This protocol uses small programs called agents? that are based on the machine that you want to monitor. These agents collect information and store it locally in memory, in a machine information base, or MIB?. When the information is requested by a central computer, the agent will send the specific piece of information requested.