a graph transformation system model of reliable dynamic communication networks for location...
TRANSCRIPT
![Page 1: A Graph Transformation System Model of Reliable Dynamic Communication Networks for Location Transparent Mobile Agents M. Kurihara (Hokkaido Univ., Japan)](https://reader030.vdocuments.net/reader030/viewer/2022032612/56649f095503460f94c1d778/html5/thumbnails/1.jpg)
A Graph Transformation System Model of Reliable Dynamic
Communication Networks for Location Transparent
Mobile Agents
M. Kurihara (Hokkaido Univ., Japan)
and M. Numazawa (Otaru Univ. Commerce, Japan)
![Page 2: A Graph Transformation System Model of Reliable Dynamic Communication Networks for Location Transparent Mobile Agents M. Kurihara (Hokkaido Univ., Japan)](https://reader030.vdocuments.net/reader030/viewer/2022032612/56649f095503460f94c1d778/html5/thumbnails/2.jpg)
Introduction
Distributed software technologies
Mobile agent technology
Future intelligent telecommunication technologies
research practice
Mobile agents are software agents that can move around the
network.
![Page 3: A Graph Transformation System Model of Reliable Dynamic Communication Networks for Location Transparent Mobile Agents M. Kurihara (Hokkaido Univ., Japan)](https://reader030.vdocuments.net/reader030/viewer/2022032612/56649f095503460f94c1d778/html5/thumbnails/3.jpg)
Introduction (2)
mobile agent network
Location transparent
Static: reliable
Dynamic: sound
![Page 4: A Graph Transformation System Model of Reliable Dynamic Communication Networks for Location Transparent Mobile Agents M. Kurihara (Hokkaido Univ., Japan)](https://reader030.vdocuments.net/reader030/viewer/2022032612/56649f095503460f94c1d778/html5/thumbnails/4.jpg)
Structure of this talk
1.Mobile agents & location transparency
2.Proxy networks (Reliablity)
3.Graph transformation system(Soundness)
![Page 5: A Graph Transformation System Model of Reliable Dynamic Communication Networks for Location Transparent Mobile Agents M. Kurihara (Hokkaido Univ., Japan)](https://reader030.vdocuments.net/reader030/viewer/2022032612/56649f095503460f94c1d778/html5/thumbnails/5.jpg)
Mobile Agents
Software agents that can move around the network
agent
stop resumemove
Host 1 Host 2
location transparent network
![Page 6: A Graph Transformation System Model of Reliable Dynamic Communication Networks for Location Transparent Mobile Agents M. Kurihara (Hokkaido Univ., Japan)](https://reader030.vdocuments.net/reader030/viewer/2022032612/56649f095503460f94c1d778/html5/thumbnails/6.jpg)
Location Transparency
The communications will not fail even if agent B has moved to B’ without any notice to A.
A
B B'communicatingmove
Can communicate?
In the location transparent network, yes.
![Page 7: A Graph Transformation System Model of Reliable Dynamic Communication Networks for Location Transparent Mobile Agents M. Kurihara (Hokkaido Univ., Japan)](https://reader030.vdocuments.net/reader030/viewer/2022032612/56649f095503460f94c1d778/html5/thumbnails/7.jpg)
Approaches to location transparency
(system-level implementation) Logging: the agents leave (in the agent
server) the trail information containing the next location
Brute Force: the system searches for the target agent by sending a query to every agent server
Registration: the system keeps the locations of all agents in a unique directory server, updating the information each time an agent makes a move
![Page 8: A Graph Transformation System Model of Reliable Dynamic Communication Networks for Location Transparent Mobile Agents M. Kurihara (Hokkaido Univ., Japan)](https://reader030.vdocuments.net/reader030/viewer/2022032612/56649f095503460f94c1d778/html5/thumbnails/8.jpg)
Proxy Networks(application-level implementation of
location transparency)
Basic idea: simple communication path for forwarding messages
A
B'B B"
proxy
proxy
target
Problems
Reliability: what if a proxy is abnormal?
Performance: O(the length of the path)
forward forward
![Page 9: A Graph Transformation System Model of Reliable Dynamic Communication Networks for Location Transparent Mobile Agents M. Kurihara (Hokkaido Univ., Japan)](https://reader030.vdocuments.net/reader030/viewer/2022032612/56649f095503460f94c1d778/html5/thumbnails/9.jpg)
Reliable and more efficient proxy networks
Reliable: one abnormal proxy is allowed. Performance: there is a shorter path.
Target
Special proxy
Normal proxies
![Page 10: A Graph Transformation System Model of Reliable Dynamic Communication Networks for Location Transparent Mobile Agents M. Kurihara (Hokkaido Univ., Japan)](https://reader030.vdocuments.net/reader030/viewer/2022032612/56649f095503460f94c1d778/html5/thumbnails/10.jpg)
Formal Representation(graph-theoretical definition of proxy networks)
A proxy network is a finite, simple, directed acyclic graph G=(V, E) that satisfy the following three conditions (in the next slide).
(The vertexes of V are called agents, and the directed edges of E are called links. By definition, a simple graph contains no parallel edges, which connect the same start and end vertexes; and an acyclic graph contains no circuits.)
![Page 11: A Graph Transformation System Model of Reliable Dynamic Communication Networks for Location Transparent Mobile Agents M. Kurihara (Hokkaido Univ., Japan)](https://reader030.vdocuments.net/reader030/viewer/2022032612/56649f095503460f94c1d778/html5/thumbnails/11.jpg)
Graph-theoretical definition of proxy networks (Contd.):
the three conditions
1. There exists a unique agent (called the target) with no outgoing links. (The agents other than the target are called proxies.)
2. There exists a unique proxy (called the special proxy) with exactly one outgoing link. The link should be connected to the target.
3. The remaining proxies (called normal proxies) have exactly two outgoing links.
![Page 12: A Graph Transformation System Model of Reliable Dynamic Communication Networks for Location Transparent Mobile Agents M. Kurihara (Hokkaido Univ., Japan)](https://reader030.vdocuments.net/reader030/viewer/2022032612/56649f095503460f94c1d778/html5/thumbnails/12.jpg)
Theorem 1 (Reliability)
For all pairs of distinct proxies v and w, there exists a path from v to the target t without passing through w.
v w t
![Page 13: A Graph Transformation System Model of Reliable Dynamic Communication Networks for Location Transparent Mobile Agents M. Kurihara (Hokkaido Univ., Japan)](https://reader030.vdocuments.net/reader030/viewer/2022032612/56649f095503460f94c1d778/html5/thumbnails/13.jpg)
Proof of Theorem 1
Start from v and follow an appropriate path as follows.
At normal proxies, follow a link whose end vertex is not w.
Repeat this process while you are at a normal proxy.
normal proxyw
![Page 14: A Graph Transformation System Model of Reliable Dynamic Communication Networks for Location Transparent Mobile Agents M. Kurihara (Hokkaido Univ., Japan)](https://reader030.vdocuments.net/reader030/viewer/2022032612/56649f095503460f94c1d778/html5/thumbnails/14.jpg)
Proof of Theorem 1 (Contd.)
Eventually, you will reach either the special proxy or the target.
If you are at the target, you are done.
Otherwise, you are at the special proxy.Follow the link connected to the target.
special proxy t
![Page 15: A Graph Transformation System Model of Reliable Dynamic Communication Networks for Location Transparent Mobile Agents M. Kurihara (Hokkaido Univ., Japan)](https://reader030.vdocuments.net/reader030/viewer/2022032612/56649f095503460f94c1d778/html5/thumbnails/15.jpg)
Graph Transformation Rule
utts usutEuVEV ,, )}),(),,{(},{(),(
s t s t u
(a) Move to a new host
![Page 16: A Graph Transformation System Model of Reliable Dynamic Communication Networks for Location Transparent Mobile Agents M. Kurihara (Hokkaido Univ., Japan)](https://reader030.vdocuments.net/reader030/viewer/2022032612/56649f095503460f94c1d778/html5/thumbnails/16.jpg)
s t s t u
(a) Move to a new place
s t
(b) Move to the special proxy
s t
u s t
(c) Move to a normal proxy
u s t
u v s t u v s t
(d) Bypass
Graph Transformation System
![Page 17: A Graph Transformation System Model of Reliable Dynamic Communication Networks for Location Transparent Mobile Agents M. Kurihara (Hokkaido Univ., Japan)](https://reader030.vdocuments.net/reader030/viewer/2022032612/56649f095503460f94c1d778/html5/thumbnails/17.jpg)
The initial network G0
)},{(},,{
),(
00
,000
tsEtsV
EVG ts
s t
![Page 18: A Graph Transformation System Model of Reliable Dynamic Communication Networks for Location Transparent Mobile Agents M. Kurihara (Hokkaido Univ., Japan)](https://reader030.vdocuments.net/reader030/viewer/2022032612/56649f095503460f94c1d778/html5/thumbnails/18.jpg)
Application of graph rewrite rules
nGGGG 210
nGG *0
![Page 19: A Graph Transformation System Model of Reliable Dynamic Communication Networks for Location Transparent Mobile Agents M. Kurihara (Hokkaido Univ., Japan)](https://reader030.vdocuments.net/reader030/viewer/2022032612/56649f095503460f94c1d778/html5/thumbnails/19.jpg)
Theorem 2 (Soundness)
If , then is a proxy network.
GG *0
G
![Page 20: A Graph Transformation System Model of Reliable Dynamic Communication Networks for Location Transparent Mobile Agents M. Kurihara (Hokkaido Univ., Japan)](https://reader030.vdocuments.net/reader030/viewer/2022032612/56649f095503460f94c1d778/html5/thumbnails/20.jpg)
Summary
1.Mobile agents
& location transparency2.Proxy networks
(Reliablity)3.Graph transformation system
(Soundness)
![Page 21: A Graph Transformation System Model of Reliable Dynamic Communication Networks for Location Transparent Mobile Agents M. Kurihara (Hokkaido Univ., Japan)](https://reader030.vdocuments.net/reader030/viewer/2022032612/56649f095503460f94c1d778/html5/thumbnails/21.jpg)
Future Work
Formal theory of more complex mobile agent systems
that might allow us (or even agents)to rigorously (or mechanically) reason about the dynamic nature of the networks.