Employment of mobile multiagent systems for attendance of transaction of distributed database
|
|
- Tabitha Patterson
- 8 years ago
- Views:
Transcription
1 Proceedings of the International Multiconference on ISSN Computer Science and Information Technology, pp PIPS Employment of mobile multiagent systems for attendance of transaction of distributed database Zofia Kruczkiewicz 1 1 The Institute of Computer Engineering, Control and Robotics, Wroclaw University of Technology, Wrocław, Poland zofia.kruczkiewicz@pwr.wroc.pl Abstract. It is aimed at the limitation of the network traffic which is generated during the realization of two-phase-commit protocol of distributed transactions in distributed database systems. This paper presents the way of the decrease of the number and the way of the diminution of the size of messages sent during distributed transactions as the manner of the limitation of the network traffic. Multiagent system is employed for attendance of confirmation of two-phase distributed transactions. The paper presents the manner of the limitation of the network traffic in multiagent systems as the use of mobile agents as resources managers of databases, static agents as coordinators of transactions and static agents as managers of transactions. These agents communicate via two-phasecommit protocols. The paper presents the performance eperiments enabling the comparison of two-phase-commit protocols, the protocol elaborated in the paper and the protocol described in the literature. 1 Introduction General applicable distributed computerized information systems store information in distributed heterogeneous databases. It is aimed at such efficient work of these systems, which generate the network traffic as small as possible. This system should have the high performance. Therefore mechanisms of the mobility and the intelligent behavior of employed software are used in these systems. The base of the maintenance of the indivisibility of realized distributed transactions of distributed heterogeneous databases, the immunity from states of the disconnection and movements of the part of systems, is the two-phase-commit protocol. It is described multiagent systems for attendance of confirmation of two-phase validation of distributed transactions in the paper. The paper presents the two-phase-commit protocol based on mobile agents, which is projected during the analyses of the MAS. This protocol includes the limited number and the least size of messages and it generates the smaller traffic than the protocol presented in the literature [13]. The concept and the implementation of activities and communication between agents play the basic role in the creation of multiagent systems (MASs). It results from the basic paradigm of MAS, which is the social character of a system i.e. the 71
2 72 Zofia Kruczkiewicz autonomy, the adaptation and interactions. The transmission of information in MASs is based on conversations [11], which include interactions and activities. These interactions and activities affect on the performance of the system and the network traffic. Performance engineering is engaged on the problems of the performance of software, during all phases of its creation. It is possible to value the performance of the system and the size of sent information in the network as time parameters of the system. Therefore it is possible to perform the choice of arbitrated solutions due to the time parameters of the model of MAS, which are matched to degree of the development of the software [1, 2]. It puts the stress on limitation of the size and the number of messages of protocols of created MASs. The mobility of software is one of the manners of this limitation, which relies on transmission of mobile agent as autonomous unit of software [6]. The mobile agent is relocated in the network of type of WAN or LAN, it decides about its activities, it eecutes services of the sending system. It is differed following patterns of interaction protocols: the static protocol (behaviors of agents and interactions are not changed) and the mobile protocol (behaviors of agents and interactions are changed). The choice of the mobility results from the type of an application and it leads to the minimization of the network traffic, the cost of CPU, generalizations of services, the autonomy of components of software, the higher immunity from errors of components moved in the network than from errors of components of the client server architecture, the elasticity of management of data and the encapsulation of the protocol. Several defined patterns of communications based on the mobility are compared in work [6]: client-server (CS, Client-Server), remote start-up of code - (REV, Remote Evaluation), transmission of code (COD, Code Demand) and mobile agent (MA, Mobile Agent). The work [4] presents methods of the improvement of the performance and the network traffic of MAS ACORN, which rely on the dynamic grouping of mobile agents in cafes due to their information and the introduction of the idea of the agent architecture as the Thick/Thin agents. The Thin agent is the mobile agent, which collects information during movement in the network and sends this information to the static agent of the type of the Thick agent. The works [3], [8] compare the performance of patterns of interaction protocols of CS and MA. It defines the sequence and parallel architecture for these patterns [8] and researches their performance in the respect of the performance of Voyager, Aglets and Concordia. The work [11] compares static and mobile MASs, which are equivalent in the respect of realized tasks. This paper describes the research of the performance of the serialization of agents as the mechanism of the mobility. The intelligent and efficient behavior of MAS enables limitation of the network traffic generated during distributed transactions of heterogeneous databases in the distributed environment. The review of systems of attendance of mobile transaction is presented in the work [12]. These systems are Clustering, Two-Tier Replication, Pro-motion, Reporting, Semi-based, Prewrite, Kangaroo Transaction, Multidatabase Transaction Processing Manager. The work [12] performs the comparison of operation models, ownership ACID, cohesions, transparency, stability, reactions on disconnect and mobility of elements of the system and it serves the proposal of the system for the attendance of the mobile transaction (MTS, Mobile Transaction Service). The work [13] presents the role of agents in improvement of the safety of distributed transactions of the system based on the technology CORBA. The work
3 Employment of mobile multiagent systems for attendance of transaction of distributed database 73 [10] describes the architecture of Distributed Database Management Systems (DBMSs), which employs the tool named CaseLP in specifying elements and testing of behavior of the system. The work [9] presents pro-active MAS, which is based on static and mobile agents which support distributed transactions of the system. These mobile agents improve the performance in comparison with classic solutions applying mobile agents. The system is realized as the platform based on IBM Aglets and the virtual machine of java (JVM) in the environment of Aglets Software Development Kit (ASDK). The second chapter of work introduces MAS JADE. It presents protocols of validation of two-phase transactions in the fourth chapter. The fifth chapter serves the results of performance eperiments concerning on comparison of two protocols i.e. the elaborated two-phase-commit protocol and the protocol presented in the work [13]. Work is ended with conclusions. 2 System MAS JADE It chooses Java MAS JADE (Java Agent Development Framework) system [7] based on FIPA specification (The Foundation for Intelligent Agents) [5] for the implementation of two-phase-commit protocols. JADE includes packages for the creation of agents and the environment of their operations as the platform of agents (AP, Agent Platform) (fig. 1). AP platform consists of following agent components: Agent Management System (AMS), which fulfils the control over the access and the utilization of agent platform; Directory Facilitator (DF), which catalogues services of applications; Message Transport System (MTS), which controls the sent messages; Agent, which represents applications. AP can be divided onto several machines as containers (fig. 1). Each container has the virtual machines of Java (JVM) and includes one or many interacting agents. The main container includes AMS and DF agents and the RMI register (Remote Method Invocation) which controls the mobility of messages and the optional mobility of agents of one AP. Containers are connected with the main container and they build the environment of operations of set of agents. According to FIPA specification, DF and AMS communicate by use of ACL (Agent Content Language) language, Fipa-Agent-Management ontology and Fipa-Request interaction protocol.
4 74 Zofia Kruczkiewicz Fig. 1. Distributed Agent platform and JADE containers [7] 3. Two-phase-commit protocols based on static and mobile agents Communication between agents is defined by the use of the interaction protocol (IP) [5]. System JADE offers the set of patterns of interaction protocols based on FIPA specification. These protocols are dedicated to different typical applications. JADE supports implementation of user-defined protocols. Patterns of protocols are placed in FIPA Interaction Protocol Library Maintenance [5]. It introduces new diagrams to design of interactions between agents, which are called protocol diagrams (PD, Protocol Diagrams). PD is based on UML sequences diagrams. It epresses new elements of PD diagrams in meta-uml language, named AUML (Agent UML) [5]. It presents IP protocols of eemplary applications at diagrams of fig.2-3. The design system consists of following elements: environments of MAS JADE, the static agent as Transaction Manager, which administers transactions, static agents as and, which gather information of eecution states of the fragments of distributed transaction and static or mobile agents as,, Manager_3 and Manager_4, which oversee eecution of fragments of distributed transaction realized in allocated resources. Agents act according to concept of Thick /Thin agent [4], i.e.: the static thick agent as Manager owns the full knowledge of its environment, it is able to acquire, to process and to analyze information therefore it has own code of a big size the mobile thin agent as Manager owns the limited knowledge of its environment and the limited range of operations, but it is able to migrate in network and it has own code of a small size. The comparison of interaction protocols bases on the assumptions that they enable realization of the same task on the same data placed on same hosts and this protocol is the best in the point of generated network traffic, which allows to eecuting task of the smallest joint size of sent messages.
5 Employment of mobile multiagent systems for attendance of transaction of distributed database 75 The IP1 protocol as two-phase-commit protocol (fig. 2) is used in the MASs presented in the work [13]. The thick agent as Manager Transaction sends a begin_transaction messages about beginning of transaction to the set of agents, which includes at least two agents i.e. and. Agents as and send messages about beginning of transaction (request_1, request_2, request_3, request_4) to static thick agents as,, Manager_3 and Manager_4. Then agents as and send can-commit message about query of the fragment of the distributed transaction to agents as,, Manager_3 and Manager_4. Each agent as Manager confirms by sending message about the correct result of the part of the transaction or failure message about the failure to the agent as Manager. After receiving all answers, agents as and send message to the agent as Transaction Manager if agents as Manager confirm all correct parts of transaction or failure message, if at least the one agent as Manager reports the failure. If the agent as Transaction Manager receives messages from all agents as Manager, it sends messages to them about the commit of the distributed transaction, in the opposite case if it receives at least one failure message, it sends messages to all agents as Manager about the come-back of the state of resources before the beginning of the transaction. In the first case agents as Managers send messages to all agents as Manager. Net agents as Manager confirm by sending have-commit messages to agents as s Manager which send have-commit messages to the agent as Transaction Manager. In the second case agents as Manager send messages to agents as Manager. Agents as Resource Manager confirm the failure of the transaction by sending have- messages to agents as Manager. Net agents as s Manager send have- messages to the agent as Transaction Manager about confirmation of the failure of the transaction. The protocol IP2 at the figure 3 differs from protocol IP1 at the figure 2 where two mobile thin agents are employed in overseeing resources of transaction. Instead of request and can-commit messages it is sent request-to-move messages with information of network migrations which are necessary for the eecution of fragments of the transaction. Protocol IP2 does not include four can-commit messages, because mobile agents as and must not receive them however the network traffic appears when the mobile agents as Managers migrate through network and eecute all fragments of the transaction. The time of the realization of request to move (request_1, request_2) message consists of the time of the receiving this message by mobile agent as and two migrations to databases placed on computers of net addresses given by parameters request_1 and request _2. The agent as sends ok commit or failure message after realization of fragments of transactions in two databases to the agent as which sends ok commit or failure message to the agent as Transaction Manager. During the second phase of transaction the agent as
6 76 Zofia Kruczkiewicz receives do_commit or message and it sends one of these messages to the agent as. It migrates through two databases and commits or cancels the fragments of the transaction. Then it sends have commit or have message to the agent as. The agent as sends have commit or have message to the agent as Transaction Manager. The same conditions concern the agent as. The smaller network traffic is generated when the eecuting of the fragment of transaction fails during the first migration. The agent as and finishes the eecuting of the transaction without another migration and sends failure message to own agent as Manager. During the second phase of the transaction it migrates to the first database and cancels the state of its resources. It decreases the number of migrations of agents from eight to four. In general, the protocol with mobile agents includes n agents as Managers and each agent as Manager coordinates p agents as Manager and each agent as Manager migrates through q databases. The number q is greater than 1. The epression p*q is equal to the number of agents as Manager of IP1 protocol. It is taken the assumption that the size of all messages and the size of code of the each mobile agent are equal to a. Therefore the IP1 protocol includes the number of messages which is equal to the value of the following epression: (4*n + 5*n*p*q)* a. The IP2 protocol includes the number of messages which is equal to the following epression: (4*n + 4*n*p+2*n*p*q)* a. The difference between these epressions is equals to value: n*p*(3*q 4)*a. It means that the IP1 protocol has the greater joint size of messages than IP2 protocol. If the transaction of IP2 protocols fails during the first migration of the each mobile agent, its epression is equal to the following one: (4*n + 6*n*p)* a. Now the difference between two epressions is equal to n*p*(5*q-6) and it is greater than the first difference. The IP2 protocol can generate the smaller network traffic than the IP1 one. 4 Performance eperiments It constructs equivalent static and mobile MASs due to the number of databases. MASs are based on IP1 and IP2 interaction protocols (fig. 2, fig. 3). Researching of the time of the answer is purpose of the eperiment in comparison with the generated network traffic of the static and the mobile MASs i.e. the time that epires from the moment of the beginning of the task of searching out to the time of receiving the result of searching. The system based on thick agents of IP1 interaction protocol is presented on fig. 4 and system based on mobility thin agents based of IP2 interaction
7 Employment of mobile multiagent systems for attendance of transaction of distributed database 77 Transaction Manager begin-transaction (task) begin-transaction (task) request_1 request_2 can-commit can-commit Manager_3 Manager_4 request_3 request_4 can-commit can-commit Phase 1 Phase 2 Meta-UML symbols have been used during sending messages - - decision type: one from many - parallel type: AND Fig. 2. IP1 protocol of validation of two phase distributed transaction of MAS based on static agents [13]
8 78 Zofia Kruczkiewicz Transaction Manager begin-transaction (task) begin-transaction (task) request-to-move(request_1, request_2) request-to-move(request_3, request_4) Phase 1 Phase 2 Meta-UML symbols have been used during sending messages - - decision type: one from many - parallel type: AND Fig. 3. IP2 protocol of validation of two phase distributed transaction of MAS based on static and mobile agents protocol is presented on fig. 5. Technical data of MASs are presented in tab.1. It carries research on computers of the local network acting on 100BASE-TX. The agent is independent thread of virtual java machine (JVM) in system acting on JADE i.e. the independent thread of operating system, which works under control of JADE. Each agent can eecute several independent tasks simultaneously. In order to build detached threads for the each agent, it introduces the concept of the behavior. This solution is efficient, because the transfer of the steering from the thread to the thread is hundred times slower than the calling method each agent behavior is called
9 Employment of mobile multiagent systems for attendance of transaction of distributed database 79 by the agent method [7]. Communication and mobility of agents are based on RMI of JAVA, which employs the migration of the code and the state of agents. Host2, Container1 Host1, MainContainer Transaction Manager Host3, Container2 Request of data 10 MB Result Request of data 10 MB Result 100 MB LAN 128 K 10MB 10MB 128 K Host4, Container3 MS SQL Server Host5, Container4 MYSQL Host6, Container4 Manager_3 MS SQL Server Host7, Container6 Manager_4 MYSQL Fig. 4. Analysis of communication infrastructure system in the following environment: seven hosts, static solution based on IP1 Host2, Container1 Agent_1 Agent_1 Host1, MainContainer Transaction Manager Host3, Container2 Agent_2 Agent_2 Request move for data 10 MB Result 100 MB LAN Request move for data 10 MB Result 128 K 10MB 10MB 128 K Host4, Container3 MS SQL Server Host5, Container5 MYSQL Host6, Container4 MS SQL Server Host7, Container6 MYSQL Fig. 5. Interaction infrastructure of MAS in the following environment: seven hosts, system IP2 Evaluated systems are researched without taking into consideration influence of the graphic interface of user. Agents as Manager eecute task of searching out on servers of databases systems MySQL and MSQL Server 2000, with database of bookstore. Each of table stores 1000 records of data of clients of bookstores. Static and mobile agents as Manager eecute the SQL query: SELECT * FROM klienci WHERE nazwisko LIKE 'X%'. Realized query is not a transaction but this solution enables to evaluate the influence of IP1 and IP2 protocols on performance of two-phase distributed transactions. The time of each searching is gauged by the use of the java class method i.e. System.currentTimeMillis.
10 80 Zofia Kruczkiewicz Tab. 1. Technical test machines data Hosts 1, 2 Hosts 3, 4, 5, 7 OS MS Windows 2000 MS Windows XP CPU Celeron 1GHz Athlon XP RAM 120 MB 256 MB JVM Sun SDK 1.5 Sun JRE 1.5 JADE Tab. 2. Time [ms] of searching of MASs after 1000 tests on 7 computers Time [ms] MAS based on IP1MAS based on IP2 Average time Ma time Min time In the static solution each query is repeated for 250 times by each Manager. In the mobile solution each Manager migrates between two hosts for 250 times per the one host. The operation of the static agent is equivalent to the one migration of the mobile agent. It presents results of research in table 2.The group of mobile agents is faster than the group of static agents. This improvement of the performance of IP2 protocols results from the limited number of mobile agents and the smaller size of its code than the size of message sending to static agents. 5 Conclusions After the employment of the proper pattern of interaction protocol based on mobility it is possible to ascertain the mobility solution on the base of carried performance tests of MASs. This solution can eceed stationary solution in respect of: higher performance - MAS based on IP2 interaction protocol with the mobility acts faster than the equivalent static solutions based on IP1 interaction protocol small capacity of software the capacity of the mobile test configuration of MAS based on IP2 protocol is less than for the static solution based on IP1 protocol small network traffic - it is possible to employ the simplest interaction protocol at the configuration of the agent according to the concept of Thick /Thin agent, where the thin agent is mobile.
11 Employment of mobile multiagent systems for attendance of transaction of distributed database 81 References 1 Babczyński T., Kruczkiewicz Z., Magott J.: Performance Evaluation of Multiagent Information Retrieval System, Foundations of Computing and Decision Sciences, Vol. 29, No. 1-2 (2004) Babczyński T., Kruczkiewicz Z., Magott J.: Performance Evaluation of Multiagent Personalized Information System, In: Proc. of the 7th Int. Conf. on Artificial Intelligence and Soft Computing 2004, Lecture Notes in Computer Science-LNAI, Springer-Verlag (2004) Buse D. P., Sun P., Wu Q. H., Fitch J.: Mobile agents for industrial information management, monitoring and control, In: Proc.of International Conference on Intelligent Agents, Web Technology and Internet Commerce-IAWTIC' , February 2003, Vienna-Austria. 4 Carter J., Ghorbani A. A., Marsh S.: Just-in time information architectures in multiagent systems, In: Proc.of the First Int. Joint Conference on Autonomous Agents and Multiagent Systems: part , Bologna, Italy. 5 FIPA, 6 Fugetta A., Picco G. P., Vigna G.: Understanding Code Mobility, IEEE Transaction On Software Engineering. Vol. 24, No.5, JADE, 8 Jha R., Iyer S.: Performance evaluation of mobile agents for e-commerce applications, In: Proc. of International Conference on High Performance Computing, Hyderabad, India, Dec Kelash H. M., Faheem H. M., Amoon M.: A Multiagent System for Distributed Systems Management, Transactions on engineering, computing and technology V11 February 2006 ISSN Mascardi V., Merelli E.: Agent-Oriented and Constraint Technologies for Distributed Transaction Management, DISI Universita di Genova via Dodecaneso, Genova (Italy) e_mail: mascardi@disi.unige.it, Istituto di Informatica - Universita di Ancona via Brecce Bianche , Ancona (Italy) merelli@inform.unian.it 11 O Malley S. A., Self A. L., Deloach S. A.: Comparing performance of static versus mobile multiagent systems, In: Proc. of National Aerospace and Electronics Conference (NAECON) Dayton OH, October P. Serrano-Alvarado, Roncancio C., Adiba M.: Mobile Transaction Supports for DBMS,. An Overview, LSR-IMAGLaboratory BP72, StMartin d'heres. 13 Vogler H., Kunkelmann Th., Moschgath Marie-Louise: An Approach for Mobile Agent Security and Fault Tolerance using Distributed Transactions, Hartmut Darmstadt University of Technology, Information Technology Transfer Office Aleanderstr. 10, D Darmstadt, Germany {vogler, kunkel, malu}@ito.th darmstadt.de
An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents
An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents M. Anber and O. Badawy Department of Computer Engineering, Arab Academy for Science and Technology
More informationADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS
ANNALS OF THE FACULTY OF ENGINEERING HUNEDOARA 2006, Tome IV, Fascicole 1, (ISSN 1584 2665) FACULTY OF ENGINEERING HUNEDOARA, 5, REVOLUTIEI, 331128, HUNEDOARA ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS
More informationMobile Software Agents: an Overview
Mobile Software Agents: an Overview Authors : From: Vu Anh Pham and Ahmed Karmouch University of Ottawa, Ontario Presented by: Luba Sakharuk Agenda for the Overview of Mobile Agents Abstract The Mobile
More informationTier Architectures. Kathleen Durant CS 3200
Tier Architectures Kathleen Durant CS 3200 1 Supporting Architectures for DBMS Over the years there have been many different hardware configurations to support database systems Some are outdated others
More informationFIPA agent based network distributed control system
FIPA agent based network distributed control system V.Gyurjyan, D. Abbott, G. Heyes, E. Jastrzembski, C. Timmer, E. Wolin TJNAF, Newport News, VA 23606, USA A control system with the capabilities to combine
More informationCloud Computing for Agent-based Traffic Management Systems
Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion
More informationCS550. Distributed Operating Systems (Advanced Operating Systems) Instructor: Xian-He Sun
CS550 Distributed Operating Systems (Advanced Operating Systems) Instructor: Xian-He Sun Email: sun@iit.edu, Phone: (312) 567-5260 Office hours: 2:10pm-3:10pm Tuesday, 3:30pm-4:30pm Thursday at SB229C,
More informationVirtual machine interface. Operating system. Physical machine interface
Software Concepts User applications Operating system Hardware Virtual machine interface Physical machine interface Operating system: Interface between users and hardware Implements a virtual machine that
More informationThe Efficiency Analysis of the Object Oriented Realization of the Client-Server Systems Based on the CORBA Standard 1
S C H E D A E I N F O R M A T I C A E VOLUME 20 2011 The Efficiency Analysis of the Object Oriented Realization of the Client-Server Systems Based on the CORBA Standard 1 Zdzis law Onderka AGH University
More informationA FRAMEWORK FOR MANAGING RUNTIME ENVIRONMENT OF JAVA APPLICATIONS
A FRAMEWORK FOR MANAGING RUNTIME ENVIRONMENT OF JAVA APPLICATIONS Abstract T.VENGATTARAMAN * Department of Computer Science, Pondicherry University, Puducherry, India. A.RAMALINGAM Department of MCA, Sri
More informationVII. Database System Architecture
VII. Database System Lecture Topics Monolithic systems Client/Server systems Parallel database servers Multidatabase systems CS338 1 Monolithic System DBMS File System Each component presents a well-defined
More informationConcepts of Database Management Seventh Edition. Chapter 9 Database Management Approaches
Concepts of Database Management Seventh Edition Chapter 9 Database Management Approaches Objectives Describe distributed database management systems (DDBMSs) Discuss client/server systems Examine the ways
More informationAGENT TECHNOLOGY ASA SOLUTION FOR NETWORK-ENABLED GIS
AGENT TECHNOLOGY ASA SOLUTION FOR NETWORK-ENABLED Saeid M. Kalantari a, Ali A. Alesheikh b a Graduate student of master, Dept. of Eng. sm_kalantary@yahoo.com b Assistant Professor, Dept. of Eng. alesheikh@kntu.ac.ir
More informationHybrid Approach of Client-Server Model and Mobile Agent Technology to Drive an E-Commerce Application
Hybrid Approach of Client-Server Model and Mobile Agent Technology to Drive an E-Commerce Application Ajab Maheshwari PG Scholar, IT Dept, IET-DAVV, Indore (M.P.), India. Dr. Pratosh Bansal Associate Professor,
More informationMulti-Agent Model for Automation of Business Process Management System Based on Service Oriented Architecture
Multi-Agent Model for Automation of Business Process Management System Based on Service Oriented Architecture Soe Winn, May Thwe Oo Abstract Business process automation is an important task in an enterprise
More informationJADE: Java Agent Development Framework What is it? How can I use it?
JADE: Java Agent Development Framework What is it? How can I use it? Based on Online documentation of Jade http://jade.tilab.com/ 1 Overview Agent Communication Language Jade Features The agent Platform
More informationA STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS
A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS Tarag Fahad, Sufian Yousef & Caroline Strange School of Design and Communication Systems, Anglia Polytechnic University Victoria
More information1. PRODUCT OVERVIEW... 3 2. PRODUCT COMPONENTS... 3
Contents 1. PRODUCT OVERVIEW... 3 2. PRODUCT COMPONENTS... 3 2.1. SERVER-BASED COMPONENTS:... 3 2.1.1. Interception Server... 3 2.1.2. Database server... 3 2.1.3. Data processing server... 3 2.1.3.1. Search
More informationMobile Code for Distributed Applications/Systems
Mobile Code for Distributed Applications/Systems Koo Lee Chun School of Computing University Utara Malaysia, Kedah, Malaysia leechunkoo@yahoo.com Abstract Traditional technologies exhibited many limitation
More informationNCP Secure Enterprise Management Next Generation Network Access Technology
Data Sheet NCP Secure Enterprise Management Next Generation Network Access Technology General description NCP Secure Enterprise Management is the central component of the NCP Next Generation Network Access
More informationJOURNAL OF OBJECT TECHNOLOGY
JOURNAL OF OBJECT TECHNOLOGY Online at http://www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2008 Vol. 7, No. 8, Novmeber - December 2008 Extension of Object-Oriented Software
More informationThe Advantages of Using Mobile Agents in Software for Telecommunications
The Advantages of Using Mobile Agents in Software for Telecommunications Luis Moura Silva Leonor Almeida University of Coimbra SIEMENS S.A. Polo II, Dep. Eng. Informatica Rua Irmãos Siemens Nº 1 3030 Coimbra,
More informationData Sheet. NCP Secure Enterprise Management. General description. Highlights
Data Sheet NCP Secure Enterprise Management General description NCP Secure Enterprise Management is the central component of the NCP Next Generation Network Access technology with integrated RADIUS server
More informationA Multi-Agent Approach to a Distributed Schedule Management System
UDC 001.81: 681.3 A Multi-Agent Approach to a Distributed Schedule Management System VYuji Wada VMasatoshi Shiouchi VYuji Takada (Manuscript received June 11,1997) More and more people are engaging in
More informationA Satellite Network Management Architecture based on Mobile Agents and SNMP
2012 4th International Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Singapore A Satellite Network Management Architecture based on Mobile Agents and SNMP Jianli
More informationData Management in an International Data Grid Project. Timur Chabuk 04/09/2007
Data Management in an International Data Grid Project Timur Chabuk 04/09/2007 Intro LHC opened in 2005 several Petabytes of data per year data created at CERN distributed to Regional Centers all over the
More informationScalability and Performance of JADE Message Transport System
E.Cortese Telecom Italia LAB Centro Direzionale isola F7 8143 Naples Italy +39819718364 Elisabetta.Cortese@TILAB.com Scalability and Performance of JADE Message Transport System F.Quarta Telecom Italia
More informationWEBAPP PATTERN FOR APACHE TOMCAT - USER GUIDE
WEBAPP PATTERN FOR APACHE TOMCAT - USER GUIDE Contents 1. Pattern Overview... 3 Features 3 Getting started with the Web Application Pattern... 3 Accepting the Web Application Pattern license agreement...
More informationINTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)
More informationMS SQL Server DBA Training Course. Table of Contents
Table of Contents Overview... 4 About DBA University, Inc.... 4 Malathy Mani Microsoft Certified Solutions Expert (MCSA)... 5 Pricing and Registration... 5 Course Duration and Timings... 5 Sunday, Monday,
More informationSystem types. Distributed systems
System types 1 Personal systems that are designed to run on a personal computer or workstation Distributed systems where the system software runs on a loosely integrated group of cooperating processors
More informationPerformance analysis and comparison of virtualization protocols, RDP and PCoIP
Performance analysis and comparison of virtualization protocols, RDP and PCoIP Jiri Kouril, Petra Lambertova Department of Telecommunications Brno University of Technology Ustav telekomunikaci, Purkynova
More informationA Hybrid approach to Network Performance Monitoring based on Mobile Agents and CORBA
A Hybrid approach to Network Performance Monitoring based on Mobile Agents and CORBA Christos Bohoris, George Pavlou, Antonio Liotta Centre for Communication Systems Research, School of Electronics, Computing
More informationICS 434 Advanced Database Systems
ICS 434 Advanced Database Systems Dr. Abdallah Al-Sukairi sukairi@kfupm.edu.sa Second Semester 2003-2004 (032) King Fahd University of Petroleum & Minerals Information & Computer Science Department Outline
More informationDesktop Virtualization Technologies and Implementation
ISSN : 2250-3021 Desktop Virtualization Technologies and Implementation Pranit Patil 1, Shakti Shekar 2 1 ( Mumbai, India) 2 (Mumbai, India) ABSTRACT Desktop virtualization is new desktop delivery method
More informationJava Secure Application Manager
Java Secure Application Manager How-to Introduction:...1 Overview:...1 Operation:...1 Example configuration:...2 JSAM Standard application support:...6 a) Citrix Web Interface for MetaFrame (NFuse Classic)...6
More informationA Scheme for Implementing Load Balancing of Web Server
Journal of Information & Computational Science 7: 3 (2010) 759 765 Available at http://www.joics.com A Scheme for Implementing Load Balancing of Web Server Jianwu Wu School of Politics and Law and Public
More information4 Networking Generators
4 Networking Generators Topics in this chapter: Overview Configuring a file server Establishing a network environment Network operations Controlling a generator remotely Upgrading generators over a network
More informationProceedings of the 9th WSEAS International Conference on TELECOMMUNICATIONS and INFORMATICS
Intelligent Agent based Hotel Search & Booking System Courtney McTavish Mona Institute of Applied Science, University of West Indies, Kingston, Jamaica & Suresh Sankaranarayanan Lecturer & Leader Intelligent
More informationChapter 1 - Web Server Management and Cluster Topology
Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management
More informationXTM Web 2.0 Enterprise Architecture Hardware Implementation Guidelines. A.Zydroń 18 April 2009. Page 1 of 12
XTM Web 2.0 Enterprise Architecture Hardware Implementation Guidelines A.Zydroń 18 April 2009 Page 1 of 12 1. Introduction...3 2. XTM Database...4 3. JVM and Tomcat considerations...5 4. XTM Engine...5
More informationCloud Computing and Software Agents: Towards Cloud Intelligent Services
Cloud Computing and Software Agents: Towards Cloud Intelligent Services Domenico Talia ICAR-CNR & University of Calabria Rende, Italy talia@deis.unical.it Abstract Cloud computing systems provide large-scale
More informationIntegration and Coordination in in both Mediator-Based and Peer-to-Peer Systems
Dottorato di Ricerca in Ingegneria dell Informazione e sua applicazione nell Industria e nei Servizi Integration and Coordination in in both Mediator-Based and Peer-to-Peer Systems presenter: (pense@inform.unian.it)
More informationPlanning the Installation and Installing SQL Server
Chapter 2 Planning the Installation and Installing SQL Server In This Chapter c SQL Server Editions c Planning Phase c Installing SQL Server 22 Microsoft SQL Server 2012: A Beginner s Guide This chapter
More informationStudio 5.0 User s Guide
Studio 5.0 User s Guide wls-ug-administrator-20060728-05 Revised 8/8/06 ii Copyright 2006 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,
More informationImplementing Java Distributed Objects with JDBC
Implementing Java Distributed Objects with JDBC Pritisha 1, Aashima Arya 2 1,2 Department of Computer Science Bhagwan Mahaveer institute of engineering & technology (BMIET), Deenbandhu Chhotu Ram University
More informationDistributed Database for Environmental Data Integration
Distributed Database for Environmental Data Integration A. Amato', V. Di Lecce2, and V. Piuri 3 II Engineering Faculty of Politecnico di Bari - Italy 2 DIASS, Politecnico di Bari, Italy 3Dept Information
More informationSome Aspects of the Quality of Service Support Used in Multi Agent Systems on Middleware- Based Distributed Messaging
Some Aspects of the Quality of Service Support Used in Multi Agent Systems on Middleware- Based Distributed Messaging Jose-Luis Poza-Luján, Raúl Simarro-Fernández, Juan-Luis Posadas-Yagüe and José-Enrique
More informationAgent Languages. Overview. Requirements. Java. Tcl/Tk. Telescript. Evaluation. Artificial Intelligence Intelligent Agents
Agent Languages Requirements Overview Java Tcl/Tk Telescript Evaluation Franz J. Kurfess, Cal Poly SLO 211 Requirements for agent Languages distributed programming large-scale (tens of thousands of computers)
More informationIsmail Khalil Summer Semester 2009
Cooperative Systems - VO Intelligent Agents Ismail Khalil Summer Semester 2009 Course Unit 10 Mobile Agents What is a mobile agent? A software agent ( so far) computer program autonomous behaviour represent
More informationChapter 2: Processes, Threads, and Agents
Process Management A distributed system is a collection of cooperating processes. Applications, services Middleware Chapter 2: Processes, Threads, and Agents OS: kernel, libraries & servers OS1 Processes,
More informationA Multi-paradigm Approach for Mobile Agents Development
A Multi-paradigm Approach for Mobile Agents Development Edgardo A. Belloni 1 Abstract Mobile agent systems have received important attention in the last years as a new programming paradigm for widely distributed
More informationFileNet System Manager Dashboard Help
FileNet System Manager Dashboard Help Release 3.5.0 June 2005 FileNet is a registered trademark of FileNet Corporation. All other products and brand names are trademarks or registered trademarks of their
More informationA Multidatabase System as 4-Tiered Client-Server Distributed Heterogeneous Database System
A Multidatabase System as 4-Tiered Client-Server Distributed Heterogeneous Database System Mohammad Ghulam Ali Academic Post Graduate Studies and Research Indian Institute of Technology, Kharagpur Kharagpur,
More informationB.Com(Computers) II Year DATABASE MANAGEMENT SYSTEM UNIT- V
B.Com(Computers) II Year DATABASE MANAGEMENT SYSTEM UNIT- V 1 1) What is Distributed Database? A) A database that is distributed among a network of geographically separated locations. A distributed database
More informationTraffic Analyzer Based on Data Flow Patterns
AUTOMATYKA 2011 Tom 15 Zeszyt 3 Artur Sierszeñ*, ukasz Sturgulewski* Traffic Analyzer Based on Data Flow Patterns 1. Introduction Nowadays, there are many systems of Network Intrusion Detection System
More informationPersonalized e-learning a Goal Oriented Approach
Proceedings of the 7th WSEAS International Conference on Distance Learning and Web Engineering, Beijing, China, September 15-17, 2007 304 Personalized e-learning a Goal Oriented Approach ZHIQI SHEN 1,
More informationBase One's Rich Client Architecture
Base One's Rich Client Architecture Base One provides a unique approach for developing Internet-enabled applications, combining both efficiency and ease of programming through its "Rich Client" architecture.
More informationUsing ModelSim, Matlab/Simulink and NS for Simulation of Distributed Systems
Using ModelSim, Matlab/Simulink and NS for Simulation of Distributed Systems U. Hatnik, S. Altmann Fraunhofer Gesellschaft EAS/ SDA 2004 8. September 2004 Outline Motivation Requirements Object Oriented
More informationWeb Services. Copyright 2011 Srdjan Komazec
Web Services Middleware Copyright 2011 Srdjan Komazec 1 Where are we? # Title 1 Distributed Information Systems 2 Middleware 3 Web Technologies 4 Web Services 5 Basic Web Service Technologies 6 Web 2.0
More informationNTP Software File Auditor for Windows Edition
NTP Software File Auditor for Windows Edition An NTP Software Installation Guide Abstract This guide provides a short introduction to installation and initial configuration of NTP Software File Auditor
More informationDistributed Systems Lecture 1 1
Distributed Systems Lecture 1 1 Distributed Systems Lecturer: Therese Berg therese.berg@it.uu.se. Recommended text book: Distributed Systems Concepts and Design, Coulouris, Dollimore and Kindberg. Addison
More informationA Review on Cloud Data Storage in Virtual Perspective
A Review on Cloud Data Storage in Virtual Perspective B.Nagarajan #1, Dr.J.Suguna *2 # Ph.D., Research Scholar, Research and Development Centre, Bharathiar University, Coimbatore-621046, India. * Associate
More informationGrid Computing Approach for Dynamic Load Balancing
International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-1 E-ISSN: 2347-2693 Grid Computing Approach for Dynamic Load Balancing Kapil B. Morey 1*, Sachin B. Jadhav
More informationORACLE BUSINESS INTELLIGENCE WORKSHOP. Prerequisites for Oracle BI Workshop
ORACLE BUSINESS INTELLIGENCE WORKSHOP Prerequisites for Oracle BI Workshop Introduction...2 Hardware Requirements...2 Minimum Hardware configuration:...2 Software Requirements...2 Virtual Machine: Runtime...2
More informationIntroduction to WIPOScan Software
Introduction to WIPOScan Software An overview of available WIPO technical assistance on digitization, such as WIPOScan and detailed modules for digitizing all kinds of industrial property data Gregory
More informationA platform independent approach for Mobile Agents to monitor Network Vulnerabilities
A platform independent approach for Mobile Agents to monitor Network Vulnerabilities GHULAM ALI MALLAH, DR. ZUBAIR A. SHAIKH National University of Computer & Emerging Sciences Shah Latif Town, National
More informationDeploying a distributed data storage system on the UK National Grid Service using federated SRB
Deploying a distributed data storage system on the UK National Grid Service using federated SRB Manandhar A.S., Kleese K., Berrisford P., Brown G.D. CCLRC e-science Center Abstract As Grid enabled applications
More informationIUCLID 5 Guidance and support. Installation Guide Distributed Version. Linux - Apache Tomcat - PostgreSQL
IUCLID 5 Guidance and support Installation Guide Distributed Version Linux - Apache Tomcat - PostgreSQL June 2009 Legal Notice Neither the European Chemicals Agency nor any person acting on behalf of the
More informationLoad balancing using Remote Method Invocation (JAVA RMI)
Load balancing using Remote Method Invocation (JAVA RMI) Ms. N. D. Rahatgaonkar 1, Prof. Mr. P. A. Tijare 2 1 Department of Computer Science & Engg and Information Technology Sipna s College of Engg &
More informationEngineering of a Clinical Decision Support Framework for the Point of Care Use
Engineering of a Clinical Decision Support Framework for the Point of Care Use Szymon Wilk, PhD 1, Wojtek Michalowski, PhD 1, Dympna O Sullivan, PhD 1, Ken Farion, MD 2, Stan Matwin, PhD 1 1 University
More informationEnterprise Manager. Version 6.2. Installation Guide
Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1
More informationVisuSniff: A Tool For The Visualization Of Network Traffic
VisuSniff: A Tool For The Visualization Of Network Traffic Rainer Oechsle University of Applied Sciences, Trier Postbox 1826 D-54208 Trier +49/651/8103-508 oechsle@informatik.fh-trier.de Oliver Gronz University
More informationRemote support for lab activities in educational institutions
Remote support for lab activities in educational institutions Marco Mari 1, Agostino Poggi 1, Michele Tomaiuolo 1 1 Università di Parma, Dipartimento di Ingegneria dell'informazione 43100 Parma Italy {poggi,mari,tomamic}@ce.unipr.it,
More informationA distributed system is defined as
A distributed system is defined as A collection of independent computers that appears to its users as a single coherent system CS550: Advanced Operating Systems 2 Resource sharing Openness Concurrency
More informationIntroduction to CORBA. 1. Introduction 2. Distributed Systems: Notions 3. Middleware 4. CORBA Architecture
Introduction to CORBA 1. Introduction 2. Distributed Systems: Notions 3. Middleware 4. CORBA Architecture 1. Introduction CORBA is defined by the OMG The OMG: -Founded in 1989 by eight companies as a non-profit
More informationReflections about Mobile Agents and Software Engineering
Reflections about Mobile gents and Software Engineering Gian Pietro Picco Dipartimento di Elettronica e Informazione Politecnico, Italy picco@elet.polimi.it http://www.elet.polimi.it/~picco Motivation
More informationSelf-organized Multi-agent System for Service Management in the Next Generation Networks
PROCEEDINGS OF THE WORKSHOP ON APPLICATIONS OF SOFTWARE AGENTS ISBN 978-86-7031-188-6, pp. 18-24, 2011 Self-organized Multi-agent System for Service Management in the Next Generation Networks Mario Kusek
More informationOutline. Mariposa: A wide-area distributed database. Outline. Motivation. Outline. (wrong) Assumptions in Distributed DBMS
Mariposa: A wide-area distributed database Presentation: Shahed 7. Experiment and Conclusion Discussion: Dutch 2 Motivation 1) Build a wide-area Distributed database system 2) Apply principles of economics
More informationExploiting Multi-agent System Technology within an Autonomous Regional Active Network Management System
1 Exploiting Multi-agent System Technology within an Autonomous Regional Active Network Management System Euan M. Davidson, Member, IEEE, Stephen D. J. McArthur, Senior Member, IEEE Abstract-- This paper
More informationKeywords Load balancing, Dispatcher, Distributed Cluster Server, Static Load balancing, Dynamic Load balancing.
Volume 5, Issue 7, July 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Hybrid Algorithm
More informationDistributed Database Management Systems for Information Management and Access
464 Distributed Database Management Systems for Information Management and Access N Geetha Abstract Libraries play an important role in the academic world by providing access to world-class information
More informationDistributed Systems Architectures
Software Engineering Distributed Systems Architectures Based on Software Engineering, 7 th Edition by Ian Sommerville Objectives To explain the advantages and disadvantages of different distributed systems
More informationMigrating the ASAS Database Administrator s Notes
Administrator s Notes For ASAS 2.4 and Above 2 Overview........................................................................ 2 2.1 s........................................................................
More informationMAS 200 Supported Platform Matrix
The information in this document applies to MAS 200 Level 3.60 and higher. Best Software only supports the current MAS 200 level and one major level back. As of the Level 3.70 release, MAS 200 Levels 3.51
More informationJava Agent DEvelopment Framework (JADE)
Java Agent DEvelopment Framework (JADE) Laboratory of Multiagent Systems LM Laboratorio di Sistemi Multiagente LM Elena Nardini elena.nardini@unibo.it Ingegneria Due Alma Mater Studiorum Università di
More informationElastic Calculator : A Mobile Application for windows mobile using Mobile Cloud Services
Elastic Calculator : A Mobile Application for windows mobile using Mobile Cloud Services K.Lakshmi Narayanan* & Nadesh R.K # School of Information Technology and Engineering, VIT University Vellore, India
More informationConstructing a Collaborative Multi-Agents System Tool for Real Time System Requirements
www.ijcsi.org 134 Constructing a Collaborative Multi-Agents System Tool for Real Time System Requirements Asmaa Y. Hamo 1, Marwa A. Aljawaherry 2 1, 2 Software Engineering, Mosul University, Collage of
More informationRemote Desktop on Mobile
Remote Desktop on Mobile SonamGavhane RasikaPhanse Monica Sadafule B.W.Balkhande Abstract In This paper we will see how the remote Desktop with static IP can be accessed using Android based mobile phones,to
More informationCS 3530 Operating Systems. L02 OS Intro Part 1 Dr. Ken Hoganson
CS 3530 Operating Systems L02 OS Intro Part 1 Dr. Ken Hoganson Chapter 1 Basic Concepts of Operating Systems Computer Systems A computer system consists of two basic types of components: Hardware components,
More informationDynamic Scheduling of Object Invocations in Distributed Object Oriented Real-Time Systems Jørgensen, Bo Nørregaard; Joosen, Wouter
Syddansk Universitet Dynamic Scheduling of Object Invocations in Distributed Object Oriented Real-Time Systems Jørgensen, Bo Nørregaard; Joosen, Wouter Published in: Lecture Notes in Computer Science Publication
More informationHow To Manage A Network With Mobile Agents
A Framework for Network Management using Mobile Agents Manoj Kumar Kona and Cheng-Zhong Xu Department of Electrical and Computer Engineering Wayne State University, Detroit, MI 48202 {manoj, czxu}@ernie.eng.wayne.edu
More informationDISTRIBUTED AND PARALLELL DATABASE
DISTRIBUTED AND PARALLELL DATABASE SYSTEMS Tore Risch Uppsala Database Laboratory Department of Information Technology Uppsala University Sweden http://user.it.uu.se/~torer PAGE 1 What is a Distributed
More informationClient/Server and Distributed Computing
Adapted from:operating Systems: Internals and Design Principles, 6/E William Stallings CS571 Fall 2010 Client/Server and Distributed Computing Dave Bremer Otago Polytechnic, N.Z. 2008, Prentice Hall Traditional
More informationLexia Network Installation Instructions
Lexia Network Installation Instructions For Lexia Early Reading 3.x, Primary Reading 1.x, Foundation Reading 1.x, Strategies for Older Students 4.x, Cross-Trainer 1.x and Quick Reading Test 2.x (NOT for
More informationImproving Performance and Reliability Using New Load Balancing Strategy with Large Public Cloud
Improving Performance and Reliability Using New Load Balancing Strategy with Large Public Cloud P.Gayathri Atchuta*1, L.Prasanna Kumar*2, Amarendra Kothalanka*3 M.Tech Student*1, Associate Professor*2,
More informationA Study on the Application of Existing Load Balancing Algorithms for Large, Dynamic, Heterogeneous Distributed Systems
A Study on the Application of Existing Load Balancing Algorithms for Large, Dynamic, Heterogeneous Distributed Systems RUPAM MUKHOPADHYAY, DIBYAJYOTI GHOSH AND NANDINI MUKHERJEE Department of Computer
More informationMiddleware Lou Somers
Middleware Lou Somers April 18, 2002 1 Contents Overview Definition, goals, requirements Four categories of middleware Transactional, message oriented, procedural, object Middleware examples XML-RPC, SOAP,
More informationSQL Server An Overview
SQL Server An Overview SQL Server Microsoft SQL Server is designed to work effectively in a number of environments: As a two-tier or multi-tier client/server database system As a desktop database system
More informationINTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
More information