Petri Net Simulation and Analysis of Network Management Based on Mobile Agent Technology

Size: px
Start display at page:

Download "Petri Net Simulation and Analysis of Network Management Based on Mobile Agent Technology"

Transcription

1 Simulation and Analysis of Network Management Based on Mobile Agent Technology Juraj Pukšec, Student Member, IEEE, Darije Ramljak and Darko Huljenić, Member, IEEE Abstract This paper presents advantages of applying analysis and simulation of Network Management based on Mobile Agent Technology. Mobile Agent Technology has proven to be very useful to network administrator for maintaining complex computer networks. By obtaining the simulation and analysis in early design phases for formal verification, some potential deadlocks and possible conflict activities can be discovered and avoided. Index Terms, Mobile Agents, Network Management, Simulation and Analysis. INTRODUCTION The Network management becomes of significant importance due to explosive growth and complexity of the computer networks. Monitoring and maintaining distributed servers within the computer network are very demanding and complicated tasks. The Network Management consists of monitoring and of control of network elements. Network monitoring involves observing and analysing the status of the network; and thus does not involve interface in the network functioning. Network control involves active interference and configuration of the state of the network. A Network Management System includes the management of the network elements and the use of a management protocol. The management protocol that has been extensively used is the Simple Network Management Protocol SNMP. The manager communicates with the SNMP agents executing on the managed nodes through the set of management primitives. The SNMP agents are static programs that execute on the managed nodes and provide the manager with the information it requests from time to time. The Network Management System secures the functionality of configuration of the network, monitoring of the network, studying the performance of the network, handling the security of the network and studying the alarms generated in the network [1]. The use of Mobile agents in distributed network management is expected to have a significant impact because Mobile agents can simultaneously perform different tasks on several locations (hosts) in the network. Mobile agents will be of excellent assistance to network administrator by performing different tasks like controlling and maintaining the computer network. This paper discusses application of Mobile agent for maintaining and management of the computer network. Mobile Agent checks the status of client computers, if there is no response from them Mobile agent will try to restart (reboot) the client. The task for Mobile agent is also checking the installed version of software programs on client computers, and if necessary, it will install new version(s). After performing task(s) agent(s) will notify the network administrator about performed job. The formal verification of the network was performed by using model. Simulation and Analysis of the constructed Petri net was performed by using DaNAMiCS tools. This paper is organised as follows: in the first section the overview of the mobile software agents is described. Second section deals with the application of mobile agents in the Network management. based simulation is presented in the third section. In the fourth section the results of analysis are discussed. Conclusions are given at the end. Juraj Pukšec, Darije Ramljak and Darko Huljenić are with Research and Development Center of Ericsson Nikola Tesla, Krapinska 45, HR Zagreb, Croatia. Tel.: , Fax.: {juraj.puksec, darije.ramljak, darko.huljenic }@etk.ericsson.se

2 I. MOBILE SOFTWARE AGENTS Client computer - CC i The Mobile agent concept has grown out of three earlier technologies: process migration (PM), remote evaluation (RE) and mobile objects. All these three technologies have been developed to improve on Remote Procedure Calling (RPC) for distributed programming. Mobile agents have improved these three technologies for distributed programming by providing a way for executable code, program state information and other data to be transferred to any host Agent considers necessary to carry out the actions specified in an application. Client computer - CC 1 Mobile Agent... Network Mobile Agent... Client computer - Mobile Agent CC n The basic characteristics of mobile agents are mobility, autonomy, intelligence, persistence, goal orientation, communication and activity. For Mobile agents it is very important to be autonomous. By term autonomous it is understood that the Mobile agent can make its own decision how to reach the given goals. A mobile agent is characterised by its behaviour, state and location. Behaviour is specified in class of an object inside the program. State of a mobile agent is stored in variables of an object. Location is a place where mobile agent performs certain actions in order to carry out its main task. Also, Mobile agent must have learning skills. The Mobile Agents have to learn about their environment and actions so that they can be more effective [2], [3]. II. APPLYING MOBILE AGENTS IN THE NETWORK MANAGEMENT In the Figure 1, computer network based on Mobile agents is presented. Mobile agents are programmed on the server side. The tasks for mobile agent are: checking the status of client computer, restarting the client computer (if needed), checking the version of installed software, and installation of software (if needed). Server computer SC Figure 1. The Computer network based on Mobile agents (LA) will visit every client computer within a computer network, first checking the status of the client computer, if the client computer works properly (1). After checking the status of the computer, LA will check the version of the installed software (2). After performing the given task Mobile agent will migrate to another client computer within the computer network (3). But if there is no response from the client computer or some unexpected event occurs LA will call the Restart agent (RA) to restart the client computer (4). Restart Agent (RA) will restart the client computer (5), and after restarting the computer LA agent will check the status of the computer again (6). If after several restarts computer does not respond Mobile agent will disconnect the computer from the network and send notification to the server computer (10). LA agent will check the version of installed software on client computer, and if necessary will call the Installer Agent (IA) from the server (7). IA agent will install the new software on the client computer (8), and then restart the client computer (9). Every action that Mobile agent performs will be reported to the server computer network administrator (10). Mobile agent system contains three Mobile agents: Local agent (LA), Restart agent (RA), and Installer Agent (IA). Task of Local Mobile Agent (LA) is to roam through the network and check the status of client computer and the version of installed software. Restart Agent (RA) is responsible for restart (reboot) of the client computer, and Installer Agent (AI) install the software programs on client computers. Further is explained the role of mobile agents on client computer. server computer LA RA IA notification 1) 4) 5) 10) client computer i checking the status of client computer 6) restart 8) 2) 3) 7) 9) checking the version of installed software installation All three Mobile agents are situated on server, Figure 2. Administrator of the computer network supervises all four agents. Administrator must define version of the installed software on the client computers (version for Web explorer, Mail tool, audio-video explorer, ). Local Mobile Agent Figure 2. The tasks for Mobile agents

3 A formal model of a distributed programming of a Mobile agent based network management is proposed in [4]. Multi agent system can be described as (1): A= {agent 1,... agent i..., agent n } (1) where A denotes multi agent system which consists of n cooperating and communicating Mobile Agents. These mobile agents perform the service requests by their users in this multi agent system. This system can be described as: III. PETRI NET BASED SIMULATION Before the programming took place the simulation was performed. The main task of the simulation and results analysis is the control of are checking the formal properties of the proposed solution, particularly liveness, in early phases of the project in order to avoid potential deadlocks and possible conflict activities. A= {LA, RA, IA} (2) The multi agent system can be consider as a distributed system whose processing nodes communicate. A set of processing nodes is denoted as: server CC1 CCi S= {S 1,..., S i,..., S n } (3) Each node, S i, is characterised by a set of services it provides. According to [4] and [5] Mobile agent based network is defined as a triple: MAN = {A, S, N} (4) A defines a multi agent system consisting of the cooperating and communicating mobile agents, S denotes the set of processing nodes capable of serving the agents and N stands for the network that connects the nodes and provides an agent migration. Mobile agent can migrate autonomously from client to client (node to node), to perform the tasks on behalf of the network administrator. It can be defined as: Agent = {idno, address, service, verinfo, installation} (4) where idno is a unique identification number of the agent, address denotes its location, service means check if there is a respond from the client and restart if there is no answer from the client, verinfo is number of the latest software version and instalation will be performed if latest version of software is not installed on the client computer. In this paper multi agent system operating on the behalf of a network administrator will be discussed. An agent will be programmed on a server and will be spread throughout the computer network. The agent will migrate from node to node in the computer network and will perform management tasks. CCn Figure 3. The model In the Figure 3 the Petri net model is proposed [6], [7], [8]. The was constructed according to model and the set of tasks that are given to the Mobile agents, presented in the Figure 2. The constructed is presented in the Figure 4. In order to simplify the, according to Figure 1, constructed computer network has one server computer (places pp1, pp2, pp3, pp4 and ps5) and three client computers (p1-p12, p13-p24, and p25-p36). In pp1 state Local mobile agents (LA) are created (programmed), and they migrate in the network to the first client computer. When the agent arrives to a client computer (p1), it will check the status of the computer. If there is a response from the computer, agent will check the version of the installed software (p2). If the computer does not work properly (p4) Local agent will call Restart agent (pp2). Restart agent (RA) will try to restart the computer (p7) and check its status again. If after three restarts computer does not respond the Mobile agent will disconnect the computer from the network (p8 and p12). After installation of software (p10 and p11) computer must be restarted (p7), if needed. All performed actions Local agent (LA) will report to the administrator after returning to the server (pp5). After visiting one client computer and performing all necessary action, Local agent will migrate to another computer within the network and perform assigned tasks. Different situations are investigated by simulating all possible operations. In this model several possible situation are demonstrated:

4 t1 t2 t3 t4 t5 t6 t7 t8 t11 t9 t10 t12 t13 t14 t15 t16 t17 t18 t19 t20 t23 t21 t22 t24 t25 t26 t27 t28 t29 t30 t31 t34 t35 t32 t33 t36 t37 t38 t39 P1 P2 P3 P4 P9 P5 P6 P7 P8 P10 P11 P12 P13 P14 P15 P16 P17 P18 P19 P20 P24 P21 P22 P23 P25 P26 P27 P28 P29 P30 P31 P32 P36 P33 P34 P35 PP1 PP2 PP3 PP4 PP5 server CCi CC n CC1 Figure 4.

5 regular transitions everything is working properly: pp1 p1 p2 p3 p13 p14 p15 p25 p26 p27 pp4,pp5, client 1 does not respond (p3): pp1 p1,p4 p5,pp2 p6 p7,p8 p1 p2 client 2 does not respond (p12): p13,p16 p17,pp2 p18 p19,p20 p13 p14 client 3 does not respond (p22) not even after three restarts: p25,p28 p29,pp2 p30 p31,p32 p25,p28 p29,pp2 p30 p31,p32 p25,p28 p29,pp2 p30 p31,p32 p36 client 1 needs to install new version of software (p7): pp1 p1 p2,p9 p10 p11 p7 p1 p2 p3 client 2 needs to install new version of software (p17), p13 p14,p21 p22 p23 p19 p13 p14 p15... client 3 needs to install new version of software (p26),... p25 p26,p33 p34 p23 p20 p21 p26 ps1,ps3 some unpredicted situations that may occur if there is a problem with restart of the system. By using Java-based Petri net tool DaNAMiCS [9] simulations were performed, Figure 5. IV. RESULTS ANALYSIS The DaNAMiCS tool was used for the simulation of the Petri net. consists of 31 places and 28 transition. Petri net has been applied because of complex demand on the system and the configuration of the network. Inhibition arcs were used for modelling error conditions. This is explained by the fact that from every regular place transition is possible to next regular place but if some error Figure 5. DaNAMiCS simulation

6 occurs (the client computers does not respond) or some unpredicted situations happen agent will drop to the place where some changes must be made. Applying Petri net simulation before the programming has proved to be very useful. From the simulation results for checking the response of the client. Administrator should allow the mobile agent to restart the system for a maximum 3 times. If after several restarts of the system computer does not respond, mobile agent has to disconnect the computer from the network and notify the network administrator about some unpredicted errors. The is live and there are no deadlocks in the model. Conflict transitions are only transitions that model regular continuation and error-initiated termination, such as: (t1, t12), (t2, t3), (t4, t9), (t13, t24), (t14, t15), (t16, t21), (t26, t27), i (t28, t32). These conflicts are intentional and they describe mutually exclusive actions. The only unbounded places in the model were those collecting tokens for statistical purposes. Therefore, the modelled net is also persistent and has a home state. From the simulation results we can conclude that the constructed Petri net is error-free. After the Petri net simulation was performed, the programming of the Mobile agents took place. Performing formal description by using s we defined the role of Mobile agents on client computer. Programming of Mobile agents can be performed on any platform. CONCLUSION simulation and result analysis of Network Management based on Mobile Agent Technology is described in the paper. Petri net models were used for clarifying service concepts and implementation. Formal verification and simulation based on derived Petri net proved to be useful in early design phases. Petri net models and the analysis based on them were found to be an efficient way to improve design process and project controllability. REFERENCES [1] A. Sahai, C. Morin, Mobile Agents for Enabling Mobile User Aware Applications, IEEE Network Operations and Management Symposium - NOMS 98, pp , vol. 2., February 15 20, [2] J. Pukšec, The Maintenance of Internet Service Nodes by using Mobile Software Agents, Master Thesis, University of Zagreb Faculty of Electrical Engineering and Computing, Croatia, 2001, (in Croatian). [3] W. T. Cockayne, M. Zyda, Mobile Agents, Manning Publications Co, USA, [4] V. Sinković, I. Lovrek, Genetic Algorithm of a Mobile Agent Network Suitable for Performance Evaluation, Proc. of KES 2000 Conf., pp Brighton, UK. [5] G. Ježić, M. Kušek, I. Ljubi, Mobile Agent Based Distributed Web Management, Proc. of KES 2000 Conf., Brighton, UK, pp [6] J. L. Peterson, Theory and the Modelling of systems, Prentice-Hall, Englewood Cliffs, [7] I. Lovrek, Modelling Telecommunications Processes Theory and Application of s, Skolska knjiga, Zagreb, (in Croatian). [8] J. Pukšec, M. Opsenica, D. Frank, V. Maričić, K. P. Valavanis, I. Lovrek, based Modelling and Simulation of Alert System, Proc. of 10 th MELECON 2000 Conf., vol. 1, pp , Lemesos, Cyprus, [9] DaNAMiCS documentation - /DNA /DaNAMiCS/

Self-organized Multi-agent System for Service Management in the Next Generation Networks

Self-organized Multi-agent System for Service Management in the Next Generation Networks PROCEEDINGS OF THE WORKSHOP ON APPLICATIONS OF SOFTWARE AGENTS ISBN 978-86-7031-188-6, pp. 18-24, 2011 Self-organized Multi-agent System for Service Management in the Next Generation Networks Mario Kusek

More information

A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS

A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS Tarag Fahad, Sufian Yousef & Caroline Strange School of Design and Communication Systems, Anglia Polytechnic University Victoria

More information

UML SUPPORTED SOFTWARE DESIGN

UML SUPPORTED SOFTWARE DESIGN UML SUPPORTED SOFTWARE DESIGN Darko Gvozdanović, Saša Dešić, Darko Huljenić Ericsson Nikola Tesla d.d., Krapinska 45, HR-0000 Zagreb, Croatia, tel.: +385 365 3889, faks: +385 365 3548, e-mail: darko.gvozdanovic@etk.ericsson.se

More information

A Multi-Agent Approach to a Distributed Schedule Management System

A Multi-Agent Approach to a Distributed Schedule Management System UDC 001.81: 681.3 A Multi-Agent Approach to a Distributed Schedule Management System VYuji Wada VMasatoshi Shiouchi VYuji Takada (Manuscript received June 11,1997) More and more people are engaging in

More information

Test Coverage Criteria for Autonomous Mobile Systems based on Coloured Petri Nets

Test Coverage Criteria for Autonomous Mobile Systems based on Coloured Petri Nets 9th Symposium on Formal Methods for Automation and Safety in Railway and Automotive Systems Institut für Verkehrssicherheit und Automatisierungstechnik, TU Braunschweig, 2012 FORMS/FORMAT 2012 (http://www.forms-format.de)

More information

Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing

Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing www.ijcsi.org 227 Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing Dhuha Basheer Abdullah 1, Zeena Abdulgafar Thanoon 2, 1 Computer Science Department, Mosul University,

More information

PETRI NET BASED SUPERVISORY CONTROL OF FLEXIBLE BATCH PLANTS. G. Mušič and D. Matko

PETRI NET BASED SUPERVISORY CONTROL OF FLEXIBLE BATCH PLANTS. G. Mušič and D. Matko PETRI NET BASED SUPERVISORY CONTROL OF FLEXIBLE BATCH PLANTS G. Mušič and D. Matko Faculty of Electrical Engineering, University of Ljubljana, Slovenia. E-mail: gasper.music@fe.uni-lj.si Abstract: The

More information

University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP

University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP This Conference or Workshop Item Adda, Mo, Kasassbeh, M and Peart, Amanda (2005) A survey of network fault management. In: Telecommunications

More information

NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage

NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage AdRem NetCrunch 6 Network Monitoring Server With NetCrunch, you always know exactly what is happening with your critical applications, servers, and devices. Document Explore physical and logical network

More information

The EMSX Platform. A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks. A White Paper.

The EMSX Platform. A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks. A White Paper. The EMSX Platform A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks A White Paper November 2002 Abstract: The EMSX Platform is a set of components that together provide

More information

Traffic Control by Influencing User Behavior

Traffic Control by Influencing User Behavior Traffic Control by Influencing User Behavior We examined a means of influencing user behavior to reduce the number of repeated calls by providing information to users and controlling the traffic before

More information

Computer Network Intrusion Detection, Assessment And Prevention Based on Security Dependency Relation

Computer Network Intrusion Detection, Assessment And Prevention Based on Security Dependency Relation Computer Network Intrusion Detection, Assessment And Prevention Based on Security Dependency Relation Stephen S. Yau and Xinyu Zhang Computer Science and Engineering Department Arizona State University

More information

Monitoring Data Visualization and Agent-based Software Management for the Grid

Monitoring Data Visualization and Agent-based Software Management for the Grid Elektrotehniški vestnik XX(Y): 1 6, YEAR Electrotechnical Review, Ljubljana, Slovenija Monitoring Data Visualization and Agent-based Software Management for the Grid Maja Matijašević and Gordan Ježić University

More information

An Active Packet can be classified as

An Active Packet can be classified as Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems

More information

A Study of Application Recovery in Mobile Environment Using Log Management Scheme

A Study of Application Recovery in Mobile Environment Using Log Management Scheme A Study of Application Recovery in Mobile Environment Using Log Management Scheme A.Ashok, Harikrishnan.N, Thangavelu.V, ashokannadurai@gmail.com, hariever4it@gmail.com,thangavelc@gmail.com, Bit Campus,

More information

Design and Development of SMS Based Wireless Home Appliance Control and Security System

Design and Development of SMS Based Wireless Home Appliance Control and Security System Journal of Modern Science and Technology Vol. 3. No. 1. March 2015 Issue. Pp.80-87 Design and Development of SMS Based Wireless Home Appliance Control and Security System Md. Abdullah Al Asad *, Md. Al

More information

GOAL-BASED INTELLIGENT AGENTS

GOAL-BASED INTELLIGENT AGENTS International Journal of Information Technology, Vol. 9 No. 1 GOAL-BASED INTELLIGENT AGENTS Zhiqi Shen, Robert Gay and Xuehong Tao ICIS, School of EEE, Nanyang Technological University, Singapore 639798

More information

Achieving collaborative service provisioning for mobile network users: the CollDown example

Achieving collaborative service provisioning for mobile network users: the CollDown example SPECIAL ISSUE Achieving collaborative service provisioning for mobile network users: the CollDown example VEDRAN PODOBNIK, IVA BOJIC, LUKAVRDOLJAK, MARIO KUSEK University of Zagreb, Faculty of Electrical

More information

Implementation of a NAT and Firewall Traversal Library

Implementation of a NAT and Firewall Traversal Library Implementation of a NAT and Firewall Traversal Library Damien Auroux Supervisors: Prof. Karl Aberer Nicolas Bonvin Distributed Systems Laboratory January 1, 2009 Presentation Outline I- Motivations and

More information

Use of Agent-Based Service Discovery for Resource Management in Metacomputing Environment

Use of Agent-Based Service Discovery for Resource Management in Metacomputing Environment In Proceedings of 7 th International Euro-Par Conference, Manchester, UK, Lecture Notes in Computer Science 2150, Springer Verlag, August 2001, pp. 882-886. Use of Agent-Based Service Discovery for Resource

More information

Roulette Wheel Selection Model based on Virtual Machine Weight for Load Balancing in Cloud Computing

Roulette Wheel Selection Model based on Virtual Machine Weight for Load Balancing in Cloud Computing IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 5, Ver. VII (Sep Oct. 2014), PP 65-70 Roulette Wheel Selection Model based on Virtual Machine Weight

More information

A Study on Integrated Security Service Control Solution Development about CRETA Security

A Study on Integrated Security Service Control Solution Development about CRETA Security A Study on Integrated Security Service Control Solution Development about CRETA Security Yongwon (Conrad) Cho 1, Jinwon (Frank) Choi 2 1 Director Research Engineer, Virtual Builders Co., Ltd. 2 CEO & Co-Founder,

More information

ARTIFICIAL INTELLIGENCE METHODS IN EARLY MANUFACTURING TIME ESTIMATION

ARTIFICIAL INTELLIGENCE METHODS IN EARLY MANUFACTURING TIME ESTIMATION 1 ARTIFICIAL INTELLIGENCE METHODS IN EARLY MANUFACTURING TIME ESTIMATION B. Mikó PhD, Z-Form Tool Manufacturing and Application Ltd H-1082. Budapest, Asztalos S. u 4. Tel: (1) 477 1016, e-mail: miko@manuf.bme.hu

More information

Performance advantages of resource sharing in polymorphic optical networks

Performance advantages of resource sharing in polymorphic optical networks R. J. Durán, I. de Miguel, N. Merayo, P. Fernández, R. M. Lorenzo, E. J. Abril, I. Tafur Monroy, Performance advantages of resource sharing in polymorphic optical networks, Proc. of the 0th European Conference

More information

OpenSAF A Standardized HA Solution

OpenSAF A Standardized HA Solution OpenSAF A Standardized HA Solution LinuxCON Edinburgh, UK 2013-10-21 Anders Widell Ericsson AB Outline What are OpenSAF and SA Forum? What is Service Availability? Simple Use Case: Web server The OpenSAF

More information

KNOWLEGDE MANAGEMENT AND IT S APPLICATION IN CROATIAN COMPANIES

KNOWLEGDE MANAGEMENT AND IT S APPLICATION IN CROATIAN COMPANIES 416 KNOWLEGDE MANAGEMENT AND IT S APPLICATION IN CROATIAN COMPANIES Postgraduate specialists study Organization and Management Osijek ABSTRACT Following the trends of recent business, emerges the need

More information

Intelligent Log Analyzer. André Restivo <andre.restivo@portugalmail.pt>

Intelligent Log Analyzer. André Restivo <andre.restivo@portugalmail.pt> Intelligent Log Analyzer André Restivo 9th January 2003 Abstract Server Administrators often have to analyze server logs to find if something is wrong with their machines.

More information

Communications Management. 3ICT12 (with thanks to Prof. George Pavlou, University of Surrey)

Communications Management. 3ICT12 (with thanks to Prof. George Pavlou, University of Surrey) Communications Management 3ICT12 (with thanks to Prof. George Pavlou, University of Surrey) 1 Communications Management Network Management Overview What is Network Management? Manager Agent Model OSI Management:

More information

Alert ALARM MANAGEMENT

Alert ALARM MANAGEMENT by Alert ALARM MANAGEMENT Alert To inform and to alert Alert is able to treat alarms or intervention demand coming from different sources: Supervisor software (SCADA), via DDE, OPC or dedicated interface

More information

Virtualization Technology using Virtual Machines for Cloud Computing

Virtualization Technology using Virtual Machines for Cloud Computing International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) Virtualization Technology using Virtual Machines for Cloud Computing T. Kamalakar Raju 1, A. Lavanya 2, Dr. M. Rajanikanth 2 1,

More information

Fuzzy Cognitive Map for Software Testing Using Artificial Intelligence Techniques

Fuzzy Cognitive Map for Software Testing Using Artificial Intelligence Techniques Fuzzy ognitive Map for Software Testing Using Artificial Intelligence Techniques Deane Larkman 1, Masoud Mohammadian 1, Bala Balachandran 1, Ric Jentzsch 2 1 Faculty of Information Science and Engineering,

More information

Supervision software for Intrusion detection, Fire detection and CCTV systems

Supervision software for Intrusion detection, Fire detection and CCTV systems Supervision software for Intrusion detection, Fire detection and CCTV systems elmospa.com Global security solutions Globalpro GLOBALPRO is the new supervision software that allows to obtain a powerful

More information

An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents

An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents M. Anber and O. Badawy Department of Computer Engineering, Arab Academy for Science and Technology

More information

Load balancing algorithms for TINA networks. 1. Introduction. Maria Kihl, Niklas Widell and Christian Nyberg

Load balancing algorithms for TINA networks. 1. Introduction. Maria Kihl, Niklas Widell and Christian Nyberg This is an author produced version of a conference paper presented at the International Teletraffic Congress - ITC-16, Edinburgh International Conference Centre, United Kingdom, 7-11 June, 1999. This paper

More information

Research and realization of Resource Cloud Encapsulation in Cloud Manufacturing

Research and realization of Resource Cloud Encapsulation in Cloud Manufacturing www.ijcsi.org 579 Research and realization of Resource Cloud Encapsulation in Cloud Manufacturing Zhang Ming 1, Hu Chunyang 2 1 Department of Teaching and Practicing, Guilin University of Electronic Technology

More information

USING MOBILE AGENTS TO IMPROVE PERFORMANCE OF NETWORK MANAGEMENT OPERATIONS

USING MOBILE AGENTS TO IMPROVE PERFORMANCE OF NETWORK MANAGEMENT OPERATIONS USING MOBILE AGENTS TO IMPROVE PERFORNCE OF NETWORK NAGEMENT OPERATIONS Iwan Adhicandra, Colin Pattinson, Ebrahim Shaghouei Computer Communications Research Group, School of Computing, Leeds Metropolitan

More information

Distributed Data Management

Distributed Data Management Introduction Distributed Data Management Involves the distribution of data and work among more than one machine in the network. Distributed computing is more broad than canonical client/server, in that

More information

Performance Evaluation of Mobile Agent-based Dynamic Load Balancing Algorithm

Performance Evaluation of Mobile Agent-based Dynamic Load Balancing Algorithm Performance Evaluation of Mobile -based Dynamic Load Balancing Algorithm MAGDY SAEB, CHERINE FATHY Computer Engineering Department Arab Academy for Science, Technology & Maritime Transport Alexandria,

More information

Survey on Models to Investigate Data Center Performance and QoS in Cloud Computing Infrastructure

Survey on Models to Investigate Data Center Performance and QoS in Cloud Computing Infrastructure Survey on Models to Investigate Data Center Performance and QoS in Cloud Computing Infrastructure Chandrakala Department of Computer Science and Engineering Srinivas School of Engineering, Mukka Mangalore,

More information

A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS

A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS Chandanpreet Kaur Global Institute of Management and Emerging Technologies, Amritsar, Punjab, India, lpu_chandan@yahoo.co.in

More information

Access Control and Operating Conditions Monitoring System for Telecommunication and Server Racks

Access Control and Operating Conditions Monitoring System for Telecommunication and Server Racks Access Control and Operating Conditions Monitoring System for Telecommunication and Server Racks Why is Supracontrol so superior? It adjusts to the existing access identification system It adjusts to the

More information

Methodological norms for the application of the Government Emergency Ordinance no. 105/ 2001 regarding the Romanian state border

Methodological norms for the application of the Government Emergency Ordinance no. 105/ 2001 regarding the Romanian state border Methodological norms for the application of the Government Emergency Ordinance no. 105/ 2001 regarding the Romanian state border CHAPTER I General Provisions ART. 1 The legal regime of the state border

More information

A New Hybrid Load Balancing Algorithm in Grid Computing Systems

A New Hybrid Load Balancing Algorithm in Grid Computing Systems A New Hybrid Load Balancing Algorithm in Grid Computing Systems Leyli Mohammad Khanli 1, Behnaz Didevar 2 1 University of Tabriz, Department of Computer Science, 2 Department of Technical and Engineering,

More information

BS 7 SIS Safety Information System Green Light for Your Production

BS 7 SIS Safety Information System Green Light for Your Production BS 7 SIS Safety Information System Green Light for Your Production SIS - GreCon Safety Information System The Challenge The Solution In big industrial plants, such as wood based panel productions, there

More information

Performance Oriented Management System for Reconfigurable Network Appliances

Performance Oriented Management System for Reconfigurable Network Appliances Performance Oriented Management System for Reconfigurable Network Appliances Hiroki Matsutani, Ryuji Wakikawa, Koshiro Mitsuya and Jun Murai Faculty of Environmental Information, Keio University Graduate

More information

Udai Shankar 2 Deptt. of Computer Sc. & Engineering Madan Mohan Malaviya Engineering College, Gorakhpur, India

Udai Shankar 2 Deptt. of Computer Sc. & Engineering Madan Mohan Malaviya Engineering College, Gorakhpur, India A Protocol for Concurrency Control in Real-Time Replicated Databases System Ashish Srivastava 1 College, Gorakhpur. India Udai Shankar 2 College, Gorakhpur, India Sanjay Kumar Tiwari 3 College, Gorakhpur,

More information

CONFORMED COPY. Method Statement Helpdesk Services. Revision History. Revision Date Reviewer Status. 23 March 2007 Project Co Final Version

CONFORMED COPY. Method Statement Helpdesk Services. Revision History. Revision Date Reviewer Status. 23 March 2007 Project Co Final Version CONFORMED COPY Method Statement Revision History Revision Date Reviewer Status 23 March 2007 Project Co Final Version Table of Contents 1 Objectives... 3 2 Management Supervision and Organisation Structure...

More information

High-Mix Low-Volume Flow Shop Manufacturing System Scheduling

High-Mix Low-Volume Flow Shop Manufacturing System Scheduling Proceedings of the 14th IAC Symposium on Information Control Problems in Manufacturing, May 23-25, 2012 High-Mix Low-Volume low Shop Manufacturing System Scheduling Juraj Svancara, Zdenka Kralova Institute

More information

Coverability for Parallel Programs

Coverability for Parallel Programs 2015 http://excel.fit.vutbr.cz Coverability for Parallel Programs Lenka Turoňová* Abstract We improve existing method for the automatic verification of systems with parallel running processes. The technique

More information

Lightweight Monitoring of Label Switched Paths for Bandwidth Management

Lightweight Monitoring of Label Switched Paths for Bandwidth Management Lightweight ing of Label Switched Paths for Bandwidth Management P. Vilà, J.L. Marzo, E. Calle, L. Carrillo Institut d Informàtica i Aplicacions Universitat de Girona Girona (Spain) { perev marzo eusebi

More information

The Advantages of Using Mobile Agents in Software for Telecommunications

The Advantages of Using Mobile Agents in Software for Telecommunications The Advantages of Using Mobile Agents in Software for Telecommunications Luis Moura Silva Leonor Almeida University of Coimbra SIEMENS S.A. Polo II, Dep. Eng. Informatica Rua Irmãos Siemens Nº 1 3030 Coimbra,

More information

Building Reusable Mobile Agents for Network Management

Building Reusable Mobile Agents for Network Management IEEE TRANSACTIONS SYSTEMS, MAN, AND CYBERNETICS PART C: APPLICATION AND REVIEWS, VOL. 33, NO. 3, AUGUST 2003 350 Building Reusable Mobile Agents for Network Management Ichiro Satoh Member, IEEE, Abstract

More information

Integration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Microsoft DirectAccess

Integration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Microsoft DirectAccess SafeNet Authentication Service Integration Guide SAS Using RADIUS Protocol with Microsoft DirectAccess Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet,

More information

Neural Network Applications in Stock Market Predictions - A Methodology Analysis

Neural Network Applications in Stock Market Predictions - A Methodology Analysis Neural Network Applications in Stock Market Predictions - A Methodology Analysis Marijana Zekic, MS University of Josip Juraj Strossmayer in Osijek Faculty of Economics Osijek Gajev trg 7, 31000 Osijek

More information

Cloud Computing for Agent-based Traffic Management Systems

Cloud Computing for Agent-based Traffic Management Systems Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion

More information

APPLICATION NOTE. Ethernet Configuration Guide for D-500 D-700

APPLICATION NOTE. Ethernet Configuration Guide for D-500 D-700 Tel: +90-216 466 84 60 Fax: +90-216 364 65 65 datakom@datakom.com.tr http://www.datakom.com.tr APPLICATION NOTE Ethernet Configuration Guide for D-500 D-700 PRODUCTS AFFECTED: D-500 / D-700 WRITTEN BY:

More information

Building and Selecting Mobile Agents 2.1

Building and Selecting Mobile Agents 2.1 Building and Selecting Mobile Agents for Network Management Ichiro Satoh National Institute of Informatics 2-1-2 Hitotsubashi, Chiyoda-ku, Tokyo 101-8430, Japan Tel: +81-3-4212-2546 Fax: +81-3-3556-1916

More information

MANAGING OF IMMENSE CLOUD DATA BY LOAD BALANCING STRATEGY. Sara Anjum 1, B.Manasa 2

MANAGING OF IMMENSE CLOUD DATA BY LOAD BALANCING STRATEGY. Sara Anjum 1, B.Manasa 2 INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE MANAGING OF IMMENSE CLOUD DATA BY LOAD BALANCING STRATEGY Sara Anjum 1, B.Manasa 2 1 M.Tech Student, Dept of CSE, A.M.R. Institute

More information

Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets

Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets # K.Deepika 1, M.Tech Computer Science Engineering, Mail: medeepusony@gmail.com # K.Meena 2, Assistant Professor

More information

COMPUTER NETWORKS SECOND EDITION. ANDREW S.fjANENBAUM. Vrije Universiteit Amsterdam, The Netherlands. Nachrichtentechnische Bib'iothek THD Inv.

COMPUTER NETWORKS SECOND EDITION. ANDREW S.fjANENBAUM. Vrije Universiteit Amsterdam, The Netherlands. Nachrichtentechnische Bib'iothek THD Inv. COMPUTER NETWORKS SECOND EDITION ANDREW S.fjANENBAUM Vrije Universiteit Amsterdam, The Netherlands Nachrichtentechnische Bib'iothek THD Inv.-Ni,: tq(s ULB Darmstadt iiiiiir 17800787 =3JE Prentice-Hall

More information

Efficient DNS based Load Balancing for Bursty Web Application Traffic

Efficient DNS based Load Balancing for Bursty Web Application Traffic ISSN Volume 1, No.1, September October 2012 International Journal of Science the and Internet. Applied However, Information this trend leads Technology to sudden burst of Available Online at http://warse.org/pdfs/ijmcis01112012.pdf

More information

Assessment of RLG Trusted Digital Repository Requirements

Assessment of RLG Trusted Digital Repository Requirements Assessment of RLG Trusted Digital Repository Requirements Reagan W. Moore San Diego Supercomputer Center 9500 Gilman Drive La Jolla, CA 92093-0505 01 858 534 5073 moore@sdsc.edu ABSTRACT The RLG/NARA trusted

More information

Distributed Systems. REK s adaptation of Prof. Claypool s adaptation of Tanenbaum s Distributed Systems Chapter 1

Distributed Systems. REK s adaptation of Prof. Claypool s adaptation of Tanenbaum s Distributed Systems Chapter 1 Distributed Systems REK s adaptation of Prof. Claypool s adaptation of Tanenbaum s Distributed Systems Chapter 1 1 The Rise of Distributed Systems! Computer hardware prices are falling and power increasing.!

More information

Multi-Agent System for Management and Monitoring of Routes Surveillance

Multi-Agent System for Management and Monitoring of Routes Surveillance Multi-Agent System for Management and Monitoring of Routes Surveillance Sara Rodríguez and Javier Bajo Departamento de Informática y Automática, Universidad de Salamanca Plaza de la Merced s/n, 37008,

More information

Meeting Scheduling with Multi Agent Systems: Design and Implementation

Meeting Scheduling with Multi Agent Systems: Design and Implementation Proceedings of the 6th WSEAS Int. Conf. on Software Engineering, Parallel and Distributed Systems, Corfu Island, Greece, February 16-19, 2007 92 Meeting Scheduling with Multi Agent Systems: Design and

More information

Real Time Remote Monitoring over Cellular Networks. Wayne Chen Marketing Specialist

Real Time Remote Monitoring over Cellular Networks. Wayne Chen Marketing Specialist Real Time Remote Monitoring over Cellular Networks Wayne Chen Marketing Specialist Introduction For distribution infrastructures located in remote, isolated areas, unmanned monitoring systems have long

More information

How To Detect An Advanced Persistent Threat Through Big Data And Network Analysis

How To Detect An Advanced Persistent Threat Through Big Data And Network Analysis , pp.30-36 http://dx.doi.org/10.14257/astl.2013.29.06 Detection of Advanced Persistent Threat by Analyzing the Big Data Log Jisang Kim 1, Taejin Lee, Hyung-guen Kim, Haeryong Park KISA, Information Security

More information

Technical Note #31. GE PMCS App Note 31 Page 1 of 5. RAS - Host and View Node. RAS - Host Configuration with No Network Adapter Installed:

Technical Note #31. GE PMCS App Note 31 Page 1 of 5. RAS - Host and View Node. RAS - Host Configuration with No Network Adapter Installed: GE PMCS App Note 31 Page 1 of 5 Technical Note #31 RAS - Host and View Node Subject: Configuring a Host and a View Node to communicate via modems. Applies To: PMCS 5.0 / Windows NT 3.51. For later versions

More information

BACnet Alarming Revised. The BACnet data and services model for event reporting was developed. BACnet Today & the Smart Grid

BACnet Alarming Revised. The BACnet data and services model for event reporting was developed. BACnet Today & the Smart Grid BACnet Today & the Smart Grid This article was published in ASHRAE Journal, November 2011. Copyright 2011 American Society of Heating, Refrigerating and Air-Conditioning Engineers, Inc. Posted at www.ashrae.org.

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

A Multiagent Model for Intelligent Distributed Control Systems

A Multiagent Model for Intelligent Distributed Control Systems A Multiagent Model for Intelligent Distributed Control Systems José Aguilar, Mariela Cerrada, Gloria Mousalli, Franklin Rivas, and Francisco Hidrobo CEMISID, Dpto. de Computación, Facultad de Ingeniería,

More information

How To Monitor Performance On Eve

How To Monitor Performance On Eve Performance Monitoring on Networked Virtual Environments C. Bouras 1, 2, E. Giannaka 1, 2 Abstract As networked virtual environments gain increasing interest and acceptance in the field of Internet applications,

More information

Online Auction Software Fundamentals

Online Auction Software Fundamentals 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Online Auction Software Fundamentals Jarrod Trevathan +, Wayne Read and Rodel Balingit

More information

ADAPTIVE LOAD BALANCING ALGORITHM USING MODIFIED RESOURCE ALLOCATION STRATEGIES ON INFRASTRUCTURE AS A SERVICE CLOUD SYSTEMS

ADAPTIVE LOAD BALANCING ALGORITHM USING MODIFIED RESOURCE ALLOCATION STRATEGIES ON INFRASTRUCTURE AS A SERVICE CLOUD SYSTEMS ADAPTIVE LOAD BALANCING ALGORITHM USING MODIFIED RESOURCE ALLOCATION STRATEGIES ON INFRASTRUCTURE AS A SERVICE CLOUD SYSTEMS Lavanya M., Sahana V., Swathi Rekha K. and Vaithiyanathan V. School of Computing,

More information

T-79.186 Reactive Systems: Introduction and Finite State Automata

T-79.186 Reactive Systems: Introduction and Finite State Automata T-79.186 Reactive Systems: Introduction and Finite State Automata Timo Latvala 14.1.2004 Reactive Systems: Introduction and Finite State Automata 1-1 Reactive Systems Reactive systems are a class of software

More information

HOW TO REMOTELY CONNECT TO THE FIU NETWORK VIA VPN

HOW TO REMOTELY CONNECT TO THE FIU NETWORK VIA VPN HOW TO REMOTELY CONNECT TO THE FIU NETWORK VIA VPN FLORIDA INTERNATIONAL UNIVERSITY HERBERT WERTHEIM COLLEGE OF MEDICINE OFFICE OF INFORMATION TECHNOLOGY Modesto A. Maidique Campus, 11200 S. W. 8 th St.,

More information

Integrated Healthcare Information System. Darko Gvozdanović, M.Sc.E.E. Department manager e-health

Integrated Healthcare Information System. Darko Gvozdanović, M.Sc.E.E. Department manager e-health Integrated Healthcare Information System Darko Gvozdanović, M.Sc.E.E. Department manager e-health Agenda Healthcare challenges Ericsson addressing the challenges Integrated Healthcare Information System

More information

OMC Solution IP Radios

OMC Solution IP Radios DATASHEET OMC Solution IP Radios COST EFFECTIVE E2E REMOTE NETWORK MANAGEMENT Intuitive, User Friendly GUI E2E Management of Transmission/Backhaul System Lower Total Cost of Ownership Simplified Remote

More information

Reallocation and Allocation of Virtual Machines in Cloud Computing Manan D. Shah a, *, Harshad B. Prajapati b

Reallocation and Allocation of Virtual Machines in Cloud Computing Manan D. Shah a, *, Harshad B. Prajapati b Proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA-14) Reallocation and Allocation of Virtual Machines in Cloud Computing Manan

More information

secure Agent Secure Enterprise Solutions Remote Recovery from a Data Center Outage SecureAgent Software www.secureagent.com

secure Agent Secure Enterprise Solutions Remote Recovery from a Data Center Outage SecureAgent Software www.secureagent.com secure Agent Secure Enterprise Solutions SecureAgent Software Disaster Recovery Remote Recovery from a Data Center Outage SecureAgent Software 2448 E. 81 st St., Ste. 2000 Tulsa OK 74137-4271 USA Tel:

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

Integrated management information in utilities

Integrated management information in utilities Integrated management information in utilities Information from Cigré The objective of this article is to assist utilities define, specify and evaluate the high level management systems that form the information

More information

UPSMON PRO Linux --- User Manual

UPSMON PRO Linux --- User Manual UPSMON PRO Linux --- User Manual Version : 2.1 *Attention : root authority is necessary to execute at Linux here AA. UPSMON PRO Install 2 BB. UPSMON PRO Start 3 CC. UPSMON PRO Status 6 DD. UPSMON PRO Config

More information

Building Remote Access VPNs

Building Remote Access VPNs Building Remote Access VPNs 124 Grove Street, Suite 309 Franklin, MA 02038 877-4-ALTIGA www.altiga.com Building Remote Access VPNs: Harnessing the Power of the Internet to Reduce Costs and Boost Performance

More information

Frequently Asked Questions

Frequently Asked Questions Connecting HealthCare Providers, Institutions, Consortiums and Students for Superior Workforce Development Frequently Asked Questions ClientSolv Technologies 7730 E. Belleview Ave, A-201 Englewood, CO

More information

Energy Consumption in Android Phones when using Wireless Communication Technologies

Energy Consumption in Android Phones when using Wireless Communication Technologies Energy Consumption in Android Phones when using Wireless Communication Technologies Goran Kalic, Iva Bojic and Mario Kusek University of Zagreb Faculty of Electrical Engineering and Computing Unska 3,

More information

Dynamic Query Updation for User Authentication in cloud Environment

Dynamic Query Updation for User Authentication in cloud Environment Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,

More information

Examining Performance Issues of Multiagent Systems

Examining Performance Issues of Multiagent Systems Course Number: SENG 609.22 Session: Fall, 2003 Course Name: Agent-based Software Engineering Department: Electrical and Computer Engineering Document Type: Tutorial Report Examining Performance Issues

More information

Formal Security Model for Virtual Machine Hypervisors in Cloud Computing Systems

Formal Security Model for Virtual Machine Hypervisors in Cloud Computing Systems Nonlinear Phenomena in Complex Systems, vol. 17, no. 3 (2014), pp. 253-262 Formal Security Model for Virtual Machine Hypervisors in Cloud Computing Systems D. P. Zegzhda and A. V. Nikolsky Saint-Petersburg

More information

IBM G-Cloud Application Systems Management as a Service

IBM G-Cloud Application Systems Management as a Service IBM G-Cloud Application Systems Management as a Service Service Definition 1 1. Summary 1.1 Service Description This offering is provided by IBM Global Business Services and provides a Systems Management

More information

TSGR3#4(99)465. TSG-RAN Working Group 3 meeting #4 Warwick, UK, 1 st 4 th June 1999. Agenda Item: 21

TSGR3#4(99)465. TSG-RAN Working Group 3 meeting #4 Warwick, UK, 1 st 4 th June 1999. Agenda Item: 21 TSG-RAN Working Group 3 meeting #4 Warwick, UK, 1 st 4 th June 1999 TSGR3#4(99)465 Agenda Item: 21 Source: Vodafone Title: Contribution to I3.05 Node B O&M Functional Description Document for: Decision

More information

16 February 2016. Connected Worker

16 February 2016. Connected Worker 16 February 2016 Connected Worker Connected Worker 1 Real Time Gas Detection, Real Time Telematics Use any Smart Phone and/or computer for real time remote worker and vehicle tracking: - Includes real

More information

Multi-Objective Genetic Test Generation for Systems-on-Chip Hardware Verification

Multi-Objective Genetic Test Generation for Systems-on-Chip Hardware Verification Multi-Objective Genetic Test Generation for Systems-on-Chip Hardware Verification Adriel Cheng Cheng-Chew Lim The University of Adelaide, Australia 5005 Abstract We propose a test generation method employing

More information

PATROL Internet Server Manager Technical Brief

PATROL Internet Server Manager Technical Brief PATROL Internet Server Manager Technical Brief Contents Why Manage Web Applications?...1 What Is PATROL?...1 The PATROL Agent...2 PATROL Knowledge Modules...2 The PATROL Console...2 PATROL Internet Server

More information

Cloud Based Distributed Databases: The Future Ahead

Cloud Based Distributed Databases: The Future Ahead Cloud Based Distributed Databases: The Future Ahead Arpita Mathur Mridul Mathur Pallavi Upadhyay Abstract Fault tolerant systems are necessary to be there for distributed databases for data centers or

More information

UPS MANAGEMENT SOFTWARE

UPS MANAGEMENT SOFTWARE UPSMAN UPSMON UPSMON CUSTOM Version: 20100504 UPS MANAGEMENT SOFTWARE UPSMAN/UPSMON, and UNMS II Comprehensive UPS Administration and Alerting UNMS II Firewall UPSMAN Server + 2 Sender Windows Server UPS

More information

A Novel Pathway for Portability of Networks and Handing-on between Networks

A Novel Pathway for Portability of Networks and Handing-on between Networks A Novel Pathway for Portability of Networks and Handing-on between Networks D. S. Dayana #1, S. R. Surya #2 Department of Computer Applications, SRM University, Chennai, India 1 dayanads@rediffmail.com

More information

Modeling and Performance Evaluation of Computer Systems Security Operation 1

Modeling and Performance Evaluation of Computer Systems Security Operation 1 Modeling and Performance Evaluation of Computer Systems Security Operation 1 D. Guster 2 St.Cloud State University 3 N.K. Krivulin 4 St.Petersburg State University 5 Abstract A model of computer system

More information