Network Load Imposed by Software Agents in Distributed Plant Automation
|
|
- Sibyl Bradley
- 7 years ago
- Views:
Transcription
1 Network Load Imposed by Software Agents in Distributed Plant Automation Yoseba K. Penya Vienna University of Technology Institute of Computer Technology Gusshausstrasse 27/E384, A-1040 Wien Austria Thilo Sauter Vienna University of Technology Institute of Computer Technology Gusshausstrasse 27/E384, A-1040 Wien Austria Abstract The current state of the art in production planning is still dominated by largely centralized solutions. More distributed approaches require a substantial increase in communication, and network load becomes an important factor. This paper presents a distributed plant automation approach based on mobile software agents and investigates the network load generated by the agents in terms of communication and migration. Particular emphasis is given to the impact of the planning horizon and prioritization, which leads to extensive rescheduling processes. It appears that scheduling approaches that plan several steps in advance need substantially more communication overhead, but can be made less susceptible to snowball effects associated with rescheduling. I. INTRODUCTION As far as the production planning is concerned, the current state of the art in plant automation is still dominated by centralized solutions. Nevertheless, distributed approaches are the focus of much research work. The most obvious benefit of distributing functions of, e.g., the MES (manufacturing execution system) or the control level is a tremendous increase in flexibility, the ultimate goal being an autonomous self organization of the entire production process. Another advantage less often addressed is the scalability. Distributed approaches no longer need powerful central computers to execute the planning tasks, or at least they alleviate the performance requirements. This is beneficial especially in large plants. On the other hand, the reduction of local computing power in distributed systems comes at the price of an increased demand for communication. When the elements of such system increase their flexibility, autonomy and intelligence, they need to exchange more information in order successfully synchronize and coordinate themselves. The network constitutes a shared resource within the plant automation system. This is particularly important for distributed solutions (such as the one addressed by the EUfunded Project PABADIS, Plant Automation Based on Distributed Systems [1,2]) that make use of mobile software agents to enhance the control of the individual manufacturing process. In spite of their benefits, the necessary migration for every step of the production process increases the network traffic. Consequently, it is worthwhile to investigate the impact that a distributed approach has on the network load and where the limits of scalability are. The remainder of the paper is organized as follows: in the section II we introduce the main features of the multiagent system used in PABADIS, section III describes the scheduling approach, section IV explains the model used in the simulation, section V presents and discusses the results, and section VI draws conclusions and outlines future work. II. PLANT AUTOMATION AS AN INFORMATION SYSTEM The classical representation of Plant Automation is that of a three-layered pyramid, where the machinery is on the lowest (control) level and two layers of more complex plant-wide control functions are above it. This approach starts from the assumption that every production cell has a minimum degree of intelligence to give some information that will be used by the upper layer for scheduling, dispatching, and other management tasks. In other words, the plant is conceived as a network of information points. Traditionally, the information stream flows to a central place, where it is processed by an ERP (enterprise resource planning) system that controls the plant as a whole, issues production orders and logs the results. Unlike this approach of concentrating all the responsibility, intelligence, and production management in one point, latest trends tend to distribute these three tasks at least partly between several units that have smaller processing power but communicate and cooperate to enhance the overall plant automation functionalities. In PABADIS, a plant is composed from abstract entities called Cooperative Manufacturing Units () that comprise both an intelligence module and a production module, which can involve one or more machines. All the s are connected to a common network, so they can cooperate in the manufacturing process. There are three types of s (in [2], they are called BIIOs, Basic Intelligent Independent Object, which is essentially the same): Logical s for computational services such as complex scheduling algorithms, database search etc., Manufacturing s for the physical processing of the products, SCADA s providing an interface to the SCADA system that controls the plant. Basically, PABADIS can be seen as an enhancement of an MES, with a clear focus on a product-oriented view (this is why the approach is mainly targeted at single-piece production), rather than the more process-oriented approach of classical MES. According to [3], functions covered by the MES are the following: Resource allocation, scheduling, and dispatching: This most complicated function of the MES manages the resources of the plans and performs ERP order execution. On one hand, the goal of this function is to optimize the usage of resources, such as machines, tools, labor skills, or materials. On the other hand, the product creation must be optimized as well. In PABADIS this functionality is distributed in the community of software agents which act individually with respect to their own tasks, such as product creation or machine optimization.
2 Document control, data collection, product tracking and genealogy, process management and performance analysis: This function provides information to the ERP system regarding the current situation of the production and product processing. Maintenance management, which tracks and directs the activities to maintain the equipment and tools, in order to ensure their availability for manufacturing and to ensure scheduling for periodic or preventive maintenance. III. SCHEDULING IN A MULTI-AGENT SYSTEM As mentioned before, the s in PABADIS are composed of a manufacturing module and an intelligence module. The latter is in fact a stationary agent called Residential Agent () that represents the in the network. It provides the network with an interface to the physical resources and functionalities the offers. The interface is used by the Product Agents (PA), mobile software agents that guide the product through its manufacturing process. In the same way that the Residential Agents know everything about the they represent, the Product Agent possess all the necessary data to optimize the development of the product it is in charge of. Therefore, when a PA arrives at a, it exactly knows which parameters must be indicated to the, in order to get its workpiece processed. Product Agents are created in an entity called Agency, which is the interface of the PABADIS agent community to an ERP system. It processes the demand and transforms it into documents one per work order. The Agency parses the documents and creates a product agent that will be responsible for the creation of the correspondent workpiece. The Agency also collects the reports of the product agents. Finally, there is another key element within PABADIS: the Look-up Service (LUS). It acts as white-pages mechanism for the product agents, so they know where to migrate when they need a specific functionality. Every notifies the LUS of its joining the network, and provides it with data about the functionalities it offers. The LUS periodically renews its data, so that when a PA requests some information, it is up to date. Fig. 1 illustrates the main components of the PABADIS system. A. Scheduling -Parser PABADIS -Parser Agency ERP Much have been said, written and discussed about constrained scheduling and the benefits of using software agents in planning processes in general [4,5,6] in for specific use cases that implement different solutions to face the problem [7,8]. In PABADIS, the scheduling is distributed (physically and operatively); the problem is divided into small bits, since it is carried out in local operations at level between Product Agents and Residential Agents. On the one hand, PAs represent the resource consumers, on the other hand, s represent the resource owners. Consequently, they have to negotiate with each other to reach an agreement. Specifically, the scheduling is performed in two ways: Horizontal fashion: The s collect the incoming requests for processing and generates a schedule of tasks from different Pas that need to be processed on the respective. Vertical fashion: The PAs generates a list with all possible s where its task could be carried out. The combination of both tables forms a matrix representing the whole schedule. B. Depth of Scheduling and priorities The scheduling process is in its simplest form a kind of first-come first-serve model, which is easy to solve. Nevertheless, this simple schema does not fit the requirements imposed by current Plant Automation systems. There must be a mechanism to prioritize the manufacturing of special products to account for urgent demands. Therefore, PABADIS supports priority-based scheduling. When a PA requests a time slot that has been already reserved by a lower-priority PA, the s arbitrates the conflict by assigning the time slot to the high-priority PA. Since the lower-priority PA must reallocate its resources, the notifies it of the new situation to let the PA start a rescheduling process. If the PA stills has a higher priority than other PAs, this may lead to a rescheduling cascade effect [9] propagating through the whole agent community. The solution that PABADIS promotes to reduce this effect is the introduction of a depth of scheduling parameter. This variable gives the number of tasks a Product Agent plans before starting the manufacturing process. Depending on the value of this parameter, the scheduling can be classified in three categories: Advance scheduling: The PA allocates the resources for all tasks in the work order. Thus, the PA analyses the whole work order and chooses the best possible way of execution. The depth of scheduling parameter is equal to the number of tasks the work order comprises. Step-by-step scheduling: In this case a PA allocates a resource for the next task only when the current one is completed. In fact, real scheduling is not necessary for the, which makes the optimization of resource usage almost impossible. The depth of scheduling parameter is equal to 1. Hybrid approach: In this case a PA analyses a work order several steps in advance (the number specified by depth of scheduling parameter) and allocates resources for this certain number of tasks, but not for the whole work order.... -Parser Fig. 1. Components of the PABADIS system
3 C. Life Cycle of a Product Agent Fig. 2 illustrates the program flow of a Product Agent. After parsing the document with the work order, it contacts the Look-up Service to find out about which s provide the functionalities needed for the execution of the work order. The LUS returns a list of matching s and also adds a rough estimate for the time required by each to finish the task. This information is then used by the PA to outline a graph where all the possible paths for the accomplishment of the work order are represented and can be ordered with respect to their overall processing time. Of course, other criteria for the decision might be used as well: workload of the, cost, status of the stocks, etc. Subsequently, the PA selects the best path and starts allocating a depth of scheduling number of tasks on the s that compose such path. This process includes the negotiation with the s about which time-slot is available and which PA with lower priority can be forced to give way. Afterwards, the PA starts the migration and physical manufacturing of its associated workpiece. In case that the depth of scheduling was less than the total amount of tasks needed, it starts a new allocation procedure and so on, until the work piece is finished. IV. MODELING OF THE SYSTEM Allocation error Migration error parse work order ask LUS for needed list depth of scheduling tasks allocation Error? Move to next Error? Perform Task All tasks finished? Move to Agency and report Fig. 2. Program flow of a Product Agent. The objective of the simulation is to evaluate the influence that the behavior of the agents has on the network load. For this purpose, a model representing a worst-case PABADIS environment with the following characteristics is investigated: The objective is to measure the migrations of the agents and the interchanged messages, as well as the time when they are performed or sent. All the parameters (number of agents, number of tasks that compose a work order, etc.) remain fixed, whereas the depth of scheduling and number of product agents with higher priority are the variables to be tuned and observed. Only one kind of product is manufactured, hence the work orders of all Product Agents are identical. Moreover, all Residential Agents represent similar s, therefore each work order is composed of a fixed number of identical tasks. Migration time is supposed to be negligible. Hence, there is no need to include time slots for migrations in the scheduling. Furthermore, the migration is performed before as the task but in the same time slot. Although all s are alike, the PAs can not reserve two time slots with the same. They must perform a task and then move to a different machine. Each PA starts its life cycle at the Agency and it must return there upon completion of the work order to report about the operation that was carried out. Thus, there is always an extra movement (not necessary for the manufacturing of the product) that must be done by the Product Agent. The simulation itself is not based on a real agent platform (like the Grasshopper platform used in the PABADIS project) and several machines, but for the sake of simplicity on a multi-threaded Java program running on a single PC. The flow of the program is as follows: a daemon thread starts four Residential Agent threads and afterwards ten Product Agent threads consecutively and with a small pause in between to have enough time to finish the allocation of resources. The agents allocate their required resources from the first time step on, so the first time interval is devoted to initial operations. Furthermore, all the highpriority PAs are launched when the ordinary PAs have finished their respective allocation procedures. Since by that time the previous PAs have already reserved time slots in the s, the highest possible number of rescheduling processes will happen (one per task and high-priority PA). Table I shows the set-up details of the individual experiments. The work order length is set to ten tasks that require each one-time step for execution. The daemon thread acts also as the clock of the system, so every time it ticks, all the PAs and s are notified. After simulation starts, the Product Agents contact the LUS and then begin to allocate a number of tasks defined by the depth of scheduling parameter. According to the program flow shown in Fig. 2, they wait afterwards until they are able to move and perform an operation on a. Moreover, if the task was the last to do, they quit and return to the Agency. If the task is the last allocated but they needed to allocate more (thus, the depth of scheduling is less than the total number of tasks), they restart the allocation process. To account for the network traffic, the daemon thread
4 TABLE I EXPERIMENTS PERFORMED IN THE SIMULATION. Identifier Depth of Scheduling high-priority PAs A0 1 (step by step) 0 A2 1 (step by step) 2 A4 1 (step by step) 4 B0 5 (50% of tasks) 0 B2 5 (50% of tasks) 2 B4 5 (50% of tasks) 4 C0 10 (full advance) 0 C2 10 (full advance) 2 C4 10 (full advance) 4 registers all messages sent and migrations performed upon notification of the entity that did it. Effectively, only the numbers are counted. The final value of the network traffic is then estimated. Taking into account that the maximum length of an Ethernet packet is 1500 bytes, a segmentation of the agent is indispensable. Furthermore, the header information for Ethernet (11 bytes), IP (20 bytes), and TCP (20 bytes) must also be included. The agent size assumed here is 3,000 bytes for the code and 1,200 bytes for the data of the work order. This makes three packets and in total 4123 bytes that need to be moved, each time the agent migrates from one to another. The messages exchanged between the agents are very short, they are assumed to have just 10 bytes each, which is enough to convey information about status, time slot availability, or schedule details. However, the header overhead is significant, and so a total of 61 bytes must be sent over the network. Concerning the rescheduling processes that can be initiated be Product Agents with a higher priority, an additional restriction was imposed on the timing. It is essential to avoid rescheduling when the affected agent is migrating or is about to migrate. Therefore, the time slot that is going to be reassigned must be at least one time step after the request from the high-priority agent is received. V. RESULTS Table II shows the main results of the experiments. At first sight, it can be seen that migrations are not affected by the variation in the change of scheduling or the number of PAs with higher priority. They are always 11 per PA, this is, one for each task and one more for the return to the Agency (the high-priority agents are not counted to ensure comparability). Fig. 3 shows the average of the experiments (A for A0, A2 and A4; B for B0, B2 and B4, etc.). It illustrates the behaviors of the system over time. The number of rescheduling processes depends only on the number of high-priority PAs and the number of tasks to be performed. Thus, with 8 high-priority PAs and 10 tasks, 80 rescheduling processes happen. There is no snowball effect because there are only two different priorities, and the affected PAs are not able to cause more rescheduling processes (the other PAs have at least the same priority). Another interesting effect regarding the rescheduling is that if the PAs do some advance scheduling, a higher number of high-priority agents results in a decrease of total messages needed in the experiment. The reason is the scheduling strategy of the agents. The PA aims to allocate all the tasks consecutively. If there is a gap in its schedule, this means that other PAs reserved the slots in between. Thus, when rescheduling, the PA assumes that earlier time slots are already reserved and therefore does not try to allocate them, which spares messages. For instance, if a PA has allocated the following resources: t = 10, t = 11, t = 13, and it receives a notification of rescheduling at t = 10, the PA will start rescheduling from t = 13 on. It supposes that if it previously did not succeed in allocating resources for t = 12, it will not succeed in the future. This effect is especially relevant with advanced planning, since the saving is bigger than in step-by-step or hybrid scheduling (see Table II). Fig. 3 clearly shows the network load for each scheduling modality. Advance scheduling (type C) requires most of the network traffic at the beginning, where the PAs send all the messages. Afterwards, they migrate to the s without any further exchange of information. The hybrid approach (type B) presents a diagram with pronounced peaks, corresponding to the moments where the allocation is performed. Since the depth of scheduling is 5 and the PAs start allocating from t = 1, the time slots with higher network traffic are 6, 11, and then 16, 21, etc, but obviously the peaks are smaller since there are fewer agents. Finally, the type A experiments (step-by-step scheduling) do not show significant peaks (only when in the same time slot some PAs turn back to the Agency and others migrate to perform a task) and distribute the network load uniformly. Fig. 4 shows the average of the results with the number of high-priority PAs as parameter. It confirms what exposed for Fig. 3: experiments with a lower number of highpriority PAs need to interchange a higher amount of data, due to the previously explained improvement in the allocation procedure. VI. CONCLUSION AND FUTURE WORK The model presented in this paper illustrates the impact on the network load that different scheduling modalities for a plant automation system based on mobile software agents have. The simulation demonstrated that snowball effects due to rescheduling processes and extra migrations could be avoided by using only two different priority levels, and by ensuring that an agent to that is going to be Identifier Finishing Time Messages Migrations Bytes transmitted A A A B B B C C C TABLE II RESULTS OF THE MEASUREMENTS
5 Data Transmitted (bytes) A B C Time Elapsed (seconds) Fig. 3. Average behavior of the experiments regarding the depth of scheduling Data transmitted (bytes) high-p Pas 2 high-p Pas 4 high-p Pas Time elapsed (seconds) Fig. 4. Average behavior of the experiments regarding the number of high-priority Product Agents. rescheduled is not about to arrive at the targeted. Evidently, the simulation model used was rather coarse. In the course of the project, however, it will be refined to account for, e.g., non-uniform task execution times per, which will open new possibilities for optimization. The simulations seem to suggest that full in-advance scheduling creates an extremely high network load at the beginning of the process and is therefore inferior to a stepby-step scheduling or an approach with a low depth of scheduling where the load is more balanced. From the viewpoint of network load, this is certainly true. However, the simulation cannot judge the benefits of a larger scheduling depth such as better optimization results that might outweigh the temporarily higher network traffic. Still, future investigations have to explore the impact the number of agents has on the load. Particularly during the negotiation phase, it is anticipated that the load will dramatically increase with the number of agents. The available network bandwidth may therefore easily put an upper limit to the practically achievable scheduling depth. Of course, it has to be noted that it is highly unlikely that all PAs start at the same time. In practice, they can be released with short delays in between. The only critical situation will be then a rescheduling process affecting a large number of agents. REFERENCES [1] PABADIS, IST , [2] T. Sauter and P. Palensky, "Network Technology for Distributed Plant Automation", in Proceedings of the IEEE International Conference on Intelligent Engineering Systems (INES) 2001, pp [3] MES Association, [4] C. Le Pape, Classification of scheduling problems and selection of corresponding constraint-based techniques, in Proceedings of the IEE Colloquium on Advanced Software Technologies for Scheduling 1993, pp. 1/1-1/3. [5] P. Prosser, The future of scheduling-dai?, in Proceedings of the IEE Colloquium on Advanced Software Technologies for Scheduling 1993, pp. 8/1-8/2. [6] T. Grant, Overview And Conclusions, in Proceedings of the IEE Colloquium on Intelligent Planning and Scheduling Solutions 1996, pp. 7/1-7/4. [7] B. Drabble, Modern planning and scheduling technologies, in Proceedings of the IEE Colloquium on Intelligent Planning and Scheduling Solutions 1996, pp. 3/1-3/6. [8] J. Reaidy, P. Massotte, L. Yingjiu and D. Diep, Product and process reconfiguration based on intelligent agents, in Proceedings of the 2001 IEEE International Conference on Systems, Man, and Cybernetics, pp [9] M. Fletcher and S. M. Deen, Task rescheduling in multi-agent manufacturing, in Proceedings of the 1999 International Workshop on Database and Expert Systems Applications, pp
ERP Integration into Generic Plant Automation Model
Integration into Generic Plant Automation Model Yoseba K. Penya, Alexei Bratoukhine and Thilo Sauter Institute of Computer Technology VIENNA UNIVERSITY OF TECHNOLOGY Gußhausstraße 27/E384, A-1040 Wien
More informationIntelligent Software Agents in Plant Automation
Intelligent Software Agents in Plant Automation Alexei Bratoukhine, Yoseba K. Penya and Thilo Sauter Institute of Computer Technology VIENNA UNIVERSITY OF TECHNOLOGY Gusshausstrasse 27/E384, A-1040 Wien
More information19 Comparison of Ethernet Systems
Frithjof Klasen Ever since the end of the 90 s, the usage of industrial Ethernet in automation has been a pursued target. Along with this, the desire emerged to have a universal and standard communication
More informationPerformance Testing Process A Whitepaper
Process A Whitepaper Copyright 2006. Technologies Pvt. Ltd. All Rights Reserved. is a registered trademark of, Inc. All other trademarks are owned by the respective owners. Proprietary Table of Contents
More informationAN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK
Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,
More informationA Conceptual Approach to Data Visualization for User Interface Design of Smart Grid Operation Tools
A Conceptual Approach to Data Visualization for User Interface Design of Smart Grid Operation Tools Dong-Joo Kang and Sunju Park Yonsei University unlimit0909@hotmail.com, boxenju@yonsei.ac.kr Abstract
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More informationFPGA Implementation of IP Packet Segmentation and Reassembly in Internet Router*
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 399-407 UDK: 004.738.5.057.4 FPGA Implementation of IP Packet Segmentation and Reassembly in Internet Router* Marko Carević 1,a,
More informationCROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
More informationChapter 1 - Web Server Management and Cluster Topology
Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management
More informationCommunications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
More informationDong-Joo Kang* Dong-Kyun Kang** Balho H. Kim***
Visualization Issues of Mass Data for Efficient HMI Design on Control System in Electric Power Industry Visualization in Computerized Operation & Simulation Tools Dong-Joo Kang* Dong-Kyun Kang** Balho
More informationA New Approach to Enhance E-mail Performance Through SMTP Protocol
IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.4, April 2008 299 A New Approach to Enhance E-mail Performance Through SMTP Protocol Hussein A.Al bazar,sureswaran Ramadass,
More informationInternet Infrastructure Measurement: Challenges and Tools
Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with
More informationMeasure wireless network performance using testing tool iperf
Measure wireless network performance using testing tool iperf By Lisa Phifer, SearchNetworking.com Many companies are upgrading their wireless networks to 802.11n for better throughput, reach, and reliability,
More informationComparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications
Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications White Paper Table of Contents Overview...3 Replication Types Supported...3 Set-up &
More informationHow To Monitor And Test An Ethernet Network On A Computer Or Network Card
3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel
More informationA Multi-Agent Approach to a Distributed Schedule Management System
UDC 001.81: 681.3 A Multi-Agent Approach to a Distributed Schedule Management System VYuji Wada VMasatoshi Shiouchi VYuji Takada (Manuscript received June 11,1997) More and more people are engaging in
More informationModule 15: Network Structures
Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and
More informationCapacity Planning Process Estimating the load Initial configuration
Capacity Planning Any data warehouse solution will grow over time, sometimes quite dramatically. It is essential that the components of the solution (hardware, software, and database) are capable of supporting
More informationComputer Networks Homework 1
Computer Networks Homework 1 Reference Solution 1. (15%) Suppose users share a 1 Mbps link. Also suppose each user requires 100 kbps when transmitting, but each user transmits only 10 percent of the time.
More informationRegion 10 Videoconference Network (R10VN)
Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits
More informationPer-Flow Queuing Allot's Approach to Bandwidth Management
White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth
More informationReal-Time Scheduling 1 / 39
Real-Time Scheduling 1 / 39 Multiple Real-Time Processes A runs every 30 msec; each time it needs 10 msec of CPU time B runs 25 times/sec for 15 msec C runs 20 times/sec for 5 msec For our equation, A
More informationExtension of Decision Tree Algorithm for Stream Data Mining Using Real Data
Fifth International Workshop on Computational Intelligence & Applications IEEE SMC Hiroshima Chapter, Hiroshima University, Japan, November 10, 11 & 12, 2009 Extension of Decision Tree Algorithm for Stream
More informationCommunications Management. 3ICT12 (with thanks to Prof. George Pavlou, University of Surrey)
Communications Management 3ICT12 (with thanks to Prof. George Pavlou, University of Surrey) 1 Communications Management Network Management Overview What is Network Management? Manager Agent Model OSI Management:
More informationData Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine
Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Virtual communication versus actual communication: Specific functions
More informationAutoconfiguration and maintenance of the IP address in ad-hoc mobile networks
1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166
More informationMuse Server Sizing. 18 June 2012. Document Version 0.0.1.9 Muse 2.7.0.0
Muse Server Sizing 18 June 2012 Document Version 0.0.1.9 Muse 2.7.0.0 Notice No part of this publication may be reproduced stored in a retrieval system, or transmitted, in any form or by any means, without
More informationDynamic Thread Pool based Service Tracking Manager
Dynamic Thread Pool based Service Tracking Manager D.V.Lavanya, V.K.Govindan Department of Computer Science & Engineering National Institute of Technology Calicut Calicut, India e-mail: lavanya.vijaysri@gmail.com,
More informationLearning More About Load Testing
Welcome to this introduction to application performance testing and the LoadRunner load testing solution. This document provides a short overview of LoadRunner s features, and includes the following sections:
More informationTransport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
More informationBehavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
More informationThe Matrix - A framework for real-time resource management for video streaming in networks of heterogenous devices
The Matrix - A framework for real-time resource management for video streaming in networks of heterogenous devices Larisa Rizvanovic Mälardalen University Department of Computer Science and Electronics
More informationSemester Thesis Traffic Monitoring in Sensor Networks
Semester Thesis Traffic Monitoring in Sensor Networks Raphael Schmid Departments of Computer Science and Information Technology and Electrical Engineering, ETH Zurich Summer Term 2006 Supervisors: Nicolas
More informationHow To Test For Elulla
EQUELLA Whitepaper Performance Testing Carl Hoffmann Senior Technical Consultant Contents 1 EQUELLA Performance Testing 3 1.1 Introduction 3 1.2 Overview of performance testing 3 2 Why do performance testing?
More informationNFS File Sharing. Peter Lo. CP582 Peter Lo 2003 1
NFS File Sharing Peter Lo CP582 Peter Lo 2003 1 NFS File Sharing Summary Distinguish between: File transfer Entire file is copied to new location FTP Copy command File sharing Multiple users can access
More informationHadoop Fair Scheduler Design Document
Hadoop Fair Scheduler Design Document October 18, 2010 Contents 1 Introduction 2 2 Fair Scheduler Goals 2 3 Scheduler Features 2 3.1 Pools........................................ 2 3.2 Minimum Shares.................................
More informationQuality of Service versus Fairness. Inelastic Applications. QoS Analogy: Surface Mail. How to Provide QoS?
18-345: Introduction to Telecommunication Networks Lectures 20: Quality of Service Peter Steenkiste Spring 2015 www.cs.cmu.edu/~prs/nets-ece Overview What is QoS? Queuing discipline and scheduling Traffic
More informationAn Overview of Distributed Databases
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 207-214 International Research Publications House http://www. irphouse.com /ijict.htm An Overview
More informationOperating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師
Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized
More informationLatency on a Switched Ethernet Network
Application Note 8 Latency on a Switched Ethernet Network Introduction: This document serves to explain the sources of latency on a switched Ethernet network and describe how to calculate cumulative latency
More informationParallel Scalable Algorithms- Performance Parameters
www.bsc.es Parallel Scalable Algorithms- Performance Parameters Vassil Alexandrov, ICREA - Barcelona Supercomputing Center, Spain Overview Sources of Overhead in Parallel Programs Performance Metrics for
More informationD1.2 Network Load Balancing
D1. Network Load Balancing Ronald van der Pol, Freek Dijkstra, Igor Idziejczak, and Mark Meijerink SARA Computing and Networking Services, Science Park 11, 9 XG Amsterdam, The Netherlands June ronald.vanderpol@sara.nl,freek.dijkstra@sara.nl,
More informationPriori ty ... ... ...
.Maintenance Scheduling Maintenance scheduling is the process by which jobs are matched with resources (crafts) and sequenced to be executed at certain points in time. The maintenance schedule can be prepared
More informationLoad Distribution in Large Scale Network Monitoring Infrastructures
Load Distribution in Large Scale Network Monitoring Infrastructures Josep Sanjuàs-Cuxart, Pere Barlet-Ros, Gianluca Iannaccone, and Josep Solé-Pareta Universitat Politècnica de Catalunya (UPC) {jsanjuas,pbarlet,pareta}@ac.upc.edu
More informationDistributed Data Management
Introduction Distributed Data Management Involves the distribution of data and work among more than one machine in the network. Distributed computing is more broad than canonical client/server, in that
More informationChapter 16: Distributed Operating Systems
Module 16: Distributed ib System Structure, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed Operating Systems Motivation Types of Network-Based Operating Systems Network Structure Network Topology
More informationEncoding Text with a Small Alphabet
Chapter 2 Encoding Text with a Small Alphabet Given the nature of the Internet, we can break the process of understanding how information is transmitted into two components. First, we have to figure out
More informationOverlapping Data Transfer With Application Execution on Clusters
Overlapping Data Transfer With Application Execution on Clusters Karen L. Reid and Michael Stumm reid@cs.toronto.edu stumm@eecg.toronto.edu Department of Computer Science Department of Electrical and Computer
More informationA Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks
A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks Didem Gozupek 1,Symeon Papavassiliou 2, Nirwan Ansari 1, and Jie Yang 1 1 Department of Electrical and Computer Engineering
More informationReconfigurable Architecture Requirements for Co-Designed Virtual Machines
Reconfigurable Architecture Requirements for Co-Designed Virtual Machines Kenneth B. Kent University of New Brunswick Faculty of Computer Science Fredericton, New Brunswick, Canada ken@unb.ca Micaela Serra
More informationCH.1. Lecture # 2. Computer Networks and the Internet. Eng. Wafaa Audah. Islamic University of Gaza. Faculty of Engineering
Islamic University of Gaza Faculty of Engineering Computer Engineering Department Networks Discussion ECOM 4021 Lecture # 2 CH1 Computer Networks and the Internet By Feb 2013 (Theoretical material: page
More informationImplementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks
Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,
More informationManufacturing Planning and Control
1 Chapter Manufacturing Planning and Control The manufacturing planning and control (MPC) system is concerned with planning and controlling all aspects of manufacturing, including managing materials, scheduling
More informationAn enhanced TCP mechanism Fast-TCP in IP networks with wireless links
Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,
More informationSTANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps
More informationResources Management
Resources Management. Introduction s we have seen in network scheduling, the basic inputs to criticalpath analysis are the individual project activities, their durations, and their dependency relationships.
More informationDistributed Load Balancing for FREEDM system
Distributed Load Balancing for FREEDM system Ravi Akella, Fanjun Meng, Derek Ditch, Bruce McMillin, and Mariesa Crow Department of Electrical Engineering Department of Computer Science Missouri University
More informationChapter 14: Distributed Operating Systems
Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication
More informationDevelopment of a personal agenda and a distributed meeting scheduler based on JADE agents
Development of a personal agenda and a distributed meeting scheduler based on JADE agents Miguel Ángel Sánchez Álvaro Rayón Alonso Grupo de Sistemas Inteligentes Departamento de Ingeniería Telemática Universidad
More informationDesign and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip
Design and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip Ms Lavanya Thunuguntla 1, Saritha Sapa 2 1 Associate Professor, Department of ECE, HITAM, Telangana
More informationA Satellite Network Management Architecture based on Mobile Agents and SNMP
2012 4th International Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Singapore A Satellite Network Management Architecture based on Mobile Agents and SNMP Jianli
More informationService oriented Architecture results from Arrowhead and its usage in EMC2
1 Service oriented Architecture results from Arrowhead and its usage in EMC2 Professor Jerker Delsing Luleå University of Technology, Sweden www.arrowhead.eu 2 Building Automation Systems from IoT Arrowhead
More informationFinal for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
More informationQuantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
More informationIn: Proceedings of RECPAD 2002-12th Portuguese Conference on Pattern Recognition June 27th- 28th, 2002 Aveiro, Portugal
Paper Title: Generic Framework for Video Analysis Authors: Luís Filipe Tavares INESC Porto lft@inescporto.pt Luís Teixeira INESC Porto, Universidade Católica Portuguesa lmt@inescporto.pt Luís Corte-Real
More informationCX2822x. Application Note. Feature Descriptions. Differential Delay Drain. Mindspeed Technologies 1. Background
500185A August 3, 2001 CX2822x Feature Descriptions Differential Delay Drain Background When an IMA group is first created, the IMA system adjusts the depth of the differential delay buffer in order to
More informationTivoli IBM Tivoli Web Response Monitor and IBM Tivoli Web Segment Analyzer
Tivoli IBM Tivoli Web Response Monitor and IBM Tivoli Web Segment Analyzer Version 2.0.0 Notes for Fixpack 1.2.0-TIV-W3_Analyzer-IF0003 Tivoli IBM Tivoli Web Response Monitor and IBM Tivoli Web Segment
More informationService and Resource Discovery in Smart Spaces Composed of Low Capacity Devices
Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices Önder Uzun, Tanır Özçelebi, Johan Lukkien, Remi Bosman System Architecture and Networking Department of Mathematics and Computer
More informationCorporate Network Services of Tomorrow Business-Aware VPNs
Corporate Network Services of Tomorrow Business-Aware VPNs Authors: Daniel Kofman, CTO and Yuri Gittik, CSO Content Content...1 Introduction...2 Serving Business Customers: New VPN Requirements... 2 Evolution
More informationData Networks Summer 2007 Homework #3
Data Networks Summer Homework # Assigned June 8, Due June in class Name: Email: Student ID: Problem Total Points Problem ( points) Host A is transferring a file of size L to host B using a TCP connection.
More informationHow To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
More informationA Passive Method for Estimating End-to-End TCP Packet Loss
A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se
More informationAn Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
More informationEffects of Filler Traffic In IP Networks. Adam Feldman April 5, 2001 Master s Project
Effects of Filler Traffic In IP Networks Adam Feldman April 5, 2001 Master s Project Abstract On the Internet, there is a well-documented requirement that much more bandwidth be available than is used
More informationHigh-Performance IP Service Node with Layer 4 to 7 Packet Processing Features
UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)
More informationThe Importance of Software License Server Monitoring
The Importance of Software License Server Monitoring NetworkComputer How Shorter Running Jobs Can Help In Optimizing Your Resource Utilization White Paper Introduction Semiconductor companies typically
More informationPerformance Workload Design
Performance Workload Design The goal of this paper is to show the basic principles involved in designing a workload for performance and scalability testing. We will understand how to achieve these principles
More informationA Hybrid Load Balancing Policy underlying Cloud Computing Environment
A Hybrid Load Balancing Policy underlying Cloud Computing Environment S.C. WANG, S.C. TSENG, S.S. WANG*, K.Q. YAN* Chaoyang University of Technology 168, Jifeng E. Rd., Wufeng District, Taichung 41349
More informationP2P VoIP for Today s Premium Voice Service 1
1 P2P VoIP for Today s Premium Voice Service 1 Ayaskant Rath, Stevan Leiden, Yong Liu, Shivendra S. Panwar, Keith W. Ross ARath01@students.poly.edu, {YongLiu, Panwar, Ross}@poly.edu, Steve.Leiden@verizon.com
More informationExtending the Internet of Things to IPv6 with Software Defined Networking
Extending the Internet of Things to IPv6 with Software Defined Networking Abstract [WHITE PAPER] Pedro Martinez-Julia, Antonio F. Skarmeta {pedromj,skarmeta}@um.es The flexibility and general programmability
More informationLCMON Network Traffic Analysis
LCMON Network Traffic Analysis Adam Black Centre for Advanced Internet Architectures, Technical Report 79A Swinburne University of Technology Melbourne, Australia adamblack@swin.edu.au Abstract The Swinburne
More informationAn Oracle White Paper February 2010. Rapid Bottleneck Identification - A Better Way to do Load Testing
An Oracle White Paper February 2010 Rapid Bottleneck Identification - A Better Way to do Load Testing Introduction You re ready to launch a critical Web application. Ensuring good application performance
More informationRapid Bottleneck Identification A Better Way to do Load Testing. An Oracle White Paper June 2009
Rapid Bottleneck Identification A Better Way to do Load Testing An Oracle White Paper June 2009 Rapid Bottleneck Identification A Better Way to do Load Testing. RBI combines a comprehensive understanding
More informationON-SITE/NEAR-SHORE/OFF-SITE DELIVERY MODELS
ON-SITE/NEAR-SHORE/OFF-SITE DELIVERY MODELS The delivery model utilized is based on the location(s) of the project resources in the service delivery. ONSITE DELIVERY MODEL Under the Onsite Delivery Model
More informationA Novel Framework for Improving Bandwidth Utilization for VBR Video Delivery over Wide-Area Networks
A Novel Framework for Improving Bandwidth Utilization for VBR Video Delivery over Wide-Area Networks Junli Yuan *, Sujoy Roy, Qibin Sun Institute for Infocomm Research (I 2 R), 21 Heng Mui Keng Terrace,
More informationCS423 Spring 2015 MP4: Dynamic Load Balancer Due April 27 th at 9:00 am 2015
CS423 Spring 2015 MP4: Dynamic Load Balancer Due April 27 th at 9:00 am 2015 1. Goals and Overview 1. In this MP you will design a Dynamic Load Balancer architecture for a Distributed System 2. You will
More informationR2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?
Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout
More informationHow To Balance A Web Server With Remaining Capacity
Remaining Capacity Based Load Balancing Architecture for Heterogeneous Web Server System Tsang-Long Pao Dept. Computer Science and Engineering Tatung University Taipei, ROC Jian-Bo Chen Dept. Computer
More informationAgent vs. Agent-less auditing
Centennial Discovery Agent vs. Agent-less auditing Building fast, efficient & dynamic audits As network discovery solutions have evolved over recent years, two distinct approaches have emerged: using client-based
More informationPERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM
PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM Akmal Basha 1 Krishna Sagar 2 1 PG Student,Department of Computer Science and Engineering, Madanapalle Institute of Technology & Science, India. 2 Associate
More informationRFC 2544 Testing of Ethernet Services in Telecom Networks
RFC 2544 Testing of Ethernet Services in Telecom Networks White Paper Nigel Burgess Agilent Technologies Introduction The object of this paper is to discuss the use and testing of Ethernet services in
More informationChapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)
Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely
More informationBenchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform
Benchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform Shie-Yuan Wang Department of Computer Science National Chiao Tung University, Taiwan Email: shieyuan@cs.nctu.edu.tw
More informationBroadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.
Broadband Networks Prof. Dr. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Bombay Lecture - 29 Voice over IP So, today we will discuss about voice over IP and internet
More informationComponent visualization methods for large legacy software in C/C++
Annales Mathematicae et Informaticae 44 (2015) pp. 23 33 http://ami.ektf.hu Component visualization methods for large legacy software in C/C++ Máté Cserép a, Dániel Krupp b a Eötvös Loránd University mcserep@caesar.elte.hu
More informationIMAV: An Intelligent Multi-Agent Model Based on Cloud Computing for Resource Virtualization
2011 International Conference on Information and Electronics Engineering IPCSIT vol.6 (2011) (2011) IACSIT Press, Singapore IMAV: An Intelligent Multi-Agent Model Based on Cloud Computing for Resource
More informationProtocol Data Units and Encapsulation
Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing
More information