Orphan detection and termination in distributed systems is a well researched field for which many solutions exist. These solutions exploit well defined parent-child relationships given in distributed systems. But they are not applicable in mobile agent systems, since no similar natural relationship between agents exist. Thus new protocols have to be developed. In this paper one such protocol for orphan detection and agent termination is presented. First we present two approaches, the energy concept and the path concept. The energy concept is a passive termination protocol, and the path concept is a protocol for finding agents, that can be used to implement active termination. The energy' approach is based on the idea that an agent is provided with a limited amount of energy, which can be spent in exchange for the resources used by the agent. From time to time the agent has to request additional energy from its creator. The agent is terminated as soon as the energy falls to 0. This approach to agent termination implicitly implements orphan detection, i.e. if the creator has terminated, the dependent agents are killed as soon as they have no energy left. The path' approach uses a chain of proxies. As soon as an agent leaves a location, a proxy is created that points to the new location. By following the chain of proxies, the path, one can find any agent, and consequently terminate it. Both approaches have disadvantages. By merging them on different levels we create a protocol that combines the advantages of both approaches, and at the same time minimizes the disadvantages. The shadow' approach uses the idea of a placeholder (shadow) which is assigned by the agent system to each new agent. The shadow records the location of all dependent agents. Removing the root shadow implies that all dependent shadows and agents are terminated recursively.
[1]
Douglas Comer,et al.
Internetworking with TCP/IP
,
1988
.
[2]
Joachim Baumann,et al.
Agent Groups in Mobile Agent Systems
,
1997,
DAIS.
[3]
James R. Beers.
Book Review: Internetworking with TCP/IP Volume III: Client-Server Programming and Applications by Douglas E. Comer and David L. Stevens (Prentice Hall, 1993)
,
1993,
CCRV.
[4]
Marc Shapiro,et al.
SSP Chains: Robust, Distributed References Supporting Acyclic Garbage Collection
,
1993
.
[5]
Andrzej M. Goscinski,et al.
Distributed operating systems - the logical design
,
1991
.
[6]
Andrew S. Tanenbaum,et al.
Distributed operating systems
,
2009,
CSUR.
[7]
Nancy A. Lynch,et al.
Distributed Algorithms
,
1992,
Lecture Notes in Computer Science.
[8]
Seif Haridi,et al.
Distributed Algorithms
,
1992,
Lecture Notes in Computer Science.
[9]
Aline Baggio,et al.
Mobile host tracking and resource discovery
,
1996,
EW 7.
[10]
G. G. Stokes.
"J."
,
1890,
The New Yale Book of Quotations.
[11]
Fritz Hohl,et al.
Communication Concepts for Mobile Agent Systems
,
1997,
Mobile Agents.
[12]
Andrew P. Black,et al.
Fine-grained mobility in the Emerald system
,
1987,
TOCS.