A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS"

Transcription

1 A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS Tarag Fahad, Sufian Yousef & Caroline Strange School of Design and Communication Systems, Anglia Polytechnic University Victoria Road South, Chelmsford, Essex, CM1 1LL, UK. {t.fahad, s.yousef, Abstract This paper investigates the performance management of two different size networks using mobile agents. The performance metrics studied are the response time, traffic and utilisation. Mobile agent performance is analysed through management task simulations using an Optimised Network Engineering Tool (OPNET). Four simulation scenarios were implemented in networks; two with no load applied and two with the following applications - , ftp application, database application and http. It was found from this study that mobile agents perform efficiently in large networks in terms of reducing response time and traffic. Keywords: Mobile agents, Simulation, OPNET, Network Management. 1. INTRODUCTION The growing complexity of computer networks requires the use of sophisticated management techniques. Current network management systems are typically designed using a centralised network management paradigm that is characterised by a low degree of flexibility. Most of these systems use the Simple Network Management Protocol [1]. Management distribution may be enhanced using mobile agents. These provide a powerful software interaction paradigm that allows code migration between hosts for remote execution [2]. Mobile agents are used in the management of network systems to distribute the management functionality throughout the network, to manage both rapid changes and scalability of complex networks. Mobile Agent technology is a rapidly developing area of research in the fields of network management. As a mobile program it can roam in a network, perform duties on behalf of their creators and returning to the creator after having performed the duties assigned to it [3]. They are self-directed and have the ability to migrate from one node to another performing actions on behalf of the user. In recent years, a number of papers linking mobile agents to network management have been published. These have considered, for example, tasks of network health monitoring [4], fault diagnosis [4, 5], performance management [6] and network configuration [5]. Rubinstein et al [7] investigated mobile agent tradeoffs in network management by performing management task simulations. Their analysis focuses on the performance of two unload strategies in order to reduce the response time for mobile agent. In the first approach, the mobile agent returns to the management station, whereas in the second one the mobile agent sends data to the management station, both after visiting a fixed number of nodes. Rubinstein et al [7] concluded that the use of mobile agents reduces the response time. However, their work failed to focus on the possible advantages of mobile agents in reducing network traffic. In implementing flexible network management strategies Puliafito et al [8] discuss the advantages of mobile agent technology over SNMP agents. They implemented a mobile agent platform (MAP) that uses CORBA as an underlying communication mechanism for the transfer of code and data. This innovative approach to network management focused on security schema for mobile agent and it only identifies a simple traffic model without adequate verification methodologies. Baldi and Picco [9] describe a quantitative model for management related network traffic and a formal tool for determining the best way to perform management operations. Several different mobile code design paradigms are compared with the use of the traditional client-server architecture. Their work provide an extensive quantitative analysis on the model of network traffic for client/server, mobile agent, remote evaluation (REV) and code on demand (COD) approach but lacks in presenting experimental analysis of the deduced equations. Quantitative analysis for latencies involved while managing a network using the above approaches was not evaluated. The rest of this paper is organised as follows. First, an overview of the mobile agent infrastructure is provided. Then, the benefits of mobile agents in network management system are discussed. Next, we explain the mobile agent simulation module and its parameters. Subsequently, we discuss and analyse the simulation results. Finally, The paper is concluded with remarks on future work. ISBN: PGNet

2 2. MOBILE AGENT INFRASTRUCTURE Reduction in network traffic: Code is often smaller than data that it processes. Therefore, In order to perform network management functionality using mobile agent, it is necessary to have an infrastructure that provides a framework for code mobility. Pagurek et al [12] explain the development of Mobile Agent Infrastructure as shown in figure 1. Every network component (NC) contains a Mobile Code Daemon (MCD) running within a Java Virtual Machine (JVM). The MCD provides a number of services that facilitates the execution of mobile agents. Included are: a Mobile Code Manager (MCM) that manages the life cycle of a mobile agent from its arrival an authentication at the network component to its migration or perhaps destruction, a Migration Facilitator to transport mobile agents between NCs, a Communication Facilitator for collaboration between local and remote mobile agents, and an interface called the Virtual Managed Component which provides for mobile agents accessing the NC s managed objects and resources in a controlled and secure way. The VMC is responsible for management of the mobile agents access rights and the allocation of resources to that agents. NC = Network Component MF = Migration Facility MA = Mobile Agent JVM = Java Virtual Machine MCD = Mobile Code Daemon MCM = Mobile Code Manager VMC = Virtual Managed Component Figure 1. Mobile Agent Infrastructure the transfer of mobile agents to the sources of data creates less traffic than transferring the data. Remote objects can help in some cases, however they also involve loads of parameters, which may be large. Space savings: Resource consumption is limited, because a mobile agent resides only on one node at a time. In contrast, static multiple servers require duplication of functionality at every location. Mobile agents carry the functionality with them, so it does not have to be duplicated. Remote objects provide similar benefits, but the costs of the middleware might be high. Efficiency savings: CPU consumption is limited, because a mobile agent execute only on one node at a time. Other nodes do not run an agent until needed. Support for heterogeneous environments: Mobile agents are separated from the hosts by the mobility framework. If the framework is in place, agents can target any system. The costs of running a Java Virtual Machine (JVM) on a device are decreasing. Java chips will probably dominate in the future, but the underlying technology is also evolving in the direction of ever-smaller footprints Robustness and fault tolerance: If a distributed system starts to malfunction, then mobile agents can be used to increase availability of certain services in the concerned areas. For example, the density of fault detecting or repairing agents can be increased. Some kind of meta-level management of agents is required to ensure that the agent-based system fulfils its purpose. Easy software upgrades: A mobile agent can be exchanged virtually at will. In contrast, swapping functionality of servers is complicated; especially, if we want to maintain the appropriate level of quality of service (QoS). Online extensibility of services: Mobile agents can be used to extend capabilities of applications, for example, providing services. This allows for building systems that are extremely flexible. 3. BENEFITS OF MOBILE AGENTS 4. SIMULATION MODULE The use of mobile agents has advantages over other implementations of static agents, which relay heavily on SNMP. The following advantages based on [5] and they include the following: OPNET Modeler 6.0 [11] has been used to develop and simulate the Mobile Agent module. In order to represent and study the behaviour of mobile agent in the network management system we have developed simulation module called Mobile Agent Module. It divided up into four scenarios; two scenarios with

3 unloaded application (i.e. , ftp application, database application and http). Figure 2. Mobile Agent 5 Nodes Scenario Contents the manager to the mobile agent, and a Response is the information sent from the mobile agent back to the manager. An initial network utilization of 25% starts after the first 100-second of the three hours simulation time. The Traffic Sent parameter represents OPNET Background traffic type, which refers to analytically modelled traffic that impacts performance of explicit traffic by inducing additional delays. Background traffic is not modelled by individual discrete events. The presence of background traffic results in queue build-up at intermediate devices and causes delays based on the queue length at any given time. Notes that we have assumed that the initial size of the mobile agent is 5000 bytes, which based on [7] and each request or response of a variable is 50 bytes long. As a result, Response Transfer Size attribute will be 5050 bytes. The first one contains five nodes (figure 2) connected to the manager trough switch, and the second one contains ten nodes instead of five. Figure 3 shows how mobile agent behaves in the scenario where it collects information that requested from the manager and migrating from node to other to do so. The other two loaded scenarios are similar to unloaded scenarios except that each of them loaded with the database application, , ftp and http applications. These were simulated using representative choices from OPNET defined level heavy. The main aim is to see what will happen to the network performance when such applications are added, then comparing the results with the previous two scenarios. 6. SIMULATION RESULTS 6.1 Unloaded Scenarios Figure 4 shows that the response time in the mobile agent ten nodes scenario is higher than response time in mobile agent five nodes scenario. The first one was just above 10 sec, whereas the second was 6 sec. This result was expected, taking into account the number of network managed nodes in each scenario, mobile agent in small network will take short response time compared with large one. Figure 3.Mobile Agent 5 Nodes Scenario behaviour 5. SIMULATION PARAMETERS To study the effect of adopting mobile agents in the network on the overall network performance the response time, traffic sent and utilisation are required from the OPNET simulation. The response time is time taken by the actions required to complete a full task (a complete polling operation or problem investigation). It starts from the time when the manager sends the request to the mobile agent and ends when a response is received. A Request is the information sent from Figure 4. Unloaded scenario response time results This will lead to the fact that for the mobile agent response time increases faster when the number of managed nodes grows up due to the incremental size of the mobile agent when it migrate from node to other. On the other hand, figure 5 shows that the increase in the number of managed nodes in unloaded scenario will lead to decrease in the traffic. The traffic sent in the scenario was decreased by almost 30% compared with scenario, where it was 600 bytes/sec in the scenario and almost 900

4 bytes/sec in the scenario. This shows the advantages of mobile agent in reducing traffic when the number of network managed nodes is increased. Figure 7. Loaded scenario response time results Figure 5. Unloaded scenario traffic sent results In terms of utilisation, figure 6 shows that the utilisation does not change when the number of network managed nodes was increased, and it remains almost at 25%. Figure 8. Loaded scenario traffic sent results There is no impact on the utilisation by loading application and it remains in both 5 and loaded scenario at almost 25%. Figure 6. Unloaded scenario utilisation results 6.2 Loaded Scenarios It can be seen from figure 7 and 8 that there is no significant change in terms of the response time and traffic sent parameters in both and scenarios compare with the previous two scenarios. Therefore, we can conclude that, mobile agent behaviour does not change when further application added to the managed network nodes. 7. CONCLUSION AND FUTURE WORK This work has focused on investigating the effect of adopting mobile agents in network management system. As discovered during the simulation, mobile agent performed better in terms of reducing traffic when the number of network managed nodes was increased. However, as the number of network managed nodes increase the response time will increase. Based on the above results, we can conclude that mobile agent will perform efficiently in large network management system than in the small one. The results appear to support the intuitive expectations of mobile agents behaviour and indicate their advantages of reducing traffic across the network. The future is likely to bring more use of mobile agent in network

5 management systems. A number of directions have been identified for future work as follows: To explore the limitations of the mobile agent paradigm, with the intention of finding precisely what the circumstances are under which the use of mobile agent to manage network does create the problems described. To develop a simulation of the mobile agent approach to network management that considers all aspects of network management including fault and security management. To develop a simulation of the SNMP v3 similar to above point in order to identify comparative behaviour and determine the suitability of using each of them in the network management systems. ACKNOWLEDGEMENT The authors sincerely thank Dr. Colin Pattinson and Mr. Joao Ponciano for their helpful comments and support in this work. [7] Rubinstein, M. G., Duarte, O. C. M. B and Pujolle, G. Using Mobile Agent Strategies for Reducing the Response Time in Network Management. 16th IFIP World Computer Congress, ICCT2000, pp , Beijing, China, August [8] Puliafito, A. Tomarchio, O. Using Mobile Agents to implement flexible Network Management strategies. Computer Communication, Vol. 23 (2000) pp , April [9] Baldi, M. Picco, G. Evaluating the tradeoffs of Mobile Code Design paradigms in Network Management Applications. 20 th International Conference of Software Engineering (ICSE 98) pp [10] Pattinson, C. A simulated network management information base, Journal of Network and Computer Applications, Vol. 23 (2000) pp , April [11] OPNET Technologies, inc. [Internet] [Accessed 2 March 2002]. [12] Pagurek, B, Y. Wang, and T. White, Integrating of Mobile Agents with SNMP: Why and How, Proceeding of DSOM, REFERENCES [1] Leinwand, A. Conroy, K. F. 1996, Network Management A Practical Perspective, 2nd ed. Addison Wesley. [2] Subramanian, M. 2000, Network Management Principles and Practice, Addison Wesley. [3] Kona, M. Xu, C A. Framework for Network Management using Mobile Agents, International Parallel and Distributed Processing Symposium: IPDPS 2002 Workshops, April 15-19, 2002, Fort Lauderdale, Florida. [4] Pattinson, C. A Study of the Behaviour of the Simple Network Management Protocol, the 12th International Workshop on Distributed Systems: Operations and Management, DSOM 2001, Nancy, France, October, [5] El-Darieby, M. Biezczad, A. Intelligent Mobile Agents : Towards Network Fault Management Automation Proc. 6th IFIP/IEEE International Symposium on Integrated Network Management (IM 99) pp [6] Bieszczad, A. White, T. Pagurek, B. Sugar, G. Tran, X. Intelligent Network Modeling using Mobile Agents. (1998), In Proceedings of the IEEE Global Telecommunications Conference GLOBECOM 98, November 8th-12th, 1998, pp

USING MOBILE AGENTS TO IMPROVE PERFORMANCE OF NETWORK MANAGEMENT OPERATIONS

USING MOBILE AGENTS TO IMPROVE PERFORMANCE OF NETWORK MANAGEMENT OPERATIONS USING MOBILE AGENTS TO IMPROVE PERFORNCE OF NETWORK NAGEMENT OPERATIONS Iwan Adhicandra, Colin Pattinson, Ebrahim Shaghouei Computer Communications Research Group, School of Computing, Leeds Metropolitan

More information

A Study of the Behaviour of the Simple Network Management Protocol

A Study of the Behaviour of the Simple Network Management Protocol A Study of the Behaviour of the Simple Network Management Protocol Colin Pattinson School of Computing, Leeds Metropolitan University, Beckett Park, Leeds LS6 3QS UK E-Mail : c.pattinson@lmu.ac.uk The

More information

Role of Agents in Distributed Network Management: A Review

Role of Agents in Distributed Network Management: A Review Abstract Role of Agents in Distributed Networ Management: A Review Atul Mishra, A.K.Sharma Department of Comp. Engg. YMCA University of Science and Technology, Faridabad, India mish.atul@gmail.com, ashoale2@rediffmail.com

More information

MS MS - Management Station MNE - Managed Network Element. Link l LAN MNE MNE...

MS MS - Management Station MNE - Managed Network Element. Link l LAN MNE MNE... Analyzing Mobile Agent Scalability in Network Management Marcelo Gon alves Rubinstein and Otto Carlos Muniz Bandeira Duarte {rubi, otto}@gta.ufrj.br Grupo de Teleinform tica e Automa o - GTA Universidade

More information

University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP

University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP This Conference or Workshop Item Adda, Mo, Kasassbeh, M and Peart, Amanda (2005) A survey of network fault management. In: Telecommunications

More information

ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS

ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS ANNALS OF THE FACULTY OF ENGINEERING HUNEDOARA 2006, Tome IV, Fascicole 1, (ISSN 1584 2665) FACULTY OF ENGINEERING HUNEDOARA, 5, REVOLUTIEI, 331128, HUNEDOARA ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS

More information

A Hybrid approach to Network Performance Monitoring based on Mobile Agents and CORBA

A Hybrid approach to Network Performance Monitoring based on Mobile Agents and CORBA A Hybrid approach to Network Performance Monitoring based on Mobile Agents and CORBA Christos Bohoris, George Pavlou, Antonio Liotta Centre for Communication Systems Research, School of Electronics, Computing

More information

IMPROVEMENT OF RESPONSE TIME OF LOAD BALANCING ALGORITHM IN CLOUD ENVIROMENT

IMPROVEMENT OF RESPONSE TIME OF LOAD BALANCING ALGORITHM IN CLOUD ENVIROMENT IMPROVEMENT OF RESPONSE TIME OF LOAD BALANCING ALGORITHM IN CLOUD ENVIROMENT Muhammad Muhammad Bala 1, Miss Preety Kaushik 2, Mr Vivec Demri 3 1, 2, 3 Department of Engineering and Computer Science, Sharda

More information

A Study of Network Security Systems

A Study of Network Security Systems A Study of Network Security Systems Ramy K. Khalil, Fayez W. Zaki, Mohamed M. Ashour, Mohamed A. Mohamed Department of Communication and Electronics Mansoura University El Gomhorya Street, Mansora,Dakahlya

More information

A Satellite Network Management Architecture based on Mobile Agents and SNMP

A Satellite Network Management Architecture based on Mobile Agents and SNMP 2012 4th International Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Singapore A Satellite Network Management Architecture based on Mobile Agents and SNMP Jianli

More information

An Active Packet can be classified as

An Active Packet can be classified as Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems

More information

Chapter 1. Introduction

Chapter 1. Introduction Chapter 1 Introduction Nowadays telecommunications networks are based on different technologies in order to convey data, telephony, videoconferences and other services. These networks usually have extremely

More information

A Framework for Network Management using Mobile Agents

A Framework for Network Management using Mobile Agents A Framework for Network Management using Mobile Agents Manoj Kumar Kona and Cheng-Zhong Xu Department of Electrical and Computer Engineering Wayne State University, Detroit, MI 48202 {manoj, czxu}@ernie.eng.wayne.edu

More information

Monitoring can be as simple as waiting

Monitoring can be as simple as waiting Proactive monitoring for dynamic virtualized environments By David Weber and Veronique Delarue Virtualization can significantly increase monitoring complexity. By using BMC ProactiveNet Performance Management,

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 An Efficient Approach for Load Balancing in Cloud Environment Balasundaram Ananthakrishnan Abstract Cloud computing

More information

Designing Applications with Distributed Databases in a Hybrid Cloud

Designing Applications with Distributed Databases in a Hybrid Cloud Designing Applications with Distributed Databases in a Hybrid Cloud Evgeniy Pluzhnik 1, Oleg Lukyanchikov 2, Evgeny Nikulchev 1 & Simon Payain 1 1 Moscow Technological Institute, Moscow, 119334, Russia,

More information

Software Agent Constrained Mobility for Network Performance Monitoring

Software Agent Constrained Mobility for Network Performance Monitoring Software Agent Constrained Mobility for Network Performance Monitoring C. Bohoris, A. Liotta, G. Pavlou Center for Communication Systems Research School of Electronic Engineering and Information Technology

More information

Cloud Computing for Agent-based Traffic Management Systems

Cloud Computing for Agent-based Traffic Management Systems Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion

More information

A Survey on Load Balancing and Scheduling in Cloud Computing

A Survey on Load Balancing and Scheduling in Cloud Computing IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 7 December 2014 ISSN (online): 2349-6010 A Survey on Load Balancing and Scheduling in Cloud Computing Niraj Patel

More information

High Performance Cluster Support for NLB on Window

High Performance Cluster Support for NLB on Window High Performance Cluster Support for NLB on Window [1]Arvind Rathi, [2] Kirti, [3] Neelam [1]M.Tech Student, Department of CSE, GITM, Gurgaon Haryana (India) arvindrathi88@gmail.com [2]Asst. Professor,

More information

Keywords Ad hoc-network protocol, ad hoc cloud computing, performance analysis, simulation models, OPNET 14.5

Keywords Ad hoc-network protocol, ad hoc cloud computing, performance analysis, simulation models, OPNET 14.5 Volume 6, Issue 4, April 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Comparative Study

More information

ADAPTIVE LOAD BALANCING ALGORITHM USING MODIFIED RESOURCE ALLOCATION STRATEGIES ON INFRASTRUCTURE AS A SERVICE CLOUD SYSTEMS

ADAPTIVE LOAD BALANCING ALGORITHM USING MODIFIED RESOURCE ALLOCATION STRATEGIES ON INFRASTRUCTURE AS A SERVICE CLOUD SYSTEMS ADAPTIVE LOAD BALANCING ALGORITHM USING MODIFIED RESOURCE ALLOCATION STRATEGIES ON INFRASTRUCTURE AS A SERVICE CLOUD SYSTEMS Lavanya M., Sahana V., Swathi Rekha K. and Vaithiyanathan V. School of Computing,

More information

Abstract. 1. Introduction

Abstract. 1. Introduction A REVIEW-LOAD BALANCING OF WEB SERVER SYSTEM USING SERVICE QUEUE LENGTH Brajendra Kumar, M.Tech (Scholor) LNCT,Bhopal 1; Dr. Vineet Richhariya, HOD(CSE)LNCT Bhopal 2 Abstract In this paper, we describe

More information

ENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION

ENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION ENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION Arto Hämäläinen and Jari Porras Lappeenranta University of Technology Laboratory of Communications Engineering P.O. Box 20 53851

More information

Effective Network Monitoring Using Mobile Agents

Effective Network Monitoring Using Mobile Agents Effective Network Monitoring Using Mobile Agents Vipan Arora 1, Harpreet Kaur Bajaj 2 1 Government Polytechnic College for Girls, Jalandhar, 2 DAVIET,Kabir Nagar, Jalandhar Abstract Fast growth of computer

More information

Petri Net Simulation and Analysis of Network Management Based on Mobile Agent Technology

Petri Net Simulation and Analysis of Network Management Based on Mobile Agent Technology Simulation and Analysis of Network Management Based on Mobile Agent Technology Juraj Pukšec, Student Member, IEEE, Darije Ramljak and Darko Huljenić, Member, IEEE Abstract This paper presents advantages

More information

PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS

PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS Ali M. Alsahlany 1 1 Department of Communication Engineering, Al-Najaf Technical College, Foundation of

More information

of moving the data to the location of the management application code, as in clientserver

of moving the data to the location of the management application code, as in clientserver Unifying WBEM and Mobile Agents Approaches for Systems Management Marco Antonio C. Simões 1,2, André Luis de M. Santos 1 1 Centro de Informática Universidade Federal de Pernambuco P.O. Box 7851, ZIP: 50732-970

More information

Virtual machine interface. Operating system. Physical machine interface

Virtual machine interface. Operating system. Physical machine interface Software Concepts User applications Operating system Hardware Virtual machine interface Physical machine interface Operating system: Interface between users and hardware Implements a virtual machine that

More information

CDBMS Physical Layer issue: Load Balancing

CDBMS Physical Layer issue: Load Balancing CDBMS Physical Layer issue: Load Balancing Shweta Mongia CSE, School of Engineering G D Goenka University, Sohna Shweta.mongia@gdgoenka.ac.in Shipra Kataria CSE, School of Engineering G D Goenka University,

More information

A Scheme for Implementing Load Balancing of Web Server

A Scheme for Implementing Load Balancing of Web Server Journal of Information & Computational Science 7: 3 (2010) 759 765 Available at http://www.joics.com A Scheme for Implementing Load Balancing of Web Server Jianwu Wu School of Politics and Law and Public

More information

Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network

Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network Objective This lab teaches the basics of using OPNET IT Guru. We investigate application performance and capacity planning, by

More information

Modeling and Simulation Analysis of the Performance of Application-Level Communication between Distributed Objects

Modeling and Simulation Analysis of the Performance of Application-Level Communication between Distributed Objects Modeling and Simulation Analysis of the Performance of -Level Communication between Distributed Objects Hiroshi Yamada Abstract--Almost all business es among enterprise activities use information technology

More information

Self-organized Multi-agent System for Service Management in the Next Generation Networks

Self-organized Multi-agent System for Service Management in the Next Generation Networks PROCEEDINGS OF THE WORKSHOP ON APPLICATIONS OF SOFTWARE AGENTS ISBN 978-86-7031-188-6, pp. 18-24, 2011 Self-organized Multi-agent System for Service Management in the Next Generation Networks Mario Kusek

More information

Use of Agent-Based Service Discovery for Resource Management in Metacomputing Environment

Use of Agent-Based Service Discovery for Resource Management in Metacomputing Environment In Proceedings of 7 th International Euro-Par Conference, Manchester, UK, Lecture Notes in Computer Science 2150, Springer Verlag, August 2001, pp. 882-886. Use of Agent-Based Service Discovery for Resource

More information

An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents

An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents M. Anber and O. Badawy Department of Computer Engineering, Arab Academy for Science and Technology

More information

Methodology of performance evaluation of integrated service systems with timeout control scheme

Methodology of performance evaluation of integrated service systems with timeout control scheme Methodology of performance evaluation of integrated service systems with timeout control scheme Akira Kawaguchi and Hiroshi Yamada NTT Service Integration Laboratories, NTT Corporation 9-11, Midori-cho

More information

Castelldefels Project: Simulating the Computer System that Gives Support to the Virtual Campus of the Open University of Catalonia

Castelldefels Project: Simulating the Computer System that Gives Support to the Virtual Campus of the Open University of Catalonia 22nd EUROPEAN CONFERENCE ON OPERATIONAL RESEARCH Prague, July 8 11, 2007 Castelldefels Project: Simulating the Computer System that Gives Support to the Virtual Campus of the Open University of Catalonia

More information

Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing

Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing www.ijcsi.org 227 Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing Dhuha Basheer Abdullah 1, Zeena Abdulgafar Thanoon 2, 1 Computer Science Department, Mosul University,

More information

The Advantages of Using Mobile Agents in Software for Telecommunications

The Advantages of Using Mobile Agents in Software for Telecommunications The Advantages of Using Mobile Agents in Software for Telecommunications Luis Moura Silva Leonor Almeida University of Coimbra SIEMENS S.A. Polo II, Dep. Eng. Informatica Rua Irmãos Siemens Nº 1 3030 Coimbra,

More information

Benchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform

Benchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform Benchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform Shie-Yuan Wang Department of Computer Science National Chiao Tung University, Taiwan Email: shieyuan@cs.nctu.edu.tw

More information

Secure Network Monitoring System using Mobile Agent

Secure Network Monitoring System using Mobile Agent 1 Secure Network Monitoring System using Mobile Agent G. M. Gaikwad 1, A. M. Kanthe 2, M. S. Chaudhari 3 1,2,3 Department of Computer Engg. Sinhgad Institute of Technology, Lonavala (India) 1 gmgaikwad@gmail.com

More information

Mobile Software Agents: an Overview

Mobile Software Agents: an Overview Mobile Software Agents: an Overview Authors : From: Vu Anh Pham and Ahmed Karmouch University of Ottawa, Ontario Presented by: Luba Sakharuk Agenda for the Overview of Mobile Agents Abstract The Mobile

More information

CLEVER: a CLoud-Enabled Virtual EnviRonment

CLEVER: a CLoud-Enabled Virtual EnviRonment CLEVER: a CLoud-Enabled Virtual EnviRonment Francesco Tusa Maurizio Paone Massimo Villari Antonio Puliafito {ftusa,mpaone,mvillari,apuliafito}@unime.it Università degli Studi di Messina, Dipartimento di

More information

1. Simulation of load balancing in a cloud computing environment using OMNET

1. Simulation of load balancing in a cloud computing environment using OMNET Cloud Computing Cloud computing is a rapidly growing technology that allows users to share computer resources according to their need. It is expected that cloud computing will generate close to 13.8 million

More information

Evaluation of Constrained Mobility for Programmability in Network Management

Evaluation of Constrained Mobility for Programmability in Network Management Evaluation of Constrained Mobility for Programmability in Network Management C. Bohoris, A. Liotta, G. Pavlou Center for Communication Systems Research School of Electronic Engineering and Information

More information

A Network Simulation Experiment of WAN Based on OPNET

A Network Simulation Experiment of WAN Based on OPNET A Network Simulation Experiment of WAN Based on OPNET 1 Yao Lin, 2 Zhang Bo, 3 Liu Puyu 1, Modern Education Technology Center, Liaoning Medical University, Jinzhou, Liaoning, China,yaolin111@sina.com *2

More information

Remaining Capacity Based Load Balancing Architecture for Heterogeneous Web Server System

Remaining Capacity Based Load Balancing Architecture for Heterogeneous Web Server System Remaining Capacity Based Load Balancing Architecture for Heterogeneous Web Server System Tsang-Long Pao Dept. Computer Science and Engineering Tatung University Taipei, ROC Jian-Bo Chen Dept. Computer

More information

Heavy and Lightweight Dynamic Network Services : Challenges and Experiments for Designing Intelligent Solutions in Evolvable Next Generation Networks

Heavy and Lightweight Dynamic Network Services : Challenges and Experiments for Designing Intelligent Solutions in Evolvable Next Generation Networks Heavy and Lightweight Dynamic Network Services : Challenges and Experiments for Designing Intelligent Solutions in Evolvable Next Generation Networks Laurent Lefèvre INRIA /LIP (UMR CNRS, INRIA, ENS, UCB)

More information

.:!II PACKARD. Performance Evaluation ofa Distributed Application Performance Monitor

.:!II PACKARD. Performance Evaluation ofa Distributed Application Performance Monitor r~3 HEWLETT.:!II PACKARD Performance Evaluation ofa Distributed Application Performance Monitor Richard J. Friedrich, Jerome A. Rolia* Broadband Information Systems Laboratory HPL-95-137 December, 1995

More information

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL This chapter is to introduce the client-server model and its role in the development of distributed network systems. The chapter

More information

Reflections about Mobile Agents and Software Engineering

Reflections about Mobile Agents and Software Engineering Reflections about Mobile gents and Software Engineering Gian Pietro Picco Dipartimento di Elettronica e Informazione Politecnico, Italy picco@elet.polimi.it http://www.elet.polimi.it/~picco Motivation

More information

MEASURING PERFORMANCE OF DYNAMIC LOAD BALANCING ALGORITHMS IN DISTRIBUTED COMPUTING APPLICATIONS

MEASURING PERFORMANCE OF DYNAMIC LOAD BALANCING ALGORITHMS IN DISTRIBUTED COMPUTING APPLICATIONS MEASURING PERFORMANCE OF DYNAMIC LOAD BALANCING ALGORITHMS IN DISTRIBUTED COMPUTING APPLICATIONS Priyesh Kanungo 1 Professor and Senior Systems Engineer (Computer Centre), School of Computer Science and

More information

Cisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation

Cisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation Solution Overview Cisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation IT organizations face challenges in consolidating costly and difficult-to-manage branch-office

More information

ENHANCED HYBRID FRAMEWORK OF RELIABILITY ANALYSIS FOR SAFETY CRITICAL NETWORK INFRASTRUCTURE

ENHANCED HYBRID FRAMEWORK OF RELIABILITY ANALYSIS FOR SAFETY CRITICAL NETWORK INFRASTRUCTURE ENHANCED HYBRID FRAMEWORK OF RELIABILITY ANALYSIS FOR SAFETY CRITICAL NETWORK INFRASTRUCTURE Chandana Priyanka G. H., Aarthi R. S., Chakaravarthi S., Selvamani K. 2 and Kannan A. 3 Department of Computer

More information

A Review on Load Balancing Algorithms in Cloud

A Review on Load Balancing Algorithms in Cloud A Review on Load Balancing Algorithms in Cloud Hareesh M J Dept. of CSE, RSET, Kochi hareeshmjoseph@ gmail.com John P Martin Dept. of CSE, RSET, Kochi johnpm12@gmail.com Yedhu Sastri Dept. of IT, RSET,

More information

XMPP A Perfect Protocol for the New Era of Volunteer Cloud Computing

XMPP A Perfect Protocol for the New Era of Volunteer Cloud Computing International Journal of Computational Engineering Research Vol, 03 Issue, 10 XMPP A Perfect Protocol for the New Era of Volunteer Cloud Computing Kamlesh Lakhwani 1, Ruchika Saini 1 1 (Dept. of Computer

More information

A FRAMEWORK FOR MANAGING RUNTIME ENVIRONMENT OF JAVA APPLICATIONS

A FRAMEWORK FOR MANAGING RUNTIME ENVIRONMENT OF JAVA APPLICATIONS A FRAMEWORK FOR MANAGING RUNTIME ENVIRONMENT OF JAVA APPLICATIONS Abstract T.VENGATTARAMAN * Department of Computer Science, Pondicherry University, Puducherry, India. A.RAMALINGAM Department of MCA, Sri

More information

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile

More information

Learning More About Load Testing

Learning More About Load Testing Welcome to this introduction to application performance testing and the LoadRunner load testing solution. This document provides a short overview of LoadRunner s features, and includes the following sections:

More information

Introducing Performance Engineering by means of Tools and Practical Exercises

Introducing Performance Engineering by means of Tools and Practical Exercises Introducing Performance Engineering by means of Tools and Practical Exercises Alexander Ufimtsev, Trevor Parsons, Lucian M. Patcas, John Murphy and Liam Murphy Performance Engineering Laboratory, School

More information

Distributed Systems Lecture 1 1

Distributed Systems Lecture 1 1 Distributed Systems Lecture 1 1 Distributed Systems Lecturer: Therese Berg therese.berg@it.uu.se. Recommended text book: Distributed Systems Concepts and Design, Coulouris, Dollimore and Kindberg. Addison

More information

Performance of voice and video conferencing over ATM and Gigabit Ethernet backbone networks

Performance of voice and video conferencing over ATM and Gigabit Ethernet backbone networks Res. Lett. Inf. Math. Sci., 2005, Vol. 7, pp 19-27 19 Available online at http://iims.massey.ac.nz/research/letters/ Performance of voice and video conferencing over ATM and Gigabit Ethernet backbone networks

More information

Opnet Based simulation for route redistribution in EIGRP, BGP and OSPF network protocols

Opnet Based simulation for route redistribution in EIGRP, BGP and OSPF network protocols IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 1, Ver. IV (Jan. 2014), PP 47-52 Opnet Based simulation for route redistribution

More information

Resource Management and Scheduling. Mechanisms in Grid Computing

Resource Management and Scheduling. Mechanisms in Grid Computing Resource Management and Scheduling Mechanisms in Grid Computing Edgar Magaña Perdomo Universitat Politècnica de Catalunya Network Management Group Barcelona, Spain emagana@nmg.upc.edu http://nmg.upc.es/~emagana/

More information

Performance Evaluation of Mobile Agent-based Dynamic Load Balancing Algorithm

Performance Evaluation of Mobile Agent-based Dynamic Load Balancing Algorithm Performance Evaluation of Mobile -based Dynamic Load Balancing Algorithm MAGDY SAEB, CHERINE FATHY Computer Engineering Department Arab Academy for Science, Technology & Maritime Transport Alexandria,

More information

Network Monitoring. Chu-Sing Yang. Department of Electrical Engineering National Cheng Kung University

Network Monitoring. Chu-Sing Yang. Department of Electrical Engineering National Cheng Kung University Network Monitoring Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outline Introduction Network monitoring architecture Performance monitoring Fault monitoring Accounting

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh

More information

Experiences with certification of reusable components in the GSN project in Ericsson, Norway

Experiences with certification of reusable components in the GSN project in Ericsson, Norway Experiences with certification of reusable components in the GSN project in Ericsson, Norway Parastoo Mohagheghi (Ph.D. Student, NTNU) Reidar Conradi Ericsson AS, Grimstad, Dept. Computer and Information

More information

Implementation of Botcatch for Identifying Bot Infected Hosts

Implementation of Botcatch for Identifying Bot Infected Hosts Implementation of Botcatch for Identifying Bot Infected Hosts GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus

More information

From Centralization to Distribution: A Comparison of File Sharing Protocols

From Centralization to Distribution: A Comparison of File Sharing Protocols From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015

More information

LOAD BALANCING TECHNIQUES FOR RELEASE 11i AND RELEASE 12 E-BUSINESS ENVIRONMENTS

LOAD BALANCING TECHNIQUES FOR RELEASE 11i AND RELEASE 12 E-BUSINESS ENVIRONMENTS LOAD BALANCING TECHNIQUES FOR RELEASE 11i AND RELEASE 12 E-BUSINESS ENVIRONMENTS Venkat Perumal IT Convergence Introduction Any application server based on a certain CPU, memory and other configurations

More information

Load Balancing using DWARR Algorithm in Cloud Computing

Load Balancing using DWARR Algorithm in Cloud Computing IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 12 May 2015 ISSN (online): 2349-6010 Load Balancing using DWARR Algorithm in Cloud Computing Niraj Patel PG Student

More information

Towards P2P-based Computer Network Management *

Towards P2P-based Computer Network Management * Towards P2P-based Computer Network Management * Hui Xu, and Debao Xiao Department of Computer Science, Huazhong Normal University Wuhan, P.R. China, 430079 xuhui_1004@hotmail.com Abstract Nowadays, the

More information

AN ADAPTIVE DISTRIBUTED LOAD BALANCING TECHNIQUE FOR CLOUD COMPUTING

AN ADAPTIVE DISTRIBUTED LOAD BALANCING TECHNIQUE FOR CLOUD COMPUTING AN ADAPTIVE DISTRIBUTED LOAD BALANCING TECHNIQUE FOR CLOUD COMPUTING Gurpreet Singh M.Phil Research Scholar, Computer Science Dept. Punjabi University, Patiala gurpreet.msa@gmail.com Abstract: Cloud Computing

More information

Information Systems Development Process (Software Development Life Cycle)

Information Systems Development Process (Software Development Life Cycle) Information Systems Development Process (Software Development Life Cycle) Phase 1 Feasibility Study Concerned with analyzing the benefits and solutions for the identified problem area Includes development

More information

Enterprise Energy Management with JouleX and Cisco EnergyWise

Enterprise Energy Management with JouleX and Cisco EnergyWise Enterprise Energy Management with JouleX and Cisco EnergyWise Introduction Corporate sustainability and enterprise energy management are pressing initiatives for organizations dealing with rising energy

More information

Improving Performance and Reliability Using New Load Balancing Strategy with Large Public Cloud

Improving Performance and Reliability Using New Load Balancing Strategy with Large Public Cloud Improving Performance and Reliability Using New Load Balancing Strategy with Large Public Cloud P.Gayathri Atchuta*1, L.Prasanna Kumar*2, Amarendra Kothalanka*3 M.Tech Student*1, Associate Professor*2,

More information

Evolution of OpenCache: an OpenSource Virtual Content Distribution Network (vcdn) Platform

Evolution of OpenCache: an OpenSource Virtual Content Distribution Network (vcdn) Platform Evolution of OpenCache: an OpenSource Virtual Content Distribution Network (vcdn) Platform Daniel King d.king@lancaster.ac.uk Matthew Broadbent m.broadbent@lancaster.ac.uk David Hutchison d.hutchison@lancaster.ac.uk

More information

AN EFFICIENT LOAD BALANCING APPROACH IN CLOUD SERVER USING ANT COLONY OPTIMIZATION

AN EFFICIENT LOAD BALANCING APPROACH IN CLOUD SERVER USING ANT COLONY OPTIMIZATION AN EFFICIENT LOAD BALANCING APPROACH IN CLOUD SERVER USING ANT COLONY OPTIMIZATION Shanmuga Priya.J 1, Sridevi.A 2 1 PG Scholar, Department of Information Technology, J.J College of Engineering and Technology

More information

Reverse Auction-based Resource Allocation Policy for Service Broker in Hybrid Cloud Environment

Reverse Auction-based Resource Allocation Policy for Service Broker in Hybrid Cloud Environment Reverse Auction-based Resource Allocation Policy for Service Broker in Hybrid Cloud Environment Sunghwan Moon, Jaekwon Kim, Taeyoung Kim, Jongsik Lee Department of Computer and Information Engineering,

More information

An Infrastructure for Distributed and Dynamic Network Management based on Mobile Agent Technology

An Infrastructure for Distributed and Dynamic Network Management based on Mobile Agent Technology An Infrastructure for Distributed and Dynamic Network Management based on Mobile Agent Technology Damianos Gavalas, Dominic Greenwood *, Mohammed Ghanbari, Mike O Mahony Communication Networks Research

More information

Keywords: PDAs, VM. 2015, IJARCSSE All Rights Reserved Page 365

Keywords: PDAs, VM. 2015, IJARCSSE All Rights Reserved Page 365 Volume 5, Issue 7, July 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Energy Adaptive

More information

Delivering Network Performance and Capacity. The most important thing we build is trust

Delivering Network Performance and Capacity. The most important thing we build is trust Delivering Network Performance and Capacity The most important thing we build is trust The Ultimate in Real-life Network Perfomance Testing 1 The TM500 Family the most comprehensive 3GPP performance and

More information

Load Balancing of Web Server System Using Service Queue Length

Load Balancing of Web Server System Using Service Queue Length Load Balancing of Web Server System Using Service Queue Length Brajendra Kumar 1, Dr. Vineet Richhariya 2 1 M.tech Scholar (CSE) LNCT, Bhopal 2 HOD (CSE), LNCT, Bhopal Abstract- In this paper, we describe

More information

CHAPTER 7 SUMMARY AND CONCLUSION

CHAPTER 7 SUMMARY AND CONCLUSION 179 CHAPTER 7 SUMMARY AND CONCLUSION This chapter summarizes our research achievements and conclude this thesis with discussions and interesting avenues for future exploration. The thesis describes a novel

More information

Utilizing Round Robin Concept for Load Balancing Algorithm at Virtual Machine Level in Cloud Environment

Utilizing Round Robin Concept for Load Balancing Algorithm at Virtual Machine Level in Cloud Environment Utilizing Round Robin Concept for Load Balancing Algorithm at Virtual Machine Level in Cloud Environment Stuti Dave B H Gardi College of Engineering & Technology Rajkot Gujarat - India Prashant Maheta

More information

How Router Technology Shapes Inter-Cloud Computing Service Architecture for The Future Internet

How Router Technology Shapes Inter-Cloud Computing Service Architecture for The Future Internet How Router Technology Shapes Inter-Cloud Computing Service Architecture for The Future Internet Professor Jiann-Liang Chen Friday, September 23, 2011 Wireless Networks and Evolutional Communications Laboratory

More information

Home Networking Evaluating Internet Connection Choices for a Small Home PC Network

Home Networking Evaluating Internet Connection Choices for a Small Home PC Network Laboratory 2 Home Networking Evaluating Internet Connection Choices for a Small Home PC Network Objetive This lab teaches the basics of using OPNET IT Guru. OPNET IT Guru s user-friendly interface with

More information

The Data Grid: Towards an Architecture for Distributed Management and Analysis of Large Scientific Datasets

The Data Grid: Towards an Architecture for Distributed Management and Analysis of Large Scientific Datasets The Data Grid: Towards an Architecture for Distributed Management and Analysis of Large Scientific Datasets!! Large data collections appear in many scientific domains like climate studies.!! Users and

More information

AN EFFICIENT LOAD BALANCING ALGORITHM FOR A DISTRIBUTED COMPUTER SYSTEM. Dr. T.Ravichandran, B.E (ECE), M.E(CSE), Ph.D., MISTE.,

AN EFFICIENT LOAD BALANCING ALGORITHM FOR A DISTRIBUTED COMPUTER SYSTEM. Dr. T.Ravichandran, B.E (ECE), M.E(CSE), Ph.D., MISTE., AN EFFICIENT LOAD BALANCING ALGORITHM FOR A DISTRIBUTED COMPUTER SYSTEM K.Kungumaraj, M.Sc., B.L.I.S., M.Phil., Research Scholar, Principal, Karpagam University, Hindusthan Institute of Technology, Coimbatore

More information

TTM4128: Network and Service Management - TTM4128: Network and Service Management - Part A.1 : Course Overview and Introduction.

TTM4128: Network and Service Management - TTM4128: Network and Service Management - Part A.1 : Course Overview and Introduction. TTM4128: Network and Service - Part A.1 : Course Overview and Introduction TTM4128: Network and Service - Course Overview Course Overview Network A Short Introduction Learning Objectives Course Contents

More information

Evaluation of Scalability and Communication in MMOGs

Evaluation of Scalability and Communication in MMOGs Evaluation of Scalability and Communication in MMOGs Sarmad A. Abdulazeez, Abdennour El Rhalibi and Dhiya Al-Jumeily Department of Computer Science, Faculty of Engineering and Technology Liverpool John

More information

On Cloud Computing Technology in the Construction of Digital Campus

On Cloud Computing Technology in the Construction of Digital Campus 2012 International Conference on Innovation and Information Management (ICIIM 2012) IPCSIT vol. 36 (2012) (2012) IACSIT Press, Singapore On Cloud Computing Technology in the Construction of Digital Campus

More information

Data Management in an International Data Grid Project. Timur Chabuk 04/09/2007

Data Management in an International Data Grid Project. Timur Chabuk 04/09/2007 Data Management in an International Data Grid Project Timur Chabuk 04/09/2007 Intro LHC opened in 2005 several Petabytes of data per year data created at CERN distributed to Regional Centers all over the

More information

Toward Certification of Adaptive Distributed Systems

Toward Certification of Adaptive Distributed Systems Toward Certification of Adaptive Distributed Systems John M. Slaby, Lonnie R. Welch, Paul R. Work OMG's Workshop on Distributed Object Computing for Real-time and Embedded Systems July 10-13, 2006 - Arlington,

More information

Network Management and Monitoring Software

Network Management and Monitoring Software Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the

More information

Telecom Data processing and analysis based on Hadoop

Telecom Data processing and analysis based on Hadoop COMPUTER MODELLING & NEW TECHNOLOGIES 214 18(12B) 658-664 Abstract Telecom Data processing and analysis based on Hadoop Guofan Lu, Qingnian Zhang *, Zhao Chen Wuhan University of Technology, Wuhan 4363,China

More information

DDSS: Dynamic Dedicated Servers Scheduling for Multi Priority Level Classes in Cloud Computing

DDSS: Dynamic Dedicated Servers Scheduling for Multi Priority Level Classes in Cloud Computing DDSS: Dynamic Dedicated Servers Scheduling for Multi Priority Level Classes in Cloud Computing Husnu S. Narman husnu@ou.edu Md. Shohrab Hossain mshohrabhossain@cse.buet.ac.bd Mohammed Atiquzzaman atiq@ou.edu

More information

CHAPTER 2. QoS ROUTING AND ITS ROLE IN QOS PARADIGM

CHAPTER 2. QoS ROUTING AND ITS ROLE IN QOS PARADIGM CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information