Petri Net Simulation and Analysis of Network Management Based on Mobile Agent Technology

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Petri Net Simulation and Analysis of Network Management Based on Mobile Agent Technology"

Transcription

1 Simulation and Analysis of Network Management Based on Mobile Agent Technology Juraj Pukšec, Student Member, IEEE, Darije Ramljak and Darko Huljenić, Member, IEEE Abstract This paper presents advantages of applying analysis and simulation of Network Management based on Mobile Agent Technology. Mobile Agent Technology has proven to be very useful to network administrator for maintaining complex computer networks. By obtaining the simulation and analysis in early design phases for formal verification, some potential deadlocks and possible conflict activities can be discovered and avoided. Index Terms, Mobile Agents, Network Management, Simulation and Analysis. INTRODUCTION The Network management becomes of significant importance due to explosive growth and complexity of the computer networks. Monitoring and maintaining distributed servers within the computer network are very demanding and complicated tasks. The Network Management consists of monitoring and of control of network elements. Network monitoring involves observing and analysing the status of the network; and thus does not involve interface in the network functioning. Network control involves active interference and configuration of the state of the network. A Network Management System includes the management of the network elements and the use of a management protocol. The management protocol that has been extensively used is the Simple Network Management Protocol SNMP. The manager communicates with the SNMP agents executing on the managed nodes through the set of management primitives. The SNMP agents are static programs that execute on the managed nodes and provide the manager with the information it requests from time to time. The Network Management System secures the functionality of configuration of the network, monitoring of the network, studying the performance of the network, handling the security of the network and studying the alarms generated in the network [1]. The use of Mobile agents in distributed network management is expected to have a significant impact because Mobile agents can simultaneously perform different tasks on several locations (hosts) in the network. Mobile agents will be of excellent assistance to network administrator by performing different tasks like controlling and maintaining the computer network. This paper discusses application of Mobile agent for maintaining and management of the computer network. Mobile Agent checks the status of client computers, if there is no response from them Mobile agent will try to restart (reboot) the client. The task for Mobile agent is also checking the installed version of software programs on client computers, and if necessary, it will install new version(s). After performing task(s) agent(s) will notify the network administrator about performed job. The formal verification of the network was performed by using model. Simulation and Analysis of the constructed Petri net was performed by using DaNAMiCS tools. This paper is organised as follows: in the first section the overview of the mobile software agents is described. Second section deals with the application of mobile agents in the Network management. based simulation is presented in the third section. In the fourth section the results of analysis are discussed. Conclusions are given at the end. Juraj Pukšec, Darije Ramljak and Darko Huljenić are with Research and Development Center of Ericsson Nikola Tesla, Krapinska 45, HR Zagreb, Croatia. Tel.: , Fax.: {juraj.puksec, darije.ramljak, darko.huljenic

2 I. MOBILE SOFTWARE AGENTS Client computer - CC i The Mobile agent concept has grown out of three earlier technologies: process migration (PM), remote evaluation (RE) and mobile objects. All these three technologies have been developed to improve on Remote Procedure Calling (RPC) for distributed programming. Mobile agents have improved these three technologies for distributed programming by providing a way for executable code, program state information and other data to be transferred to any host Agent considers necessary to carry out the actions specified in an application. Client computer - CC 1 Mobile Agent... Network Mobile Agent... Client computer - Mobile Agent CC n The basic characteristics of mobile agents are mobility, autonomy, intelligence, persistence, goal orientation, communication and activity. For Mobile agents it is very important to be autonomous. By term autonomous it is understood that the Mobile agent can make its own decision how to reach the given goals. A mobile agent is characterised by its behaviour, state and location. Behaviour is specified in class of an object inside the program. State of a mobile agent is stored in variables of an object. Location is a place where mobile agent performs certain actions in order to carry out its main task. Also, Mobile agent must have learning skills. The Mobile Agents have to learn about their environment and actions so that they can be more effective [2], [3]. II. APPLYING MOBILE AGENTS IN THE NETWORK MANAGEMENT In the Figure 1, computer network based on Mobile agents is presented. Mobile agents are programmed on the server side. The tasks for mobile agent are: checking the status of client computer, restarting the client computer (if needed), checking the version of installed software, and installation of software (if needed). Server computer SC Figure 1. The Computer network based on Mobile agents (LA) will visit every client computer within a computer network, first checking the status of the client computer, if the client computer works properly (1). After checking the status of the computer, LA will check the version of the installed software (2). After performing the given task Mobile agent will migrate to another client computer within the computer network (3). But if there is no response from the client computer or some unexpected event occurs LA will call the Restart agent (RA) to restart the client computer (4). Restart Agent (RA) will restart the client computer (5), and after restarting the computer LA agent will check the status of the computer again (6). If after several restarts computer does not respond Mobile agent will disconnect the computer from the network and send notification to the server computer (10). LA agent will check the version of installed software on client computer, and if necessary will call the Installer Agent (IA) from the server (7). IA agent will install the new software on the client computer (8), and then restart the client computer (9). Every action that Mobile agent performs will be reported to the server computer network administrator (10). Mobile agent system contains three Mobile agents: Local agent (LA), Restart agent (RA), and Installer Agent (IA). Task of Local Mobile Agent (LA) is to roam through the network and check the status of client computer and the version of installed software. Restart Agent (RA) is responsible for restart (reboot) of the client computer, and Installer Agent (AI) install the software programs on client computers. Further is explained the role of mobile agents on client computer. server computer LA RA IA notification 1) 4) 5) 10) client computer i checking the status of client computer 6) restart 8) 2) 3) 7) 9) checking the version of installed software installation All three Mobile agents are situated on server, Figure 2. Administrator of the computer network supervises all four agents. Administrator must define version of the installed software on the client computers (version for Web explorer, Mail tool, audio-video explorer, ). Local Mobile Agent Figure 2. The tasks for Mobile agents

3 A formal model of a distributed programming of a Mobile agent based network management is proposed in [4]. Multi agent system can be described as (1): A= {agent 1,... agent i..., agent n } (1) where A denotes multi agent system which consists of n cooperating and communicating Mobile Agents. These mobile agents perform the service requests by their users in this multi agent system. This system can be described as: III. PETRI NET BASED SIMULATION Before the programming took place the simulation was performed. The main task of the simulation and results analysis is the control of are checking the formal properties of the proposed solution, particularly liveness, in early phases of the project in order to avoid potential deadlocks and possible conflict activities. A= {LA, RA, IA} (2) The multi agent system can be consider as a distributed system whose processing nodes communicate. A set of processing nodes is denoted as: server CC1 CCi S= {S 1,..., S i,..., S n } (3) Each node, S i, is characterised by a set of services it provides. According to [4] and [5] Mobile agent based network is defined as a triple: MAN = {A, S, N} (4) A defines a multi agent system consisting of the cooperating and communicating mobile agents, S denotes the set of processing nodes capable of serving the agents and N stands for the network that connects the nodes and provides an agent migration. Mobile agent can migrate autonomously from client to client (node to node), to perform the tasks on behalf of the network administrator. It can be defined as: Agent = {idno, address, service, verinfo, installation} (4) where idno is a unique identification number of the agent, address denotes its location, service means check if there is a respond from the client and restart if there is no answer from the client, verinfo is number of the latest software version and instalation will be performed if latest version of software is not installed on the client computer. In this paper multi agent system operating on the behalf of a network administrator will be discussed. An agent will be programmed on a server and will be spread throughout the computer network. The agent will migrate from node to node in the computer network and will perform management tasks. CCn Figure 3. The model In the Figure 3 the Petri net model is proposed [6], [7], [8]. The was constructed according to model and the set of tasks that are given to the Mobile agents, presented in the Figure 2. The constructed is presented in the Figure 4. In order to simplify the, according to Figure 1, constructed computer network has one server computer (places pp1, pp2, pp3, pp4 and ps5) and three client computers (p1-p12, p13-p24, and p25-p36). In pp1 state Local mobile agents (LA) are created (programmed), and they migrate in the network to the first client computer. When the agent arrives to a client computer (p1), it will check the status of the computer. If there is a response from the computer, agent will check the version of the installed software (p2). If the computer does not work properly (p4) Local agent will call Restart agent (pp2). Restart agent (RA) will try to restart the computer (p7) and check its status again. If after three restarts computer does not respond the Mobile agent will disconnect the computer from the network (p8 and p12). After installation of software (p10 and p11) computer must be restarted (p7), if needed. All performed actions Local agent (LA) will report to the administrator after returning to the server (pp5). After visiting one client computer and performing all necessary action, Local agent will migrate to another computer within the network and perform assigned tasks. Different situations are investigated by simulating all possible operations. In this model several possible situation are demonstrated:

4 t1 t2 t3 t4 t5 t6 t7 t8 t11 t9 t10 t12 t13 t14 t15 t16 t17 t18 t19 t20 t23 t21 t22 t24 t25 t26 t27 t28 t29 t30 t31 t34 t35 t32 t33 t36 t37 t38 t39 P1 P2 P3 P4 P9 P5 P6 P7 P8 P10 P11 P12 P13 P14 P15 P16 P17 P18 P19 P20 P24 P21 P22 P23 P25 P26 P27 P28 P29 P30 P31 P32 P36 P33 P34 P35 PP1 PP2 PP3 PP4 PP5 server CCi CC n CC1 Figure 4.

5 regular transitions everything is working properly: pp1 p1 p2 p3 p13 p14 p15 p25 p26 p27 pp4,pp5, client 1 does not respond (p3): pp1 p1,p4 p5,pp2 p6 p7,p8 p1 p2 client 2 does not respond (p12): p13,p16 p17,pp2 p18 p19,p20 p13 p14 client 3 does not respond (p22) not even after three restarts: p25,p28 p29,pp2 p30 p31,p32 p25,p28 p29,pp2 p30 p31,p32 p25,p28 p29,pp2 p30 p31,p32 p36 client 1 needs to install new version of software (p7): pp1 p1 p2,p9 p10 p11 p7 p1 p2 p3 client 2 needs to install new version of software (p17), p13 p14,p21 p22 p23 p19 p13 p14 p15... client 3 needs to install new version of software (p26),... p25 p26,p33 p34 p23 p20 p21 p26 ps1,ps3 some unpredicted situations that may occur if there is a problem with restart of the system. By using Java-based Petri net tool DaNAMiCS [9] simulations were performed, Figure 5. IV. RESULTS ANALYSIS The DaNAMiCS tool was used for the simulation of the Petri net. consists of 31 places and 28 transition. Petri net has been applied because of complex demand on the system and the configuration of the network. Inhibition arcs were used for modelling error conditions. This is explained by the fact that from every regular place transition is possible to next regular place but if some error Figure 5. DaNAMiCS simulation

6 occurs (the client computers does not respond) or some unpredicted situations happen agent will drop to the place where some changes must be made. Applying Petri net simulation before the programming has proved to be very useful. From the simulation results for checking the response of the client. Administrator should allow the mobile agent to restart the system for a maximum 3 times. If after several restarts of the system computer does not respond, mobile agent has to disconnect the computer from the network and notify the network administrator about some unpredicted errors. The is live and there are no deadlocks in the model. Conflict transitions are only transitions that model regular continuation and error-initiated termination, such as: (t1, t12), (t2, t3), (t4, t9), (t13, t24), (t14, t15), (t16, t21), (t26, t27), i (t28, t32). These conflicts are intentional and they describe mutually exclusive actions. The only unbounded places in the model were those collecting tokens for statistical purposes. Therefore, the modelled net is also persistent and has a home state. From the simulation results we can conclude that the constructed Petri net is error-free. After the Petri net simulation was performed, the programming of the Mobile agents took place. Performing formal description by using s we defined the role of Mobile agents on client computer. Programming of Mobile agents can be performed on any platform. CONCLUSION simulation and result analysis of Network Management based on Mobile Agent Technology is described in the paper. Petri net models were used for clarifying service concepts and implementation. Formal verification and simulation based on derived Petri net proved to be useful in early design phases. Petri net models and the analysis based on them were found to be an efficient way to improve design process and project controllability. REFERENCES [1] A. Sahai, C. Morin, Mobile Agents for Enabling Mobile User Aware Applications, IEEE Network Operations and Management Symposium - NOMS 98, pp , vol. 2., February 15 20, [2] J. Pukšec, The Maintenance of Internet Service Nodes by using Mobile Software Agents, Master Thesis, University of Zagreb Faculty of Electrical Engineering and Computing, Croatia, 2001, (in Croatian). [3] W. T. Cockayne, M. Zyda, Mobile Agents, Manning Publications Co, USA, [4] V. Sinković, I. Lovrek, Genetic Algorithm of a Mobile Agent Network Suitable for Performance Evaluation, Proc. of KES 2000 Conf., pp Brighton, UK. [5] G. Ježić, M. Kušek, I. Ljubi, Mobile Agent Based Distributed Web Management, Proc. of KES 2000 Conf., Brighton, UK, pp [6] J. L. Peterson, Theory and the Modelling of systems, Prentice-Hall, Englewood Cliffs, [7] I. Lovrek, Modelling Telecommunications Processes Theory and Application of s, Skolska knjiga, Zagreb, (in Croatian). [8] J. Pukšec, M. Opsenica, D. Frank, V. Maričić, K. P. Valavanis, I. Lovrek, based Modelling and Simulation of Alert System, Proc. of 10 th MELECON 2000 Conf., vol. 1, pp , Lemesos, Cyprus, [9] DaNAMiCS documentation - /DNA /DaNAMiCS/

Self-organized Multi-agent System for Service Management in the Next Generation Networks

Self-organized Multi-agent System for Service Management in the Next Generation Networks PROCEEDINGS OF THE WORKSHOP ON APPLICATIONS OF SOFTWARE AGENTS ISBN 978-86-7031-188-6, pp. 18-24, 2011 Self-organized Multi-agent System for Service Management in the Next Generation Networks Mario Kusek

More information

A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS

A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS Tarag Fahad, Sufian Yousef & Caroline Strange School of Design and Communication Systems, Anglia Polytechnic University Victoria

More information

NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage

NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage AdRem NetCrunch 6 Network Monitoring Server With NetCrunch, you always know exactly what is happening with your critical applications, servers, and devices. Document Explore physical and logical network

More information

UML SUPPORTED SOFTWARE DESIGN

UML SUPPORTED SOFTWARE DESIGN UML SUPPORTED SOFTWARE DESIGN Darko Gvozdanović, Saša Dešić, Darko Huljenić Ericsson Nikola Tesla d.d., Krapinska 45, HR-0000 Zagreb, Croatia, tel.: +385 365 3889, faks: +385 365 3548, e-mail: darko.gvozdanovic@etk.ericsson.se

More information

Analysis of Location Management Mechanisms for Mobile Multi Agents

Analysis of Location Management Mechanisms for Mobile Multi Agents International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 9 (2013), pp. 917-926 International Research Publications House http://www. irphouse.com /ijict.htm Analysis

More information

HPE Installation and Startup Service for IMC

HPE Installation and Startup Service for IMC Data sheet HPE Installation and Startup Service for IMC Support Services HPE Installation and Startup Service for HPE Intelligent Management Center (IMC) products coordinates installation, configuration,

More information

ETSI TS V1.1.1 ( )

ETSI TS V1.1.1 ( ) TS 101 892 V1.1.1 (2001-01) Technical Specification Telecommunications Management Network (TMN); Protocol and interface service requirements 2 TS 101 892 V1.1.1 (2001-01) Reference DTS/TMN-GOM005 Keywords

More information

Test Coverage Criteria for Autonomous Mobile Systems based on Coloured Petri Nets

Test Coverage Criteria for Autonomous Mobile Systems based on Coloured Petri Nets 9th Symposium on Formal Methods for Automation and Safety in Railway and Automotive Systems Institut für Verkehrssicherheit und Automatisierungstechnik, TU Braunschweig, 2012 FORMS/FORMAT 2012 (http://www.forms-format.de)

More information

Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing

Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing www.ijcsi.org 227 Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing Dhuha Basheer Abdullah 1, Zeena Abdulgafar Thanoon 2, 1 Computer Science Department, Mosul University,

More information

A Multi-Agent Approach to a Distributed Schedule Management System

A Multi-Agent Approach to a Distributed Schedule Management System UDC 001.81: 681.3 A Multi-Agent Approach to a Distributed Schedule Management System VYuji Wada VMasatoshi Shiouchi VYuji Takada (Manuscript received June 11,1997) More and more people are engaging in

More information

ARTIFICIAL INTELLIGENCE METHODS IN EARLY MANUFACTURING TIME ESTIMATION

ARTIFICIAL INTELLIGENCE METHODS IN EARLY MANUFACTURING TIME ESTIMATION 1 ARTIFICIAL INTELLIGENCE METHODS IN EARLY MANUFACTURING TIME ESTIMATION B. Mikó PhD, Z-Form Tool Manufacturing and Application Ltd H-1082. Budapest, Asztalos S. u 4. Tel: (1) 477 1016, e-mail: miko@manuf.bme.hu

More information

Monitoring Data Visualization and Agent-based Software Management for the Grid

Monitoring Data Visualization and Agent-based Software Management for the Grid Elektrotehniški vestnik XX(Y): 1 6, YEAR Electrotechnical Review, Ljubljana, Slovenija Monitoring Data Visualization and Agent-based Software Management for the Grid Maja Matijašević and Gordan Ježić University

More information

Real Time Remote Monitoring over Cellular Networks. Wayne Chen Marketing Specialist

Real Time Remote Monitoring over Cellular Networks. Wayne Chen Marketing Specialist Real Time Remote Monitoring over Cellular Networks Wayne Chen Marketing Specialist Introduction For distribution infrastructures located in remote, isolated areas, unmanned monitoring systems have long

More information

TSGR3#4(99)465. TSG-RAN Working Group 3 meeting #4 Warwick, UK, 1 st 4 th June 1999. Agenda Item: 21

TSGR3#4(99)465. TSG-RAN Working Group 3 meeting #4 Warwick, UK, 1 st 4 th June 1999. Agenda Item: 21 TSG-RAN Working Group 3 meeting #4 Warwick, UK, 1 st 4 th June 1999 TSGR3#4(99)465 Agenda Item: 21 Source: Vodafone Title: Contribution to I3.05 Node B O&M Functional Description Document for: Decision

More information

GOAL-BASED INTELLIGENT AGENTS

GOAL-BASED INTELLIGENT AGENTS International Journal of Information Technology, Vol. 9 No. 1 GOAL-BASED INTELLIGENT AGENTS Zhiqi Shen, Robert Gay and Xuehong Tao ICIS, School of EEE, Nanyang Technological University, Singapore 639798

More information

Research and realization of Resource Cloud Encapsulation in Cloud Manufacturing

Research and realization of Resource Cloud Encapsulation in Cloud Manufacturing www.ijcsi.org 579 Research and realization of Resource Cloud Encapsulation in Cloud Manufacturing Zhang Ming 1, Hu Chunyang 2 1 Department of Teaching and Practicing, Guilin University of Electronic Technology

More information

BS 7 SIS Safety Information System Green Light for Your Production

BS 7 SIS Safety Information System Green Light for Your Production BS 7 SIS Safety Information System Green Light for Your Production SIS - GreCon Safety Information System The Challenge The Solution In big industrial plants, such as wood based panel productions, there

More information

Virtualization Technology using Virtual Machines for Cloud Computing

Virtualization Technology using Virtual Machines for Cloud Computing International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) Virtualization Technology using Virtual Machines for Cloud Computing T. Kamalakar Raju 1, A. Lavanya 2, Dr. M. Rajanikanth 2 1,

More information

Distributed Data Management

Distributed Data Management Introduction Distributed Data Management Involves the distribution of data and work among more than one machine in the network. Distributed computing is more broad than canonical client/server, in that

More information

University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP

University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP This Conference or Workshop Item Adda, Mo, Kasassbeh, M and Peart, Amanda (2005) A survey of network fault management. In: Telecommunications

More information

Communications Management. 3ICT12 (with thanks to Prof. George Pavlou, University of Surrey)

Communications Management. 3ICT12 (with thanks to Prof. George Pavlou, University of Surrey) Communications Management 3ICT12 (with thanks to Prof. George Pavlou, University of Surrey) 1 Communications Management Network Management Overview What is Network Management? Manager Agent Model OSI Management:

More information

An Active Packet can be classified as

An Active Packet can be classified as Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems

More information

The EMSX Platform. A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks. A White Paper.

The EMSX Platform. A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks. A White Paper. The EMSX Platform A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks A White Paper November 2002 Abstract: The EMSX Platform is a set of components that together provide

More information

Neural Network Applications in Stock Market Predictions - A Methodology Analysis

Neural Network Applications in Stock Market Predictions - A Methodology Analysis Neural Network Applications in Stock Market Predictions - A Methodology Analysis Marijana Zekic, MS University of Josip Juraj Strossmayer in Osijek Faculty of Economics Osijek Gajev trg 7, 31000 Osijek

More information

A Study on Integrated Security Service Control Solution Development about CRETA Security

A Study on Integrated Security Service Control Solution Development about CRETA Security A Study on Integrated Security Service Control Solution Development about CRETA Security Yongwon (Conrad) Cho 1, Jinwon (Frank) Choi 2 1 Director Research Engineer, Virtual Builders Co., Ltd. 2 CEO & Co-Founder,

More information

Intelligent Log Analyzer. André Restivo <andre.restivo@portugalmail.pt>

Intelligent Log Analyzer. André Restivo <andre.restivo@portugalmail.pt> Intelligent Log Analyzer André Restivo 9th January 2003 Abstract Server Administrators often have to analyze server logs to find if something is wrong with their machines.

More information

OpenSAF A Standardized HA Solution

OpenSAF A Standardized HA Solution OpenSAF A Standardized HA Solution LinuxCON Edinburgh, UK 2013-10-21 Anders Widell Ericsson AB Outline What are OpenSAF and SA Forum? What is Service Availability? Simple Use Case: Web server The OpenSAF

More information

Alert ALARM MANAGEMENT

Alert ALARM MANAGEMENT by Alert ALARM MANAGEMENT Alert To inform and to alert Alert is able to treat alarms or intervention demand coming from different sources: Supervisor software (SCADA), via DDE, OPC or dedicated interface

More information

IPv6 Broadband Access Network Systems

IPv6 Broadband Access Network Systems IPv6 Broadband Access Network Systems IPv6 Broadband Access Network Systems 60 Junji Yamada Koji Wakayama Eisuke Sato OVERVIEW: To meet the demand for broadband access and enable a smooth transition from

More information

Case Study "3 Nursing Homes"

Case Study 3 Nursing Homes Case Study "3 Nursing Homes" MobiCall Alarm Server Solution Starting Position The nursing home consist of 3 different locations with each comprises an Alcatel Enterprise PABX that are connected over a

More information

Ciceron Integration Services

Ciceron Integration Services Ciceron Integration Services product description Ciceron Integration Services (CIS) is designed from the outset to be the binding link between different systems. This means that CIS can support any kind

More information

OMC Solution IP Radios

OMC Solution IP Radios DATASHEET OMC Solution IP Radios COST EFFECTIVE E2E REMOTE NETWORK MANAGEMENT Intuitive, User Friendly GUI E2E Management of Transmission/Backhaul System Lower Total Cost of Ownership Simplified Remote

More information

A Study of Application Recovery in Mobile Environment Using Log Management Scheme

A Study of Application Recovery in Mobile Environment Using Log Management Scheme A Study of Application Recovery in Mobile Environment Using Log Management Scheme A.Ashok, Harikrishnan.N, Thangavelu.V, ashokannadurai@gmail.com, hariever4it@gmail.com,thangavelc@gmail.com, Bit Campus,

More information

PRTG Training Standard, Pro & Expert

PRTG Training Standard, Pro & Expert Contact +33 (0)1 34 93 35 35 Standard, Pro & Expert Summary INTRODUCTION The offers p.2/3 Your needs : Training Content - Overview - PRTG General Presentation - PRTG Detailed Presentation - Integrated

More information

Course Name: Operating Systems - 2 Course Code: CS342

Course Name: Operating Systems - 2 Course Code: CS342 Course Name: Operating Systems - 2 Course Code: CS342 I. Basic Course Information Major or minor element of program: Both Major and Minor Department offering the course: Computer Science Department Academic

More information

Temaline Solutions. Raising the benchmark in security and people management

Temaline Solutions. Raising the benchmark in security and people management Temaline Solutions Raising the benchmark in security and people management Honeywell Temaline solutions The standard in integrated enterprise-wide access control, time & attendance management and intruder

More information

Coverability for Parallel Programs

Coverability for Parallel Programs 2015 http://excel.fit.vutbr.cz Coverability for Parallel Programs Lenka Turoňová* Abstract We improve existing method for the automatic verification of systems with parallel running processes. The technique

More information

KNOWLEGDE MANAGEMENT AND IT S APPLICATION IN CROATIAN COMPANIES

KNOWLEGDE MANAGEMENT AND IT S APPLICATION IN CROATIAN COMPANIES 416 KNOWLEGDE MANAGEMENT AND IT S APPLICATION IN CROATIAN COMPANIES Postgraduate specialists study Organization and Management Osijek ABSTRACT Following the trends of recent business, emerges the need

More information

Service Level Agreement

Service Level Agreement Exhibit No. 1 to Agreement No. H/ of 201_ 1. Terms and Definitions Service Level Agreement 1.1. Services (see description of tariff plans at Provider s web site at: http://www.inoventica-services.ru) 1.1.1.

More information

The Advantages of Using Mobile Agents in Software for Telecommunications

The Advantages of Using Mobile Agents in Software for Telecommunications The Advantages of Using Mobile Agents in Software for Telecommunications Luis Moura Silva Leonor Almeida University of Coimbra SIEMENS S.A. Polo II, Dep. Eng. Informatica Rua Irmãos Siemens Nº 1 3030 Coimbra,

More information

Access Control and Operating Conditions Monitoring System for Telecommunication and Server Racks

Access Control and Operating Conditions Monitoring System for Telecommunication and Server Racks Access Control and Operating Conditions Monitoring System for Telecommunication and Server Racks Why is Supracontrol so superior? It adjusts to the existing access identification system It adjusts to the

More information

USING MOBILE AGENTS TO IMPROVE PERFORMANCE OF NETWORK MANAGEMENT OPERATIONS

USING MOBILE AGENTS TO IMPROVE PERFORMANCE OF NETWORK MANAGEMENT OPERATIONS USING MOBILE AGENTS TO IMPROVE PERFORNCE OF NETWORK NAGEMENT OPERATIONS Iwan Adhicandra, Colin Pattinson, Ebrahim Shaghouei Computer Communications Research Group, School of Computing, Leeds Metropolitan

More information

Cloud Computing for Agent-based Traffic Management Systems

Cloud Computing for Agent-based Traffic Management Systems Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion

More information

Detection of Advanced Persistent Threat by Analyzing the Big Data Log

Detection of Advanced Persistent Threat by Analyzing the Big Data Log , pp.30-36 http://dx.doi.org/10.14257/astl.2013.29.06 Detection of Advanced Persistent Threat by Analyzing the Big Data Log Jisang Kim 1, Taejin Lee, Hyung-guen Kim, Haeryong Park KISA, Information Security

More information

COMPUTER NETWORKS SECOND EDITION. ANDREW S.fjANENBAUM. Vrije Universiteit Amsterdam, The Netherlands. Nachrichtentechnische Bib'iothek THD Inv.

COMPUTER NETWORKS SECOND EDITION. ANDREW S.fjANENBAUM. Vrije Universiteit Amsterdam, The Netherlands. Nachrichtentechnische Bib'iothek THD Inv. COMPUTER NETWORKS SECOND EDITION ANDREW S.fjANENBAUM Vrije Universiteit Amsterdam, The Netherlands Nachrichtentechnische Bib'iothek THD Inv.-Ni,: tq(s ULB Darmstadt iiiiiir 17800787 =3JE Prentice-Hall

More information

A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS

A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS Chandanpreet Kaur Global Institute of Management and Emerging Technologies, Amritsar, Punjab, India, lpu_chandan@yahoo.co.in

More information

Performance Oriented Management System for Reconfigurable Network Appliances

Performance Oriented Management System for Reconfigurable Network Appliances Performance Oriented Management System for Reconfigurable Network Appliances Hiroki Matsutani, Ryuji Wakikawa, Koshiro Mitsuya and Jun Murai Faculty of Environmental Information, Keio University Graduate

More information

Experiences with certification of reusable components in the GSN project in Ericsson, Norway

Experiences with certification of reusable components in the GSN project in Ericsson, Norway Experiences with certification of reusable components in the GSN project in Ericsson, Norway Parastoo Mohagheghi (Ph.D. Student, NTNU) Reidar Conradi Ericsson AS, Grimstad, Dept. Computer and Information

More information

An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents

An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents M. Anber and O. Badawy Department of Computer Engineering, Arab Academy for Science and Technology

More information

Topic Based Agent Migration Scheme via Publish/Subscribe Paradigm

Topic Based Agent Migration Scheme via Publish/Subscribe Paradigm Topic Based Agent Migration Scheme via Publish/Subscribe Paradigm Mustafa Akif Karzan and Nadia Erdogan Abstract Multi agent systems provide distributed computation for decentralized software applications.

More information

Achieving collaborative service provisioning for mobile network users: the CollDown example

Achieving collaborative service provisioning for mobile network users: the CollDown example SPECIAL ISSUE Achieving collaborative service provisioning for mobile network users: the CollDown example VEDRAN PODOBNIK, IVA BOJIC, LUKAVRDOLJAK, MARIO KUSEK University of Zagreb, Faculty of Electrical

More information

Performance Evaluation of Mobile Agent-based Dynamic Load Balancing Algorithm

Performance Evaluation of Mobile Agent-based Dynamic Load Balancing Algorithm Performance Evaluation of Mobile -based Dynamic Load Balancing Algorithm MAGDY SAEB, CHERINE FATHY Computer Engineering Department Arab Academy for Science, Technology & Maritime Transport Alexandria,

More information

CONTENTS CONTENTS 1 About the Zagreb Stock Exchange 2 Trading Hours How to Become a Remote Member

CONTENTS CONTENTS 1 About the Zagreb Stock Exchange 2 Trading Hours How to Become a Remote Member REMOTE MEMBERSHIP CONTENTS CONTENTS 1 About the Zagreb Stock Exchange, 3 2 Trading Hours, 3 3 How to Become a Remote Member, 3 4 Organisational, Personnel and Technical Requirements for Membership, 3 4.1

More information

Integrated Healthcare Information System. Darko Gvozdanović, M.Sc.E.E. Department manager e-health

Integrated Healthcare Information System. Darko Gvozdanović, M.Sc.E.E. Department manager e-health Integrated Healthcare Information System Darko Gvozdanović, M.Sc.E.E. Department manager e-health Agenda Healthcare challenges Ericsson addressing the challenges Integrated Healthcare Information System

More information

An Inter-domain Virtual Private Network Management Service

An Inter-domain Virtual Private Network Management Service An Inter-domain Virtual Private Network Management Service David Lewis University College London Computer Science Department, Gower Street, London, WC1E 6BT, UK tel:+44 171 391 1327 fax: +44 171 387 1397

More information

Multi-Objective Genetic Test Generation for Systems-on-Chip Hardware Verification

Multi-Objective Genetic Test Generation for Systems-on-Chip Hardware Verification Multi-Objective Genetic Test Generation for Systems-on-Chip Hardware Verification Adriel Cheng Cheng-Chew Lim The University of Adelaide, Australia 5005 Abstract We propose a test generation method employing

More information

Using Cellular RTU Technology for Remote Monitoring and Control in Pipeline and Well Applications

Using Cellular RTU Technology for Remote Monitoring and Control in Pipeline and Well Applications Using Cellular RTU Technology for Remote Monitoring and Control in Pipeline and Well Applications Steve Frank Business Development Manager Moxa Inc. Introduction Cellular technology minimizes site visits

More information

WebNMS-Based Topology Discovery in EPON Network

WebNMS-Based Topology Discovery in EPON Network , pp.161-168 http://dx.doi.org/10.14257/ijfgcn.2013.6.6.17 WebNMS-Based Topology Discovery in EPON Network Feng Jian and Zhu Li College of Computer Science & Technology, Xi an University of Science and

More information

Cloud Computing and Advanced Relationship Analytics

Cloud Computing and Advanced Relationship Analytics Cloud Computing and Advanced Relationship Analytics Using Objectivity/DB to Discover the Relationships in your Data By Brian Clark Vice President, Product Management Objectivity, Inc. 408 992 7136 brian.clark@objectivity.com

More information

- 1 - StruxureWare TM Data Center Expert Periodic Maintenance. Software Integration Service. 1.0 Executive Summary. 2.0 Features & Benefits

- 1 - StruxureWare TM Data Center Expert Periodic Maintenance. Software Integration Service. 1.0 Executive Summary. 2.0 Features & Benefits Statement of Work - 1 - StruxureWare TM Data Center Expert Periodic Maintenance StruxureWare Data Center Expert Periodic Maintenance Software Integration Service Service 1.0 Executive Summary Table of

More information

UPS MANAGEMENT SOFTWARE

UPS MANAGEMENT SOFTWARE UPSMAN UPSMON UPSMON CUSTOM Version: 20100504 UPS MANAGEMENT SOFTWARE UPSMAN/UPSMON, and UNMS II Comprehensive UPS Administration and Alerting UNMS II Firewall UPSMAN Server + 2 Sender Windows Server UPS

More information

EXPLOITING SIMILARITIES BETWEEN SIP AND RAS: THE ROLE OF THE RAS PROVIDER IN INTERNET TELEPHONY. Nick Marly, Dominique Chantrain, Jurgen Hofkens

EXPLOITING SIMILARITIES BETWEEN SIP AND RAS: THE ROLE OF THE RAS PROVIDER IN INTERNET TELEPHONY. Nick Marly, Dominique Chantrain, Jurgen Hofkens Nick Marly, Dominique Chantrain, Jurgen Hofkens Alcatel Francis Wellesplein 1 B-2018 Antwerp Belgium Key Theme T3 Tel : (+32) 3 240 7767 Fax : (+32) 3 240 8485 E-mail : Nick.Marly@alcatel.be Tel : (+32)

More information

Supervision software for Intrusion detection, Fire detection and CCTV systems

Supervision software for Intrusion detection, Fire detection and CCTV systems Supervision software for Intrusion detection, Fire detection and CCTV systems elmospa.com Global security solutions Globalpro GLOBALPRO is the new supervision software that allows to obtain a powerful

More information

Energy Consumption in Android Phones when using Wireless Communication Technologies

Energy Consumption in Android Phones when using Wireless Communication Technologies Energy Consumption in Android Phones when using Wireless Communication Technologies Goran Kalic, Iva Bojic and Mario Kusek University of Zagreb Faculty of Electrical Engineering and Computing Unska 3,

More information

Personalized e-learning a Goal Oriented Approach

Personalized e-learning a Goal Oriented Approach Proceedings of the 7th WSEAS International Conference on Distance Learning and Web Engineering, Beijing, China, September 15-17, 2007 304 Personalized e-learning a Goal Oriented Approach ZHIQI SHEN 1,

More information

Distributed Systems. Cloud & the Internet of Things. Björn Franke University of Edinburgh, 2015

Distributed Systems. Cloud & the Internet of Things. Björn Franke University of Edinburgh, 2015 Distributed Systems Cloud & the Internet of Things Björn Franke University of Edinburgh, 2015 OVERVIEW Cloud Computing vs. Distributed Computing Examples SAAS, PAAS, IAAS Goals, Types, Characteristics

More information

Building and Selecting Mobile Agents for Network Management

Building and Selecting Mobile Agents for Network Management Building and Selecting Mobile Agents for Network Management Ichiro Satoh National Institute of Informatics 2-1-2 Hitotsubashi, Chiyoda-ku, Tokyo 101-8430, Japan Tel: +81-3-4212-2546 Fax: +81-3-3556-1916

More information

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Hyper-V Manager Hyper-V Server R1, R2 Intelligent Power Protector Main

More information

ELS NET. Metra's electronic locking system

ELS NET. Metra's electronic locking system ELS NET Metra's electronic locking system Improves your service & facility management Use electronically controlled lockers for ski resorts, hotel, university, factory, hospital Can be used with storage

More information

CA Workload Automation Agents Operating System, ERP, Database, Application Services and Web Services

CA Workload Automation Agents Operating System, ERP, Database, Application Services and Web Services PRODUCT SHEET CA Workload Automation Agents CA Workload Automation Agents Operating System, ERP, Database, Application Services and Web Services CA Workload Automation Agents extend the automation capabilities

More information

Railway Simulation with the CASSANDRA Simulation System

Railway Simulation with the CASSANDRA Simulation System Journal of Computing and Information Technology - CIT 9, 2001, 2, 133 142 133 Railway Simulation with the CASSANDRA Simulation System Gábor Szűcs International McLeod Institute of Simulation Sciences,

More information

Design and Development of SMS Based Wireless Home Appliance Control and Security System

Design and Development of SMS Based Wireless Home Appliance Control and Security System Journal of Modern Science and Technology Vol. 3. No. 1. March 2015 Issue. Pp.80-87 Design and Development of SMS Based Wireless Home Appliance Control and Security System Md. Abdullah Al Asad *, Md. Al

More information

Third Party Data Session Control in the Evolved Packet System

Third Party Data Session Control in the Evolved Packet System Third Party Data Session Control in the Evolved Packet System EVELINA PENCHEVA Faculty of Telecommunications Technical University of Sofia 8 Kliment Ohridski blvd., 1000 Sofia BULGARIA enp@tu-sofia.bg

More information

WIALAN Technologies, Inc. Network Monitoring System Overview

WIALAN Technologies, Inc. Network Monitoring System Overview WIALAN Technologies, Inc. Network Monitoring System Overview Table of Content I. Introduction... 3 II. Connectivity... 3 III. Monitoring Core Module... 3 Current Status... 3 Reports... 8 System... 11 IV.

More information

Fuzzy Cognitive Map for Software Testing Using Artificial Intelligence Techniques

Fuzzy Cognitive Map for Software Testing Using Artificial Intelligence Techniques Fuzzy ognitive Map for Software Testing Using Artificial Intelligence Techniques Deane Larkman 1, Masoud Mohammadian 1, Bala Balachandran 1, Ric Jentzsch 2 1 Faculty of Information Science and Engineering,

More information

Figure 1. Basic Petri net Elements

Figure 1. Basic Petri net Elements ABCM Symposium Series in Mechatronics - Vol. 3 - pp.653-658 Copyright c 2008 by ABCM A REAL OBJECT CONTROL SYSTEM FOR USE IN MANUFACTURING TELEPRESENCE ENVIRONMENTS. Claiton de Oliveira Department of Mechanical

More information

Lab Testing Summary Report

Lab Testing Summary Report Lab Testing Summary Report February 2007 Report 070228 Product Category: SMB IP-PBX Vendor Tested: Cisco Systems Product Tested: Cisco Unified Communications 500 Series Key findings and conclusions: Complete

More information

HOW TO REMOTELY CONNECT TO THE FIU NETWORK VIA VPN

HOW TO REMOTELY CONNECT TO THE FIU NETWORK VIA VPN HOW TO REMOTELY CONNECT TO THE FIU NETWORK VIA VPN FLORIDA INTERNATIONAL UNIVERSITY HERBERT WERTHEIM COLLEGE OF MEDICINE OFFICE OF INFORMATION TECHNOLOGY Modesto A. Maidique Campus, 11200 S. W. 8 th St.,

More information

A Survey Study on Monitoring Service for Grid

A Survey Study on Monitoring Service for Grid A Survey Study on Monitoring Service for Grid Erkang You erkyou@indiana.edu ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide

More information

PETRI NET BASED SUPERVISORY CONTROL OF FLEXIBLE BATCH PLANTS. G. Mušič and D. Matko

PETRI NET BASED SUPERVISORY CONTROL OF FLEXIBLE BATCH PLANTS. G. Mušič and D. Matko PETRI NET BASED SUPERVISORY CONTROL OF FLEXIBLE BATCH PLANTS G. Mušič and D. Matko Faculty of Electrical Engineering, University of Ljubljana, Slovenia. E-mail: gasper.music@fe.uni-lj.si Abstract: The

More information

Whitepaper. Data Warehouse/BI Testing Offering YOUR SUCCESS IS OUR FOCUS. Published on: January 2009 Author: BIBA PRACTICE

Whitepaper. Data Warehouse/BI Testing Offering YOUR SUCCESS IS OUR FOCUS. Published on: January 2009 Author: BIBA PRACTICE YOUR SUCCESS IS OUR FOCUS Whitepaper Published on: January 2009 Author: BIBA PRACTICE 2009 Hexaware Technologies. All rights reserved. Table of Contents 1. 2. Data Warehouse - Typical pain points 3. Hexaware

More information

Ericsson Multiservice Proxy (MSP) 6.0 Training Programs. Catalog of Course Descriptions

Ericsson Multiservice Proxy (MSP) 6.0 Training Programs. Catalog of Course Descriptions Ericsson Multiservice Proxy (MSP) 6.0 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION... 3 ERICSSON MULTISERVICE PROXY (MSP) 6.0 SYSTEM SURVEY... 4 ERICSSON

More information

Maturity, motivation and effective learning in projects - benefits from using industrial clients

Maturity, motivation and effective learning in projects - benefits from using industrial clients Maturity, motivation and effective learning in projects - benefits from using industrial clients C Johansson Ericsson Software Technology AB/University of Karlskrona/Ronneby P Molin University of Karlskrona/Ronneby,

More information

Managed Service For IP VPN Networks

Managed Service For IP VPN Networks LinchPin Managed Service For IP VPN Networks Web Site www.linchpinnetworks.co.uk Email info@linchpinnetworks.co.uk Telephone 01284 830 841 Introduction The LinchPin CPE Managed Service for IP VPN Networks

More information

Multi-Agent-based Approach for Meeting Scheduling System

Multi-Agent-based Approach for Meeting Scheduling System Multi-Agent-based Approach for Meeting Scheduling System Takao KAWAMURA, Yusuke HAMADA, and Kazunori SUGAHARA Department of Information and Knowledge Engineering, Faculty of Engineering, Tottori University

More information

The Service Availability Forum Specification for High Availability Middleware

The Service Availability Forum Specification for High Availability Middleware The Availability Forum Specification for High Availability Middleware Timo Jokiaho, Fred Herrmann, Dave Penkler, Manfred Reitenspiess, Louise Moser Availability Forum Timo.Jokiaho@nokia.com, Frederic.Herrmann@sun.com,

More information

Online Auction Software Fundamentals

Online Auction Software Fundamentals 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Online Auction Software Fundamentals Jarrod Trevathan +, Wayne Read and Rodel Balingit

More information

Performance Monitoring on Networked Virtual Environments

Performance Monitoring on Networked Virtual Environments Performance Monitoring on Networked Virtual Environments C. Bouras 1, 2, E. Giannaka 1, 2 Abstract As networked virtual environments gain increasing interest and acceptance in the field of Internet applications,

More information

Load balancing algorithms for TINA networks. 1. Introduction. Maria Kihl, Niklas Widell and Christian Nyberg

Load balancing algorithms for TINA networks. 1. Introduction. Maria Kihl, Niklas Widell and Christian Nyberg This is an author produced version of a conference paper presented at the International Teletraffic Congress - ITC-16, Edinburgh International Conference Centre, United Kingdom, 7-11 June, 1999. This paper

More information

Workflow Automation and Management Services in Web 2.0: An Object-Based Approach to Distributed Workflow Enactment

Workflow Automation and Management Services in Web 2.0: An Object-Based Approach to Distributed Workflow Enactment Workflow Automation and Management Services in Web 2.0: An Object-Based Approach to Distributed Workflow Enactment Peter Y. Wu wu@rmu.edu Department of Computer & Information Systems Robert Morris University

More information

MODULAR DISTRIBUTED MANUFACTURING SYSTEMS AND THE IMPLICATIONS FOR INTEGRATED CONTROL

MODULAR DISTRIBUTED MANUFACTURING SYSTEMS AND THE IMPLICATIONS FOR INTEGRATED CONTROL MODULAR DISTRIBUTED MANUFACTURING SYSTEMS AND THE IMPLICATIONS FOR INTEGRATED CONTROL Duncan McFarlane 1 ABSTRACT Driven by the need for more responsive manufacturing processes and as a consequence of

More information

A Multiagent Model for Intelligent Distributed Control Systems

A Multiagent Model for Intelligent Distributed Control Systems A Multiagent Model for Intelligent Distributed Control Systems José Aguilar, Mariela Cerrada, Gloria Mousalli, Franklin Rivas, and Francisco Hidrobo CEMISID, Dpto. de Computación, Facultad de Ingeniería,

More information

Open Core Engineering Freedom and efficiency redefined

Open Core Engineering Freedom and efficiency redefined Open Core Engineering Freedom and efficiency redefined Meet new software engineering challenges with new opportunities Progressively shorter product life cycles are increasing the demand for highly productive,

More information

Infrastructure as a Service (IaaS)

Infrastructure as a Service (IaaS) Infrastructure as a Service (IaaS) (ENCS 691K Chapter 4) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ References 1. R. Moreno et al.,

More information

CenterMind P+ Intelligent Power Management for your Data Center

CenterMind P+ Intelligent Power Management for your Data Center CenterMind P+ Intelligent Power Management for your Data Center Intelligent Power Management for your Data Center monitor and manage your data center power consumption and connectivity efficiently The

More information

NEXT GENERATION ARCHIVE MIGRATION TOOLS

NEXT GENERATION ARCHIVE MIGRATION TOOLS NEXT GENERATION ARCHIVE MIGRATION TOOLS Cloud Ready, Scalable, & Highly Customizable - Migrate 6.0 Ensures Faster & Smarter Migrations EXECUTIVE SUMMARY Data migrations and the products used to perform

More information

Survey on Models to Investigate Data Center Performance and QoS in Cloud Computing Infrastructure

Survey on Models to Investigate Data Center Performance and QoS in Cloud Computing Infrastructure Survey on Models to Investigate Data Center Performance and QoS in Cloud Computing Infrastructure Chandrakala Department of Computer Science and Engineering Srinivas School of Engineering, Mukka Mangalore,

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK NETWORK MONITORING AND ADMINISTRATION USING ANDROID PHONE PROF. S. S. ASOLE, C.

More information

MGE UPS Communication

MGE UPS Communication MGE UPS MGE UPS SYSTEMS has developed a comprehensive, simple and coherent range of products for power supply management for servers and other systems requiring power protection. This range provides 2

More information

Building Reusable Mobile Agents for Network Management

Building Reusable Mobile Agents for Network Management IEEE TRANSACTIONS SYSTEMS, MAN, AND CYBERNETICS PART C: APPLICATION AND REVIEWS, VOL. 33, NO. 3, AUGUST 2003 350 Building Reusable Mobile Agents for Network Management Ichiro Satoh Member, IEEE, Abstract

More information