
iv. While the platform can provide some level of fault-tolerance
and fault-recovery, agents may be required to assume
responsibility for their own fault-recovery.
Que 4.9. What are the security measures for mobile agents ?
Answer
Security measures for mobile agent :
The following available technologies and research efforts addresses the
security issues arising from the mobility property of mobileagents:
1. Protecting agents :
a. This is due to the fact that an agent is completely susceptible toan
agent platform and cannot prevent malicious behaviour from
occurring.
b. Some more general purpose techniques for protecting an agent
include the following:
i Partial result encapsulation :
1. Encapsulation may be done for different purposes with
different mechanisms, such as providing confidentiality using
encryption or for integrity and accountability using digital
signature.
2. In general, there are three alternative ways to encapsulate
partial results:
Provide the agent with a means for encapsulating the
information.
b. Rely on the encapsulation capabilities of the agent
platform.
Mobile Computing 149 (IT-8) J
Answer
Security threats in mobile communication :
from attacks or threats.
1. Security system is a system to defend our assets
2. Attacks are carried out at the point of vulnerability.
3. When the vulnerability is exploited for some interest or
selfish motive,
it is an attack on the system.
4. Where the vulnerability is exploited, there is a loss.
or an
5 This loss can be either of static information asset (static asset)
information asset in transit (dynamicasset).
6. Attacks on dynamic assets can be of the following types:
a. Interception :
part
i. An unauthorized party gaining access to an asset will be a
of this attack.
ii This is an attack on confidentiality like unauthorized copying
of files or tappinga conversation between parties.
iüi. Some of the sniffing attacks fall in this category.
b. Modification:
i An unauthorized party gaining control of an asset and
tampering with it is part of this attack.
This is an attack on integrity like changing the content of a
message being transmitted through the network.
of
ii. Different types of man-in-the-middle attacks are the part
modification attack.
Fabrication :
i An authorized party inserts counterfeited objects into the
system, for example, impersonating someone and inserting a
spurious message in a network.
d Interruption :
i An asset is destroyed or made unusable.
This is an attack on availability.
ii. This attack can be ona static asset or a dynamic asset.
iv. An example could be cutting a communication line or making
the router so busy that a user cannot use a server in a network.
7 Attack on static assets can be of the following types:
a. Virus and worms :
These are a type of program that replicates and propagates from
one system to another.
Most of the virus do malicious destructive functions in the system.
152 (IT-8) J Mobile Agent Computing
b. Denial of Service:
These are attacks on the system to prevent legitimate users from
using the service.
C. Intrusion :
d. Replay attack:
i Ina replay attack the opponent passively captures the data without
trying to analyze the content.
i. At a later time, the same is used in the same sequence to impersonate
an event and gain unauthorized access to resource.
e Buffer overflow attack :
PART-2
Transaction Processing in Mobile Computing Environment.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
Answer
Transaction :
1. The transaction is amodeling abstraction that groups multiple database
accesses as an atomic unit for the purpose of recovery, concurrency and
consistency.
2. Amobile transaction is a distributed transaction where some parts of
the computation are executed on mobile host and some parts on non
mobile hosts.
156 (IT-8) J Mobile Agent Computing
3. Transactions guarantee the consistency of data records when multiple
users or processes perform concurrent operations on them.
4. The access of distributed resources for example, database on different
computers within a transaction is called a distributed transaction for
committing the results, the peer involved in a distributed transaction
usually communicate via the two phase commit protocol (2PC).
5. Only distributed transaction processing (DTP) offers the posibility to
control the state of a mobile agent system.
6 At present, many type of mobile computing devices such as laptops,
personal digital assistant (PDA)are available.
7 The capacities of these mobile aevices become more powerful.
8. They have more processing speed and longer operating time.
9 Mobile computing devices are becoming the major work processing
equipments in every daily activity.
10. Combining with the expanding of the high-speed network like the
internet, mobile computing applications are growing rapidly.
Transaction processing :
1. Transaction processing is information processing that is divided into
individual and invisible operations called transaction.
2. Transaction processing is designed to maintain databases in a known,
consistent state, by ensuring that any operation carried out on the
database that are interdependent and either all completed successfully
or allcancelled successfully.
3. Transaction processing allows multiple individual operations on a
database to be linked together automatically as a single, individual
transaction.
4 The transaction processing system ensures that either all operations in
a transaction are completed without error, or none of them are.
5. If some of the operations are completed but errors occur when the
others are attempted, the transaction processing system "rolls back" all
of the operations of the transaction, thereby erasing all traces of the
transaction and restoring the database to the consistent, known state
that it was in before processing of the transaction began.
6. If all operations of a transaction are completed successfully, the
transaction is committed" by the system and all changes to the database
are made permanent; the transaction cannot be rolled back once this is
done.
7 If the computer system crashes in the middle of a transaction the
transaction processing system guarantees that all operations in any
uncommitted transaction are cancelled.
Mobile Computing 157 (IT-8) J
Have_ Phase 2:
commited completion
all participants sent
Have _committed
forget transaction
Answer
Online transaction processing :
1. Online transaction processing, or OLTP, refers to a class ofsystems that
facilitate and manage transaction-oriented applications, typically for data
entry and retrieval transaction processing.
2. OLTP has also been used to refer to processing in which the system
responds immediately to user requests. An automatic teller machine
(ATM) for bank is an example of a commercial transaction processing
application.
3 Online transaction processing increasingly requires support for
transactions that span a network and may include more than one
company.
4 For this reason, new OLTP software uses client/server processing and
brokering software that allows transactions to run on diferent computer
platforms in a network.
5 In large applications, efficient OLTP may depend on sophisticated
transaction management software (such as CICS) and/or database
optimization tactics to facilitate the processing of large numbers of
concurrent updates to an 0LTP-oriented database.
6. For even more demanding decentralized database systems, OLTP
brokering programs can distribute transaction processing among
multiple computers on a network.
7. OLTP is often integrated into SOA service-oriented architecture and
web services.
8 Because there is a need for transactions you will need online processing.
9 Online transaction processing has two key benefits: simplicity and
efficiency.
10. Reduced paper trails and the faster, more accurate forecasts for revenues
and expenses are both examples of how OLTP makes things simpler for
businesses.
160 (IT-8) J Mobile Agent Computing
11. It also provides a concrete foundation for a stable organization because
of the timely updating.
12. Another simplicity factor is that of allowing consumers the choice of
how they want to pay, making it that much more enticing to make
transactions.
13. OLTP is proven efficient because it vastly broadens the consumer base
for an organization, the individual processes are faster, and it's available
24/7.
Various mobile transactions models :
1. A mobile transaction is a distributed transaction where some parts of
the computation are executed on mobile host and some parts on non
mobile hOsts.
2 The use of wireless medium and the mobility of data consumers and
producers affect transaction processing in various ways.
3 Location and time of mobile host are the two major factors that affect
mobile transaction processing.
4 Twomobile transaction models are available as follows:
a. High Commit Mobile Transaction Model (HiCoMo) :
i The execution model is mainly for processing aggregate data
stored in a data warehouse which resides in mobile units.
iüi. Since the data warehouse resides in mobile units, HiCoMo
transactions are always initiated on mobile unit where they
are processed in a disconnected model.
ii. As a result transaction commit1nents are quite fast.
iv. The base database resides on the fixed network.
V. The structure of HiCoMo transaction is based on nested
transaction model.
vi. It is manipulated by transaction called base or source
transactions. These transactions initiated at the fixed network.
vii. To install updates of HiCoMo transaction they must be
converted tosource transactions.
vii. This conversion is done by a transaction transformation
function.
b. Kangaroo mobile transaction model :
It captured both data and the movement of mobile unit.
i. The model based on a split transaction and enforces the ACID
properties.
iii. Aglobal or parent Kangaroo transaction, KT, is composed of a
number of subtransactions. Each subtransaction is similar to
an ACID transaction, which is composed of a set of reads and
writes. These subtransactions are called Joey Transaction (JT)
161 (IT-8) J
Mobile Computing
and are local to a base station.
transaction, a base station creates
iv. Upon initiation of a Kangaroo
a JT for its execution.
the initial BS (base
V. AKT, when initiate by a MU (mobile unit), identity and
station) immediately creates a JT withaunique
become responsible for its execution.
cell, the BS of this cell
vi. When the MU migrates to another transaction.
takes control of the execution of this
split in two JTs,
vii. When a MUencounters with handoff, KT is
thus the mobility of a MU is captured by splitting a KT.
management.
Que 4.15. Discuss the schemes of mobiletransaction
transaction management.
List out various issues concerned to
UPTU2013-14, Marks 10
OR
processing
Discuss various issues which are related to transaction
in mobile computing. UPTU2011-12, 2012-13; Marks 10
Answer
Mobile transaction schemes: Refer Q. 4.14, Page 159J, Unit-4.
Issues of transaction processing in mobile computing environment :
highly distributed
1 Mobile environments can be considered to be similar to
environments in many respects.
hosts are not
2 But unlike in distributed environments, locations of some
permanent in mobile environments.
bandwidth, frequent
3 This along with the low communication
disconnections and high vulnerability throws up many challenges to
researchers.
a. Data consistency and concurrency control:
i In mobile environments, data could be replicated on a number
of servers throughout the network.
Some of these servers could be MUs. Moreover, a MH might
operate on cached data while being disconnected from the
fixed network.
iüi. The data conflicts arising in mobile environments could partly
be due to the locality of the users accessing the data.
iv. The execution of a mobile transaction could also be distributed
and relocated among fixed hosts and the mobile nodes.
V
The non-deterministic lifetime of a mobile transaction and the
low bandwidth of communication links are other factors that
affect concurrency control and cache management.
162 (IT-8) J Mobile Agent Computing
b. Infrastructure requirements :
For any model to be successful, it is important that it can be
moved from the research labs and deployed in the real world.
i. Assuming a wireless communication infrastructure to be well
in place, it is important to determine the additional resources
required for having a mobile transaction system in place.
i. These resources could range from protocols for location
sensitive service access to mechanisms for optimized query
management and controlled query release mechanisms.
C. Communication costs :
i. The high cost of the communication links is one of the major
constraints in mobile environments.
i. Efficient utilization of bandwidth is thus an important factor
on evaluating a transaction model.
d. Relocation mechanism and user profiles :
i. Mobile agents are processes or set of processes that perform
an activity on the fixed network on behalf of the MU.
ii. These agents will typically be a transaction activity that access
several databases and report some results to the mobile node.
iii. Relocation of transaction execution or mobile agents is
necessary to improve response times in mobile environments.
iv. Performance can still be improved if the user profiles or user
directivescan be used to effect anticipatory relocation or to
avoid unnecessary relocation.
e. Scalability :
i As mobile computing grows to be more affordable and popular,
the number of MUs handled by every base station could be
large.
Hence, it is very important that a mobile transaction model
scale up efficiently.
Que 4.16. Discuss the challenges in transaction processing.
What are the counter measures to security threat in computing
environment ? UPTU 2014-15, Marks 10|
Answer
Challenges in transaction processing :
1. Enhanced failure model:
a. Compared to fixed-wired networks, mobile environments suffer
from a variety of failures : Message loss occurs in fixed wired
networks due to rare problems like buffer over-flows or data packet
collisions.
Mobile Computing 163 (IT-8) J