18.04.2013 Views

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

392 <strong>B2B</strong> <strong>Integration</strong> — A <strong>Practical</strong> <strong>Guide</strong> <strong>to</strong> <strong>Collaborative</strong> E-<strong>commerce</strong><br />

• Mobile agents are dynamic in nature, i.e., they are able <strong>to</strong> adapt <strong>to</strong><br />

new negotiation strategies and pro<strong>to</strong>cols, based on the current task.<br />

• Mobile code significantly reduces network traffic due <strong>to</strong> local agent<strong>to</strong>-agent<br />

communication. In a distributed application, like the ones<br />

supporting <strong>B2B</strong> e-<strong>commerce</strong>, network bandwidth is one of the major<br />

concerns. To successfully complete a single transaction in the <strong>B2B</strong><br />

domain, applications of the companies concerned have <strong>to</strong> communicate<br />

a multiple number of times. In each communication there is a clientserver,<br />

round-trip involved which not only takes the already scarce<br />

network bandwidth, but also slows down the whole process, resulting<br />

in poor performance for the application as a whole. By creating a<br />

mobile agent <strong>to</strong> handle the query or transaction and sending the agent<br />

from the client <strong>to</strong> the server, network bandwidth consumption is<br />

reduced and the process becomes much faster.<br />

• Mobile agent architectures also solve the problem created by<br />

intermittent or unreliable network connections. In the conventional<br />

systems, if the network goes down, the whole transaction is aborted.<br />

The users of such applications have <strong>to</strong> redo all the work <strong>to</strong> complete<br />

the aborted transaction. In a mobile agent architecture, the client<br />

doesn't talk <strong>to</strong> the server over the network, instead, the client actually<br />

migrates <strong>to</strong> the server's machine. Once on the server's machine, the<br />

client makes its requests <strong>to</strong> the server directly. When the entire<br />

transaction is complete, the mobile agent returns home with the<br />

results.<br />

13.8.2. Potential risks involved in use of<br />

mobile agents<br />

Mobile agents have <strong>to</strong> expose their code and data <strong>to</strong> the host environment<br />

that supplies them the means <strong>to</strong> execute. Due <strong>to</strong> this feature, agents can<br />

be tampered with, scanned, or, in some extreme cases, even terminated<br />

by malicious servers.<br />

The risks of attack on an agent's activities and fitness are directly<br />

proportional <strong>to</strong> its mobility (see Figure 13.5). Thus, agents dealing with<br />

highly secured data, such as payment information, should be restricted<br />

in mobility.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!