CFP last date
20 December 2024
Reseach Article

Mobile Agent based System for Listing Fundamental Wi-Fi Peer-to-Peer Network Details

by Kevin Otieno Gogo, Elisha Toyne Opiyo
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 114 - Number 5
Year of Publication: 2015
Authors: Kevin Otieno Gogo, Elisha Toyne Opiyo
10.5120/19977-1907

Kevin Otieno Gogo, Elisha Toyne Opiyo . Mobile Agent based System for Listing Fundamental Wi-Fi Peer-to-Peer Network Details. International Journal of Computer Applications. 114, 5 ( March 2015), 44-50. DOI=10.5120/19977-1907

@article{ 10.5120/19977-1907,
author = { Kevin Otieno Gogo, Elisha Toyne Opiyo },
title = { Mobile Agent based System for Listing Fundamental Wi-Fi Peer-to-Peer Network Details },
journal = { International Journal of Computer Applications },
issue_date = { March 2015 },
volume = { 114 },
number = { 5 },
month = { March },
year = { 2015 },
issn = { 0975-8887 },
pages = { 44-50 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume114/number5/19977-1907/ },
doi = { 10.5120/19977-1907 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:51:55.994638+05:30
%A Kevin Otieno Gogo
%A Elisha Toyne Opiyo
%T Mobile Agent based System for Listing Fundamental Wi-Fi Peer-to-Peer Network Details
%J International Journal of Computer Applications
%@ 0975-8887
%V 114
%N 5
%P 44-50
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

On our everyday operations there is need to engage agents to perform some duties on our behalf, hence they are gaining acceptance as a technology and are being used. Most of the networked offices, networked homes, cyber cafes, learning institutions and other arenas where computers are interconnected on a Wi-Fi network, have peer-to-peer networks. In Wi-Fi peer-to-peer networks, it is difficult to identify the network details of all the network devices connected such as the IP addresses, Mac addresses and computer names of all computers connected on the Wi-Fi peer to peer network at one go; which we hereby refer to as fundamental network details. This is mainly possible in a client-server based architecture where the server monitors all the computers on the network. From the above gap, we developed a mobile agent that could be run in any computer on the Wi-Fi peer-to-peer network and it lists these fundamental details of all the computers connected to the Wi-Fi peer-to-peer network. In developing this mobile agent, we used the MaSE agent methodology. The mobile agent was coded, implemented and tested. The agent was then subjected to various controls which it overcame and managed to return the desired fundamental details with over 80% accuracy. They had the capacity to classify every computer on the network as either intruder or non intruder based on the list of authorized computers supplied by the user. The agent suffered major limitation which included: - the agent took longer time to learn and return the results, as well as it could not communicate to the intruders or shut them down. In future, the agent could therefore be improved to reduce its processing time, communicate with the intruding computers, and shut down the intruding computers or deny them network access.

References
  1. Chauhan D. , 1997. JAFMAS: A Java-Based Agent Framework for Multiagent Systems Development and Implementation, master's thesis. Electrical Engineering and Computer Science Dept. , Univ. of Cincinnati, Cincinnati.
  2. El-Rewini H. , Abd-El-Barr M. 2005. Fundamentals of computer organization and architecture. A John Wiley & sons, Inc.
  3. Joey P. 2010. Peer to peer configuration, [online]. available from http://www. wifinotes. com/computer-networks/how-to-configure-network. html [accessed on10th December 2014]
  4. Kothari C. R. 2004. Research methodology, 2nd ed. , New Delhi: New Age Int. (P) Ltd.
  5. Li J. C, 2001. Mobile agents system, a tutorial report of University of Calgary. Available on http://people. ucalgary. ca/~far/Lectures/SENG697/PDF/tutorials/2001/Mobile_Agents2. pdf [accessed on10th December 2014]
  6. Michael W. 2002. An Introduction to Multiagent Systems. John Willey & Sons, Ltd.
  7. Michiardi, P. Molva, R. 2003 "Ad hoc networks security," IEEE Press Wiley, New York,
  8. Nwana H. S. 1996. 'Software agents: An Overview', in Knowledge Engineering Review.
  9. Odell J. , Parunak H. , and Bauer B. 2000. Extending UML for agents. In Proceedings of the Agent-Oriented Information Systems Workshop at the 17th National conference on Artificial Intelligence.
  10. Opiyo Elisha, Erick Ayienga, Katherine Getao, Bernard Manderick, Okello-Odongo, and Ann Nowé 2006. "Computing Research Challenges and Opportunities with Grid Computing", in Ddembe W. and Baryamureeba V. (eds); Measuring Computing Research Excellence and Vitality, Fountain publishers, Kampala. Online version available at http://cit. mak. ac. ug/iccir/downloads/SREC05. pdf
  11. Phillips M. 2010. Mobile and Ambient Agents in the Internet and in the Electronic Corposants', available from http://www. limsi. fr/~jps/enseignement/examsma/2004/BHATTI/index. htm#Mobile%20Agents, [accessed on10th December 2014]
  12. Rapaport T. S. , 2002. Wireless Communications Principles and Practice, Prentice Hall.
  13. Tarau, P. Dahl, V. De Bosschere, K. 1997. High level logic programming tools for remote execution, mobile code and agents, [accessed on 8th December 2014] available at http://clement. info. umoncton. ca/html/remote/art. html
  14. Tesfatsion, L. 2001b. Agent-based modeling of evolutionary economic systems, IEEE Transactions on Evolutionary Computation, vol. 5, pp. 1-6.
  15. Wooldridge M. 2004. An Introduction to Multi-Agent Systems, Wiley.
  16. Yang, H. Luo, H. Ye, F. Lu, S. Zhang, L. 2004. "Security in mobile ad hoc networks: challenges and solutions," In proc. IEE Wireless Communication, UCLA, Los Angeles, CA, USA; volume- 11, ISSN: 1536-1284
  17. http://en. wikipedia. org/wiki/Simple_Network_Management_Protocol [accessed on 8th December 2014]
Index Terms

Computer Science
Information Sciences

Keywords

Mobile agents agents programming Wi-Fi networks peer networks