Abstract
Some of the approaches have been developed to retrieve data automatically from one or multiple remote biological data sources. However, most of them require researchers to remain online and wait for returned results. The latter not only requires highly available network connection, but also may cause the network overload. Moreover, so far none of the existing approaches has been designed to address the following problems when retrieving the remote data in a mobile network environment: (1) the resources of mobile devices are limited; (2) network connection is relatively of low quality; and (3) mobile users are not always online. To address the aforementioned problems, we integrate an agent migration approach with a multi-agent system to overcome the high latency or limited bandwidth problem by moving their computations to the required resources or services. More importantly, the approach is fit for the mobile computing environments. Presented in this paper are also the system architecture, the migration strategy, as well as the security authentication of agent migration. As a demonstration, the remote data retrieval from GenBank was used to illustrate the feasibility of the proposed approach.
Introduction
Due to the exponential growth of biological sequences generated in the postgenomic age [1], a large amount of biology related data is generated and publicly available as web resources [2]. Typically, these resources are accessible only through web-based query interfaces. Analytical methods are often developed on the integration of information from multiple sources in bioinformatics research. This might result in an individual researcher has to do a query at each data source. What's more, these data sources are very possible to have different entries, data formats, query options, and complex results [3].
Fortunately, some approaches have been developed to retrieve data automatically from one or multiple data sources. Buttler and Critchlow propose a meta-data description language to automatically generate wrappers that can extract the appropriate data from each source [3]. Cadag and Tarczy-Hornoch address diverse data retrieval via a simple framework for representing coverage and evidence that operates in parallel with an arbitrary schema, and a language upon which queries on the schema and framework may be executed [4]. Gouy and Delmotte proposes a biological sequence database system named ACNUC, which is able to provide powerful and fast query and extraction capabilities to a variety of nucleotide and protein sequence databases [5]. Lacroix presents a tool to query integrated web data sources composed of a retrieval component based on an intermediate object view mechanism and search views, and an XML engine [6]. Some efforts are done on the integration of biological data available on the web and maintained in diverse sources [7], [8], [9], [10], [11].
However, the most of the above approaches for remote data retrieval require researchers to remain online and wait for returned results. The retrieval mode with the feature of “static service and floating data” not only requires high availability of network connection, but also might result in network overload. Moreover, the existing approaches are not designed to address the remote data retrieval in a mobile network environment, which is welcome by more and more researchers, with the rapid development speed of mobile networks. Researchers often wish that they can obtain retrieval results by their mobile devices so that they are able to promptly make decisions in terms of required information.
To tackle these problems, we integrate the migration mechanism of mobile agents to a multi-agent system to reduce the workload of network transmission, improve the capability of parallel processing, as well as facilitate the flexibility and scalability of the system.
Mobile agents, evolved from autonomous agents [12], [13], [14], have the feature of autonomy, social ability, learning, and most importantly, mobility. They can automatically suspend their executions on one host and migrate to another to resume their computations without tedious and slow network communication [15], [16]. In a mobile network environment, agent migration has a more significant role: due to the resource limitation of mobile devices, agents are sent to some nodes/devices with rich resources for doing some tasks which have high requirements of resources, and then bring results back.
Agent migration has been regarded as a promising approach used in diverse fields of network applications to reduce network load, shorten communication delay, package transmission protocol, and increase flexibility [16], [17], [18]. Recently, a few applications developed using agent migration approach have been seen in a couple of areas, such as wireless ad hot network routing [19], electronic marketplace [20], electronic tour guide [21], distributed information retrieval [22], supply chain management [23], and autonomous software deployment [24]. Some studies have further combined agent migration with ecosystem-inspired evolutionary approaches, aiming to build highly available, ubiquitous, self-managing, and adaptable applications [16], [25], [26]. In general, agent migration approach can be applied to the areas of distributed information retrieval, networks services, electronic commerce, personal assistance, secure brokering, supply chain management, monitoring and notification, information dissemination, and parallel processing [20].
This paper further develops an asynchronous migration mode, where the migration request is initially inserted into a processing queue, rather than immediately addressed. Using this mode, agents can perform their tasks even if the users are mostly in a low-quality connection or disconnection status. Although agent migration approach has many distinct properties that make it a promising direction for data retrieval, it also brings significant security threats, which have become the bottleneck of the development and maintenance of the mobile agent systems [15]. So in the proposed agent migration service, we design a security authentication of agent migration.
The rest of the paper is organized as follows. We first present the architecture of the proposed multi-agent system and the agent migration service. Then, as a demonstration, an application for remote data retrieval in GenBank [27] is developed to illustrate the feasibility of the proposed approach. Finally, this paper concludes our research efforts.
Methods
1. System Architecture
The proposed multi-agent system is fully implemented using Java. This architecture (as shown in Figure 1) is regarded as a three-layer model, including: (1) resources layer, (2) agent environment layer, and (3) applications layer.
Each system is hosted in a network node (e.g., a mobile phone or a supercomputer) and runs upon a Java virtual machine (JVM), which is built on an active operating system in the node. So the resources layer consists of all kinds of basic resources available in the network node. The applications layer establishes a friendly interface between users and the proposed system. Many services in this layer are provided through web pages and can be implemented by JavaBean, JSP, Servlet, and so on.
In the middle of the above two layers, the agent environment is the runtime environment for deploying and executing agents. Upon the resource layer, the agent environment layer provides a bunch of low-level functional modules which can help agents fully use the resources. The low-level functional modules include local resource management, local security, message transport, class loader, and concurrency. Then upon the low-level functional modules, the agent environment layer provides a set of general-purpose runtime services that are frequently used by agents, including naming service, sensing service, security authentication service, persistency service, and agent migration service. These services alleviate agents from low-level operations and allow agents to be lightweight by separating them from some routine work. This layer of the proposed multi-agent system is implemented based on the ENGM platform. The discussion on design philosophy, layer analysis, service design, functional merits and message-based communication of the ENGM system is beyond the scope of this paper. Readers are referred to Refs. [13], [28], [29].
2. Agent Migration Service
Agent migration can help agents: (1) approach data sources or service requests, and reduce network communication workload; (2) utilize rich resources in destination nodes; (3) encapsulate a suitable transmission protocol for establishing connection in accordance to the applied protocol; and (4) find useful partner agents in other network nodes, build new relationships, and improve service quality. The proposed multi-agent system has two migration modes: synchronous and asynchronous migration. In the synchronous mode, the migration request of a mobile agent is processed immediately. However, if the agent migration service of the system finds the destination node is unreachable, it will send an error message to its administrator and let him/her determine its next step. In the asynchronous migration mode, the migration request is initially inserted into a processing queue and not immediately processed. The asynchronous migration mode is required in some tough situations, such as when the destination node is unreachable, when executing a task without persistent connection, or when a mobile agent in a node with persistent connection is waiting for returning to an offline node.
The agent migration service is responsible for sending/receiving an agent to/from another host. It serializes both agent code and execution state into streams/bit-blobs which are suitable for network transfer and persistent storage. The persistency service is responsible for storing serialized agents into persistent storage. It minimizes resource consumption while agents wait for executing a task. In addition, the persistency service offers fault tolerance by duplicating and storing agent copies before starting critical operations.
Two key technologies: migration strategy and security authentication of agent migration are presented as follows.
2.1. Migration Strategy
In this section, as a demonstration of agent migration strategy, a flowchart of agent asynchronous migration is shown in Figure 2. When a migration request is under processing, the agent migration service of the multi-agent system checks migration conditions in the source node, deciding to allow the agent to migrate or not. In addition, the agent migration service judges whether the destination node agrees the migration, the destination node is reachable, and the migration is successful, then take different actions. Once the migration is successful, the replication of the agent in the destination node will execute its task and the original agent will be deleted in the source node.
2.2. Security Authentication of Agent Migration
The agent migration approach also brings significant security concerns, among which the primarily important problems are the ones between a mobile agent and its platforms. Existing mobile agent systems mostly utilize user information stored in external directory services to authenticate an external access. However, the resource limitation of mobile devices restricts the communication between external directory services and themselves. So a security authentication of agent migration must be done locally and not involve an external directory service.
We design a security authentication of agent migration based on java virtual machine (JVM). Figure 3 demonstrates the designed security authentication of agent migration, which includes digital signature exanimation, trustable node examination, and user authentication. To the agent that migrates to a new node successfully, the local security module in the node will authenticate and monitor its access to local resources.
The digital signature exanimation is used to confirm if a migrating agent (i.e., migration codes) changes. An application developer creates and signs message abstract where a signature is encrypted digital data. The JVM decrypts the message abstract of the migration codes and compares it with the abstract decrypted using a public cryptographic key. If two abstracts match, there is no change in the migrating agent. In this examination, the public cryptographic key should be registered locally before receiving remote migration codes.
Note that even if the migration codes are trustable, the remote program may be harmful. The trustable node examination is based on JVM, which creates protection domain for executing program and restricts the privilege of the remote program. When an agent migrates to a new node, the Java class loader of the JVM in the node will examine the creator of the agent. If the creator is not in the local list (a JVM maintains a list of trustable nodes), the JVM will assign the least privilege to execute the migration codes.
The security authentication service also maintains a user authentication table, which is used to authenticate mobile agents that migrate from other hosts. An access privilege is created based on the agent metadata, the authentication result of the source node, and local security requirements. Once the system receives the migration request from an unknown node or an unmarked agent, the security authentication will send a message to its administrator (terminal user) and let the administrator determine how to deal with the situation. According to the decision made by the administrator, the security authentication offers agents different access privileges.
Results and Discussion
A Case Study of Remote Data Retrieval Using Agent Migration
We apply the migration service described above to remote data retrieval in GenBank, which is the NIH genetic sequence database, an annotated collection of all publicly available DNA sequences. In this case, we want to retrieve all genome sequences of spike (S) protein of severe acute respiratory syndrome coronavirus (SARS-CoV) [30] from the GenBank database. The idea is according to the record format in Genbank is relatively invariable, sending migration programs to the website and capturing effective information locally from the web tags.
After the mobile agent is allowed to execute tasks in the destination node (a GenBank server), firstly, the mobile agent is required to obtain the start and end positions of a genome sequence of S protein by finding the information “/product = ‘spike glycoprotein’”, as shown in the blank box of Figure 4.
Secondly, the agent needs to capture sequence data under “ORIGIN” tag, which stands for the start of a sequence, as shown in Figure 5.
The flowchart of data retrieval of the mobile agent is shown in Figure 6. The agent is required to declare a HTTP component to locate the data source, then capture and store the information. Next, the agent will check the information obtained, if the process is verified as a successful case, the information captured will be returned to client terminals; otherwise, error messages will be sent to the terminals.
In the implementation of the case study, when a mobile agent is required to migrate, it invokes requestMigration() method to request an asynchronous migration. Then the multi-agent system processes the request by executing preDeliverAgent() method, and build a connection with the destination host by remotely invoking preReceiveAgent() method in that host through RMI over Internet inter-orb protocol (RMI-IIOP) [31]. Furthermore, the multi-agent system sends a request for transferring an agent to the system in the destination host. After obtaining a positive response from the destination host, the system in the source host starts to transfer the replication of the agent. If the transfer is successful, a message will be sent to close the connection, register the information to the destination host, make the agent reloaded in the destination host, and inform the source host to delete the agent; otherwise, the request will enter the processing queue in the source host. Parts of preDeliverAgent() method and preReceiveAgent() method are shown as follows,
public void preDeliverAgent (Agent agent, String desAddress) {
String agentId = agent.getAgentID(); // obtain the ID of the agent;
String address = desAddress; // the address of the destination host;
String rmiiiopAddress = “//”+address+“/preReceiveAgent”;
Receiver receiver = (Receiver) Naming.lookup (rmiiiopAdddress); // look for preReceiveAgent() method;
boolean migrate = receiver.preReceiveAgent (host, port, agentId); // invoke preReceiveAgent();
…
}
public boolean preReceiveAgent (String host, int port, String agentId) {
Connection con = new Connection (host, port); // build a connection;
ObjectOutputStream out = new ObjectOutputStream(con.getOutputStream()); // create output stream;
ObjectInputStream input = new ObjectInputStream(con.getInputStream()); // create input stream;
out.writeObject(agentId); // send agent ID to the host;
String agentName = (String) input.readObject(); // obtain agent name;
// communicate with the source host to examine whether the agent is ready to migrate
…
// receive the agent if it is ready, otherwise return error messages
…
con.close(); // close connection;
this.server.registerAgent(agentName, agentId); // register the agent;
this.server.startAgent(agentId); // reload the agent;
}
Furthermore, we can utilize rich resources in destination nodes or third-party platforms to deal with obtained data and do some analyses, then return the processed results to mobile devices with limited resources. For example, in the above case, the genome sequences of S protein can be further analyzed using the approach proposed in Ref. [30] and the agent only needs to return the analysis results. Figure 7 demonstrates the returned analysis results in two mobile device emulators.
This paper proposes an agent migration approach to fill in the gap that existing approaches have not addressed: retrieving remote data in a low-quality network environment, especially unstable mobile computing environments. The ability of migration offers mobile agents a means to overcome the high latency or limited bandwidth problem by moving their computations to required resources or services. The proposed approach can also overcome the resource limitation of mobile terminals and release mobile users from keeping online persistently. The system architecture and the migration service are given in details. A remote data retrieval in GenBank was used to illustrate the feasibility of the proposed approach.
The agent migration approach can also be applied to retrieving non-data web resources, for example, sending mobile agents to some bioinformatics web servers (e.g., [32], [33], [34], [35], [36], [37]) and retrieving analysis results to mobile devices. Since user-friendly and publicly accessible web-servers represent the future direction for developing practically more useful models, simulated methods, or predictors [34], [38], we shall make efforts in our future work to provide a web-server for the approach presented in this paper.
Acknowledgments
The authors wish to thank the anonymous reviewers for their constructive comments, which were very helpful in strengthening the presentation of this paper.
Footnotes
Competing Interests: As two authors, Hua Dai and Tong-Liang Zhang, are employed by commercial companies (Shanghai R&D Center and Research Institute of Highway); their work was done when they studied in Donghua University. There are no competing interests and nothing related to employment, consultancy, patents, products in development or marketed products, etc., with the companies. This does not alter the authors′ adherence to all the PLoS ONE policies on sharing data and materials.
Funding: The authors have no support or funding to report.
References
- 1.Chou K-C. Some remarks on protein attribute prediction and pseudo amino acid composition. Journal of Theoretical Biology. 2011;273:236–247. doi: 10.1016/j.jtbi.2010.12.024. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 2.Thireou T, Spyrou G, Atlamazoglou V. A survey of the availability of primary bioinformatics web resources. Genomics, Proteomics & Bioinformatics. 2007;5:70–76. doi: 10.1016/S1672-0229(07)60017-5. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 3.Buttler D, Critchlow T. Using meta-data to automatically wrap bioinformatics sources. Information and Software Technology. 2002;44:237–239. [Google Scholar]
- 4.Cadag E, Tarczy-Hornoch P. Supporting retrieval of diverse biomedical data using evidence-aware queries. Journal of Biomedical Informatics. 2010;43:873–882. doi: 10.1016/j.jbi.2010.07.005. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 5.Gouy M, Delmotte S. Remote access to ACNUC nucleotide and protein sequence databases at PBIL. Biochimie. 2008;90:555–562. doi: 10.1016/j.biochi.2007.07.003. [DOI] [PubMed] [Google Scholar]
- 6.Lacroix Z. Web data retrieval and extraction. Data & Knowledge Engineering. 2003;44:347–367. [Google Scholar]
- 7.Macauley J, Wang H, Goodman N. A model system for studying the integration of molecular biology databases. Bioinformatics. 1998;14:575–582. doi: 10.1093/bioinformatics/14.7.575. [DOI] [PubMed] [Google Scholar]
- 8.Karasavvas KA, Baldock R, Burger A. Bioinformatics integration and agent technology. Journal of Biomedical Informatics. 2004;37:205–219. doi: 10.1016/j.jbi.2004.04.003. [DOI] [PubMed] [Google Scholar]
- 9.Goble C, Stevens R. State of the nation in data integration for bioinformatics. Journal of Biomedical Informatics. 2008;41:687–693. doi: 10.1016/j.jbi.2008.01.008. [DOI] [PubMed] [Google Scholar]
- 10.Wang C, Zhou BB, Zomaya AY. EvolvingSpace: a data centric framework for integrating bioinformatics applications. IEEE Transactions on Computers. 2010;59:721–734. [Google Scholar]
- 11.Stein LD, Cartinhour S, Thierry-Mieg D, Thierry-Mieg J. JADE: An approach for interconnecting bioinformatics databases. Gene. 1998;209:GC39–GC43. [PubMed] [Google Scholar]
- 12.Jennings NR. An agent-based approach for building complex software systems. Communications of the ACM. 2001;44:35–41. [Google Scholar]
- 13.Gao L, Ding Y-S, Ying H. Economics-inspired decentralized control approach for adaptive grid services and applications. International Journal of Intelligent Systems. 2006;21:1269–1288. [Google Scholar]
- 14.Gao L, Hailu A. Evaluating the effects of area closure for recreational fishing in a coral reef ecosystem: The benefits of an integrated economic and biophysical modelling. Ecological Economics. 2011 DOI: 10.1016/j.ecolecon.2011.1004.1014, In press. [Google Scholar]
- 15.Ma L, Tsai JJP. Formal modeling and analysis of a secure mobile-agent system. IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans. 2008;38:180–196. [Google Scholar]
- 16.Ding Y-S, Gao L. Macrodynamics analysis of migration behaviors in large-scale mobile agent systems for the future Internet. IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans. 2011;41 DOI: 10.1109/TSMCA.2011.2109377, In press. [Google Scholar]
- 17.Crasso M, Mateos C, Zunino A, Campo M. SWAM: A logic-based mobile agent programming language for the Semantic Web. Expert Systems with Applications. 2011;38:1723–1737. [Google Scholar]
- 18.Chung Y-F, Chen T-S, Lai M-W. Efficient migration access control for mobile agents. Computer Standards & Interfaces. 2009;31:1061–1068. [Google Scholar]
- 19.Abosamra A, Hashem M, Darwish G. Securing DSR with mobile agents in wireless ad hoc networks. Egyptian Informatics Journal. 2011;12:29–36. [Google Scholar]
- 20.Du TC, Li EY, Wei E. Mobile agents for a brokering service in the electronic marketplace. Decision Support Systems. 2005;39:371–383. [Google Scholar]
- 21.O'Grady MJ, O'Hare GMP, Sas C. Mobile agents for mobile tourists: a user evaluation of Gulliver's Genie. Interacting with Computers. 2005;17:343–366. [Google Scholar]
- 22.Baek J-W, Yeom HY. A timed mobile agent planning approach for distributed information retrieval in dynamic network environments. Information Sciences. 2006;176:3347–3378. [Google Scholar]
- 23.Cheng C-B, Wang C. Outsourcer selection and order tracking in a supply chain by mobile agents. Computers & Industrial Engineering. 2008;55:406–422. [Google Scholar]
- 24.Manzoor U, Nefti S. QUIET: A methodology for autonomous software deployment using mobile agents. Journal of Network and Computer Applications. 2010;33:696–706. [Google Scholar]
- 25.Urrea E, Sahin CS, Hökelek I, Uyar MÜ, Conner M, et al. Bio-inspired topology control for knowledge sharing mobile agents. Ad Hoc Networks. 2009;7:677–689. [Google Scholar]
- 26.Carreras I, Miorandi D, Saint-Paul R, Chlamtac I. Bottom-up design patterns and the energy web. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans. 2010;40:815–824. [Google Scholar]
- 27.Benson DA, Karsch-Mizrachi I, Lipman DJ, Ostell J, Sayers EW. GenBank. Nucleic Acids Research. 2009;37:D26–31. doi: 10.1093/nar/gkn723. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 28.Gao L, Ding Y-S, Ren L-H. A novel ecological network-based computation platform as grid middleware system. International Journal of Intelligent Systems. 2004;19:859–884. [Google Scholar]
- 29.Gao L, Ding Y-S. A Flexible Communication Scheme to Support Grid Service Emergence. Lecture Notes in Computer Science. 2005;3482:175–186. [Google Scholar]
- 30.Gao L, Ding Y-S, Dai H, Shao S-H, Huang Z-D, et al. A novel fingerprint map for detecting SARS-CoV. Journal of pharmaceutical and biomedical analysis. 2006;41:246–250. doi: 10.1016/j.jpba.2005.09.031. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 31.Ding Y-S, Gao L, Ruan D. Communication mechanisms in ecological network-based grid middleware for service emergence. Information Sciences. 2007;177:722–733. [Google Scholar]
- 32.Chou KC, Shen HB. A new method for predicting the subcellular localization of eukaryotic proteins with both single and multiple sites: Euk-mPLoc 2.0. PLoS ONE. 2010;5:e9931. doi: 10.1371/journal.pone.0009931. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 33.Chou KC, Shen HB. Plant-mPLoc: A Top-Down Strategy to Augment the Power for Predicting Plant Protein Subcellular Localization. PLoS ONE. 2010;5:e11335. doi: 10.1371/journal.pone.0011335. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 34.Chou KC, Shen HB. Review: recent advances in developing web-servers for predicting protein attributes. Natural Science. 2009;2:63–92. (openly accessible at http://www.scirp.org/journal/NS/) [Google Scholar]
- 35.Chou KC, Shen HB. Cell-PLoc 2.0: An improved package of web-servers for predicting subcellular localization of proteins in various organisms. Natural Science. 2010;2:1090–1103. doi: 10.1038/nprot.2007.494. (openly accessible at http://www.scirp.org/journal/NS/) [DOI] [PubMed] [Google Scholar]
- 36.Wei R, Gao L, Zhang T-L. A novel motif discovery algorithm for identifying protein families. Protein & Peptide Letters. 2010;17:1215–1222. doi: 10.2174/092986610792231429. [DOI] [PubMed] [Google Scholar]
- 37.Chou KC, Shen HB. Cell-PLoc: A package of Web servers for predicting subcellular localization of proteins in various organisms. Nature Protocols. 2008;3:153–162. doi: 10.1038/nprot.2007.494. [DOI] [PubMed] [Google Scholar]
- 38.Chou KC, Wu ZC, Xiao X. iLoc-Euk: A Multi-Label Classifier for Predicting the Subcellular Localization of Singleplex and Multiplex Eukaryotic Proteins. PLoS One. 2011;6:e18258. doi: 10.1371/journal.pone.0018258. [DOI] [PMC free article] [PubMed] [Google Scholar]