215
Copyright © 2012, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Chapter 9
DOI: 10.4018/978-1-61350-107-8.ch009
INTRODUCTION
In recent years, a mobile agent is used in many
applications like Data mining (Klusch et al., 2003),
Grid computing (Kuang et al., 2002), P2P networks
(Lu and Fu, 2006), Network routing (Manvi and
Venkatram, 2007) etc. The key reasons for in-
corporating the mobile agent concept in various
applications are Reduction of the network load,
Reduce network latency, Dynamic Adaption, Ro-
bust and fault-tolerant and Client Customization.
In the multimedia environment, content dis-
covery is the major aspect to bring the content
to every user. For this, mobile agent can play a
S. Venkatesan
Indian Institute of Information Technology-Allahabad, India
C. Chellappan
Anna University, India
P. Dhavachelvan
Pondicherry University, India
Recovery of Ubiquitous
Multimedia Content Discovery
Mobile Agent
ABSTRACT
Multimedia content is ubiquitous; therefore it is very diffcult to bring all the hidden contents to the every
one of universe. Mobile agent technology is the effcient technique to discover and bring the multimedia
content to the universe with the help of dynamic itinerary movement. While mobile agent is roaming
to discover the ubiquitous content, it has to go and visit multiple servers with different character in
nature (that is server may be legitimate or hostile; hostile intention is to disturb the agent functional-
ities either by killing the agent or modifying the agent functionalities). Whenever the agent is disturbed
(agent is altered or killed) by the hostile servers while roaming to discover the content, we should have
the recovery mechanism to rollback the agent. This chapter adopts the K-response recovery model to
rollback the original agent even then it is cracked or killed by the malicious servers while discovering
the multimedia content.