Petri Net Simulation and Analysis of Network Management Based on Mobile Agent Technology
|
|
- Linda Kelly
- 8 years ago
- Views:
Transcription
1 Simulation and Analysis of Network Management Based on Mobile Agent Technology Juraj Pukšec, Student Member, IEEE, Darije Ramljak and Darko Huljenić, Member, IEEE Abstract This paper presents advantages of applying analysis and simulation of Network Management based on Mobile Agent Technology. Mobile Agent Technology has proven to be very useful to network administrator for maintaining complex computer networks. By obtaining the simulation and analysis in early design phases for formal verification, some potential deadlocks and possible conflict activities can be discovered and avoided. Index Terms, Mobile Agents, Network Management, Simulation and Analysis. INTRODUCTION The Network management becomes of significant importance due to explosive growth and complexity of the computer networks. Monitoring and maintaining distributed servers within the computer network are very demanding and complicated tasks. The Network Management consists of monitoring and of control of network elements. Network monitoring involves observing and analysing the status of the network; and thus does not involve interface in the network functioning. Network control involves active interference and configuration of the state of the network. A Network Management System includes the management of the network elements and the use of a management protocol. The management protocol that has been extensively used is the Simple Network Management Protocol SNMP. The manager communicates with the SNMP agents executing on the managed nodes through the set of management primitives. The SNMP agents are static programs that execute on the managed nodes and provide the manager with the information it requests from time to time. The Network Management System secures the functionality of configuration of the network, monitoring of the network, studying the performance of the network, handling the security of the network and studying the alarms generated in the network [1]. The use of Mobile agents in distributed network management is expected to have a significant impact because Mobile agents can simultaneously perform different tasks on several locations (hosts) in the network. Mobile agents will be of excellent assistance to network administrator by performing different tasks like controlling and maintaining the computer network. This paper discusses application of Mobile agent for maintaining and management of the computer network. Mobile Agent checks the status of client computers, if there is no response from them Mobile agent will try to restart (reboot) the client. The task for Mobile agent is also checking the installed version of software programs on client computers, and if necessary, it will install new version(s). After performing task(s) agent(s) will notify the network administrator about performed job. The formal verification of the network was performed by using model. Simulation and Analysis of the constructed Petri net was performed by using DaNAMiCS tools. This paper is organised as follows: in the first section the overview of the mobile software agents is described. Second section deals with the application of mobile agents in the Network management. based simulation is presented in the third section. In the fourth section the results of analysis are discussed. Conclusions are given at the end. Juraj Pukšec, Darije Ramljak and Darko Huljenić are with Research and Development Center of Ericsson Nikola Tesla, Krapinska 45, HR Zagreb, Croatia. Tel.: , Fax.: {juraj.puksec, darije.ramljak, darko.huljenic }@etk.ericsson.se
2 I. MOBILE SOFTWARE AGENTS Client computer - CC i The Mobile agent concept has grown out of three earlier technologies: process migration (PM), remote evaluation (RE) and mobile objects. All these three technologies have been developed to improve on Remote Procedure Calling (RPC) for distributed programming. Mobile agents have improved these three technologies for distributed programming by providing a way for executable code, program state information and other data to be transferred to any host Agent considers necessary to carry out the actions specified in an application. Client computer - CC 1 Mobile Agent... Network Mobile Agent... Client computer - Mobile Agent CC n The basic characteristics of mobile agents are mobility, autonomy, intelligence, persistence, goal orientation, communication and activity. For Mobile agents it is very important to be autonomous. By term autonomous it is understood that the Mobile agent can make its own decision how to reach the given goals. A mobile agent is characterised by its behaviour, state and location. Behaviour is specified in class of an object inside the program. State of a mobile agent is stored in variables of an object. Location is a place where mobile agent performs certain actions in order to carry out its main task. Also, Mobile agent must have learning skills. The Mobile Agents have to learn about their environment and actions so that they can be more effective [2], [3]. II. APPLYING MOBILE AGENTS IN THE NETWORK MANAGEMENT In the Figure 1, computer network based on Mobile agents is presented. Mobile agents are programmed on the server side. The tasks for mobile agent are: checking the status of client computer, restarting the client computer (if needed), checking the version of installed software, and installation of software (if needed). Server computer SC Figure 1. The Computer network based on Mobile agents (LA) will visit every client computer within a computer network, first checking the status of the client computer, if the client computer works properly (1). After checking the status of the computer, LA will check the version of the installed software (2). After performing the given task Mobile agent will migrate to another client computer within the computer network (3). But if there is no response from the client computer or some unexpected event occurs LA will call the Restart agent (RA) to restart the client computer (4). Restart Agent (RA) will restart the client computer (5), and after restarting the computer LA agent will check the status of the computer again (6). If after several restarts computer does not respond Mobile agent will disconnect the computer from the network and send notification to the server computer (10). LA agent will check the version of installed software on client computer, and if necessary will call the Installer Agent (IA) from the server (7). IA agent will install the new software on the client computer (8), and then restart the client computer (9). Every action that Mobile agent performs will be reported to the server computer network administrator (10). Mobile agent system contains three Mobile agents: Local agent (LA), Restart agent (RA), and Installer Agent (IA). Task of Local Mobile Agent (LA) is to roam through the network and check the status of client computer and the version of installed software. Restart Agent (RA) is responsible for restart (reboot) of the client computer, and Installer Agent (AI) install the software programs on client computers. Further is explained the role of mobile agents on client computer. server computer LA RA IA notification 1) 4) 5) 10) client computer i checking the status of client computer 6) restart 8) 2) 3) 7) 9) checking the version of installed software installation All three Mobile agents are situated on server, Figure 2. Administrator of the computer network supervises all four agents. Administrator must define version of the installed software on the client computers (version for Web explorer, Mail tool, audio-video explorer, ). Local Mobile Agent Figure 2. The tasks for Mobile agents
3 A formal model of a distributed programming of a Mobile agent based network management is proposed in [4]. Multi agent system can be described as (1): A= {agent 1,... agent i..., agent n } (1) where A denotes multi agent system which consists of n cooperating and communicating Mobile Agents. These mobile agents perform the service requests by their users in this multi agent system. This system can be described as: III. PETRI NET BASED SIMULATION Before the programming took place the simulation was performed. The main task of the simulation and results analysis is the control of are checking the formal properties of the proposed solution, particularly liveness, in early phases of the project in order to avoid potential deadlocks and possible conflict activities. A= {LA, RA, IA} (2) The multi agent system can be consider as a distributed system whose processing nodes communicate. A set of processing nodes is denoted as: server CC1 CCi S= {S 1,..., S i,..., S n } (3) Each node, S i, is characterised by a set of services it provides. According to [4] and [5] Mobile agent based network is defined as a triple: MAN = {A, S, N} (4) A defines a multi agent system consisting of the cooperating and communicating mobile agents, S denotes the set of processing nodes capable of serving the agents and N stands for the network that connects the nodes and provides an agent migration. Mobile agent can migrate autonomously from client to client (node to node), to perform the tasks on behalf of the network administrator. It can be defined as: Agent = {idno, address, service, verinfo, installation} (4) where idno is a unique identification number of the agent, address denotes its location, service means check if there is a respond from the client and restart if there is no answer from the client, verinfo is number of the latest software version and instalation will be performed if latest version of software is not installed on the client computer. In this paper multi agent system operating on the behalf of a network administrator will be discussed. An agent will be programmed on a server and will be spread throughout the computer network. The agent will migrate from node to node in the computer network and will perform management tasks. CCn Figure 3. The model In the Figure 3 the Petri net model is proposed [6], [7], [8]. The was constructed according to model and the set of tasks that are given to the Mobile agents, presented in the Figure 2. The constructed is presented in the Figure 4. In order to simplify the, according to Figure 1, constructed computer network has one server computer (places pp1, pp2, pp3, pp4 and ps5) and three client computers (p1-p12, p13-p24, and p25-p36). In pp1 state Local mobile agents (LA) are created (programmed), and they migrate in the network to the first client computer. When the agent arrives to a client computer (p1), it will check the status of the computer. If there is a response from the computer, agent will check the version of the installed software (p2). If the computer does not work properly (p4) Local agent will call Restart agent (pp2). Restart agent (RA) will try to restart the computer (p7) and check its status again. If after three restarts computer does not respond the Mobile agent will disconnect the computer from the network (p8 and p12). After installation of software (p10 and p11) computer must be restarted (p7), if needed. All performed actions Local agent (LA) will report to the administrator after returning to the server (pp5). After visiting one client computer and performing all necessary action, Local agent will migrate to another computer within the network and perform assigned tasks. Different situations are investigated by simulating all possible operations. In this model several possible situation are demonstrated:
4 t1 t2 t3 t4 t5 t6 t7 t8 t11 t9 t10 t12 t13 t14 t15 t16 t17 t18 t19 t20 t23 t21 t22 t24 t25 t26 t27 t28 t29 t30 t31 t34 t35 t32 t33 t36 t37 t38 t39 P1 P2 P3 P4 P9 P5 P6 P7 P8 P10 P11 P12 P13 P14 P15 P16 P17 P18 P19 P20 P24 P21 P22 P23 P25 P26 P27 P28 P29 P30 P31 P32 P36 P33 P34 P35 PP1 PP2 PP3 PP4 PP5 server CCi CC n CC1 Figure 4.
5 regular transitions everything is working properly: pp1 p1 p2 p3 p13 p14 p15 p25 p26 p27 pp4,pp5, client 1 does not respond (p3): pp1 p1,p4 p5,pp2 p6 p7,p8 p1 p2 client 2 does not respond (p12): p13,p16 p17,pp2 p18 p19,p20 p13 p14 client 3 does not respond (p22) not even after three restarts: p25,p28 p29,pp2 p30 p31,p32 p25,p28 p29,pp2 p30 p31,p32 p25,p28 p29,pp2 p30 p31,p32 p36 client 1 needs to install new version of software (p7): pp1 p1 p2,p9 p10 p11 p7 p1 p2 p3 client 2 needs to install new version of software (p17), p13 p14,p21 p22 p23 p19 p13 p14 p15... client 3 needs to install new version of software (p26),... p25 p26,p33 p34 p23 p20 p21 p26 ps1,ps3 some unpredicted situations that may occur if there is a problem with restart of the system. By using Java-based Petri net tool DaNAMiCS [9] simulations were performed, Figure 5. IV. RESULTS ANALYSIS The DaNAMiCS tool was used for the simulation of the Petri net. consists of 31 places and 28 transition. Petri net has been applied because of complex demand on the system and the configuration of the network. Inhibition arcs were used for modelling error conditions. This is explained by the fact that from every regular place transition is possible to next regular place but if some error Figure 5. DaNAMiCS simulation
6 occurs (the client computers does not respond) or some unpredicted situations happen agent will drop to the place where some changes must be made. Applying Petri net simulation before the programming has proved to be very useful. From the simulation results for checking the response of the client. Administrator should allow the mobile agent to restart the system for a maximum 3 times. If after several restarts of the system computer does not respond, mobile agent has to disconnect the computer from the network and notify the network administrator about some unpredicted errors. The is live and there are no deadlocks in the model. Conflict transitions are only transitions that model regular continuation and error-initiated termination, such as: (t1, t12), (t2, t3), (t4, t9), (t13, t24), (t14, t15), (t16, t21), (t26, t27), i (t28, t32). These conflicts are intentional and they describe mutually exclusive actions. The only unbounded places in the model were those collecting tokens for statistical purposes. Therefore, the modelled net is also persistent and has a home state. From the simulation results we can conclude that the constructed Petri net is error-free. After the Petri net simulation was performed, the programming of the Mobile agents took place. Performing formal description by using s we defined the role of Mobile agents on client computer. Programming of Mobile agents can be performed on any platform. CONCLUSION simulation and result analysis of Network Management based on Mobile Agent Technology is described in the paper. Petri net models were used for clarifying service concepts and implementation. Formal verification and simulation based on derived Petri net proved to be useful in early design phases. Petri net models and the analysis based on them were found to be an efficient way to improve design process and project controllability. REFERENCES [1] A. Sahai, C. Morin, Mobile Agents for Enabling Mobile User Aware Applications, IEEE Network Operations and Management Symposium - NOMS 98, pp , vol. 2., February 15 20, [2] J. Pukšec, The Maintenance of Internet Service Nodes by using Mobile Software Agents, Master Thesis, University of Zagreb Faculty of Electrical Engineering and Computing, Croatia, 2001, (in Croatian). [3] W. T. Cockayne, M. Zyda, Mobile Agents, Manning Publications Co, USA, [4] V. Sinković, I. Lovrek, Genetic Algorithm of a Mobile Agent Network Suitable for Performance Evaluation, Proc. of KES 2000 Conf., pp Brighton, UK. [5] G. Ježić, M. Kušek, I. Ljubi, Mobile Agent Based Distributed Web Management, Proc. of KES 2000 Conf., Brighton, UK, pp [6] J. L. Peterson, Theory and the Modelling of systems, Prentice-Hall, Englewood Cliffs, [7] I. Lovrek, Modelling Telecommunications Processes Theory and Application of s, Skolska knjiga, Zagreb, (in Croatian). [8] J. Pukšec, M. Opsenica, D. Frank, V. Maričić, K. P. Valavanis, I. Lovrek, based Modelling and Simulation of Alert System, Proc. of 10 th MELECON 2000 Conf., vol. 1, pp , Lemesos, Cyprus, [9] DaNAMiCS documentation - /DNA /DaNAMiCS/
Self-organized Multi-agent System for Service Management in the Next Generation Networks
PROCEEDINGS OF THE WORKSHOP ON APPLICATIONS OF SOFTWARE AGENTS ISBN 978-86-7031-188-6, pp. 18-24, 2011 Self-organized Multi-agent System for Service Management in the Next Generation Networks Mario Kusek
More informationA STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS
A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS Tarag Fahad, Sufian Yousef & Caroline Strange School of Design and Communication Systems, Anglia Polytechnic University Victoria
More informationUML SUPPORTED SOFTWARE DESIGN
UML SUPPORTED SOFTWARE DESIGN Darko Gvozdanović, Saša Dešić, Darko Huljenić Ericsson Nikola Tesla d.d., Krapinska 45, HR-0000 Zagreb, Croatia, tel.: +385 365 3889, faks: +385 365 3548, e-mail: darko.gvozdanovic@etk.ericsson.se
More informationA Multi-Agent Approach to a Distributed Schedule Management System
UDC 001.81: 681.3 A Multi-Agent Approach to a Distributed Schedule Management System VYuji Wada VMasatoshi Shiouchi VYuji Takada (Manuscript received June 11,1997) More and more people are engaging in
More informationTest Coverage Criteria for Autonomous Mobile Systems based on Coloured Petri Nets
9th Symposium on Formal Methods for Automation and Safety in Railway and Automotive Systems Institut für Verkehrssicherheit und Automatisierungstechnik, TU Braunschweig, 2012 FORMS/FORMAT 2012 (http://www.forms-format.de)
More informationReal Time Network Server Monitoring using Smartphone with Dynamic Load Balancing
www.ijcsi.org 227 Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing Dhuha Basheer Abdullah 1, Zeena Abdulgafar Thanoon 2, 1 Computer Science Department, Mosul University,
More informationPETRI NET BASED SUPERVISORY CONTROL OF FLEXIBLE BATCH PLANTS. G. Mušič and D. Matko
PETRI NET BASED SUPERVISORY CONTROL OF FLEXIBLE BATCH PLANTS G. Mušič and D. Matko Faculty of Electrical Engineering, University of Ljubljana, Slovenia. E-mail: gasper.music@fe.uni-lj.si Abstract: The
More informationUniversity of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP
University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP This Conference or Workshop Item Adda, Mo, Kasassbeh, M and Peart, Amanda (2005) A survey of network fault management. In: Telecommunications
More informationNetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage
AdRem NetCrunch 6 Network Monitoring Server With NetCrunch, you always know exactly what is happening with your critical applications, servers, and devices. Document Explore physical and logical network
More informationThe EMSX Platform. A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks. A White Paper.
The EMSX Platform A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks A White Paper November 2002 Abstract: The EMSX Platform is a set of components that together provide
More informationTraffic Control by Influencing User Behavior
Traffic Control by Influencing User Behavior We examined a means of influencing user behavior to reduce the number of repeated calls by providing information to users and controlling the traffic before
More informationComputer Network Intrusion Detection, Assessment And Prevention Based on Security Dependency Relation
Computer Network Intrusion Detection, Assessment And Prevention Based on Security Dependency Relation Stephen S. Yau and Xinyu Zhang Computer Science and Engineering Department Arizona State University
More informationMonitoring Data Visualization and Agent-based Software Management for the Grid
Elektrotehniški vestnik XX(Y): 1 6, YEAR Electrotechnical Review, Ljubljana, Slovenija Monitoring Data Visualization and Agent-based Software Management for the Grid Maja Matijašević and Gordan Ježić University
More informationAn Active Packet can be classified as
Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems
More informationA Study of Application Recovery in Mobile Environment Using Log Management Scheme
A Study of Application Recovery in Mobile Environment Using Log Management Scheme A.Ashok, Harikrishnan.N, Thangavelu.V, ashokannadurai@gmail.com, hariever4it@gmail.com,thangavelc@gmail.com, Bit Campus,
More informationDesign and Development of SMS Based Wireless Home Appliance Control and Security System
Journal of Modern Science and Technology Vol. 3. No. 1. March 2015 Issue. Pp.80-87 Design and Development of SMS Based Wireless Home Appliance Control and Security System Md. Abdullah Al Asad *, Md. Al
More informationGOAL-BASED INTELLIGENT AGENTS
International Journal of Information Technology, Vol. 9 No. 1 GOAL-BASED INTELLIGENT AGENTS Zhiqi Shen, Robert Gay and Xuehong Tao ICIS, School of EEE, Nanyang Technological University, Singapore 639798
More informationAchieving collaborative service provisioning for mobile network users: the CollDown example
SPECIAL ISSUE Achieving collaborative service provisioning for mobile network users: the CollDown example VEDRAN PODOBNIK, IVA BOJIC, LUKAVRDOLJAK, MARIO KUSEK University of Zagreb, Faculty of Electrical
More informationImplementation of a NAT and Firewall Traversal Library
Implementation of a NAT and Firewall Traversal Library Damien Auroux Supervisors: Prof. Karl Aberer Nicolas Bonvin Distributed Systems Laboratory January 1, 2009 Presentation Outline I- Motivations and
More informationUse of Agent-Based Service Discovery for Resource Management in Metacomputing Environment
In Proceedings of 7 th International Euro-Par Conference, Manchester, UK, Lecture Notes in Computer Science 2150, Springer Verlag, August 2001, pp. 882-886. Use of Agent-Based Service Discovery for Resource
More informationRoulette Wheel Selection Model based on Virtual Machine Weight for Load Balancing in Cloud Computing
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 5, Ver. VII (Sep Oct. 2014), PP 65-70 Roulette Wheel Selection Model based on Virtual Machine Weight
More informationA Study on Integrated Security Service Control Solution Development about CRETA Security
A Study on Integrated Security Service Control Solution Development about CRETA Security Yongwon (Conrad) Cho 1, Jinwon (Frank) Choi 2 1 Director Research Engineer, Virtual Builders Co., Ltd. 2 CEO & Co-Founder,
More informationARTIFICIAL INTELLIGENCE METHODS IN EARLY MANUFACTURING TIME ESTIMATION
1 ARTIFICIAL INTELLIGENCE METHODS IN EARLY MANUFACTURING TIME ESTIMATION B. Mikó PhD, Z-Form Tool Manufacturing and Application Ltd H-1082. Budapest, Asztalos S. u 4. Tel: (1) 477 1016, e-mail: miko@manuf.bme.hu
More informationPerformance advantages of resource sharing in polymorphic optical networks
R. J. Durán, I. de Miguel, N. Merayo, P. Fernández, R. M. Lorenzo, E. J. Abril, I. Tafur Monroy, Performance advantages of resource sharing in polymorphic optical networks, Proc. of the 0th European Conference
More informationOpenSAF A Standardized HA Solution
OpenSAF A Standardized HA Solution LinuxCON Edinburgh, UK 2013-10-21 Anders Widell Ericsson AB Outline What are OpenSAF and SA Forum? What is Service Availability? Simple Use Case: Web server The OpenSAF
More informationKNOWLEGDE MANAGEMENT AND IT S APPLICATION IN CROATIAN COMPANIES
416 KNOWLEGDE MANAGEMENT AND IT S APPLICATION IN CROATIAN COMPANIES Postgraduate specialists study Organization and Management Osijek ABSTRACT Following the trends of recent business, emerges the need
More informationIntelligent Log Analyzer. André Restivo <andre.restivo@portugalmail.pt>
Intelligent Log Analyzer André Restivo 9th January 2003 Abstract Server Administrators often have to analyze server logs to find if something is wrong with their machines.
More informationCommunications Management. 3ICT12 (with thanks to Prof. George Pavlou, University of Surrey)
Communications Management 3ICT12 (with thanks to Prof. George Pavlou, University of Surrey) 1 Communications Management Network Management Overview What is Network Management? Manager Agent Model OSI Management:
More informationAlert ALARM MANAGEMENT
by Alert ALARM MANAGEMENT Alert To inform and to alert Alert is able to treat alarms or intervention demand coming from different sources: Supervisor software (SCADA), via DDE, OPC or dedicated interface
More informationVirtualization Technology using Virtual Machines for Cloud Computing
International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) Virtualization Technology using Virtual Machines for Cloud Computing T. Kamalakar Raju 1, A. Lavanya 2, Dr. M. Rajanikanth 2 1,
More informationFuzzy Cognitive Map for Software Testing Using Artificial Intelligence Techniques
Fuzzy ognitive Map for Software Testing Using Artificial Intelligence Techniques Deane Larkman 1, Masoud Mohammadian 1, Bala Balachandran 1, Ric Jentzsch 2 1 Faculty of Information Science and Engineering,
More informationSupervision software for Intrusion detection, Fire detection and CCTV systems
Supervision software for Intrusion detection, Fire detection and CCTV systems elmospa.com Global security solutions Globalpro GLOBALPRO is the new supervision software that allows to obtain a powerful
More informationAn Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents
An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents M. Anber and O. Badawy Department of Computer Engineering, Arab Academy for Science and Technology
More informationLoad balancing algorithms for TINA networks. 1. Introduction. Maria Kihl, Niklas Widell and Christian Nyberg
This is an author produced version of a conference paper presented at the International Teletraffic Congress - ITC-16, Edinburgh International Conference Centre, United Kingdom, 7-11 June, 1999. This paper
More informationResearch and realization of Resource Cloud Encapsulation in Cloud Manufacturing
www.ijcsi.org 579 Research and realization of Resource Cloud Encapsulation in Cloud Manufacturing Zhang Ming 1, Hu Chunyang 2 1 Department of Teaching and Practicing, Guilin University of Electronic Technology
More informationUSING MOBILE AGENTS TO IMPROVE PERFORMANCE OF NETWORK MANAGEMENT OPERATIONS
USING MOBILE AGENTS TO IMPROVE PERFORNCE OF NETWORK NAGEMENT OPERATIONS Iwan Adhicandra, Colin Pattinson, Ebrahim Shaghouei Computer Communications Research Group, School of Computing, Leeds Metropolitan
More informationDistributed Data Management
Introduction Distributed Data Management Involves the distribution of data and work among more than one machine in the network. Distributed computing is more broad than canonical client/server, in that
More informationPerformance Evaluation of Mobile Agent-based Dynamic Load Balancing Algorithm
Performance Evaluation of Mobile -based Dynamic Load Balancing Algorithm MAGDY SAEB, CHERINE FATHY Computer Engineering Department Arab Academy for Science, Technology & Maritime Transport Alexandria,
More informationSurvey on Models to Investigate Data Center Performance and QoS in Cloud Computing Infrastructure
Survey on Models to Investigate Data Center Performance and QoS in Cloud Computing Infrastructure Chandrakala Department of Computer Science and Engineering Srinivas School of Engineering, Mukka Mangalore,
More informationA UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS
A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS Chandanpreet Kaur Global Institute of Management and Emerging Technologies, Amritsar, Punjab, India, lpu_chandan@yahoo.co.in
More informationAccess Control and Operating Conditions Monitoring System for Telecommunication and Server Racks
Access Control and Operating Conditions Monitoring System for Telecommunication and Server Racks Why is Supracontrol so superior? It adjusts to the existing access identification system It adjusts to the
More informationMethodological norms for the application of the Government Emergency Ordinance no. 105/ 2001 regarding the Romanian state border
Methodological norms for the application of the Government Emergency Ordinance no. 105/ 2001 regarding the Romanian state border CHAPTER I General Provisions ART. 1 The legal regime of the state border
More informationA New Hybrid Load Balancing Algorithm in Grid Computing Systems
A New Hybrid Load Balancing Algorithm in Grid Computing Systems Leyli Mohammad Khanli 1, Behnaz Didevar 2 1 University of Tabriz, Department of Computer Science, 2 Department of Technical and Engineering,
More informationBS 7 SIS Safety Information System Green Light for Your Production
BS 7 SIS Safety Information System Green Light for Your Production SIS - GreCon Safety Information System The Challenge The Solution In big industrial plants, such as wood based panel productions, there
More informationPerformance Oriented Management System for Reconfigurable Network Appliances
Performance Oriented Management System for Reconfigurable Network Appliances Hiroki Matsutani, Ryuji Wakikawa, Koshiro Mitsuya and Jun Murai Faculty of Environmental Information, Keio University Graduate
More informationUdai Shankar 2 Deptt. of Computer Sc. & Engineering Madan Mohan Malaviya Engineering College, Gorakhpur, India
A Protocol for Concurrency Control in Real-Time Replicated Databases System Ashish Srivastava 1 College, Gorakhpur. India Udai Shankar 2 College, Gorakhpur, India Sanjay Kumar Tiwari 3 College, Gorakhpur,
More informationCONFORMED COPY. Method Statement Helpdesk Services. Revision History. Revision Date Reviewer Status. 23 March 2007 Project Co Final Version
CONFORMED COPY Method Statement Revision History Revision Date Reviewer Status 23 March 2007 Project Co Final Version Table of Contents 1 Objectives... 3 2 Management Supervision and Organisation Structure...
More informationHigh-Mix Low-Volume Flow Shop Manufacturing System Scheduling
Proceedings of the 14th IAC Symposium on Information Control Problems in Manufacturing, May 23-25, 2012 High-Mix Low-Volume low Shop Manufacturing System Scheduling Juraj Svancara, Zdenka Kralova Institute
More informationCoverability for Parallel Programs
2015 http://excel.fit.vutbr.cz Coverability for Parallel Programs Lenka Turoňová* Abstract We improve existing method for the automatic verification of systems with parallel running processes. The technique
More informationLightweight Monitoring of Label Switched Paths for Bandwidth Management
Lightweight ing of Label Switched Paths for Bandwidth Management P. Vilà, J.L. Marzo, E. Calle, L. Carrillo Institut d Informàtica i Aplicacions Universitat de Girona Girona (Spain) { perev marzo eusebi
More informationThe Advantages of Using Mobile Agents in Software for Telecommunications
The Advantages of Using Mobile Agents in Software for Telecommunications Luis Moura Silva Leonor Almeida University of Coimbra SIEMENS S.A. Polo II, Dep. Eng. Informatica Rua Irmãos Siemens Nº 1 3030 Coimbra,
More informationBuilding Reusable Mobile Agents for Network Management
IEEE TRANSACTIONS SYSTEMS, MAN, AND CYBERNETICS PART C: APPLICATION AND REVIEWS, VOL. 33, NO. 3, AUGUST 2003 350 Building Reusable Mobile Agents for Network Management Ichiro Satoh Member, IEEE, Abstract
More informationIntegration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Microsoft DirectAccess
SafeNet Authentication Service Integration Guide SAS Using RADIUS Protocol with Microsoft DirectAccess Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet,
More informationNeural Network Applications in Stock Market Predictions - A Methodology Analysis
Neural Network Applications in Stock Market Predictions - A Methodology Analysis Marijana Zekic, MS University of Josip Juraj Strossmayer in Osijek Faculty of Economics Osijek Gajev trg 7, 31000 Osijek
More informationCloud Computing for Agent-based Traffic Management Systems
Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion
More informationAPPLICATION NOTE. Ethernet Configuration Guide for D-500 D-700
Tel: +90-216 466 84 60 Fax: +90-216 364 65 65 datakom@datakom.com.tr http://www.datakom.com.tr APPLICATION NOTE Ethernet Configuration Guide for D-500 D-700 PRODUCTS AFFECTED: D-500 / D-700 WRITTEN BY:
More informationBuilding and Selecting Mobile Agents 2.1
Building and Selecting Mobile Agents for Network Management Ichiro Satoh National Institute of Informatics 2-1-2 Hitotsubashi, Chiyoda-ku, Tokyo 101-8430, Japan Tel: +81-3-4212-2546 Fax: +81-3-3556-1916
More informationMANAGING OF IMMENSE CLOUD DATA BY LOAD BALANCING STRATEGY. Sara Anjum 1, B.Manasa 2
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE MANAGING OF IMMENSE CLOUD DATA BY LOAD BALANCING STRATEGY Sara Anjum 1, B.Manasa 2 1 M.Tech Student, Dept of CSE, A.M.R. Institute
More informationAnalysis on Leveraging social networks for p2p content-based file sharing in disconnected manets
Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets # K.Deepika 1, M.Tech Computer Science Engineering, Mail: medeepusony@gmail.com # K.Meena 2, Assistant Professor
More informationCOMPUTER NETWORKS SECOND EDITION. ANDREW S.fjANENBAUM. Vrije Universiteit Amsterdam, The Netherlands. Nachrichtentechnische Bib'iothek THD Inv.
COMPUTER NETWORKS SECOND EDITION ANDREW S.fjANENBAUM Vrije Universiteit Amsterdam, The Netherlands Nachrichtentechnische Bib'iothek THD Inv.-Ni,: tq(s ULB Darmstadt iiiiiir 17800787 =3JE Prentice-Hall
More informationEfficient DNS based Load Balancing for Bursty Web Application Traffic
ISSN Volume 1, No.1, September October 2012 International Journal of Science the and Internet. Applied However, Information this trend leads Technology to sudden burst of Available Online at http://warse.org/pdfs/ijmcis01112012.pdf
More informationAssessment of RLG Trusted Digital Repository Requirements
Assessment of RLG Trusted Digital Repository Requirements Reagan W. Moore San Diego Supercomputer Center 9500 Gilman Drive La Jolla, CA 92093-0505 01 858 534 5073 moore@sdsc.edu ABSTRACT The RLG/NARA trusted
More informationDistributed Systems. REK s adaptation of Prof. Claypool s adaptation of Tanenbaum s Distributed Systems Chapter 1
Distributed Systems REK s adaptation of Prof. Claypool s adaptation of Tanenbaum s Distributed Systems Chapter 1 1 The Rise of Distributed Systems! Computer hardware prices are falling and power increasing.!
More informationMulti-Agent System for Management and Monitoring of Routes Surveillance
Multi-Agent System for Management and Monitoring of Routes Surveillance Sara Rodríguez and Javier Bajo Departamento de Informática y Automática, Universidad de Salamanca Plaza de la Merced s/n, 37008,
More informationMeeting Scheduling with Multi Agent Systems: Design and Implementation
Proceedings of the 6th WSEAS Int. Conf. on Software Engineering, Parallel and Distributed Systems, Corfu Island, Greece, February 16-19, 2007 92 Meeting Scheduling with Multi Agent Systems: Design and
More informationReal Time Remote Monitoring over Cellular Networks. Wayne Chen Marketing Specialist
Real Time Remote Monitoring over Cellular Networks Wayne Chen Marketing Specialist Introduction For distribution infrastructures located in remote, isolated areas, unmanned monitoring systems have long
More informationHow To Detect An Advanced Persistent Threat Through Big Data And Network Analysis
, pp.30-36 http://dx.doi.org/10.14257/astl.2013.29.06 Detection of Advanced Persistent Threat by Analyzing the Big Data Log Jisang Kim 1, Taejin Lee, Hyung-guen Kim, Haeryong Park KISA, Information Security
More informationTechnical Note #31. GE PMCS App Note 31 Page 1 of 5. RAS - Host and View Node. RAS - Host Configuration with No Network Adapter Installed:
GE PMCS App Note 31 Page 1 of 5 Technical Note #31 RAS - Host and View Node Subject: Configuring a Host and a View Node to communicate via modems. Applies To: PMCS 5.0 / Windows NT 3.51. For later versions
More informationBACnet Alarming Revised. The BACnet data and services model for event reporting was developed. BACnet Today & the Smart Grid
BACnet Today & the Smart Grid This article was published in ASHRAE Journal, November 2011. Copyright 2011 American Society of Heating, Refrigerating and Air-Conditioning Engineers, Inc. Posted at www.ashrae.org.
More informationBehavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
More informationA Multiagent Model for Intelligent Distributed Control Systems
A Multiagent Model for Intelligent Distributed Control Systems José Aguilar, Mariela Cerrada, Gloria Mousalli, Franklin Rivas, and Francisco Hidrobo CEMISID, Dpto. de Computación, Facultad de Ingeniería,
More informationHow To Monitor Performance On Eve
Performance Monitoring on Networked Virtual Environments C. Bouras 1, 2, E. Giannaka 1, 2 Abstract As networked virtual environments gain increasing interest and acceptance in the field of Internet applications,
More informationOnline Auction Software Fundamentals
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Online Auction Software Fundamentals Jarrod Trevathan +, Wayne Read and Rodel Balingit
More informationADAPTIVE LOAD BALANCING ALGORITHM USING MODIFIED RESOURCE ALLOCATION STRATEGIES ON INFRASTRUCTURE AS A SERVICE CLOUD SYSTEMS
ADAPTIVE LOAD BALANCING ALGORITHM USING MODIFIED RESOURCE ALLOCATION STRATEGIES ON INFRASTRUCTURE AS A SERVICE CLOUD SYSTEMS Lavanya M., Sahana V., Swathi Rekha K. and Vaithiyanathan V. School of Computing,
More informationT-79.186 Reactive Systems: Introduction and Finite State Automata
T-79.186 Reactive Systems: Introduction and Finite State Automata Timo Latvala 14.1.2004 Reactive Systems: Introduction and Finite State Automata 1-1 Reactive Systems Reactive systems are a class of software
More informationHOW TO REMOTELY CONNECT TO THE FIU NETWORK VIA VPN
HOW TO REMOTELY CONNECT TO THE FIU NETWORK VIA VPN FLORIDA INTERNATIONAL UNIVERSITY HERBERT WERTHEIM COLLEGE OF MEDICINE OFFICE OF INFORMATION TECHNOLOGY Modesto A. Maidique Campus, 11200 S. W. 8 th St.,
More informationIntegrated Healthcare Information System. Darko Gvozdanović, M.Sc.E.E. Department manager e-health
Integrated Healthcare Information System Darko Gvozdanović, M.Sc.E.E. Department manager e-health Agenda Healthcare challenges Ericsson addressing the challenges Integrated Healthcare Information System
More informationOMC Solution IP Radios
DATASHEET OMC Solution IP Radios COST EFFECTIVE E2E REMOTE NETWORK MANAGEMENT Intuitive, User Friendly GUI E2E Management of Transmission/Backhaul System Lower Total Cost of Ownership Simplified Remote
More informationReallocation and Allocation of Virtual Machines in Cloud Computing Manan D. Shah a, *, Harshad B. Prajapati b
Proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA-14) Reallocation and Allocation of Virtual Machines in Cloud Computing Manan
More informationsecure Agent Secure Enterprise Solutions Remote Recovery from a Data Center Outage SecureAgent Software www.secureagent.com
secure Agent Secure Enterprise Solutions SecureAgent Software Disaster Recovery Remote Recovery from a Data Center Outage SecureAgent Software 2448 E. 81 st St., Ste. 2000 Tulsa OK 74137-4271 USA Tel:
More informationTOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
More informationIntegrated management information in utilities
Integrated management information in utilities Information from Cigré The objective of this article is to assist utilities define, specify and evaluate the high level management systems that form the information
More informationUPSMON PRO Linux --- User Manual
UPSMON PRO Linux --- User Manual Version : 2.1 *Attention : root authority is necessary to execute at Linux here AA. UPSMON PRO Install 2 BB. UPSMON PRO Start 3 CC. UPSMON PRO Status 6 DD. UPSMON PRO Config
More informationBuilding Remote Access VPNs
Building Remote Access VPNs 124 Grove Street, Suite 309 Franklin, MA 02038 877-4-ALTIGA www.altiga.com Building Remote Access VPNs: Harnessing the Power of the Internet to Reduce Costs and Boost Performance
More informationFrequently Asked Questions
Connecting HealthCare Providers, Institutions, Consortiums and Students for Superior Workforce Development Frequently Asked Questions ClientSolv Technologies 7730 E. Belleview Ave, A-201 Englewood, CO
More informationEnergy Consumption in Android Phones when using Wireless Communication Technologies
Energy Consumption in Android Phones when using Wireless Communication Technologies Goran Kalic, Iva Bojic and Mario Kusek University of Zagreb Faculty of Electrical Engineering and Computing Unska 3,
More informationDynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
More informationExamining Performance Issues of Multiagent Systems
Course Number: SENG 609.22 Session: Fall, 2003 Course Name: Agent-based Software Engineering Department: Electrical and Computer Engineering Document Type: Tutorial Report Examining Performance Issues
More informationFormal Security Model for Virtual Machine Hypervisors in Cloud Computing Systems
Nonlinear Phenomena in Complex Systems, vol. 17, no. 3 (2014), pp. 253-262 Formal Security Model for Virtual Machine Hypervisors in Cloud Computing Systems D. P. Zegzhda and A. V. Nikolsky Saint-Petersburg
More informationIBM G-Cloud Application Systems Management as a Service
IBM G-Cloud Application Systems Management as a Service Service Definition 1 1. Summary 1.1 Service Description This offering is provided by IBM Global Business Services and provides a Systems Management
More informationTSGR3#4(99)465. TSG-RAN Working Group 3 meeting #4 Warwick, UK, 1 st 4 th June 1999. Agenda Item: 21
TSG-RAN Working Group 3 meeting #4 Warwick, UK, 1 st 4 th June 1999 TSGR3#4(99)465 Agenda Item: 21 Source: Vodafone Title: Contribution to I3.05 Node B O&M Functional Description Document for: Decision
More information16 February 2016. Connected Worker
16 February 2016 Connected Worker Connected Worker 1 Real Time Gas Detection, Real Time Telematics Use any Smart Phone and/or computer for real time remote worker and vehicle tracking: - Includes real
More informationMulti-Objective Genetic Test Generation for Systems-on-Chip Hardware Verification
Multi-Objective Genetic Test Generation for Systems-on-Chip Hardware Verification Adriel Cheng Cheng-Chew Lim The University of Adelaide, Australia 5005 Abstract We propose a test generation method employing
More informationPATROL Internet Server Manager Technical Brief
PATROL Internet Server Manager Technical Brief Contents Why Manage Web Applications?...1 What Is PATROL?...1 The PATROL Agent...2 PATROL Knowledge Modules...2 The PATROL Console...2 PATROL Internet Server
More informationCloud Based Distributed Databases: The Future Ahead
Cloud Based Distributed Databases: The Future Ahead Arpita Mathur Mridul Mathur Pallavi Upadhyay Abstract Fault tolerant systems are necessary to be there for distributed databases for data centers or
More informationUPS MANAGEMENT SOFTWARE
UPSMAN UPSMON UPSMON CUSTOM Version: 20100504 UPS MANAGEMENT SOFTWARE UPSMAN/UPSMON, and UNMS II Comprehensive UPS Administration and Alerting UNMS II Firewall UPSMAN Server + 2 Sender Windows Server UPS
More informationA Novel Pathway for Portability of Networks and Handing-on between Networks
A Novel Pathway for Portability of Networks and Handing-on between Networks D. S. Dayana #1, S. R. Surya #2 Department of Computer Applications, SRM University, Chennai, India 1 dayanads@rediffmail.com
More informationModeling and Performance Evaluation of Computer Systems Security Operation 1
Modeling and Performance Evaluation of Computer Systems Security Operation 1 D. Guster 2 St.Cloud State University 3 N.K. Krivulin 4 St.Petersburg State University 5 Abstract A model of computer system
More information