Employment of mobile multiagent systems for attendance of transaction of distributed database

Size: px
Start display at page:

Download "Employment of mobile multiagent systems for attendance of transaction of distributed database"

Transcription

1 Proceedings of the International Multiconference on ISSN Computer Science and Information Technology, pp PIPS Employment of mobile multiagent systems for attendance of transaction of distributed database Zofia Kruczkiewicz 1 1 The Institute of Computer Engineering, Control and Robotics, Wroclaw University of Technology, Wrocław, Poland zofia.kruczkiewicz@pwr.wroc.pl Abstract. It is aimed at the limitation of the network traffic which is generated during the realization of two-phase-commit protocol of distributed transactions in distributed database systems. This paper presents the way of the decrease of the number and the way of the diminution of the size of messages sent during distributed transactions as the manner of the limitation of the network traffic. Multiagent system is employed for attendance of confirmation of two-phase distributed transactions. The paper presents the manner of the limitation of the network traffic in multiagent systems as the use of mobile agents as resources managers of databases, static agents as coordinators of transactions and static agents as managers of transactions. These agents communicate via two-phasecommit protocols. The paper presents the performance eperiments enabling the comparison of two-phase-commit protocols, the protocol elaborated in the paper and the protocol described in the literature. 1 Introduction General applicable distributed computerized information systems store information in distributed heterogeneous databases. It is aimed at such efficient work of these systems, which generate the network traffic as small as possible. This system should have the high performance. Therefore mechanisms of the mobility and the intelligent behavior of employed software are used in these systems. The base of the maintenance of the indivisibility of realized distributed transactions of distributed heterogeneous databases, the immunity from states of the disconnection and movements of the part of systems, is the two-phase-commit protocol. It is described multiagent systems for attendance of confirmation of two-phase validation of distributed transactions in the paper. The paper presents the two-phase-commit protocol based on mobile agents, which is projected during the analyses of the MAS. This protocol includes the limited number and the least size of messages and it generates the smaller traffic than the protocol presented in the literature [13]. The concept and the implementation of activities and communication between agents play the basic role in the creation of multiagent systems (MASs). It results from the basic paradigm of MAS, which is the social character of a system i.e. the 71

2 72 Zofia Kruczkiewicz autonomy, the adaptation and interactions. The transmission of information in MASs is based on conversations [11], which include interactions and activities. These interactions and activities affect on the performance of the system and the network traffic. Performance engineering is engaged on the problems of the performance of software, during all phases of its creation. It is possible to value the performance of the system and the size of sent information in the network as time parameters of the system. Therefore it is possible to perform the choice of arbitrated solutions due to the time parameters of the model of MAS, which are matched to degree of the development of the software [1, 2]. It puts the stress on limitation of the size and the number of messages of protocols of created MASs. The mobility of software is one of the manners of this limitation, which relies on transmission of mobile agent as autonomous unit of software [6]. The mobile agent is relocated in the network of type of WAN or LAN, it decides about its activities, it eecutes services of the sending system. It is differed following patterns of interaction protocols: the static protocol (behaviors of agents and interactions are not changed) and the mobile protocol (behaviors of agents and interactions are changed). The choice of the mobility results from the type of an application and it leads to the minimization of the network traffic, the cost of CPU, generalizations of services, the autonomy of components of software, the higher immunity from errors of components moved in the network than from errors of components of the client server architecture, the elasticity of management of data and the encapsulation of the protocol. Several defined patterns of communications based on the mobility are compared in work [6]: client-server (CS, Client-Server), remote start-up of code - (REV, Remote Evaluation), transmission of code (COD, Code Demand) and mobile agent (MA, Mobile Agent). The work [4] presents methods of the improvement of the performance and the network traffic of MAS ACORN, which rely on the dynamic grouping of mobile agents in cafes due to their information and the introduction of the idea of the agent architecture as the Thick/Thin agents. The Thin agent is the mobile agent, which collects information during movement in the network and sends this information to the static agent of the type of the Thick agent. The works [3], [8] compare the performance of patterns of interaction protocols of CS and MA. It defines the sequence and parallel architecture for these patterns [8] and researches their performance in the respect of the performance of Voyager, Aglets and Concordia. The work [11] compares static and mobile MASs, which are equivalent in the respect of realized tasks. This paper describes the research of the performance of the serialization of agents as the mechanism of the mobility. The intelligent and efficient behavior of MAS enables limitation of the network traffic generated during distributed transactions of heterogeneous databases in the distributed environment. The review of systems of attendance of mobile transaction is presented in the work [12]. These systems are Clustering, Two-Tier Replication, Pro-motion, Reporting, Semi-based, Prewrite, Kangaroo Transaction, Multidatabase Transaction Processing Manager. The work [12] performs the comparison of operation models, ownership ACID, cohesions, transparency, stability, reactions on disconnect and mobility of elements of the system and it serves the proposal of the system for the attendance of the mobile transaction (MTS, Mobile Transaction Service). The work [13] presents the role of agents in improvement of the safety of distributed transactions of the system based on the technology CORBA. The work

3 Employment of mobile multiagent systems for attendance of transaction of distributed database 73 [10] describes the architecture of Distributed Database Management Systems (DBMSs), which employs the tool named CaseLP in specifying elements and testing of behavior of the system. The work [9] presents pro-active MAS, which is based on static and mobile agents which support distributed transactions of the system. These mobile agents improve the performance in comparison with classic solutions applying mobile agents. The system is realized as the platform based on IBM Aglets and the virtual machine of java (JVM) in the environment of Aglets Software Development Kit (ASDK). The second chapter of work introduces MAS JADE. It presents protocols of validation of two-phase transactions in the fourth chapter. The fifth chapter serves the results of performance eperiments concerning on comparison of two protocols i.e. the elaborated two-phase-commit protocol and the protocol presented in the work [13]. Work is ended with conclusions. 2 System MAS JADE It chooses Java MAS JADE (Java Agent Development Framework) system [7] based on FIPA specification (The Foundation for Intelligent Agents) [5] for the implementation of two-phase-commit protocols. JADE includes packages for the creation of agents and the environment of their operations as the platform of agents (AP, Agent Platform) (fig. 1). AP platform consists of following agent components: Agent Management System (AMS), which fulfils the control over the access and the utilization of agent platform; Directory Facilitator (DF), which catalogues services of applications; Message Transport System (MTS), which controls the sent messages; Agent, which represents applications. AP can be divided onto several machines as containers (fig. 1). Each container has the virtual machines of Java (JVM) and includes one or many interacting agents. The main container includes AMS and DF agents and the RMI register (Remote Method Invocation) which controls the mobility of messages and the optional mobility of agents of one AP. Containers are connected with the main container and they build the environment of operations of set of agents. According to FIPA specification, DF and AMS communicate by use of ACL (Agent Content Language) language, Fipa-Agent-Management ontology and Fipa-Request interaction protocol.

4 74 Zofia Kruczkiewicz Fig. 1. Distributed Agent platform and JADE containers [7] 3. Two-phase-commit protocols based on static and mobile agents Communication between agents is defined by the use of the interaction protocol (IP) [5]. System JADE offers the set of patterns of interaction protocols based on FIPA specification. These protocols are dedicated to different typical applications. JADE supports implementation of user-defined protocols. Patterns of protocols are placed in FIPA Interaction Protocol Library Maintenance [5]. It introduces new diagrams to design of interactions between agents, which are called protocol diagrams (PD, Protocol Diagrams). PD is based on UML sequences diagrams. It epresses new elements of PD diagrams in meta-uml language, named AUML (Agent UML) [5]. It presents IP protocols of eemplary applications at diagrams of fig.2-3. The design system consists of following elements: environments of MAS JADE, the static agent as Transaction Manager, which administers transactions, static agents as and, which gather information of eecution states of the fragments of distributed transaction and static or mobile agents as,, Manager_3 and Manager_4, which oversee eecution of fragments of distributed transaction realized in allocated resources. Agents act according to concept of Thick /Thin agent [4], i.e.: the static thick agent as Manager owns the full knowledge of its environment, it is able to acquire, to process and to analyze information therefore it has own code of a big size the mobile thin agent as Manager owns the limited knowledge of its environment and the limited range of operations, but it is able to migrate in network and it has own code of a small size. The comparison of interaction protocols bases on the assumptions that they enable realization of the same task on the same data placed on same hosts and this protocol is the best in the point of generated network traffic, which allows to eecuting task of the smallest joint size of sent messages.

5 Employment of mobile multiagent systems for attendance of transaction of distributed database 75 The IP1 protocol as two-phase-commit protocol (fig. 2) is used in the MASs presented in the work [13]. The thick agent as Manager Transaction sends a begin_transaction messages about beginning of transaction to the set of agents, which includes at least two agents i.e. and. Agents as and send messages about beginning of transaction (request_1, request_2, request_3, request_4) to static thick agents as,, Manager_3 and Manager_4. Then agents as and send can-commit message about query of the fragment of the distributed transaction to agents as,, Manager_3 and Manager_4. Each agent as Manager confirms by sending message about the correct result of the part of the transaction or failure message about the failure to the agent as Manager. After receiving all answers, agents as and send message to the agent as Transaction Manager if agents as Manager confirm all correct parts of transaction or failure message, if at least the one agent as Manager reports the failure. If the agent as Transaction Manager receives messages from all agents as Manager, it sends messages to them about the commit of the distributed transaction, in the opposite case if it receives at least one failure message, it sends messages to all agents as Manager about the come-back of the state of resources before the beginning of the transaction. In the first case agents as Managers send messages to all agents as Manager. Net agents as Manager confirm by sending have-commit messages to agents as s Manager which send have-commit messages to the agent as Transaction Manager. In the second case agents as Manager send messages to agents as Manager. Agents as Resource Manager confirm the failure of the transaction by sending have- messages to agents as Manager. Net agents as s Manager send have- messages to the agent as Transaction Manager about confirmation of the failure of the transaction. The protocol IP2 at the figure 3 differs from protocol IP1 at the figure 2 where two mobile thin agents are employed in overseeing resources of transaction. Instead of request and can-commit messages it is sent request-to-move messages with information of network migrations which are necessary for the eecution of fragments of the transaction. Protocol IP2 does not include four can-commit messages, because mobile agents as and must not receive them however the network traffic appears when the mobile agents as Managers migrate through network and eecute all fragments of the transaction. The time of the realization of request to move (request_1, request_2) message consists of the time of the receiving this message by mobile agent as and two migrations to databases placed on computers of net addresses given by parameters request_1 and request _2. The agent as sends ok commit or failure message after realization of fragments of transactions in two databases to the agent as which sends ok commit or failure message to the agent as Transaction Manager. During the second phase of transaction the agent as

6 76 Zofia Kruczkiewicz receives do_commit or message and it sends one of these messages to the agent as. It migrates through two databases and commits or cancels the fragments of the transaction. Then it sends have commit or have message to the agent as. The agent as sends have commit or have message to the agent as Transaction Manager. The same conditions concern the agent as. The smaller network traffic is generated when the eecuting of the fragment of transaction fails during the first migration. The agent as and finishes the eecuting of the transaction without another migration and sends failure message to own agent as Manager. During the second phase of the transaction it migrates to the first database and cancels the state of its resources. It decreases the number of migrations of agents from eight to four. In general, the protocol with mobile agents includes n agents as Managers and each agent as Manager coordinates p agents as Manager and each agent as Manager migrates through q databases. The number q is greater than 1. The epression p*q is equal to the number of agents as Manager of IP1 protocol. It is taken the assumption that the size of all messages and the size of code of the each mobile agent are equal to a. Therefore the IP1 protocol includes the number of messages which is equal to the value of the following epression: (4*n + 5*n*p*q)* a. The IP2 protocol includes the number of messages which is equal to the following epression: (4*n + 4*n*p+2*n*p*q)* a. The difference between these epressions is equals to value: n*p*(3*q 4)*a. It means that the IP1 protocol has the greater joint size of messages than IP2 protocol. If the transaction of IP2 protocols fails during the first migration of the each mobile agent, its epression is equal to the following one: (4*n + 6*n*p)* a. Now the difference between two epressions is equal to n*p*(5*q-6) and it is greater than the first difference. The IP2 protocol can generate the smaller network traffic than the IP1 one. 4 Performance eperiments It constructs equivalent static and mobile MASs due to the number of databases. MASs are based on IP1 and IP2 interaction protocols (fig. 2, fig. 3). Researching of the time of the answer is purpose of the eperiment in comparison with the generated network traffic of the static and the mobile MASs i.e. the time that epires from the moment of the beginning of the task of searching out to the time of receiving the result of searching. The system based on thick agents of IP1 interaction protocol is presented on fig. 4 and system based on mobility thin agents based of IP2 interaction

7 Employment of mobile multiagent systems for attendance of transaction of distributed database 77 Transaction Manager begin-transaction (task) begin-transaction (task) request_1 request_2 can-commit can-commit Manager_3 Manager_4 request_3 request_4 can-commit can-commit Phase 1 Phase 2 Meta-UML symbols have been used during sending messages - - decision type: one from many - parallel type: AND Fig. 2. IP1 protocol of validation of two phase distributed transaction of MAS based on static agents [13]

8 78 Zofia Kruczkiewicz Transaction Manager begin-transaction (task) begin-transaction (task) request-to-move(request_1, request_2) request-to-move(request_3, request_4) Phase 1 Phase 2 Meta-UML symbols have been used during sending messages - - decision type: one from many - parallel type: AND Fig. 3. IP2 protocol of validation of two phase distributed transaction of MAS based on static and mobile agents protocol is presented on fig. 5. Technical data of MASs are presented in tab.1. It carries research on computers of the local network acting on 100BASE-TX. The agent is independent thread of virtual java machine (JVM) in system acting on JADE i.e. the independent thread of operating system, which works under control of JADE. Each agent can eecute several independent tasks simultaneously. In order to build detached threads for the each agent, it introduces the concept of the behavior. This solution is efficient, because the transfer of the steering from the thread to the thread is hundred times slower than the calling method each agent behavior is called

9 Employment of mobile multiagent systems for attendance of transaction of distributed database 79 by the agent method [7]. Communication and mobility of agents are based on RMI of JAVA, which employs the migration of the code and the state of agents. Host2, Container1 Host1, MainContainer Transaction Manager Host3, Container2 Request of data 10 MB Result Request of data 10 MB Result 100 MB LAN 128 K 10MB 10MB 128 K Host4, Container3 MS SQL Server Host5, Container4 MYSQL Host6, Container4 Manager_3 MS SQL Server Host7, Container6 Manager_4 MYSQL Fig. 4. Analysis of communication infrastructure system in the following environment: seven hosts, static solution based on IP1 Host2, Container1 Agent_1 Agent_1 Host1, MainContainer Transaction Manager Host3, Container2 Agent_2 Agent_2 Request move for data 10 MB Result 100 MB LAN Request move for data 10 MB Result 128 K 10MB 10MB 128 K Host4, Container3 MS SQL Server Host5, Container5 MYSQL Host6, Container4 MS SQL Server Host7, Container6 MYSQL Fig. 5. Interaction infrastructure of MAS in the following environment: seven hosts, system IP2 Evaluated systems are researched without taking into consideration influence of the graphic interface of user. Agents as Manager eecute task of searching out on servers of databases systems MySQL and MSQL Server 2000, with database of bookstore. Each of table stores 1000 records of data of clients of bookstores. Static and mobile agents as Manager eecute the SQL query: SELECT * FROM klienci WHERE nazwisko LIKE 'X%'. Realized query is not a transaction but this solution enables to evaluate the influence of IP1 and IP2 protocols on performance of two-phase distributed transactions. The time of each searching is gauged by the use of the java class method i.e. System.currentTimeMillis.

10 80 Zofia Kruczkiewicz Tab. 1. Technical test machines data Hosts 1, 2 Hosts 3, 4, 5, 7 OS MS Windows 2000 MS Windows XP CPU Celeron 1GHz Athlon XP RAM 120 MB 256 MB JVM Sun SDK 1.5 Sun JRE 1.5 JADE Tab. 2. Time [ms] of searching of MASs after 1000 tests on 7 computers Time [ms] MAS based on IP1MAS based on IP2 Average time Ma time Min time In the static solution each query is repeated for 250 times by each Manager. In the mobile solution each Manager migrates between two hosts for 250 times per the one host. The operation of the static agent is equivalent to the one migration of the mobile agent. It presents results of research in table 2.The group of mobile agents is faster than the group of static agents. This improvement of the performance of IP2 protocols results from the limited number of mobile agents and the smaller size of its code than the size of message sending to static agents. 5 Conclusions After the employment of the proper pattern of interaction protocol based on mobility it is possible to ascertain the mobility solution on the base of carried performance tests of MASs. This solution can eceed stationary solution in respect of: higher performance - MAS based on IP2 interaction protocol with the mobility acts faster than the equivalent static solutions based on IP1 interaction protocol small capacity of software the capacity of the mobile test configuration of MAS based on IP2 protocol is less than for the static solution based on IP1 protocol small network traffic - it is possible to employ the simplest interaction protocol at the configuration of the agent according to the concept of Thick /Thin agent, where the thin agent is mobile.

11 Employment of mobile multiagent systems for attendance of transaction of distributed database 81 References 1 Babczyński T., Kruczkiewicz Z., Magott J.: Performance Evaluation of Multiagent Information Retrieval System, Foundations of Computing and Decision Sciences, Vol. 29, No. 1-2 (2004) Babczyński T., Kruczkiewicz Z., Magott J.: Performance Evaluation of Multiagent Personalized Information System, In: Proc. of the 7th Int. Conf. on Artificial Intelligence and Soft Computing 2004, Lecture Notes in Computer Science-LNAI, Springer-Verlag (2004) Buse D. P., Sun P., Wu Q. H., Fitch J.: Mobile agents for industrial information management, monitoring and control, In: Proc.of International Conference on Intelligent Agents, Web Technology and Internet Commerce-IAWTIC' , February 2003, Vienna-Austria. 4 Carter J., Ghorbani A. A., Marsh S.: Just-in time information architectures in multiagent systems, In: Proc.of the First Int. Joint Conference on Autonomous Agents and Multiagent Systems: part , Bologna, Italy. 5 FIPA, 6 Fugetta A., Picco G. P., Vigna G.: Understanding Code Mobility, IEEE Transaction On Software Engineering. Vol. 24, No.5, JADE, 8 Jha R., Iyer S.: Performance evaluation of mobile agents for e-commerce applications, In: Proc. of International Conference on High Performance Computing, Hyderabad, India, Dec Kelash H. M., Faheem H. M., Amoon M.: A Multiagent System for Distributed Systems Management, Transactions on engineering, computing and technology V11 February 2006 ISSN Mascardi V., Merelli E.: Agent-Oriented and Constraint Technologies for Distributed Transaction Management, DISI Universita di Genova via Dodecaneso, Genova (Italy) e_mail: mascardi@disi.unige.it, Istituto di Informatica - Universita di Ancona via Brecce Bianche , Ancona (Italy) merelli@inform.unian.it 11 O Malley S. A., Self A. L., Deloach S. A.: Comparing performance of static versus mobile multiagent systems, In: Proc. of National Aerospace and Electronics Conference (NAECON) Dayton OH, October P. Serrano-Alvarado, Roncancio C., Adiba M.: Mobile Transaction Supports for DBMS,. An Overview, LSR-IMAGLaboratory BP72, StMartin d'heres. 13 Vogler H., Kunkelmann Th., Moschgath Marie-Louise: An Approach for Mobile Agent Security and Fault Tolerance using Distributed Transactions, Hartmut Darmstadt University of Technology, Information Technology Transfer Office Aleanderstr. 10, D Darmstadt, Germany {vogler, kunkel, malu}@ito.th darmstadt.de

An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents

An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents M. Anber and O. Badawy Department of Computer Engineering, Arab Academy for Science and Technology

More information

ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS

ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS ANNALS OF THE FACULTY OF ENGINEERING HUNEDOARA 2006, Tome IV, Fascicole 1, (ISSN 1584 2665) FACULTY OF ENGINEERING HUNEDOARA, 5, REVOLUTIEI, 331128, HUNEDOARA ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS

More information

Mobile Software Agents: an Overview

Mobile Software Agents: an Overview Mobile Software Agents: an Overview Authors : From: Vu Anh Pham and Ahmed Karmouch University of Ottawa, Ontario Presented by: Luba Sakharuk Agenda for the Overview of Mobile Agents Abstract The Mobile

More information

Tier Architectures. Kathleen Durant CS 3200

Tier Architectures. Kathleen Durant CS 3200 Tier Architectures Kathleen Durant CS 3200 1 Supporting Architectures for DBMS Over the years there have been many different hardware configurations to support database systems Some are outdated others

More information

FIPA agent based network distributed control system

FIPA agent based network distributed control system FIPA agent based network distributed control system V.Gyurjyan, D. Abbott, G. Heyes, E. Jastrzembski, C. Timmer, E. Wolin TJNAF, Newport News, VA 23606, USA A control system with the capabilities to combine

More information

Cloud Computing for Agent-based Traffic Management Systems

Cloud Computing for Agent-based Traffic Management Systems Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion

More information

CS550. Distributed Operating Systems (Advanced Operating Systems) Instructor: Xian-He Sun

CS550. Distributed Operating Systems (Advanced Operating Systems) Instructor: Xian-He Sun CS550 Distributed Operating Systems (Advanced Operating Systems) Instructor: Xian-He Sun Email: sun@iit.edu, Phone: (312) 567-5260 Office hours: 2:10pm-3:10pm Tuesday, 3:30pm-4:30pm Thursday at SB229C,

More information

Virtual machine interface. Operating system. Physical machine interface

Virtual machine interface. Operating system. Physical machine interface Software Concepts User applications Operating system Hardware Virtual machine interface Physical machine interface Operating system: Interface between users and hardware Implements a virtual machine that

More information

The Efficiency Analysis of the Object Oriented Realization of the Client-Server Systems Based on the CORBA Standard 1

The Efficiency Analysis of the Object Oriented Realization of the Client-Server Systems Based on the CORBA Standard 1 S C H E D A E I N F O R M A T I C A E VOLUME 20 2011 The Efficiency Analysis of the Object Oriented Realization of the Client-Server Systems Based on the CORBA Standard 1 Zdzis law Onderka AGH University

More information

A FRAMEWORK FOR MANAGING RUNTIME ENVIRONMENT OF JAVA APPLICATIONS

A FRAMEWORK FOR MANAGING RUNTIME ENVIRONMENT OF JAVA APPLICATIONS A FRAMEWORK FOR MANAGING RUNTIME ENVIRONMENT OF JAVA APPLICATIONS Abstract T.VENGATTARAMAN * Department of Computer Science, Pondicherry University, Puducherry, India. A.RAMALINGAM Department of MCA, Sri

More information

VII. Database System Architecture

VII. Database System Architecture VII. Database System Lecture Topics Monolithic systems Client/Server systems Parallel database servers Multidatabase systems CS338 1 Monolithic System DBMS File System Each component presents a well-defined

More information

Concepts of Database Management Seventh Edition. Chapter 9 Database Management Approaches

Concepts of Database Management Seventh Edition. Chapter 9 Database Management Approaches Concepts of Database Management Seventh Edition Chapter 9 Database Management Approaches Objectives Describe distributed database management systems (DDBMSs) Discuss client/server systems Examine the ways

More information

AGENT TECHNOLOGY ASA SOLUTION FOR NETWORK-ENABLED GIS

AGENT TECHNOLOGY ASA SOLUTION FOR NETWORK-ENABLED GIS AGENT TECHNOLOGY ASA SOLUTION FOR NETWORK-ENABLED Saeid M. Kalantari a, Ali A. Alesheikh b a Graduate student of master, Dept. of Eng. sm_kalantary@yahoo.com b Assistant Professor, Dept. of Eng. alesheikh@kntu.ac.ir

More information

Hybrid Approach of Client-Server Model and Mobile Agent Technology to Drive an E-Commerce Application

Hybrid Approach of Client-Server Model and Mobile Agent Technology to Drive an E-Commerce Application Hybrid Approach of Client-Server Model and Mobile Agent Technology to Drive an E-Commerce Application Ajab Maheshwari PG Scholar, IT Dept, IET-DAVV, Indore (M.P.), India. Dr. Pratosh Bansal Associate Professor,

More information

Multi-Agent Model for Automation of Business Process Management System Based on Service Oriented Architecture

Multi-Agent Model for Automation of Business Process Management System Based on Service Oriented Architecture Multi-Agent Model for Automation of Business Process Management System Based on Service Oriented Architecture Soe Winn, May Thwe Oo Abstract Business process automation is an important task in an enterprise

More information

JADE: Java Agent Development Framework What is it? How can I use it?

JADE: Java Agent Development Framework What is it? How can I use it? JADE: Java Agent Development Framework What is it? How can I use it? Based on Online documentation of Jade http://jade.tilab.com/ 1 Overview Agent Communication Language Jade Features The agent Platform

More information

A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS

A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS Tarag Fahad, Sufian Yousef & Caroline Strange School of Design and Communication Systems, Anglia Polytechnic University Victoria

More information

1. PRODUCT OVERVIEW... 3 2. PRODUCT COMPONENTS... 3

1. PRODUCT OVERVIEW... 3 2. PRODUCT COMPONENTS... 3 Contents 1. PRODUCT OVERVIEW... 3 2. PRODUCT COMPONENTS... 3 2.1. SERVER-BASED COMPONENTS:... 3 2.1.1. Interception Server... 3 2.1.2. Database server... 3 2.1.3. Data processing server... 3 2.1.3.1. Search

More information

Mobile Code for Distributed Applications/Systems

Mobile Code for Distributed Applications/Systems Mobile Code for Distributed Applications/Systems Koo Lee Chun School of Computing University Utara Malaysia, Kedah, Malaysia leechunkoo@yahoo.com Abstract Traditional technologies exhibited many limitation

More information

NCP Secure Enterprise Management Next Generation Network Access Technology

NCP Secure Enterprise Management Next Generation Network Access Technology Data Sheet NCP Secure Enterprise Management Next Generation Network Access Technology General description NCP Secure Enterprise Management is the central component of the NCP Next Generation Network Access

More information

JOURNAL OF OBJECT TECHNOLOGY

JOURNAL OF OBJECT TECHNOLOGY JOURNAL OF OBJECT TECHNOLOGY Online at http://www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2008 Vol. 7, No. 8, Novmeber - December 2008 Extension of Object-Oriented Software

More information

The Advantages of Using Mobile Agents in Software for Telecommunications

The Advantages of Using Mobile Agents in Software for Telecommunications The Advantages of Using Mobile Agents in Software for Telecommunications Luis Moura Silva Leonor Almeida University of Coimbra SIEMENS S.A. Polo II, Dep. Eng. Informatica Rua Irmãos Siemens Nº 1 3030 Coimbra,

More information

Data Sheet. NCP Secure Enterprise Management. General description. Highlights

Data Sheet. NCP Secure Enterprise Management. General description. Highlights Data Sheet NCP Secure Enterprise Management General description NCP Secure Enterprise Management is the central component of the NCP Next Generation Network Access technology with integrated RADIUS server

More information

A Multi-Agent Approach to a Distributed Schedule Management System

A Multi-Agent Approach to a Distributed Schedule Management System UDC 001.81: 681.3 A Multi-Agent Approach to a Distributed Schedule Management System VYuji Wada VMasatoshi Shiouchi VYuji Takada (Manuscript received June 11,1997) More and more people are engaging in

More information

A Satellite Network Management Architecture based on Mobile Agents and SNMP

A Satellite Network Management Architecture based on Mobile Agents and SNMP 2012 4th International Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Singapore A Satellite Network Management Architecture based on Mobile Agents and SNMP Jianli

More information

Data Management in an International Data Grid Project. Timur Chabuk 04/09/2007

Data Management in an International Data Grid Project. Timur Chabuk 04/09/2007 Data Management in an International Data Grid Project Timur Chabuk 04/09/2007 Intro LHC opened in 2005 several Petabytes of data per year data created at CERN distributed to Regional Centers all over the

More information

Scalability and Performance of JADE Message Transport System

Scalability and Performance of JADE Message Transport System E.Cortese Telecom Italia LAB Centro Direzionale isola F7 8143 Naples Italy +39819718364 Elisabetta.Cortese@TILAB.com Scalability and Performance of JADE Message Transport System F.Quarta Telecom Italia

More information

WEBAPP PATTERN FOR APACHE TOMCAT - USER GUIDE

WEBAPP PATTERN FOR APACHE TOMCAT - USER GUIDE WEBAPP PATTERN FOR APACHE TOMCAT - USER GUIDE Contents 1. Pattern Overview... 3 Features 3 Getting started with the Web Application Pattern... 3 Accepting the Web Application Pattern license agreement...

More information

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)

More information

MS SQL Server DBA Training Course. Table of Contents

MS SQL Server DBA Training Course. Table of Contents Table of Contents Overview... 4 About DBA University, Inc.... 4 Malathy Mani Microsoft Certified Solutions Expert (MCSA)... 5 Pricing and Registration... 5 Course Duration and Timings... 5 Sunday, Monday,

More information

System types. Distributed systems

System types. Distributed systems System types 1 Personal systems that are designed to run on a personal computer or workstation Distributed systems where the system software runs on a loosely integrated group of cooperating processors

More information

Performance analysis and comparison of virtualization protocols, RDP and PCoIP

Performance analysis and comparison of virtualization protocols, RDP and PCoIP Performance analysis and comparison of virtualization protocols, RDP and PCoIP Jiri Kouril, Petra Lambertova Department of Telecommunications Brno University of Technology Ustav telekomunikaci, Purkynova

More information

A Hybrid approach to Network Performance Monitoring based on Mobile Agents and CORBA

A Hybrid approach to Network Performance Monitoring based on Mobile Agents and CORBA A Hybrid approach to Network Performance Monitoring based on Mobile Agents and CORBA Christos Bohoris, George Pavlou, Antonio Liotta Centre for Communication Systems Research, School of Electronics, Computing

More information

ICS 434 Advanced Database Systems

ICS 434 Advanced Database Systems ICS 434 Advanced Database Systems Dr. Abdallah Al-Sukairi sukairi@kfupm.edu.sa Second Semester 2003-2004 (032) King Fahd University of Petroleum & Minerals Information & Computer Science Department Outline

More information

Desktop Virtualization Technologies and Implementation

Desktop Virtualization Technologies and Implementation ISSN : 2250-3021 Desktop Virtualization Technologies and Implementation Pranit Patil 1, Shakti Shekar 2 1 ( Mumbai, India) 2 (Mumbai, India) ABSTRACT Desktop virtualization is new desktop delivery method

More information

Java Secure Application Manager

Java Secure Application Manager Java Secure Application Manager How-to Introduction:...1 Overview:...1 Operation:...1 Example configuration:...2 JSAM Standard application support:...6 a) Citrix Web Interface for MetaFrame (NFuse Classic)...6

More information

A Scheme for Implementing Load Balancing of Web Server

A Scheme for Implementing Load Balancing of Web Server Journal of Information & Computational Science 7: 3 (2010) 759 765 Available at http://www.joics.com A Scheme for Implementing Load Balancing of Web Server Jianwu Wu School of Politics and Law and Public

More information

4 Networking Generators

4 Networking Generators 4 Networking Generators Topics in this chapter: Overview Configuring a file server Establishing a network environment Network operations Controlling a generator remotely Upgrading generators over a network

More information

Proceedings of the 9th WSEAS International Conference on TELECOMMUNICATIONS and INFORMATICS

Proceedings of the 9th WSEAS International Conference on TELECOMMUNICATIONS and INFORMATICS Intelligent Agent based Hotel Search & Booking System Courtney McTavish Mona Institute of Applied Science, University of West Indies, Kingston, Jamaica & Suresh Sankaranarayanan Lecturer & Leader Intelligent

More information

Chapter 1 - Web Server Management and Cluster Topology

Chapter 1 - Web Server Management and Cluster Topology Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management

More information

XTM Web 2.0 Enterprise Architecture Hardware Implementation Guidelines. A.Zydroń 18 April 2009. Page 1 of 12

XTM Web 2.0 Enterprise Architecture Hardware Implementation Guidelines. A.Zydroń 18 April 2009. Page 1 of 12 XTM Web 2.0 Enterprise Architecture Hardware Implementation Guidelines A.Zydroń 18 April 2009 Page 1 of 12 1. Introduction...3 2. XTM Database...4 3. JVM and Tomcat considerations...5 4. XTM Engine...5

More information

Cloud Computing and Software Agents: Towards Cloud Intelligent Services

Cloud Computing and Software Agents: Towards Cloud Intelligent Services Cloud Computing and Software Agents: Towards Cloud Intelligent Services Domenico Talia ICAR-CNR & University of Calabria Rende, Italy talia@deis.unical.it Abstract Cloud computing systems provide large-scale

More information

Integration and Coordination in in both Mediator-Based and Peer-to-Peer Systems

Integration and Coordination in in both Mediator-Based and Peer-to-Peer Systems Dottorato di Ricerca in Ingegneria dell Informazione e sua applicazione nell Industria e nei Servizi Integration and Coordination in in both Mediator-Based and Peer-to-Peer Systems presenter: (pense@inform.unian.it)

More information

Planning the Installation and Installing SQL Server

Planning the Installation and Installing SQL Server Chapter 2 Planning the Installation and Installing SQL Server In This Chapter c SQL Server Editions c Planning Phase c Installing SQL Server 22 Microsoft SQL Server 2012: A Beginner s Guide This chapter

More information

Studio 5.0 User s Guide

Studio 5.0 User s Guide Studio 5.0 User s Guide wls-ug-administrator-20060728-05 Revised 8/8/06 ii Copyright 2006 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,

More information

Implementing Java Distributed Objects with JDBC

Implementing Java Distributed Objects with JDBC Implementing Java Distributed Objects with JDBC Pritisha 1, Aashima Arya 2 1,2 Department of Computer Science Bhagwan Mahaveer institute of engineering & technology (BMIET), Deenbandhu Chhotu Ram University

More information

Distributed Database for Environmental Data Integration

Distributed Database for Environmental Data Integration Distributed Database for Environmental Data Integration A. Amato', V. Di Lecce2, and V. Piuri 3 II Engineering Faculty of Politecnico di Bari - Italy 2 DIASS, Politecnico di Bari, Italy 3Dept Information

More information

Some Aspects of the Quality of Service Support Used in Multi Agent Systems on Middleware- Based Distributed Messaging

Some Aspects of the Quality of Service Support Used in Multi Agent Systems on Middleware- Based Distributed Messaging Some Aspects of the Quality of Service Support Used in Multi Agent Systems on Middleware- Based Distributed Messaging Jose-Luis Poza-Luján, Raúl Simarro-Fernández, Juan-Luis Posadas-Yagüe and José-Enrique

More information

Agent Languages. Overview. Requirements. Java. Tcl/Tk. Telescript. Evaluation. Artificial Intelligence Intelligent Agents

Agent Languages. Overview. Requirements. Java. Tcl/Tk. Telescript. Evaluation. Artificial Intelligence Intelligent Agents Agent Languages Requirements Overview Java Tcl/Tk Telescript Evaluation Franz J. Kurfess, Cal Poly SLO 211 Requirements for agent Languages distributed programming large-scale (tens of thousands of computers)

More information

Ismail Khalil Summer Semester 2009

Ismail Khalil Summer Semester 2009 Cooperative Systems - VO Intelligent Agents Ismail Khalil Summer Semester 2009 Course Unit 10 Mobile Agents What is a mobile agent? A software agent ( so far) computer program autonomous behaviour represent

More information

Chapter 2: Processes, Threads, and Agents

Chapter 2: Processes, Threads, and Agents Process Management A distributed system is a collection of cooperating processes. Applications, services Middleware Chapter 2: Processes, Threads, and Agents OS: kernel, libraries & servers OS1 Processes,

More information

A Multi-paradigm Approach for Mobile Agents Development

A Multi-paradigm Approach for Mobile Agents Development A Multi-paradigm Approach for Mobile Agents Development Edgardo A. Belloni 1 Abstract Mobile agent systems have received important attention in the last years as a new programming paradigm for widely distributed

More information

FileNet System Manager Dashboard Help

FileNet System Manager Dashboard Help FileNet System Manager Dashboard Help Release 3.5.0 June 2005 FileNet is a registered trademark of FileNet Corporation. All other products and brand names are trademarks or registered trademarks of their

More information

A Multidatabase System as 4-Tiered Client-Server Distributed Heterogeneous Database System

A Multidatabase System as 4-Tiered Client-Server Distributed Heterogeneous Database System A Multidatabase System as 4-Tiered Client-Server Distributed Heterogeneous Database System Mohammad Ghulam Ali Academic Post Graduate Studies and Research Indian Institute of Technology, Kharagpur Kharagpur,

More information

B.Com(Computers) II Year DATABASE MANAGEMENT SYSTEM UNIT- V

B.Com(Computers) II Year DATABASE MANAGEMENT SYSTEM UNIT- V B.Com(Computers) II Year DATABASE MANAGEMENT SYSTEM UNIT- V 1 1) What is Distributed Database? A) A database that is distributed among a network of geographically separated locations. A distributed database

More information

Traffic Analyzer Based on Data Flow Patterns

Traffic Analyzer Based on Data Flow Patterns AUTOMATYKA 2011 Tom 15 Zeszyt 3 Artur Sierszeñ*, ukasz Sturgulewski* Traffic Analyzer Based on Data Flow Patterns 1. Introduction Nowadays, there are many systems of Network Intrusion Detection System

More information

Personalized e-learning a Goal Oriented Approach

Personalized e-learning a Goal Oriented Approach Proceedings of the 7th WSEAS International Conference on Distance Learning and Web Engineering, Beijing, China, September 15-17, 2007 304 Personalized e-learning a Goal Oriented Approach ZHIQI SHEN 1,

More information

Base One's Rich Client Architecture

Base One's Rich Client Architecture Base One's Rich Client Architecture Base One provides a unique approach for developing Internet-enabled applications, combining both efficiency and ease of programming through its "Rich Client" architecture.

More information

Using ModelSim, Matlab/Simulink and NS for Simulation of Distributed Systems

Using ModelSim, Matlab/Simulink and NS for Simulation of Distributed Systems Using ModelSim, Matlab/Simulink and NS for Simulation of Distributed Systems U. Hatnik, S. Altmann Fraunhofer Gesellschaft EAS/ SDA 2004 8. September 2004 Outline Motivation Requirements Object Oriented

More information

Web Services. Copyright 2011 Srdjan Komazec

Web Services. Copyright 2011 Srdjan Komazec Web Services Middleware Copyright 2011 Srdjan Komazec 1 Where are we? # Title 1 Distributed Information Systems 2 Middleware 3 Web Technologies 4 Web Services 5 Basic Web Service Technologies 6 Web 2.0

More information

NTP Software File Auditor for Windows Edition

NTP Software File Auditor for Windows Edition NTP Software File Auditor for Windows Edition An NTP Software Installation Guide Abstract This guide provides a short introduction to installation and initial configuration of NTP Software File Auditor

More information

Distributed Systems Lecture 1 1

Distributed Systems Lecture 1 1 Distributed Systems Lecture 1 1 Distributed Systems Lecturer: Therese Berg therese.berg@it.uu.se. Recommended text book: Distributed Systems Concepts and Design, Coulouris, Dollimore and Kindberg. Addison

More information

A Review on Cloud Data Storage in Virtual Perspective

A Review on Cloud Data Storage in Virtual Perspective A Review on Cloud Data Storage in Virtual Perspective B.Nagarajan #1, Dr.J.Suguna *2 # Ph.D., Research Scholar, Research and Development Centre, Bharathiar University, Coimbatore-621046, India. * Associate

More information

Grid Computing Approach for Dynamic Load Balancing

Grid Computing Approach for Dynamic Load Balancing International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-1 E-ISSN: 2347-2693 Grid Computing Approach for Dynamic Load Balancing Kapil B. Morey 1*, Sachin B. Jadhav

More information

ORACLE BUSINESS INTELLIGENCE WORKSHOP. Prerequisites for Oracle BI Workshop

ORACLE BUSINESS INTELLIGENCE WORKSHOP. Prerequisites for Oracle BI Workshop ORACLE BUSINESS INTELLIGENCE WORKSHOP Prerequisites for Oracle BI Workshop Introduction...2 Hardware Requirements...2 Minimum Hardware configuration:...2 Software Requirements...2 Virtual Machine: Runtime...2

More information

Introduction to WIPOScan Software

Introduction to WIPOScan Software Introduction to WIPOScan Software An overview of available WIPO technical assistance on digitization, such as WIPOScan and detailed modules for digitizing all kinds of industrial property data Gregory

More information

A platform independent approach for Mobile Agents to monitor Network Vulnerabilities

A platform independent approach for Mobile Agents to monitor Network Vulnerabilities A platform independent approach for Mobile Agents to monitor Network Vulnerabilities GHULAM ALI MALLAH, DR. ZUBAIR A. SHAIKH National University of Computer & Emerging Sciences Shah Latif Town, National

More information

Deploying a distributed data storage system on the UK National Grid Service using federated SRB

Deploying a distributed data storage system on the UK National Grid Service using federated SRB Deploying a distributed data storage system on the UK National Grid Service using federated SRB Manandhar A.S., Kleese K., Berrisford P., Brown G.D. CCLRC e-science Center Abstract As Grid enabled applications

More information

IUCLID 5 Guidance and support. Installation Guide Distributed Version. Linux - Apache Tomcat - PostgreSQL

IUCLID 5 Guidance and support. Installation Guide Distributed Version. Linux - Apache Tomcat - PostgreSQL IUCLID 5 Guidance and support Installation Guide Distributed Version Linux - Apache Tomcat - PostgreSQL June 2009 Legal Notice Neither the European Chemicals Agency nor any person acting on behalf of the

More information

Load balancing using Remote Method Invocation (JAVA RMI)

Load balancing using Remote Method Invocation (JAVA RMI) Load balancing using Remote Method Invocation (JAVA RMI) Ms. N. D. Rahatgaonkar 1, Prof. Mr. P. A. Tijare 2 1 Department of Computer Science & Engg and Information Technology Sipna s College of Engg &

More information

Engineering of a Clinical Decision Support Framework for the Point of Care Use

Engineering of a Clinical Decision Support Framework for the Point of Care Use Engineering of a Clinical Decision Support Framework for the Point of Care Use Szymon Wilk, PhD 1, Wojtek Michalowski, PhD 1, Dympna O Sullivan, PhD 1, Ken Farion, MD 2, Stan Matwin, PhD 1 1 University

More information

Enterprise Manager. Version 6.2. Installation Guide

Enterprise Manager. Version 6.2. Installation Guide Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1

More information

VisuSniff: A Tool For The Visualization Of Network Traffic

VisuSniff: A Tool For The Visualization Of Network Traffic VisuSniff: A Tool For The Visualization Of Network Traffic Rainer Oechsle University of Applied Sciences, Trier Postbox 1826 D-54208 Trier +49/651/8103-508 oechsle@informatik.fh-trier.de Oliver Gronz University

More information

Remote support for lab activities in educational institutions

Remote support for lab activities in educational institutions Remote support for lab activities in educational institutions Marco Mari 1, Agostino Poggi 1, Michele Tomaiuolo 1 1 Università di Parma, Dipartimento di Ingegneria dell'informazione 43100 Parma Italy {poggi,mari,tomamic}@ce.unipr.it,

More information

A distributed system is defined as

A distributed system is defined as A distributed system is defined as A collection of independent computers that appears to its users as a single coherent system CS550: Advanced Operating Systems 2 Resource sharing Openness Concurrency

More information

Introduction to CORBA. 1. Introduction 2. Distributed Systems: Notions 3. Middleware 4. CORBA Architecture

Introduction to CORBA. 1. Introduction 2. Distributed Systems: Notions 3. Middleware 4. CORBA Architecture Introduction to CORBA 1. Introduction 2. Distributed Systems: Notions 3. Middleware 4. CORBA Architecture 1. Introduction CORBA is defined by the OMG The OMG: -Founded in 1989 by eight companies as a non-profit

More information

Reflections about Mobile Agents and Software Engineering

Reflections about Mobile Agents and Software Engineering Reflections about Mobile gents and Software Engineering Gian Pietro Picco Dipartimento di Elettronica e Informazione Politecnico, Italy picco@elet.polimi.it http://www.elet.polimi.it/~picco Motivation

More information

Self-organized Multi-agent System for Service Management in the Next Generation Networks

Self-organized Multi-agent System for Service Management in the Next Generation Networks PROCEEDINGS OF THE WORKSHOP ON APPLICATIONS OF SOFTWARE AGENTS ISBN 978-86-7031-188-6, pp. 18-24, 2011 Self-organized Multi-agent System for Service Management in the Next Generation Networks Mario Kusek

More information

Outline. Mariposa: A wide-area distributed database. Outline. Motivation. Outline. (wrong) Assumptions in Distributed DBMS

Outline. Mariposa: A wide-area distributed database. Outline. Motivation. Outline. (wrong) Assumptions in Distributed DBMS Mariposa: A wide-area distributed database Presentation: Shahed 7. Experiment and Conclusion Discussion: Dutch 2 Motivation 1) Build a wide-area Distributed database system 2) Apply principles of economics

More information

Exploiting Multi-agent System Technology within an Autonomous Regional Active Network Management System

Exploiting Multi-agent System Technology within an Autonomous Regional Active Network Management System 1 Exploiting Multi-agent System Technology within an Autonomous Regional Active Network Management System Euan M. Davidson, Member, IEEE, Stephen D. J. McArthur, Senior Member, IEEE Abstract-- This paper

More information

Keywords Load balancing, Dispatcher, Distributed Cluster Server, Static Load balancing, Dynamic Load balancing.

Keywords Load balancing, Dispatcher, Distributed Cluster Server, Static Load balancing, Dynamic Load balancing. Volume 5, Issue 7, July 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Hybrid Algorithm

More information

Distributed Database Management Systems for Information Management and Access

Distributed Database Management Systems for Information Management and Access 464 Distributed Database Management Systems for Information Management and Access N Geetha Abstract Libraries play an important role in the academic world by providing access to world-class information

More information

Distributed Systems Architectures

Distributed Systems Architectures Software Engineering Distributed Systems Architectures Based on Software Engineering, 7 th Edition by Ian Sommerville Objectives To explain the advantages and disadvantages of different distributed systems

More information

Migrating the ASAS Database Administrator s Notes

Migrating the ASAS Database Administrator s Notes Administrator s Notes For ASAS 2.4 and Above 2 Overview........................................................................ 2 2.1 s........................................................................

More information

MAS 200 Supported Platform Matrix

MAS 200 Supported Platform Matrix The information in this document applies to MAS 200 Level 3.60 and higher. Best Software only supports the current MAS 200 level and one major level back. As of the Level 3.70 release, MAS 200 Levels 3.51

More information

Java Agent DEvelopment Framework (JADE)

Java Agent DEvelopment Framework (JADE) Java Agent DEvelopment Framework (JADE) Laboratory of Multiagent Systems LM Laboratorio di Sistemi Multiagente LM Elena Nardini elena.nardini@unibo.it Ingegneria Due Alma Mater Studiorum Università di

More information

Elastic Calculator : A Mobile Application for windows mobile using Mobile Cloud Services

Elastic Calculator : A Mobile Application for windows mobile using Mobile Cloud Services Elastic Calculator : A Mobile Application for windows mobile using Mobile Cloud Services K.Lakshmi Narayanan* & Nadesh R.K # School of Information Technology and Engineering, VIT University Vellore, India

More information

Constructing a Collaborative Multi-Agents System Tool for Real Time System Requirements

Constructing a Collaborative Multi-Agents System Tool for Real Time System Requirements www.ijcsi.org 134 Constructing a Collaborative Multi-Agents System Tool for Real Time System Requirements Asmaa Y. Hamo 1, Marwa A. Aljawaherry 2 1, 2 Software Engineering, Mosul University, Collage of

More information

Remote Desktop on Mobile

Remote Desktop on Mobile Remote Desktop on Mobile SonamGavhane RasikaPhanse Monica Sadafule B.W.Balkhande Abstract In This paper we will see how the remote Desktop with static IP can be accessed using Android based mobile phones,to

More information

CS 3530 Operating Systems. L02 OS Intro Part 1 Dr. Ken Hoganson

CS 3530 Operating Systems. L02 OS Intro Part 1 Dr. Ken Hoganson CS 3530 Operating Systems L02 OS Intro Part 1 Dr. Ken Hoganson Chapter 1 Basic Concepts of Operating Systems Computer Systems A computer system consists of two basic types of components: Hardware components,

More information

Dynamic Scheduling of Object Invocations in Distributed Object Oriented Real-Time Systems Jørgensen, Bo Nørregaard; Joosen, Wouter

Dynamic Scheduling of Object Invocations in Distributed Object Oriented Real-Time Systems Jørgensen, Bo Nørregaard; Joosen, Wouter Syddansk Universitet Dynamic Scheduling of Object Invocations in Distributed Object Oriented Real-Time Systems Jørgensen, Bo Nørregaard; Joosen, Wouter Published in: Lecture Notes in Computer Science Publication

More information

How To Manage A Network With Mobile Agents

How To Manage A Network With Mobile Agents A Framework for Network Management using Mobile Agents Manoj Kumar Kona and Cheng-Zhong Xu Department of Electrical and Computer Engineering Wayne State University, Detroit, MI 48202 {manoj, czxu}@ernie.eng.wayne.edu

More information

DISTRIBUTED AND PARALLELL DATABASE

DISTRIBUTED AND PARALLELL DATABASE DISTRIBUTED AND PARALLELL DATABASE SYSTEMS Tore Risch Uppsala Database Laboratory Department of Information Technology Uppsala University Sweden http://user.it.uu.se/~torer PAGE 1 What is a Distributed

More information

Client/Server and Distributed Computing

Client/Server and Distributed Computing Adapted from:operating Systems: Internals and Design Principles, 6/E William Stallings CS571 Fall 2010 Client/Server and Distributed Computing Dave Bremer Otago Polytechnic, N.Z. 2008, Prentice Hall Traditional

More information

Lexia Network Installation Instructions

Lexia Network Installation Instructions Lexia Network Installation Instructions For Lexia Early Reading 3.x, Primary Reading 1.x, Foundation Reading 1.x, Strategies for Older Students 4.x, Cross-Trainer 1.x and Quick Reading Test 2.x (NOT for

More information

Improving Performance and Reliability Using New Load Balancing Strategy with Large Public Cloud

Improving Performance and Reliability Using New Load Balancing Strategy with Large Public Cloud Improving Performance and Reliability Using New Load Balancing Strategy with Large Public Cloud P.Gayathri Atchuta*1, L.Prasanna Kumar*2, Amarendra Kothalanka*3 M.Tech Student*1, Associate Professor*2,

More information

A Study on the Application of Existing Load Balancing Algorithms for Large, Dynamic, Heterogeneous Distributed Systems

A Study on the Application of Existing Load Balancing Algorithms for Large, Dynamic, Heterogeneous Distributed Systems A Study on the Application of Existing Load Balancing Algorithms for Large, Dynamic, Heterogeneous Distributed Systems RUPAM MUKHOPADHYAY, DIBYAJYOTI GHOSH AND NANDINI MUKHERJEE Department of Computer

More information

Middleware Lou Somers

Middleware Lou Somers Middleware Lou Somers April 18, 2002 1 Contents Overview Definition, goals, requirements Four categories of middleware Transactional, message oriented, procedural, object Middleware examples XML-RPC, SOAP,

More information

SQL Server An Overview

SQL Server An Overview SQL Server An Overview SQL Server Microsoft SQL Server is designed to work effectively in a number of environments: As a two-tier or multi-tier client/server database system As a desktop database system

More information

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing

More information