In this paper, we propose a novel Distributed MANET Management System (DMMS) approach to use cross layer models to demonstrate a simplified way of efficiently managing the overall performance of individual network resources (nodes) and the network itself which is critical for not only monitoring the traffic, but also dynamically controlling the end-to-end Quality of Service (QoS) for different applications. In the proposed DMMS architecture, each network resource maintains a set of Management Information Base (MIB) elements and stores resource activities in their abstraction in terms of counters, timer, flag and threshold values. The abstract data is exchanged between different management agents residing in different resources on a need-to-know basis and each agent logically executes management functions locally to develop understanding of the behavior of all network resources to ensure that user protocols can function smoothly. However, in traditional network management systems, they collect statistical data such as resource usage and performance by spoofing of resources. The amount of data that is exchanged with other resources through management protocols that can be extremely high and the bandwidth for overhead management functions increases significantly. Also, the data storage requirements in each network resource for management functions increases and become inefficient as it increases the power usage for processing. Our proposed scheme targets at solving the problems.
Domain partitioned element management systems employing mobile agents for dis...IJCNCJournal
Network management systems based on mobile agents a
re efficiently a better alternative than typical
client/server based architectures. Centralized mana
gement models like SNMP or CMIP based management
models suffer from scalability and flexibility issu
es which are addressed to great extent by flat bed
or static
mid-level manager models based on mobile agents, ye
t the use of mobile agents to distribute and delega
te
management tasks for above stated agent-based manag
ement frameworks like initial flat bed models and
static mid-level managers cannot efficiently meet t
he demands of current networks which are growing in
size and complexity. In view of the above mentioned
limitations, we proposed a domain partitioned netw
ork
management model based-on mobile agent & Element Ma
nagement Systems in order to minimize
management data flow to a centralized server. Intel
ligent agent allocated to specific EMS performs loc
al
network management and reports the results to the s
uperior manager and finally the global manager
performs global network management using those subm
itted management results. Experimental results of
various scenarios of the proposed model have been p
resented to support the arguments given in favor of
the
prototype system based on mobile agents.
Network Monitoring and Traffic Reduction using Multi-Agent TechnologyEswar Publications
In this paper the algorithms which could improve Transmission band and Network Traffic reduction for computer network has been shown. Problem solving is an area with which many Multiagent-based applications are concerned. Multiagent systems are computational systems in which several agents interact or work together to achieve some purposes. It includes distributed solutions to problems, solving distributed problems and distributed techniques for problem solving. Multiagent using for maximizing group performance with planning, execution, monitoring, communication and coordination. This paper also addresses some critical issues in developing
Multi agent-based traffic control and monitoring systems, such as interoperability, flexibility, and extendibility. Finally, several future research directions toward the successful deployment of Multiagent technology in traffic control and monitoring systems are discussed.
This document discusses the basics of network management. It covers the key components of network management including network devices, management agents, the management information base (MIB), and managed objects. It also discusses the roles of network managers and agents in communicating via management protocols. Finally, it outlines the layers of network management from network elements to business management based on the TMN model.
This document describes a report submitted for a seminar assignment on dynamic load balancing in grid computing using a multi-agent system and tree structure. It was submitted by Vishnu Kumar Prajapati in 2013 for his M.Tech. in Advanced Networking at ABV Indian Institute of Information Technology and Management in Gwalior, India. The report discusses the historical background and motivation for grid computing and load balancing. It then reviews literature on dynamic load balancing policies, multi-agent systems, grid computing service architectures and objectives. The methodology section proposes reducing communication overhead compared to previous pool-based approaches to improve grid system performance.
Current issues - International Journal of Network Security & Its Applications...IJNSA Journal
nternational Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
This document discusses the benefits of an integrated network management system for large provider networks. As networks grow in size and complexity, an integrated system allows operators to monitor, optimize, secure and expand networks efficiently without adding overhead. It provides a comprehensive view of the entire network through centralized metrics and reporting, enabling faster issue resolution and improved customer support. An integrated approach improves uptime compared to disparate systems that are difficult to manage.
This document summarizes the internship work conducted by Marta de la Cruz Martos at CITSEM within the GRyS group. The internship focused on developing algorithms to analyze energy consumption for smart grids as part of the I3RES project, which aims to integrate renewable energy sources into distributed networks using artificial intelligence. Specifically, the internship involved studying relevant technologies, participating in software component design, developing and implementing algorithms, and preparing reports. The document provides background on distributed systems and databases, describes the work conducted, and presents results and conclusions.
Development of a Suitable Load Balancing Strategy In Case Of a Cloud Computi...IJMER
Cloud computing is an attracting technology in the field of computer science. In
Gartner’s report, it says that the cloud will bring changes to the IT industry. The cloud is changing
our life by providing users with new types of services. Users get service from a cloud without paying
attention to the details. NIST gave a definition of cloud computing as a model for enabling
ubiquitous, convenient, on-demand network access to a shared pool of configurable computing
resources (e.g., networks, servers, storage, applications, and services) that can be rapidly
provisioned and released with minimal management effort or service provider interaction. More
and more people pay attention to cloud computing. Cloud computing is efficient and scalable but
maintaining the stability of processing so many jobs in the cloud computing environment is a very
complex problem with load balancing receiving much attention for researchers. Since the job
arrival pattern is not predictable and the capacities of each node in the cloud differ, for load
balancing problem, workload control is crucial to improve system performance and maintain
stability. Load balancing schemes depending on whether the system dynamics are important can be
either static or dynamic. Static schemes do not use the system information and are less complex
while dynamic schemes will bring additional costs for the system but can change as the system
status changes. A dynamic scheme is used here for its flexibility. The model has a main controller
and balancers to gather and analyze the information. Thus, the dynamic control has little influence
on the other working nodes. The system status then provides a basis for choosing the right load
balancing strategy. The load balancing model given in this research article is aimed at the public
cloud which has numerous nodes with distributed computing resources in many different
geographic locations. Thus, this model divides the public cloud into several cloud partitions. When
the environment is very large and complex, these divisions simplify the load balancing. The cloud
has a main controller that chooses the suitable partitions for arriving jobs while the balancer for
each cloud partition chooses the best load balancing strategy.
Domain partitioned element management systems employing mobile agents for dis...IJCNCJournal
Network management systems based on mobile agents a
re efficiently a better alternative than typical
client/server based architectures. Centralized mana
gement models like SNMP or CMIP based management
models suffer from scalability and flexibility issu
es which are addressed to great extent by flat bed
or static
mid-level manager models based on mobile agents, ye
t the use of mobile agents to distribute and delega
te
management tasks for above stated agent-based manag
ement frameworks like initial flat bed models and
static mid-level managers cannot efficiently meet t
he demands of current networks which are growing in
size and complexity. In view of the above mentioned
limitations, we proposed a domain partitioned netw
ork
management model based-on mobile agent & Element Ma
nagement Systems in order to minimize
management data flow to a centralized server. Intel
ligent agent allocated to specific EMS performs loc
al
network management and reports the results to the s
uperior manager and finally the global manager
performs global network management using those subm
itted management results. Experimental results of
various scenarios of the proposed model have been p
resented to support the arguments given in favor of
the
prototype system based on mobile agents.
Network Monitoring and Traffic Reduction using Multi-Agent TechnologyEswar Publications
In this paper the algorithms which could improve Transmission band and Network Traffic reduction for computer network has been shown. Problem solving is an area with which many Multiagent-based applications are concerned. Multiagent systems are computational systems in which several agents interact or work together to achieve some purposes. It includes distributed solutions to problems, solving distributed problems and distributed techniques for problem solving. Multiagent using for maximizing group performance with planning, execution, monitoring, communication and coordination. This paper also addresses some critical issues in developing
Multi agent-based traffic control and monitoring systems, such as interoperability, flexibility, and extendibility. Finally, several future research directions toward the successful deployment of Multiagent technology in traffic control and monitoring systems are discussed.
This document discusses the basics of network management. It covers the key components of network management including network devices, management agents, the management information base (MIB), and managed objects. It also discusses the roles of network managers and agents in communicating via management protocols. Finally, it outlines the layers of network management from network elements to business management based on the TMN model.
This document describes a report submitted for a seminar assignment on dynamic load balancing in grid computing using a multi-agent system and tree structure. It was submitted by Vishnu Kumar Prajapati in 2013 for his M.Tech. in Advanced Networking at ABV Indian Institute of Information Technology and Management in Gwalior, India. The report discusses the historical background and motivation for grid computing and load balancing. It then reviews literature on dynamic load balancing policies, multi-agent systems, grid computing service architectures and objectives. The methodology section proposes reducing communication overhead compared to previous pool-based approaches to improve grid system performance.
Current issues - International Journal of Network Security & Its Applications...IJNSA Journal
nternational Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
This document discusses the benefits of an integrated network management system for large provider networks. As networks grow in size and complexity, an integrated system allows operators to monitor, optimize, secure and expand networks efficiently without adding overhead. It provides a comprehensive view of the entire network through centralized metrics and reporting, enabling faster issue resolution and improved customer support. An integrated approach improves uptime compared to disparate systems that are difficult to manage.
This document summarizes the internship work conducted by Marta de la Cruz Martos at CITSEM within the GRyS group. The internship focused on developing algorithms to analyze energy consumption for smart grids as part of the I3RES project, which aims to integrate renewable energy sources into distributed networks using artificial intelligence. Specifically, the internship involved studying relevant technologies, participating in software component design, developing and implementing algorithms, and preparing reports. The document provides background on distributed systems and databases, describes the work conducted, and presents results and conclusions.
Development of a Suitable Load Balancing Strategy In Case Of a Cloud Computi...IJMER
Cloud computing is an attracting technology in the field of computer science. In
Gartner’s report, it says that the cloud will bring changes to the IT industry. The cloud is changing
our life by providing users with new types of services. Users get service from a cloud without paying
attention to the details. NIST gave a definition of cloud computing as a model for enabling
ubiquitous, convenient, on-demand network access to a shared pool of configurable computing
resources (e.g., networks, servers, storage, applications, and services) that can be rapidly
provisioned and released with minimal management effort or service provider interaction. More
and more people pay attention to cloud computing. Cloud computing is efficient and scalable but
maintaining the stability of processing so many jobs in the cloud computing environment is a very
complex problem with load balancing receiving much attention for researchers. Since the job
arrival pattern is not predictable and the capacities of each node in the cloud differ, for load
balancing problem, workload control is crucial to improve system performance and maintain
stability. Load balancing schemes depending on whether the system dynamics are important can be
either static or dynamic. Static schemes do not use the system information and are less complex
while dynamic schemes will bring additional costs for the system but can change as the system
status changes. A dynamic scheme is used here for its flexibility. The model has a main controller
and balancers to gather and analyze the information. Thus, the dynamic control has little influence
on the other working nodes. The system status then provides a basis for choosing the right load
balancing strategy. The load balancing model given in this research article is aimed at the public
cloud which has numerous nodes with distributed computing resources in many different
geographic locations. Thus, this model divides the public cloud into several cloud partitions. When
the environment is very large and complex, these divisions simplify the load balancing. The cloud
has a main controller that chooses the suitable partitions for arriving jobs while the balancer for
each cloud partition chooses the best load balancing strategy.
Network management involves configuration management, fault management, performance management, security management, and accounting management. Configuration management deals with documenting the initial setup and any changes to network entities and their relationships over time. Fault management detects, isolates, corrects, and documents issues through both reactive and proactive approaches. Performance management monitors metrics like capacity, traffic, throughput, and response time to ensure efficient network operations. Security management controls access based on policies while accounting management tracks network resource usage for billing or budgeting purposes.
Distributed computing by Dr.C.R.Dhivyaa, Assistant Professor, Kongu Engineeri...Dhivyaa C.R
The document discusses examples of distributed systems including web search engines, massively multiplayer online games, and financial trading systems. It describes how Google's web search infrastructure utilizes a distributed file system and structured storage across data centers worldwide. It also explains how online games like EVE Online maintain consistency across servers that partition virtual worlds among hundreds of computers. Financial trading systems are discussed as processing real-time event streams across various sources and formats to detect patterns and automatically execute trades.
SELF-ORGANIZATION AND AUTONOMOUS NETWORK SURVEYIJNSA Journal
The autonomic network gathers several aspects of Self-organization, which is depicted, into different
autonomous function such as the Self- configuration, the Self-optimization, the Self-repair, the Selfprotection, and the Self-cure. The latter is considered as one of the autonomous functions wished of a system network, which could be described by autonomous behavior is realized by structures of the control
loops and loop of control.
Resource Allocation using Virtual Machine Migration: A Surveyidescitation
As virtualization is proving to be dominant in
enterprise and organizational networks there is a need for
operators and administrators to pay more attention to live
migration of virtual machines (VMs) with the main objective
of workload balancing, monitoring, fault management, low-
level system maintenance and good performance with minimal
service downtimes. It is also a crucial aspect of cloud computing
that offers strategies to implement the dynamic allocation of
resources. Virtualization also enables virtual machine
migration to eliminate hotspots in data centers .However the
security associated with VMs live migration has not received
thorough analysis. Further, the negative impact on service
levels of running applications is likely to occur during the
live VM migration hence a better understanding of its
implications on the system performance is highly required.
In this survey we explore the security issues involved in live
migration of VMs and demonstrate the importance of security
during the migration process. A model which demonstrates
the cost incurred in reconfiguring a cloud-based environment
in response to the workload variations is studied. It is also
proved that migration cost is acceptable but should not be
neglected, particularly in systems where service availability
and response times are imposed by stringent Service Level
Agreements (SLAs). A system that provides automation of
monitoring and detection of hotspots and determination of
the new mapping of physical to virtual resources and finally
initiates the required migrations based on its observations is
also studied. These are experimented using Xen Virtual
Machine Manager. Migration based resource Managers for
virtualized environments are presented by comparing and
discussing several types of underlying algorithms from
algorithmistic issues point of view.
Java can be used two types of programs: applications & applets.An application is a program that runs on your computer, under the operating system of that computer.
An applets is an application designed to be transmitted over the Internet and executed by a java-compatible Web Browser. An applet is an executable program that runs inside a browser, such as Netscape or Internet Explorer.
Subject: Software Architecture Design
Topic: Distributed Architecture
In this presentation, you will learn about design pattern, softawre architecture, distributed architecture, basis of distributed architecture, why distributed architecture, need of distributed architecture, advantages and disadvantages of DA and much more.
Rate my presentation, It's designed graphically.
Analysis and Enhancements of Leader Elections algorithms in Mobile Ad Hoc Net...IDES Editor
The document analyzes and proposes enhancements to four leader election algorithms used in mobile ad hoc networks (MANETs). It considers factors like time complexity, message complexity, assumptions, fault tolerance, and timing models. Key points:
- It summarizes four leader election algorithms for MANETs and analyzes them based on common factors.
- Proposed enhancements include nodes inquiring about the current leader instead of starting new elections, using candidates to reduce overhead, and considering battery life and signal strength in elections.
- The analysis and enhancements aim to help system designers choose the right election algorithm for MANETs by providing a reference on time/message complexities and how the algorithms handle aspects like as
Distributed computing allows computers connected over a network to coordinate activities and share resources. It appears as a single, integrated system to users. Key characteristics include resource sharing, openness, concurrency, scalability, fault tolerance, and transparency. Common architectures include client-server, n-tier, and peer-to-peer. Paradigms for distributed applications include message passing between processes, the client-server model with asymmetric roles, and the peer-to-peer model with equal roles.
HOST AND NETWORK SECURITY by ThesisScientist.comProf Ansari
Network management means different things to different people. In some cases, it involves a solitary network consultant monitoring network activity with an outdated protocol analyzer. In other cases, network management involves a distributed database, auto polling of network devices, and high-end workstations generating real-time graphical views of network topology changes and traffic. In general, network management is a service that employs a variety of tools, applications, and devices to assist human network managers in monitoring and maintaining networks.
The Open Grid Services Architecture (OGSA) defines a set of standards for building grid systems. It has four main layers:
1) The application layer which includes physical resources like servers and storage, and logical resources like database and workflow managers.
2) A web services layer which defines how resources and services can interact using Open Grid Services Infrastructure (OGSI) and grid services.
3) OGSI specifies five interfaces for grid services: Factory, Life Cycle, State Management, Service Groups, and Notification.
4) Together these layers define a standardized architecture for building grid systems using web services and interfaces to manage resources and their interactions.
Review of Some Checkpointing Schemes for Distributed and Mobile Computing Env...Eswar Publications
Fault Tolerance Techniques facilitate systems to carry out tasks in the incidence of faults. A checkpoint is a local state of a process saved on stable storage. In a distributed system, since the processes in the system do not share memory; a global state of the system is defined as a combination of local states, one from each process. In case of a fault in distributed systems, checkpointing enables the execution of a program to be resumed from a previous consistent global state rather than resuming the execution from the commencement. In this way, the sum of constructive processing vanished because of the fault is appreciably reduced. In this paper, we talk about various issues related to the checkpointing for distributed systems and mobile computing environments. We also confer
various types of checkpointing: coordinated checkpointing, asynchronous checkpointing, communication induced
checkpointing and message logging based checkpointing. We also present a survey of some checkpointing algorithms for distributed systems.
This document discusses dynamic resource allocation using virtual machines. It begins by introducing cloud computing and how it allows scaling of resource usage based on demand through virtualization technology. It then analyzes the existing system of mapping virtual machines to physical resources and proposes an automated resource management system to achieve a balance between overload avoidance and green computing. The key modules of the proposed system are described as the cloud computing module, resource management module, and virtualization module. It further discusses system requirements, feasibility analysis, various UML diagrams including use case diagrams and sequence diagrams, and concludes with describing the software technologies used.
Load balancing in public cloud by division of cloud based on the geographical...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document provides an overview of multi agent-based distributed data mining. It discusses how data mining techniques have challenges when dealing with large, distributed data sources. Multi-agent systems can help address these challenges by allowing for distributed problem solving across decentralized data sources. The document then discusses how agent computing is well-suited for distributed data mining applications due to properties like decentralization, autonomy, and reactivity. It provides examples of application domains for distributed data mining and outlines key aspects like interoperability, dynamic system configuration, and performance that agent-based distributed data mining systems should address.
Application of Fuzzy Logic in Load Balancing of Homogenous Distributed Systems1CSCJournals
Various studies have shown that distributing the work load evenly among processors of a
distributed system highly improves system performance and increases resource utilization. This
process is known as load balancing. Fuzzy logic has been applied in many fields of science and
industry to deal with uncertainties. Existing research in using fuzzy logic for the purpose of load
balancing has only concentrated in utilizing fuzzy logic concepts in describing processors load
and tasks execution length. The responsibility of the fuzzy-based load balancing process itself,
however, has not been discussed and in most reported work is assumed to be performed in a
distributed fashion by all nodes in the network. This paper proposes a new fuzzy dynamic load
balancing algorithm for homogenous distributed systems. The proposed algorithm utilizes fuzzy
logic in dealing with inaccurate load information, making load distribution decisions, and
maintaining overall system stability. In terms of control, we propose a new approach that specifies
how, when, and by which node the load balancing is implemented. Our approach is called
Centralized-But-Distributed (CBD). An evaluation study of the proposed algorithm shows that our
algorithm is able to reduce the average response time and average queue length as compared to
known load balancing algorithms reported in the literature.
A distributed computing system is a collection of interconnected processors with local memory that communicate via message passing. There are various models including minicomputer, workstation, workstation-server, and processor pool. Distributed systems provide advantages like supporting distributed applications, sharing information and resources, extensibility, shorter response times, higher reliability, flexibility, and better price-performance ratio compared to centralized systems.
The document discusses the history and evolution of computer networking and distributed systems over time. Key points include:
- Ethernet was introduced in the 1970s and became the de facto networking standard. Network speeds increased from kilobits to gigabits per second over the decades.
- The number of internet hosts grew from a few thousand in the 1980s to hundreds of millions now, enabling widespread connectivity.
- Computing power increased dramatically with smaller, cheaper, and faster processors and storage. This enabled more complex distributed applications and protocols.
- Distributed systems allow performance scaling, distributed applications, interactive communication, remote access, and increased reliability through redundancy. Challenges include designing distributed software and maintaining reliability, security, and performance over
This document discusses various distributed system architectures including centralized, decentralized, and hybrid architectures. It covers software architectures like layered architectures, object-based architectures, and event-based architectures. It also discusses system architectures including client-server, peer-to-peer, structured P2P (like Chord and CAN), unstructured P2P, and hybrid architectures combining centralized and decentralized elements like edge server systems and collaborative distributed systems. Middleware is described as sitting between applications and distributed platforms to provide distribution transparency. Adaptability techniques like interceptors, separation of concerns, reflection, and feedback control loops are also summarized.
Due to the rapidly increasing data speed requirement, it has become essential to smartly utilize the available frequency spectrum. In wireless communications systems, channel quality parameters are often used to enable resource allocation techniques that improve system capacity and user quality. The uncoded bit or symbol error rate (SER) is specified as an important parameter in the second and third generation partnership project (3GPP). Nonetheless, techniques to estimate the uncoded SER are usually not much published. This paper introduces a novel uncoded bit error rate (BER) estimation method using the
accurate-bits sequence of the new channel codes over the AWGN channel. Here, we have used the new channel codes as a forward error correction coding scheme for our communication system. This paper also presents the simulation results to demonstrate and compare the estimation accuracy of the proposed method over the AWGN channel.
Virtual 2 d positioning system by using wireless sensors in indoor environmentijwmn
A 2D location detection system is constructed by using Wireless Sensor Nodes (WSN) to create aVirtual
Fingerprint map, specifically designed for use in an indoor environment. WSN technologies and
programmable ZigBee wireless network protocols are employed. This system is based on radio-location
fingerprinting technique. Both Linear taper functions and exponential taper functions are utilized with the
received signal strength distributions between the fingerprint nodes to generate virtual fingerprint maps.
Thus, areal and virtual combined fingerprint map is generated across the test area. K-nearest
neighborhood algorithm has been implemented on virtual fingerprint maps, in conjunction with weight
functions used to find the coordinates of the unknown objects. The system Localization accuracies of less
than a grid space areproved in calculations.
Network management involves configuration management, fault management, performance management, security management, and accounting management. Configuration management deals with documenting the initial setup and any changes to network entities and their relationships over time. Fault management detects, isolates, corrects, and documents issues through both reactive and proactive approaches. Performance management monitors metrics like capacity, traffic, throughput, and response time to ensure efficient network operations. Security management controls access based on policies while accounting management tracks network resource usage for billing or budgeting purposes.
Distributed computing by Dr.C.R.Dhivyaa, Assistant Professor, Kongu Engineeri...Dhivyaa C.R
The document discusses examples of distributed systems including web search engines, massively multiplayer online games, and financial trading systems. It describes how Google's web search infrastructure utilizes a distributed file system and structured storage across data centers worldwide. It also explains how online games like EVE Online maintain consistency across servers that partition virtual worlds among hundreds of computers. Financial trading systems are discussed as processing real-time event streams across various sources and formats to detect patterns and automatically execute trades.
SELF-ORGANIZATION AND AUTONOMOUS NETWORK SURVEYIJNSA Journal
The autonomic network gathers several aspects of Self-organization, which is depicted, into different
autonomous function such as the Self- configuration, the Self-optimization, the Self-repair, the Selfprotection, and the Self-cure. The latter is considered as one of the autonomous functions wished of a system network, which could be described by autonomous behavior is realized by structures of the control
loops and loop of control.
Resource Allocation using Virtual Machine Migration: A Surveyidescitation
As virtualization is proving to be dominant in
enterprise and organizational networks there is a need for
operators and administrators to pay more attention to live
migration of virtual machines (VMs) with the main objective
of workload balancing, monitoring, fault management, low-
level system maintenance and good performance with minimal
service downtimes. It is also a crucial aspect of cloud computing
that offers strategies to implement the dynamic allocation of
resources. Virtualization also enables virtual machine
migration to eliminate hotspots in data centers .However the
security associated with VMs live migration has not received
thorough analysis. Further, the negative impact on service
levels of running applications is likely to occur during the
live VM migration hence a better understanding of its
implications on the system performance is highly required.
In this survey we explore the security issues involved in live
migration of VMs and demonstrate the importance of security
during the migration process. A model which demonstrates
the cost incurred in reconfiguring a cloud-based environment
in response to the workload variations is studied. It is also
proved that migration cost is acceptable but should not be
neglected, particularly in systems where service availability
and response times are imposed by stringent Service Level
Agreements (SLAs). A system that provides automation of
monitoring and detection of hotspots and determination of
the new mapping of physical to virtual resources and finally
initiates the required migrations based on its observations is
also studied. These are experimented using Xen Virtual
Machine Manager. Migration based resource Managers for
virtualized environments are presented by comparing and
discussing several types of underlying algorithms from
algorithmistic issues point of view.
Java can be used two types of programs: applications & applets.An application is a program that runs on your computer, under the operating system of that computer.
An applets is an application designed to be transmitted over the Internet and executed by a java-compatible Web Browser. An applet is an executable program that runs inside a browser, such as Netscape or Internet Explorer.
Subject: Software Architecture Design
Topic: Distributed Architecture
In this presentation, you will learn about design pattern, softawre architecture, distributed architecture, basis of distributed architecture, why distributed architecture, need of distributed architecture, advantages and disadvantages of DA and much more.
Rate my presentation, It's designed graphically.
Analysis and Enhancements of Leader Elections algorithms in Mobile Ad Hoc Net...IDES Editor
The document analyzes and proposes enhancements to four leader election algorithms used in mobile ad hoc networks (MANETs). It considers factors like time complexity, message complexity, assumptions, fault tolerance, and timing models. Key points:
- It summarizes four leader election algorithms for MANETs and analyzes them based on common factors.
- Proposed enhancements include nodes inquiring about the current leader instead of starting new elections, using candidates to reduce overhead, and considering battery life and signal strength in elections.
- The analysis and enhancements aim to help system designers choose the right election algorithm for MANETs by providing a reference on time/message complexities and how the algorithms handle aspects like as
Distributed computing allows computers connected over a network to coordinate activities and share resources. It appears as a single, integrated system to users. Key characteristics include resource sharing, openness, concurrency, scalability, fault tolerance, and transparency. Common architectures include client-server, n-tier, and peer-to-peer. Paradigms for distributed applications include message passing between processes, the client-server model with asymmetric roles, and the peer-to-peer model with equal roles.
HOST AND NETWORK SECURITY by ThesisScientist.comProf Ansari
Network management means different things to different people. In some cases, it involves a solitary network consultant monitoring network activity with an outdated protocol analyzer. In other cases, network management involves a distributed database, auto polling of network devices, and high-end workstations generating real-time graphical views of network topology changes and traffic. In general, network management is a service that employs a variety of tools, applications, and devices to assist human network managers in monitoring and maintaining networks.
The Open Grid Services Architecture (OGSA) defines a set of standards for building grid systems. It has four main layers:
1) The application layer which includes physical resources like servers and storage, and logical resources like database and workflow managers.
2) A web services layer which defines how resources and services can interact using Open Grid Services Infrastructure (OGSI) and grid services.
3) OGSI specifies five interfaces for grid services: Factory, Life Cycle, State Management, Service Groups, and Notification.
4) Together these layers define a standardized architecture for building grid systems using web services and interfaces to manage resources and their interactions.
Review of Some Checkpointing Schemes for Distributed and Mobile Computing Env...Eswar Publications
Fault Tolerance Techniques facilitate systems to carry out tasks in the incidence of faults. A checkpoint is a local state of a process saved on stable storage. In a distributed system, since the processes in the system do not share memory; a global state of the system is defined as a combination of local states, one from each process. In case of a fault in distributed systems, checkpointing enables the execution of a program to be resumed from a previous consistent global state rather than resuming the execution from the commencement. In this way, the sum of constructive processing vanished because of the fault is appreciably reduced. In this paper, we talk about various issues related to the checkpointing for distributed systems and mobile computing environments. We also confer
various types of checkpointing: coordinated checkpointing, asynchronous checkpointing, communication induced
checkpointing and message logging based checkpointing. We also present a survey of some checkpointing algorithms for distributed systems.
This document discusses dynamic resource allocation using virtual machines. It begins by introducing cloud computing and how it allows scaling of resource usage based on demand through virtualization technology. It then analyzes the existing system of mapping virtual machines to physical resources and proposes an automated resource management system to achieve a balance between overload avoidance and green computing. The key modules of the proposed system are described as the cloud computing module, resource management module, and virtualization module. It further discusses system requirements, feasibility analysis, various UML diagrams including use case diagrams and sequence diagrams, and concludes with describing the software technologies used.
Load balancing in public cloud by division of cloud based on the geographical...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document provides an overview of multi agent-based distributed data mining. It discusses how data mining techniques have challenges when dealing with large, distributed data sources. Multi-agent systems can help address these challenges by allowing for distributed problem solving across decentralized data sources. The document then discusses how agent computing is well-suited for distributed data mining applications due to properties like decentralization, autonomy, and reactivity. It provides examples of application domains for distributed data mining and outlines key aspects like interoperability, dynamic system configuration, and performance that agent-based distributed data mining systems should address.
Application of Fuzzy Logic in Load Balancing of Homogenous Distributed Systems1CSCJournals
Various studies have shown that distributing the work load evenly among processors of a
distributed system highly improves system performance and increases resource utilization. This
process is known as load balancing. Fuzzy logic has been applied in many fields of science and
industry to deal with uncertainties. Existing research in using fuzzy logic for the purpose of load
balancing has only concentrated in utilizing fuzzy logic concepts in describing processors load
and tasks execution length. The responsibility of the fuzzy-based load balancing process itself,
however, has not been discussed and in most reported work is assumed to be performed in a
distributed fashion by all nodes in the network. This paper proposes a new fuzzy dynamic load
balancing algorithm for homogenous distributed systems. The proposed algorithm utilizes fuzzy
logic in dealing with inaccurate load information, making load distribution decisions, and
maintaining overall system stability. In terms of control, we propose a new approach that specifies
how, when, and by which node the load balancing is implemented. Our approach is called
Centralized-But-Distributed (CBD). An evaluation study of the proposed algorithm shows that our
algorithm is able to reduce the average response time and average queue length as compared to
known load balancing algorithms reported in the literature.
A distributed computing system is a collection of interconnected processors with local memory that communicate via message passing. There are various models including minicomputer, workstation, workstation-server, and processor pool. Distributed systems provide advantages like supporting distributed applications, sharing information and resources, extensibility, shorter response times, higher reliability, flexibility, and better price-performance ratio compared to centralized systems.
The document discusses the history and evolution of computer networking and distributed systems over time. Key points include:
- Ethernet was introduced in the 1970s and became the de facto networking standard. Network speeds increased from kilobits to gigabits per second over the decades.
- The number of internet hosts grew from a few thousand in the 1980s to hundreds of millions now, enabling widespread connectivity.
- Computing power increased dramatically with smaller, cheaper, and faster processors and storage. This enabled more complex distributed applications and protocols.
- Distributed systems allow performance scaling, distributed applications, interactive communication, remote access, and increased reliability through redundancy. Challenges include designing distributed software and maintaining reliability, security, and performance over
This document discusses various distributed system architectures including centralized, decentralized, and hybrid architectures. It covers software architectures like layered architectures, object-based architectures, and event-based architectures. It also discusses system architectures including client-server, peer-to-peer, structured P2P (like Chord and CAN), unstructured P2P, and hybrid architectures combining centralized and decentralized elements like edge server systems and collaborative distributed systems. Middleware is described as sitting between applications and distributed platforms to provide distribution transparency. Adaptability techniques like interceptors, separation of concerns, reflection, and feedback control loops are also summarized.
Due to the rapidly increasing data speed requirement, it has become essential to smartly utilize the available frequency spectrum. In wireless communications systems, channel quality parameters are often used to enable resource allocation techniques that improve system capacity and user quality. The uncoded bit or symbol error rate (SER) is specified as an important parameter in the second and third generation partnership project (3GPP). Nonetheless, techniques to estimate the uncoded SER are usually not much published. This paper introduces a novel uncoded bit error rate (BER) estimation method using the
accurate-bits sequence of the new channel codes over the AWGN channel. Here, we have used the new channel codes as a forward error correction coding scheme for our communication system. This paper also presents the simulation results to demonstrate and compare the estimation accuracy of the proposed method over the AWGN channel.
Virtual 2 d positioning system by using wireless sensors in indoor environmentijwmn
A 2D location detection system is constructed by using Wireless Sensor Nodes (WSN) to create aVirtual
Fingerprint map, specifically designed for use in an indoor environment. WSN technologies and
programmable ZigBee wireless network protocols are employed. This system is based on radio-location
fingerprinting technique. Both Linear taper functions and exponential taper functions are utilized with the
received signal strength distributions between the fingerprint nodes to generate virtual fingerprint maps.
Thus, areal and virtual combined fingerprint map is generated across the test area. K-nearest
neighborhood algorithm has been implemented on virtual fingerprint maps, in conjunction with weight
functions used to find the coordinates of the unknown objects. The system Localization accuracies of less
than a grid space areproved in calculations.
Mobility models for delay tolerant network a surveyijwmn
Delay Tolerant Network (DTN) is an emerging networking technology that is widely used in the
environment where end-to-end paths do not exist. DTN follows store-carry-forward mechanism to route
data. This mechanism exploits the mobility of nodes and hence the performances of DTN routing and
application protocols are highly dependent on the underlying mobility of nodes and its characteristics.
Therefore, suitable mobility models are required to be incorporated in the simulation tools to evaluate DTN
protocols across many scenarios. In DTN mobility modelling literature, a number of mobility models have
been developed based on synthetic theory and real world mobility traces. Furthermore, many researchers
have developed specific application oriented mobility models. All these models do not provide accurate
evaluation in the all scenarios. Therefore, model selection is an important issue in DTN protocol
simulation. In this study, we have summarized various widely used mobility models and made a comparison
of their performances. Finally, we have concluded with future research directions in mobility modelling for
DTN simulation.
Analysis of security threats in wireless sensor networkijwmn
Wireless Sensor Network(WSN) is an emerging technology and explored field of researchers worldwide
in the past few years, so does the need for effective security mechanisms. The sensing technology
combined with processing power and wireless communication makes it lucrative for being exploited in
abundance in future. The inclusion of wireless communication technology also incurs various types of
security threats due to unattended installation of sensor nodes as sensor networks may interact with
sensitive data and /or operate in hostile unattended environments. These security concerns be addressed
from the beginning of the system design. The intent of this paper is to investigate the security related
issues in wireless sensor networks. In this paper we have explored general security threats in wireless
sensor network with extensive study.
An approach to dsr routing qos by fuzzy genetic algorithmsijwmn
This document summarizes a research paper that proposes improvements to the DSR routing protocol in mobile ad hoc networks through the use of genetic and fuzzy algorithms. The proposed GA-DSR protocol adds link costs to route request packets and has the destination node use the received route requests as input to a genetic algorithm to find the two best routes. It then sends these routes back to the source in a route reply packet. The protocol also uses fuzzy logic to dynamically adjust the route update period based on route error counts. The researchers believe this approach can help improve quality of service in DSR routing by selecting optimal paths based on link costs and maintaining up-to-date routes.
In ad hoc networks, routing plays a pertinent role. Deploying the appropriate routing protocol is very important in order to achieve best routing performance and reliability. Equally important is the mobility model that is used in the routing protocol. Various mobility models are available and each can have different impact on the performance of the routing protocol. In this paper, we focus on this issue by examining how the routing protocol, Optimized Link State Routing protocol, behaves as the mobility model is varied. For this, three random mobility models, viz., random waypoint, random walk and random direction are considered. The performance metrics used for assessment of Optimized Link State Routing protocol are Optimized Link State Routing protocol, end-to-end delay and packet delivery ratio.
New strategy to optimize the performance of spray and wait routing protocolijwmn
Delay Tolerant Networks have been (DTN) have been developed to support the irregular connectivity often
separate networks. The main routing problem in this type of network is embarrassed by time that is
extremely long, since connections are intermittent and opportunistic. Routing protocols must take into
account the maximum constraint encountered in this type of environment , use effective strategies
regarding the choice of relay nodes and buffer management nodes to improve the delivery of messages and
the time of their delivery . This article proposes a new strategy that optimizes the routing Spray and wait.
The proposed method uses the information contained in the messages delivered mostly paths traversed by
the messages before arriving at their destination and the time when nodes have receive these messages.
Simulation results show that the proposed strategy can increase the probability of delivery and minimizing
overhead unlike FIFO technology used with the default routing ' sprat and wait'
A review of security attacks and intrusion detection schemes in wireless sens...ijwmn
Wireless sensor networks are currently the greatest innovation in the field of telecommunications. WSNs
have a wide range of potential applications, including security and surveillance, control, actuation and
maintenance of complex systems and fine-grain monitoring of indoor and outdoor environments. However
security is one of the major aspects of Wireless sensor networks due to the resource limitations of sensor
nodes. Those networks are facing several threats that affect their functioning and their life. In this paper we
present security attacks in wireless sensor networks, and we focus on comparison and analysis of recent
Intrusion Detection schemes in WSNs.
Path constrained data gathering scheme for wireless sensor networks with mobi...ijwmn
This document summarizes a research paper on using mobile elements to gather data in wireless sensor networks. The paper proposes a heuristic algorithm called Graph Partitioning (GP) to address the K-Hop tour planning (KH-tour) problem of designing the shortest possible tour for a mobile element to visit a subset of sensor nodes called caching points, such that any node is at most k hops from the tour.
The GP algorithm works by first partitioning the sensor network graph into partitions where the depth of each partition is bounded by k hops. It then identifies the minimum number of caching points needed in each partition. Finally, it constructs the mobile element's tour to visit all the identified caching points.
Intelligent transportation system (ITS) is an application which provides intelligence to the transportation
and traffic management systems. Although the word ITS applies to all systems in the transportation but as
per the European union directive it is the application of Information and communication technology in the
field of transportation is defined as ITS. The communication technology has evolved greatly today from
2G/3G to long term evolution (LTE). In this paper we focus on the LTE and its application in the ITS. Since
LTE offers excellent QoS, wide area coverage and high availability it is a preferred choice for vehicle to
infrastructure (V2I) service. At the same time the LTE customer base is increasing day by day which results
in congestion and accessing the network to send or request resources becomes difficult. In this paper we
have proposed a group based node selection algorithm to reduce the preamble ID collision otherwise this
uncoordinated preamble ID transmission by vehicle node (VN) will eventually clog the network and there
will be a massive congestion and re-transmissions attempts by VNs to obtain the random access channel
(RACH).
Performance analysis of voip traffic over integrating wireless lan and wan us...ijwmn
A simulation model is presented to analyze and evaluate the performance of VoIP based integrated
wireless LAN/WAN with taking into account various voice encoding schemes. The network model was
simulated using OPNET Modeler software. Different parameters that indicate the QoS like MOS, jitter,
end to end delay, traffic send and traffic received are calculated and analyzed in Wireless LAN/WAN
scenarios. Depending on this evaluation, Selection codecs G.729A consider the best choice for VoIP.
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...ijwmn
Recent developments on Wireless Sensor Networks have made their application in a wide range
such as military sensing and tracking, health monitoring, traffic monitoring, video surveillance and so on.
Wireless sensor nodes are restricted to computational resources, and are always deployed in a harsh,
unattended or unfriendly environment. Therefore, network security becomes a tough task and it involves
the authorization of admittance to data in a network. The problem of authentication and pair wise key
establishment in sensor networks with mobile sink is still not solved in the mobile sink replication attacks.
In q-composite key pre distribution scheme, a large number of keys are compromised by capturing a
small fraction of sensor nodes by the attacker. The attacker can easily take a control of the entire network
by deploying a replicated mobile sinks. Those mobile sinks which are preloaded with compromised keys
are used authenticate and initiate data communication with sensor node. To determine the above problem
the system adduces the three-tier security framework for authentication and pair wise key establishment
between mobile sinks and sensor nodes. The previous system used the polynomial key pre distribution
scheme for the sensor networks which handles sink mobility and continuous data delivery to the
neighbouring nodes and sinks, but this scheme makes high computational cost and reduces the life time of
sensors. In order to overcome this problem a random pair wise key pre distribution scheme is suggested
and further it helps to improve the network resilience. In addition to this an Identity Based Encryption is
used to encrypt the data and Mutual authentication scheme is proposed for the identification and
isolation of replicated mobile sink from the network.
Data mining is important process to extract the useful information and pattern from huge amount of data.
NS-2 is an efficient tool to build the environment of network. The results from simulate these environment
in NS-2 is trace file that contains several columns and lines represent the network events. This trace file
can be used to analyse the network according to performance metrics but it has redundant columns and
rows. So, this paper is to perform the data mining in order to find only the necessary information in
analysis operation to reduce the execution time and the storage size of the trace file.
Stochastic analysis of random ad hoc networks with maximum entropy deploymentsijwmn
In this paper, we present the first stochastic analysis of the link performance of an ad hoc network modelled
by a single homogeneous Poisson point process (HPPP). According to the maximum entropy principle, the
single HPPP model is mathematically the best model for random deployments with a given node density.
However, previous works in the literature only consider a modified model which shows a discrepancy in the
interference distribution with the more suitable single HPPP model. The main contributions of this paper
are as follows. 1) It presents a new mathematical framework leading to closed form expressions of the
probability of success of both one-way transmissions and handshakes for a deployment modelled by a
single HPPP. Our approach, based on stochastic geometry, can be extended to complex protocols. 2) From
the obtained results, all confirmed by comparison to simulated data, optimal PHY and MAC layer
parameters are determined and the relations between them is described in details. 3) The influence of the
routing protocol on handshake performance is taken into account in a realistic manner, leading to the
confirmation of the intuitive result that the effect of imperfect feedback on the probability of success of a
handshake is only negligible for transmissions to the first neighbour node.
A major role is played in the layout and evaluation of any empirical wireless structure to manifest is the goal of this paper that counterfeit mode architectures affect counterfeit conduct, regarding structure accomplishment metrics, essentially and therefore, the excellent architecture should be explored in order to accomplish the most accurate and reliable results. It is found that the most analytical factors it is found that that actuate counterfeit mode accomplishment are counterfeit time, structure event organizing and
grade of adequate. It is, also, found that counterfeit time in relation to event existence in the real structure
along with the usage of modern architectural concepts such as multi-interweave technology complement
analytical issues too in the advancement of an adequate counterfeit organization for wireless communications. In order to evaluate the above findings an extensive empirical review has been
demeanored analysising several distinct events counterfeitorganizations towards presenting the relation
between channel designing collections, counterfeit time and structure accomplishment.
Cellular wireless systems like GSM suffer from congestion resulting in overall system degradation and poor service delivery. When the traffic demand in a geographical area is high, the input traffic rate will exceed thecapacity of the output lines. This work focused on homogenous wireless network (the network traffic and resource dimensioning that are statistically identical) such that the network performance
evaluation can be reduced to a system with single cell and a single traffic type. Such system can employa queuing model to evaluate the performance metric of a cell in terms of blocking probability.
Five congestion control models were compared in the work to ascertain their peculiarities, they are Erlang B, Erlang C, Engset (cleared), Engset (buffered), and Bernoulli. To analyze the system, an aggregate onedimensional Markov chain wasderived, such that it describes a call arrival process under the assumption
that it is Poisson distributed. The models were simulated and their results show varying performances, however the Bernoulli model (Pb5) tends to show a situation that allows more users access to the system and the congestion level remain unaffected despite increase in the number of users and the offered traffic into the system.
Bandwidth aware on demand multipath routing in manetsijwmn
The document proposes a modification to the AOMDV routing protocol to utilize available bandwidth in MANETs. It describes enhancing AOMDV to select multiple paths during route discovery based on available bandwidth, and using periodic detector packets to monitor bandwidth on alternate paths. Simulation results showed this bandwidth-aware multipath approach improves end-to-end throughput, packet delivery ratio, and end-to-end delay compared to the original AOMDV protocol.
Impact of client antenna’s rotation angle and height of 5g wi fi access point...ijwmn
This paper investigates the impact of antenna rotation’s angle at the receiver side and antenna height at
transmitter side on radio channel’s amount of fading. Amount of fading is considered as a measure of
severity of fading conditions in radio channels. It indicates how severe the fading level relative to Rayleigh
fading channel. The results give an input to optimize height of 5G Wi-Fi access point for better link
performance for different antenna’s rotation angles at receiver side. The investigation covers three
different indoor environments with different multipath dispersion levels in delay and direction domains;
lecture hall, corridor, and banquet hall.
A cross layer delay-aware node disjoint multipath routing algorithm for mobil...ijwmn
Mobile Ad Hoc Networks (MANETS) require reliable routing and Quality of Service(QoS) mechanism to
support diverse applications with varying and stringent requirements for delay, jitter, bandwidth, packets
loss. Routing protocols such as AODV, AOMDV, DSR and OLSR use shortest path with minimum hop
count as the main metric for path selection, hence are not suitable for delay sensitive real time
applications. To support such applications delay constrained routing protocols are employed. These
Protocols makes path selection between source and destination based on the delay over the discovered
links during routing discovery and routing table calculations. We propose a variation of a node-disjoint
Multipath QoS Routing protocol called Cross Layer Delay aware Node Disjoint Multipath AODV (CLDMAODV)
based on delay constraint. It employs cross-layer communications between MAC and routing
layers to achieve link and channel-awareness. It regularly updates the path status in terms of lowest delay
incurred at each intermediate node. Performance of the proposed protocol is compared with single path
AODV and NDMR protocols. Proposed CLDM-AODV is superior in terms of better packet delivery and
reduced overhead between intermediate nodes.
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...IJCNCJournal
The document describes a proposed distributed network management system (DMMS) for managing mobile ad hoc networks (MANETs). Key points:
- DMMS uses a distributed approach where each node has a management agent and stores management information locally. Agents exchange abstract data on a need-to-know basis to monitor and control the network.
- The system forms nodes into clusters, with a cluster head node acting as a local manager. Management messages are exchanged within and between clusters.
- Seven message types are defined for manager-agent communication, including GET, SET, and TRAP messages. Agents can respond with data or acknowledge requests.
- Management information is stored in MIBs and represented abstractly
This document provides an overview of network management, including the key functions of configuration management, fault management, performance management, security management, and accounting management. It describes the Simple Network Management Protocol (SNMP) framework used for monitoring and maintaining networks, including the Structure of Management Information (SMI) and Management Information Base (MIB). The roles of the SNMP manager and agent are defined, along with how SMI defines object names, data types, and encoding, while MIB contains the collection of objects that can be managed.
Present and desired network management to cope with the expected expansion, n...Alexander Decker
This document summarizes the present and desired network management approaches for the Nelson Mandela African Institute of Science and Technology (NM-AIST) network to cope with expected expansion. It discusses the five functional areas of network management according to the ISO (International Organization for Standardization) model - fault management, configuration management, performance management, security management, and accounting management. For each area, it provides an overview of the current approach at NM-AIST and recommendations for improvements to effectively manage current and future growth of the network.
Network management involves administering and monitoring computer networks through various services like fault analysis and performance management. It includes functions like address management, security management, traffic management, and load balancing. Network management tools help IT professionals monitor and optimize complex networks spanning large areas by automating tasks and providing real-time visibility, compliance reporting, performance monitoring, and troubleshooting assistance. Benefits of network management include access to experts, routine monitoring, optimized operations, increased security, and improved efficiency.
Functions and features network managementFlightcase1
Network management is the process of administering and managing computer networks. Various services provided by this discipline include fault analysis, performance management, provisioning of networks, maintaining the quality of service.
This document discusses network management. It begins by defining management and describing the two main functions of controlling and monitoring. It then discusses why network management is needed, the basic models of peer-to-peer and hierarchical management, and the general architecture. It also covers the hardware and software resources that need to be managed, as well as common management protocols and applications.
Localization & management of sensor networksRushin Shah
The document discusses network management for wireless sensor networks. It describes the need for network management due to faults, optimization of performance, and analyzing user behavior. It also outlines some key requirements and design issues for network management in WSNs, including the need for adaptive and resource-efficient algorithms. Finally, it discusses using aspects of SNMP and TOM as possible approaches for network management in WSNs, noting challenges in directly applying them due to the unique properties of WSNs.
A SCALABLE MONITORING SYSTEM FOR SOFTWARE DEFINED NETWORKSijdpsjournal
Monitoring functionality is an essential element of any network system. Traditional monitoring solutions
are mostly used for manual and infrequent network management tasks. Software-defined networks (SDN)
have emerged with enabled automatic and frequent network reconfigurations. In this paper, a scalable
monitoring system for SDN is introduced. The proposed system monitors small, medium, and large-scale
SDN. Multiple instances of the proposed monitoring system can run in parallel for monitoring many SDN
slices. The introduced monitoring system receives requests from network management applications,
collects considerable amounts of measurement data, processes them, and returns the resulting knowledge
to the network management applications. The proposed monitoring system slices the network (switches and
links) into multiple slices. The introduced monitoring system concurrently monitors applications for
various tenants, with each tenant's application running on a dedicated network slice. Each slice is
monitored by a separate copy of the proposed monitoring system. These copies operate in parallel and are
synchronized. The scalability of the monitoring system is achieved by enhancing the performance of SDN.
In this context, scalability is addressed by increasing the number of tenant applications and expanding the
size of the physical network without compromising SDN performance.
Sensor Adhoc Networks SECOM paper-Final - formatJohn A. Serri
The document proposes a reference architecture called the Basic Sensor Network Framework (BSNF) for standardized management and coordination of ad hoc sensor networks. The BSNF defines six building blocks - sensors, sensor-attached users, free agent users, managers, communication nodes, and communication sub-networks. It specifies a layered model with standardized interfaces between these elements and proposes a management approach using a standardized Management Information Base similar to SNMP. The goal is to achieve interoperability across sensor network applications through a common framework while allowing for proprietary sensor and application functionality.
The document discusses network management systems (NMS) in large enterprises. It covers the introduction to network management and outlines key topics including the functional areas of network management like configuration, fault, performance, security and accounting management. It also discusses network management protocols commonly used like SNMP, SNMPv2, SNMPv3, CMIS/CMIP and RMON. The document defines the key elements of a network management system including the management station, management agents, management information base and network management protocols. It also covers considerations for choosing a network management platform and system.
Results of simulation modeling of technical parameters of a multiservice networkTELKOMNIKA JOURNAL
In a scientific article, the authors presented the results of simulation modeling of the technical parameters of a multiservice network. As a model of a multiservice communication network for the computational experiment, the model proposed in the previous scientific publications of the author was chosen. The selected model uses the Laplase-Stilles transform. Simulation modeling was carried out using the technical parameters of the multiservice network’s availability factor and network load. Scientific results of experimental research work are given in the form of tables. Relations of the probability of betime servicing of an application on the load of a multiservice communication network for various availability factors and the probability of untimely service of an application on the availability factor for numerous network loadings are obtained. The character of the distribution of costs necessary for the implementation of solutions for different categories of technical operation is shown. Scientific research on determining the objective function’s minimum value is presented in graphs and diagrams. The results of simulation modeling of the technical parameters of multiservice networks are presented in the form of diagrams using the Matlab software environment.
This document provides an overview of network management requirements and systems. It discusses the key areas of network management including fault management, accounting management, configuration and name management, performance management, and security management. It then describes the general architecture of a network management system, including network management entities, agents, and the network control host. Finally, it introduces the Simple Network Management Protocol (SNMP) and describes versions 1, 2, and 3.
Managing enterprise networks with cisco prime infrastructure_ 1 of 2Abdullaziz Tagawy
Network Management is define as monitoring, testing, configuring, and troubleshooting network components to meet a set of requirements defined by an organization.
The requirements include the smooth, efficient operation of the network that provides the predefined quality of service for users.
To accomplish this task, a network management system uses hardware, software, and humans.
An Optimized Mechanism for Adaptive and Dynamic Policy Based Handover in Clus...pijans
On-going revolution in ever-improving wireless communication enforces the necessity of a self configuring,
rapidly deployable and infrastructure less network. MANET is such an autonomous wireless network that
meets the requirements. At the same time MANET’s random behavior and absence of any central
intelligence to gather unambiguous knowledge about user contexts complexes QoS maintenance and
hampers proper utilization of network resources resulting into unnecessary handovers. In past, few policy
driven handover approaches have been proposed for MANET but none of them explores a comprehensive
policy design. Therefore in this paper we propose an adaptive and optimized policy based handover
mechanism which is based on explicitly designed policies like load balancing, service discovery and next
hop selection .Efficient procedures for these policies are also explored .This work predicts the high time of
handover need on the basis of application specific needs of individual freely roaming mobile nodes,
avoiding unnecessary handovers and provides efficient handover procedure with optimized resource
consumption, reduced latency and interruption time.
AN OPTIMIZED MECHANISM FOR ADAPTIVE AND DYNAMIC POLICY BASED HANDOVER IN CLUS...pijans
On-going revolution in ever-improving wireless communication enforces the necessity of a self configuring,
rapidly deployable and infrastructure less network. MANET is such an autonomous wireless network that
meets the requirements. At the same time MANET’s random behavior and absence of any central
intelligence to gather unambiguous knowledge about user contexts complexes QoS maintenance and
hampers proper utilization of network resources resulting into unnecessary handovers. In past, few policy
driven handover approaches have been proposed for MANET but none of them explores a comprehensive
policy design. Therefore in this paper we propose an adaptive and optimized policy based handover
mechanism which is based on explicitly designed policies like load balancing, service discovery and next
hop selection .Efficient procedures for these policies are also explored .This work predicts the high time of
handover need on the basis of application specific needs of individual freely roaming mobile nodes,
avoiding unnecessary handovers and provides efficient handover procedure with optimized resource
consumption, reduced latency and interruption time.
This document discusses network management and administration. It defines network management as dealing with operations, management, and monitoring of voice and data on a network. Network management contains five functional areas: configuration management, fault management, performance management, accounting management, and security management. It then provides examples of case histories in network management, including the importance of topology, issues with centrally managed networks, transaction delays in client-server networks, impacts on end-to-end customer services, and common network problems.
This document discusses network management for wireless sensor networks. It begins with an introduction to traditional network management models and then discusses key design issues for network management in WSNs including power efficiency, scalability, and simplicity. It provides MANNA as an example management architecture for WSNs and discusses other related issues like naming, localization, and fault tolerance. The document also outlines applications of WSNs such as habitat monitoring, structural monitoring, and smart roads.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...ijcsa
Intelligent networks are becoming more enveloping and dwelling a new generation of applications are
deployed over the peer-to-peer networks. Intelligent networks are very attractive because of their role in
improving the scalability and enhancing performance by enabling direct and real-time communication
among the participating network stations. A suitable solution for resource management in distributed wireless systems is required which should support fault-tolerant operations, requested resources (at shortest path), minimize overhead generation during network management, balancing the load distribution between the participating stations and high probability of lookup success and many more. This article
presents a Movement Assisted Component Based Scalable Framework (MAC-SF) for the distributed
network which manages the distributed wireless resources and applications; monitors the behavior of the
distributed wireless applications transparently and attains accurate resource projections, manages the
connections between the participating network stations and distributes the active objects in response to the
user requests and changing processing and network conditions. This system is also compared with some
exiting systems. Results shows that MAC-SF is a better system and can be used in any wireless network.
Introdunction to Network Management Protocols - SNMP & TR-069William Lee
This document provides an introduction to network management protocols SNMP and TR-069. It describes the key functions of network management including configuration, performance, accounting, fault and security management. It then provides details on SNMP including its simple management architecture. The document also explains TR-069/CWMP which was developed later for CPE management, covering capabilities like auto-configuration, software management, monitoring and diagnostics. It includes diagrams of the CWMP architecture and protocol stack. Finally, it defines various terminology used in network and CPE management.
Similar to A novel resource efficient dmms approach for network monitoring and controlling functions (20)
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
A novel resource efficient dmms approach for network monitoring and controlling functions
1. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 1, February 2015
DOI : 10.5121/ijwmn.2015.7101 1
A NOVEL RESOURCE EFFICIENT DMMS APPROACH
FOR NETWORK MONITORING AND CONTROLLING
FUNCTIONS
Golam R. Khan1
, Sharmistha Khan2
, Dhadesugoor R. Vaman3
, and Suxia Cui4
Department of Electrical and Computer Engineering, Prairie View A&M University,
Prairie View, Texas 77446, USA
ABSTRACT
In this paper, we propose a novel Distributed MANET Management System (DMMS) approach to use cross
layer models to demonstrate a simplified way of efficiently managing the overall performance of individual
network resources (nodes) and the network itself which is critical for not only monitoring the traffic, but
also dynamically controlling the end-to-end Quality of Service (QoS) for different applications. In the
proposed DMMS architecture, each network resource maintains a set of Management Information Base
(MIB) elements and stores resource activities in their abstraction in terms of counters, timer, flag and
threshold values. The abstract data is exchanged between different management agents residing in different
resources on a need-to-know basis and each agent logically executes management functions locally to
develop understanding of the behavior of all network resources to ensure that user protocols can function
smoothly. However, in traditional network management systems, they collect statistical data such as
resource usage and performance by spoofing of resources. The amount of data that is exchanged with other
resources through management protocols that can be extremely high and the bandwidth for overhead
management functions increases significantly. Also, the data storage requirements in each network
resource for management functions increases and become inefficient as it increases the power usage for
processing. Our proposed scheme targets at solving the problems.
KEYWORDS
Network Management, MANET, Distributed Network Management System, MIB, Managed Objects (MO)
1.INTRODUCTION
Network management is defined as “a process of controlling a complex data network so as to
maximize its efficiency and productivity” [1]. This process involves data collection, data
processing, data analysis, fault identification and fault clearing methods in order to support
desired multi-service provisioning end-to-end with performance assurance needed. To accomplish
this process, the International Standards Organization (ISO) referred to as the OSI management
model [1, 2], defines five areas of network management. They include fault management,
accounting management, configuration management, performance management, and security
management. In Fig. 1, the flow diagram of the management functions is given. At any instance
of time, the operational controls of the network resources are in the hands of these management
functions. When the network is operating in normal mode, the control is in the hands of
performance management. If any resource experiences a fault, the fault management controls the
resource. The configuration management takes control whenever a new resource is being
configured, the configuration management takes control, the security management takes control if
any resource has a security violation, and the accounting management controls the resource cost
and usage management. These functional management components are designed modularly and
2. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 1, February 2015
2
each of these functions looks at the MIB elements to take any actions whether it is real time or
non-real time. Thus, some abstraction is maintained to simplify the management functionality of
the network.
Figure 1. Flow diagram of the management functions
The design of network management architectures uses either centralized where a single network
manager station or hierarchical where it maintain multi-layered network manager or distributed
that allow each node to have an agent which takes manager-ship when initiating an action or
responds to a command. Thus, it is important to use distributed network management where a
management agent in a node takes manager-ship for a small duration of time and relinquished
once the execution of an activity is done. This allows every node to be acting as manager at
different instances of time.
This leads to the design of distributed network management where the users can measure the
behavior of the network for their own applications without requiring the network to exchange
such data is very crucial as more and more heterogeneous wireless networks are being connected.
The end user devices must be able to develop management entities that allow computation of
traffic and provide real time control will allow performance assurance of multi-service
provisioning. This paper address the distributed management architecture and demonstrate the
cost effective computation of the management entities at each user for both performance
monitoring and real time control of bounded performance management of applications supported
for each source-destination pair of nodes in Mobile Ad Hoc Networks (MANET).
In our previous work, we have shown the overview of a resource efficient Distributed MANET
Management System (DMMS) architecture [10]. In this paper, we are going to demonstrate the
cost effective computation of the management entities at each user for monitoring the overall
network such as user data throughput and delay, and real time network control functions where
we have shown different management aspects for different multi-service applications such as
Position, Location and Tracking (PL&T) system [11] and Graph Theoretical Routing application
[12] with minimal use of bandwidth in the network for management functions. The remaining
sections are organized as follows:
Section 2 Background Research
Section 3 Overview of Distributed MANET Management System (DMMS) architecture
Section 4 Management Functions
Section 5 shows a real time simulation for DMMS where Network Simulator-2 (NS-2)
and MATLAB are used as simulation tools. Through the simulation results, it will
analyze the performance of the proposed DMMS.
Section 6 Conclusions
3. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 1, February 2015
3
2. BACKGROUND RESEARCH
In Table 1 we have shown the summary of some related works.
Table 1.Summary of different network management system architectures
Network Management
System
Main Management Functionalities Limitations
Ad hoc Network
Management Protocol
(ANMP) [3]
Hierarchical NMA is used.
Reduce the number of messages
exchanged between the manager and
the agents.
Focused on data collection,
configuration/fault management, and
security management
SNMP is used.
Performance management function is
not developed.
Cost of maintaining a hierarchy in the
face of node mobility
Cluster maintenance algorithms runs
periodically
Resource Monitoring Issues
in Ad Hoc Networks [4]
• A small-scale (13 nodes) ad hoc
network is implemented and overall
performance is evaluated
• Run in a highly mobile ad hoc network
• Periodically broadcasting the beacons
that causes high message overhead
• Not saleable
Network Management
System for Large-scale
WSNs [5]
• Centralized NMA
• Overcome the bad impact of polling
and periodically broadcasting
• Configuration management,
performance management, fault
management and accounting
management is considered
• One manager
• High communicate overhead for data
polling and complex to implement
• Focuses on the performance analyses of
communication from the node to the
gateway
Network Management
Framework for WSNs [6]
• Cluster-based hierarchical architecture
is used
• Defined the MIB according to the roles
of nodes and characteristics of
information
• Reduces the management overhead of
the network
• Not shown the computation of the
aggregated or statistical information of
the network
• Not saleable.
• Complex to implement and not flexible
enough
The Guerrilla Management
Architecture for Ad hoc
Networks [7]
• Adaptive and autonomous
management of ad hoc networks
• Nodes range in heterogeneous
functionality and capability
• Scalable
Cluster heads poll management
information from the nodes in a
centralized manner that introduce an
additional overhead that will increase
energy consumption and decrease the
available bandwidth
Towards Autonomic
Network Performance
Management in Mobile Ad
Hoc Networks [8]
• Focused on centralized implementation
• Designed to monitor, model, optimize,
and configure the controllable node
• Tuning the performance of the overall
network performance.
• Not mansions about the fully distributed
or hybrid approach
MANNA: Management
Architecture for Wireless
Sensor Networks [9]
• Provides self management and self
configuration
• Policy-based management framework,
• Coverage maintenance, and fault
detection
• Polling management messages
sometimes causes huge amount of
management traffic for a large network.
From the literature reviews that are discussed above, it is clear that, all the proposed network
management architectures have some features that are really beneficial to manage a network.
However, still there are some major drawbacks that also need to be considered. Most of the
proposed systems [3-9] want to reduce management message overhead, provide power efficiency
and scalability for managing large-scale networks where SNMP is used for exchanging MIBs.
Thus, that has not given the flexibility to customize packet structure as SNMP has a fixed packet
structure. Again, most of the cases, management packets are periodically broadcasted that reduces
resource efficiency and bandwidth efficiency as well. Furthermore, for collecting statistical data,
spoofing of resources are used where it requires exchanging data with other resources through
4. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 1, February 2015
4
management protocols that ultimately increases the bandwidth for overhead management
functions. Considering these issues, we have developed such a distributed network management
system that ensure flexibility of using network resources, bandwidth efficiency and as well as
resource efficiency. In our proposed DMMS, we have shown a simplified way to find the network
performance by using cross layer management objects (MOs) and distributed the management
functions among all the cluster members.
3. OVERVIEW OF DMMS ARCHITECTURE
We have shows the architectural representation of Distributed MANET Management System
(DMMS) Architecture that was shown in [10]. In Fig. 2 shows the DMMS architecture where
each node has an agent with an associated distributed MANET management system MIB
(dMmsMIB). Any agent can assume managership at an instance of time. The network
management operation is based upon one of the agents to assume managership (become manager)
and communicate with a remote agent for accessing the dMmsMIB elements for either
monitoring of the network behavior or for controlling the network behavior in real time.
Figure 2. Architecture of the Distributed MANET Management System (DMMS)
Figure 3 shows a block schematic diagram of two nodes with network management function with
associated MIB and OSI User Protocol Stack. The User Plane where User Protocol stack resides
is used for message exchange between end user applications. The network management function
and the associated MIB reside in the management plane. The network management function
exchanges the LME data from each user protocol layer that is updated in the associated
Attributes. Basically, the Attribute content specifies the behavior of the user functions at the local
protocol layers. This is done at each node. Once this is established, any network management
function at any node can access the content of the MIB elements of the network management
function at any remote node and compute the necessary controls for execution. Since only MIB
elements are exchanged in the management plane, the bandwidth required for control functions
can be significantly reduced in the management plane as opposed to sending the strings of data in
the user plane.
Cluster Head (CH)
Node or Cluster member
Cluster
Intra-cluster communication link
Inter-cluster communication link
Nodes
Cluster
Agent
(managership)
Agent
dMmsMIB
5. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 1, February 2015
5
Figure 3. Management Information Exchange
At any instance of time, the network management function at any node can act as a manager and a
network management function at a remote node can act as an agent. The manager-agent
relationship can be reversed at different instances of time. An agent acting as a manager will issue
commands to access the MIB elements of a remote node and the agent at the remote node will
respond to the commands. In the simulation of DMMS, the network management function is set
up such that each command shall have a response from the remote agent. The communication
between two network management functions allows exchanging MIB elements or allows sending
commands to operate on the remote MOs and their associated attributes. It is independent of the
user protocol. The MIB elements in each node are organized such that a Managed Object (MO) is
specified for each user protocol layer with a set of associated attributes. The attributes are set up
as counters with content in terms of integer values, flags and status with content as Boolean.
Figure 3 shows the management information exchange process. The simulation is set up such that
the management packets are interleaving with user packets within each ensemble. The number of
management packets within each ensemble is set based on the quantity of management attributes
and the remaining packets assigned as user packets.
The management commands are identified in the management packet as a PDU types. In the
proposed design, we have used the following PDU types for Management Information Exchange:
SET, SETBULK, ACK, GET, GETBULK, and RESPONSE. These are used for either getting the
contents of the elements or operating on the remote elements (MOs and associated Attributes).
The management commands and corresponding actions are specified as follows:
GET and GETBULK are used when a management function at a node becomes a manager
and requests access to the contents of MOs and associated Attributes at a remote MIB
controlled by remote agent at a remote node.
RESPONSE is sent by the remote agent as a response to GET and GETBULK request.
SET and SETBULK are used when a management function at a node wishes to operate on
the contents of MOs and associated Attributes at a remote MIB.
ACK is used to respond to SET and SETBULK requests identifying the actions taken on
the MOs and the attributes at the remote agent.
Figure 4 shows some example of MIBs that are proposed to use as the distributed MANET
management system’s MIB (dMmsMIB).
6. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 1, February 2015
6
Figure 4. Distributed MANET management system’s MIBs (dMmsMIBs)
In [10], we defined two types of management operations such as normal basis management and
need-to-know basis management. In normal basis management operation, dynamic MIBs are
exchanged. In need-to-know basis management operation, both dynamic and static information
are exchanged.
During any transmission, when a node observes that an attribute (e.g. number of packet count) has
reached to a threshold, it will send a broadcast message or a unicast message (management) like
“SET_BULK PDU” or “SET PDU” to another node. We define this type of management operation
as normal management operation.
Sending management information periodically to the cluster members is cost ineffective that
implies too many management packets cause high message overhead and bandwidth wastes.
Need-to-know basis management allows the efficient use of the resources. In this management,
when manager wants the information, it can request the agent to send specific management
attributes that are needed to know for some management applications.
4. DMMS FUNCTIONS
The use of distributed network management with MIB elements for control and monitoring is
extremely cost effective compared to conventional network management methods where
expensive devices are used to monitor the network at different locations of the network globally.
In our proposed distributed network management approach, each source-destination pair controls
their applications independently without requiring any knowledge to be accessed from the
network itself. In this section, we have shown some management applications that can be used for
controlling and monitoring purpose.
4.1. Real Time Network Control Functions
Real Time Network Control Function allows understanding the computational measurements for
end user applications. The routing type of application at the IP layer which sets up the paths
across the network requires knowledge of nodes in the vicinity and their traffic conditions. The
Position, Location and Tracking (PL&T) [11] algorithm allows real time computation of PL&T
data for each moving target node at different instances of time which is sent to the Cluster Head
that maps the network and broadcast the mapping data of all nodes, so that each node can use the
data for any end user application. However, the user protocol layers may have to send this data in
7. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 1, February 2015
7
terms of strings of X and Y coordinates using floating point function which occupies a lot of
bandwidth, while exchanging the MIB elements reduces the bandwidth requirement significantly
at the cost of computation of Cluster map at different nodes individually is increased. However, if
each node computes only the need-to-know information such as its neighbors, the computational
burden can be significantly reduced. These computations need to be done in real time as the
cluster mapping changes periodically as nodes move.
4.1.1. Management Aspect on Position, Location & Tracking (PL&T) Application
Position, Location & Tracking (PL&T) Application is a user application that is used to determine
the location of a target node at any instance of time through triangulation and zone finding
process in a network [11]. In [11], using PL&T method, in a cluster, a reference node can
determine the X_Y coordinate of a location point for any target node. After finding the
coordinates of a target node, it will send all the X_Y strings to the Cluster Head. Then, Cluster
Head broadcast these strings of X_Y coordinates to all other nodes. On the other hand, if we
apply DMMS to this PL&T application, reference node need to create some management
attributes or MIB elements that are needed to determine the X_Y coordinates of any target node.
After creating the management attributes, reference node will send all these management
attributes to the Cluster Head. After receiving these management attributes, Cluster Head itself
can use it for determining the coordinates of any target node or CH can broadcast all these
management attributes to all other nodes in the cluster. By using these management attributes,
any node can determine the X_Y coordinate of any other node according to its need.
For simulation, we chose the management packets to carry Position, Location & Tracking
(PL&T) data as management attributes. The management attributes contain the PL&T data that
include the target id and the PL&T. The cluster head collects the PL&T for each node from the
reference nodes used in triangulation. The PL&T algorithm proposed in [11] was expected to
send the PL&T of each node to the cluster head. The cluster head organizes the PL&T data in
terms of management attributes where a management object (PLT_MO) has multiple attributes
with node_ID, PL&T Data (X, Y) and time when computed (T). In Figure 5, through the
sequence diagram, we have presented how management attributes can be set for PL&T. The
network management packets from each ensemble are used to send a collection of these attributes
in a broadcast mode so that every node in the cluster would be able to develop a map of the
cluster on the screen.
Figure 5. Sequence diagram of creating management attributes for PL&T
8. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 1, February 2015
8
In user application of PL&T [11], for sending PL&T information from reference node to the
Cluster Head, a large number of strings need to be transmitted that requires large amount of
bandwidth. Whereas, apply DMMS in PL&T, for sending PL&T information from reference node
to the Cluster Head, only related management attributes need to be transmitted that requires
comparatively less bandwidth. Thus, applying DMMS, a PL&T method can be more bandwidth
efficient.
On other aspect, Applying DMMS on PL&T, it can provide the flexibility on using PL&T
information. Since for determining the PL&T, the management attributes of all the nodes are
available to every node, any time a node can use those attributes to determine the PL&T of any
other nodes according to its need. Nodes don’t need to calculate the PL&T for all the cluster
members all the times. In the next section, through simulation result, we will show that, the
message overhead of user application of PL&T will be less if we apply DMMS on PL&T
application.
4.1.2. Management Aspect on Graph Theoretical Routing Application
For controlling purpose, DMMS can be used on different MANET routing applications. In
MANET environment, nodes move randomly. Therefore, to get the position of the nodes at any
instance of time is an important attribute for any MANET routing algorithm. In cluster based
MANET, cluster head (CH) have many responsibilities such as to manage the resources of the
cluster, to maintain the communication between two clusters, and etc. By applying DMMS on one
of the graph theoretical routing protocols [12], we have discussed how DMMS can be used in
controlling purpose to manage message overhead, to offer flexibility, and to provide resource
efficiency. In graph theoretical routing [12], PL&T data is required to develop a snap shot for the
cluster. By using user application of PL&T [11], reference nodes periodically find the PL&T data
in terms of X-Y coordinates of all the nodes and sends those X_Y strings to the CH for
developing a snap shot of the cluster. Then, CH periodically broadcast the processed snap shot to
all the cluster members for updating the PL&T information. On the other hand, if we apply
DMMS on PL&T application for developing the snapshot of the cluster, it can reduce the
message overhead and provide flexibility in similar way that we have discussed in previous sub
section. Furthermore, by using DMMS, it is also possible to save some processing power of each
node. Since all the management attributes of PL&T of all nodes are available to each node, to
update the PL&T of any node at any instance of time, a node can calculate the PL&T of its
neighbor nodes by using the management attributes and PL&T information of those nodes that
was calculated previously.
4.2. Network Monitoring Function
Network monitoring involves developing the network behavior at every node to derive the
performance in terms of throughput (IP layer), delay and data rate (physical layer). The proposed
DMMS system involves maintaining a network management agent in each node with an
associated Management Information Base (MIB). Also, the system will provide the ability of any
management function in a node to derive the performance at any other remote node only through
the knowledge of MIB elements which is set up in terms of Managed Object (MO) and its
associate Attributes. This is achieved by accessing the MOs and their associated attributes to
compute the performance for monitoring purposes. The fact that only MIB elements are accessed
will enable efficient use of bandwidth for management function. Traditional networks use
spoofing type of equipment that tends to be expensive.
9. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 1, February 2015
9
At each node, the management function is set up as an “agent process” with a set of MIB
elements. For each user protocol layer, there is a Managed Object (MO) and a set of associated
Attributes. The Attributes are updated locally through a Layer Management Entity (LME) for any
behavioral change at each user protocol layer. The attributes are set up in terms of “counters”,
“timers”, “status flags” and “thresholds”. The content of the attributes are updated at each
protocol layer whenever there is a behavioral change occurs. For an IP layer protocol, every
packet transmitted at the sending node sets a flag at the LME and the content of a counter (used as
Attribute) is updated. Similarly, the data rate counter at the Physical layer can be updated also.
4.2.1. User Data Throughput Computation
To compute the user data throughput of message, packet, and frame for a cluster, we have to use
Application layer MO (APP_MO), IP layer MO (IP_MO) and MAC layer MO (MAC_MO)
respectively where all the attributes of these MOs will be defined in terms of counters, thresholds,
timer and flags. The detailed steps to compute the packet throughput given below:
Setting IP layer Manage Object (MO):
IP_MO
{
sent_packet_counter (integer, value1)
start_sent_packet_timer_count (time, value2)
start_sent_packet_timer_flag (boolean, value3 := 0 or 1)
sent_threshold_packet_count (integer, value4 = N)
received_packet_counter (integer, value5)
start_received_packet_timer_count (time, value6)
start_received_packet_timer_flag (boolean, value7 := 0 or 1)
received_threshold_packet_count (integer, value8 = N)
}
Initialized PHY_MO:
Before the transmission start, management attributes such as “sent packet counter”, “start sent
packet timer”, “received packet counter” and “start received packet timer” of IP_MO need to be
initialized.
Management Operations:
When IP packet is ready to send, IP layer sets the sent timer flag equals to true
(start_sent_packet_timer_flag = 1). If sent flag equals to true or 1, sent packet timer
(start_sent_packet_timer_count) starts the timer and sent packet counter (sent_packet_counter)
starts counting number of packets. After sending each IP packet, sent packet counter and sent
packet timer will be updated. After transmitting the first ensemble of packets, management
attributes (sent_packet_counter, start_sent_packet_timer_count) of first ensemble is sent through
management packets of second ensemble (consist of both management packets and user data
packets) from the sending node to the receiving node. These management packets are used as a
SET type management packet.
In the receiving node, when node starts receiving first ensemble of packets, IP layer sets the
received timer flag equals to true (start_received_packet_timer_flag = 1). If received flag equals
to true or 1, received packet timer (start_received_packet_timer_count) starts the timer and
received packet counter (received_packet_counter) starts counting number of packets. After
receiving the first ensemble of packets, management attributes (received_packet_counter,
10. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 1, February 2015
10
start_received_packet_timer_count) of that ensemble are sent through SET type management
packets of the second ensemble from the receiving node to the sending node.
For each transmission of IP packet in an ensemble, the content of the “sent_packet_counter” is
increased and management functions check whether it reaches the value specified in the
“sent_threshold_packet_count” at sending node. Similarly, the content of the
“received_packet_counter” is increased and management functions can check whether it reaches
a value specified in the “received_threshold_packet_count” for each packet received at receiving
node. When the transmission of second ensemble of packets begins, the attributes with its
contents updated during the transmission of the first ensemble are stored in the buffer for
computation of the monitoring values. Since IP packets are continuously transmitted,
management attributes are not initialized after transmitting of each ensemble. Therefore, the
computation of the next monitoring value takes into first and the second ensemble. Similarly, as
multiple ensembles are transmitted, the computation is cumulative.
Both sending node and receiving node have the management attributes (sent_packet_counter,
start_sent_packet_timer_count, received_packet_counter, start_received_packet_timer_count).
After each ensemble is exchanged between two nodes, the performance management function
calculates the throughput by using the following equations (1 - 3).
Average throughput of all the cumulative throughputs has found through equation (4).
Application layer MO, MAC layer MO and IP layer MO are used to find out the message, frame,
and packet related network performance respectively.
Through the above procedure, we have shown, to find the throughput we have setup the MIB
elements in terms of counter, flag and threshold into every nodes in a cluster and computed the
throughput without requiring any expensive equipment. In the next section, we have simulated an
example to find the throughput. We have also discussed below about what are the effects on
network behaves if we find the throughput using the MOs.
4.2.2. Delay Computation
To measure the end-to-end packet propagation delay and each ensemble time delay for
transmitting of IP packets between two nodes, one of the ways we can determine is based on
using Time of Departure (ToD) and Time of Arrival (ToA) for each packet and another way is
long term average method. Both of the techniques of finding packet delay have shown below.
ToD and ToA based management computation for time delay:
11. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 1, February 2015
11
The ToD and ToA computation is done at the physical layer of the OSI reference model to avoid
the processing delays at higher layers. The processing delays at the IP and MAC layers can vary
statistically based on the operating system function calls. At the physical layer, as the packet
leaves the port, it is easier to time stamp and similarly, at the receiver, time stamping is done as
soon as the packet is received at the physical port.
The management packet sends all ToDs corresponding to packet IDs to the receiving side and the
receiving side sends all ToAs to the sending side of the packets with IDs received in each
ensemble. Similarly, for full duplex operation, the reverse management function does the same.
Thus, each management packet from both sides will have ToDs and ToAs. This will allow each
node to compute the delays independently. We have shown the Physical Layer Manage Object
(PHY_MO1) in below which is used for ToD and ToA based management computation for
propagation delay.
PHY_MO2
{
packet_id(integer, value11)
time_of_departure(time, value12)
time_of_arrival(time, value13)
sent_packet_time (packet_id,time_of_departure)(value 11,value12)
received_packet_time(packet_id,time_of_arrival)(value 11,
value13)
}
Figure 6 shows the sequence diagram that presents the procedure of how we have created
management attribute for physical layer that are used for finding the propagation delays.
… … … (5)
Where, ToDi is recorded at the sending side and ToAi is recorded at the receiving side.
Figure 6. Sequence diagram of creating the management attributes for physical layer MO (PHY_MO) for
finding the time delay
12. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 1, February 2015
12
Long Term Average based management computation for time delay:
The second method is to compute for a period of time, how many packets are transmitted from the
sending node and compute how much time it takes to receive all these packets at the receiving
node. In this method, for a reasonable number of packets in an ensemble, the time criticality is
reduced compared to the ToD and ToA measurements. We have shown the Physical Layer
Manage Object (PHY_MO2) in below which is used for long term average based management
computation for time delay.
PHY_MO2
{
node_id
sent_ensemble_start_time (time, value9)
received_ensemble_end_time (time, value10)
}
We have sent N packets and measured the time it took for sending N packets. On the other hand,
we have also received N packets and measured the time it took to receive N packets. For
measuring the total time it took for sending N packets, we have kept records the time of departure
for the 1st
and nth
packet of every ensemble in sending side. Again, for measuring the total time it
took for receiving N packets, we have kept records the time of arrival for the 1st
and nth
packet of
every ensemble in receiving end. In the receiving end, we have calculated the delay by using the
sending side information that is sent through the management packet after each ensemble. The
total delay is the difference between the amount of time it took to receive the packets at the
receiving side and the amount of time it took to send the packets at the sending side. This method
to find the end-to-end delay is called long-term average method. Since this is a long term average,
it is more consistent than the ToD, ToA.
The time delay for each ensemble is the difference of the time stamps sent from the source and
received from the source that is founded by using equation (7). After finding the time delay for
each ensemble, average delay is founded by using equation (8).
4. SIMULATION RESULTS
The proposed DMMS was implemented in real time using Network Simulator 2 (NS2). The
performance results of the simulation are plotted using the MATLAB software. In the simulation,
we used a MANET cluster of size 100 x 100 sq. m. area. In the cluster, we placed initially 10
nodes randomly at different locations as shown in Figure 7 and then varied the number of nodes
up to 100 in steps of 10 to study the performance. The simulation parameters have given in Table
2.
13. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 1, February 2015
13
Table 2: Simulation parameters
Parameter Values
Simulation time 1000 seconds
Area 100m x 100m
Number of Nodes 10, 20, 30, 40, 50,
60, 70, 80, 90, 100
Node Placement
Strategy
Random
Mobility of Nodes Random
Min speed: 1.00 m/s
Max speed: 5.00 m/s
Avg. speed: 2.49 m/s
Capacity of the
Network
20 Mbps
Packet size 512 bytes
Ensemble Size (sent
each time from a node
to another)
100 packets (Fixed Size)
Number of
Management packet
each ensemble
2 packets (Initially) and is
variable. (Remaining for
user packets)
Figure 7. A cluster with the random
distribution of nodes
5.1. Simulation Results for Monitoring Function
In this simulation, we formed a cluster initially with 10 nodes randomly placed within the cluster.
The simulation allows every node to communicate with every other node. For monitoring
function, the simulation has been set up to have pair wise communication where communicating
node pairs are: node 0 and node 1, node 2 and node 3, node 4 and node 5, node 6 and node 7, and
node 8 and node 9
Also, the nodes can start sending packets at any instance of time during the simulation. We have
used Constant Bit Rate (CBR) application with a rate of 200 Kbits/sec for transmitting IP packets
where each packet consists of 512 bytes. We have declared and initialized specific management
attributes for some of the MOs of OSI Layer that are used for computing the network
performance. We have considered the node pairs of 0 and 1 for computation. When node 0 starts
transmitting an ensemble of data packets to node 1.
5.1.1. Throughput Computation
For each transmission of IP packet in an ensemble, we increase the content of the
“sent_packet_counter” and check whether it reaches the value specified in the
“sent_threshold_packet_count” at node 0 (sending node). We increase the content of the
“received_packet_counter” and check whether it reaches a value specified in the
“received_threshold_packet_count” for each packet reception at node 1 (receiving node). When
the transmission of second ensemble of packets begins, the attributes with its contents updated
during the transmission of the first ensemble are stored in the buffer for computation of the
monitoring values. Since IP packets are continuously transmitted, management attributes are not
initialized after transmitting of each ensemble. Therefore, the computation of the next monitoring
value takes into first and the second ensemble. Similarly, as multiple ensembles are transmitted,
the computation is cumulative.
14. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 1, February 2015
14
Both sending node and receiving node have the management attributes. After each ensemble is
exchanged between two nodes, the performance management function calculates the throughput.
Table 3. Management attributes of first 10 ensembles between node 0 and node 1 for finding the
user data throughput
Number of
Ensembles
Number of
packet sent
Number of
packet received
Time (sec) to
sent by node 0
Time (sec) to
received by node 1
1 100 100 2.02752 2.02786
1,2 200 200 4.05504 4.05558
1,2,3 300 300 6.08256 6.08384
1,2,3,4 400 400 8.11008 8.1115
1,2,3,4,5 500 500 10.1376 10.14122
1,2,3,4,5,6 600 600 12.16512 12.16944
1,2,3,4,5,6,7 700 700 14.19264 14.19794
1,2,3,4,5,6,7,8 800 800 16.22016 16.22592
1,2,3,4,5,6,7,8,9 900 900 18.24768 18.25652
1,2,3,4,5,6,7,8,9,10 1000 1000 20.2752 20.28716
Table 3 shows the management attributes for the transmission of the first 10 ensembles of packets
between node 0 and node 1 that we have found from the real time simulation result and stored in
the buffer of node 0 and node 1. Same way we have also found the management attributes for
other 4 pair of nodes.
Thus, both node 0 and node 1 have all the management attributes that are listed in Table 3. The
ratio of the number of packets received at the destination and the number of packets transmitted
from the source within the ensemble time will give the throughput, which can be measured
independently by performance management function of the sending node and the receiving node.
In Table 4, we have shown the throughput of each ensemble based on the simulation data.
By observing all the data throughputs, cumulative user data throughputs is not 100% because of
some delay occurred to receive the ensembles. By averaging cumulative throughputs for all
ensembles we have found the average throughput for link 1 (node 0 to node 1). Following the
same procedure we have also found the average throughputs for other pairs of nodes. In Table 5
we have given the average throughput for all pair of nodes. By averaging five pair of nodes
throughput we have found the average throughput for the entire cluster.
Table 4. User data throughput of first 10
ensemble of packet for node 0 to node 1
Number of ensembles Data Throughput
1 0.999834
1,2 0.999901
1,2,3 0.999635
1,2,3,4 0.999931
1,2,3,4,5 0.998916
1,2,3,4,5,6 0.999654
1,2,3,4,5,6,7 0.999517
1,2,3,4,5,6,7,8 0.999773
1,2,3,4,5,6,7,8,9 0.998483
1,2,3,4,5,6,7,8,9,10 0.998463
Table 5. Average user data throughputs for all pair of
nodes in a cluster
Nodes Pair Average Throughput
node 0 to node 1 0.999703
node 2 to node 3 0.999665
node 4 to node 5 0.999778
node 6 to node 7 0.999726
node 8 to node 9 0.999883
15. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 1, February 2015
15
From simulation result, we have found the throughput of the ensembles for node 0 to node 1 and
other simulation parameters related to the cluster has set as mentioned in the Table 2. Figure 8
shows the graph of the throughput for 200 ensembles of data packets where X-axis presents the
serial of the ensembles and Y-axis presents the throughput of those ensembles.
Figure 8. Throughput calculations of a link for each
ensemble of data packets by exchanging IP_MO
Figure 9. Verification of finding throughput in two
different layers
We have verified the accuracy for finding throughput by calculating the throughput in both IP
layer and physical layer. For physical layer we have counted the total number of bytes that are
sent from node 0. Also we have counted the total number of bytes that are received at node 1.
Again we have counted the time for sending and receiving. However, we did not consider the mac
frame for computing the cumulative throughput in physical layer. Form Figure 9, we have seen
the throughput of a link (node 0 to node 1) that we have calculated by using IP layer MO and
physical layer MO are completely matched with each other.
5.1.2. Delay Computation
By using simulation results, we have shown the detail computation for finding delays for node 0
to node 1. In simulation, node 0 has transmitted an ensemble of data packets to node 1, the
management agent of node 0 has sent a management packet which is the first packet in that
ensemble of data packets. The payload of the management packet consists of different
management attributes such as “Time of Departure (ToD)” of all the packets in the ensemble of
the sending node 0 and the “Time of Arrival” (ToA) of the received packets from receiving node
1. In the reverse channel from node 1 to node 0, the ensemble contains ToD of the packets sent by
node 1 in the ensemble and ToA of the packets received from 1. Thus, it allows both node 0 and
node 1 to have ToD and ToA of all the packets sent and received. The difference between ToA
and ToD has provided the propagation time between two nodes. Based on the simulation result,
Table 6 presents that list of management attributes for first 10 IP packets transmission that we
have used for finding delay.
16. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 1, February 2015
16
Table 6. List of management attributes for first 10
IP packets that we have used for finding delay
Packet
number
Packet
ID
ToD ToA
1 5 1.00645 1.0109
2 6 1.02693 1.02971
3 7 1.04741 1.05055
4 8 1.06789 1.07057
5 9 1.08837 1.09143
6 10 1.10885 1.11159
7 11 1.12933 1.13237
8 12 1.14981 1.15259
9 13 1.17029 1.17301
10 14 1.19077 1.19341
Table 7. Calculated propagation delays and
average propagation delays for first 10 packets of
an ensemble
Packet
number
Packet
ID
Delay (sec) Avg. delay
(sec)
1 5 0.00444336 0.00444336
2 6 0.00277612 0.00360974
3 7 0.00313612 0.00345187
4 8 0.00267612 0.00325793
5 9 0.00305612 0.00321757
6 10 0.00273612 0.00313733
7 11 0.00303612 0.00312287
8 12 0.00277612 0.00307952
9 13 0.00271612 0.00303915
10 14 0.00263612 0.00299884
We have calculated the delay for each packet transmission and have calculated the average delay
for an ensemble of packets by using equation 5 and 6.
Table 7 presents all the delays that performance management function has calculated. Based on
the simulation results, Figure 10 shows the graph of the delay for each packet transmission of an
ensemble of packets and Figure 11 shows the graph of average delay for that ensemble of packets.
For performing this simulation, the parameters that we have used are listed in Table 2.
Figure 10. Propagation delay of each packet
of an ensemble by using PHY_MO2
Figure 11. Average propagation delay for an
ensemble of packets by using PHY_MO2
In another method, we have recorded the time when the transmission of an ensemble of packets
start and have record of the time when the transmission of an ensemble of packets end. Using this
two-parameter, we have found the time delay of each packet transmission of an ensemble of
packets from node 0 to node 1 and the average the time delay for that ensemble of packets from
node 0 to node 1.
Node 0 has transmitted an ensemble of data packets to node 1. When the first packet is
transmitted, node 0 has recoded the sent_ensamble_start_time. At node 1, it also recoded the
received_ensamble_end_time when the transmission of an ensemble of packets ends. In the
17. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 1, February 2015
17
reverse channel from node 1 to node 0, the ensemble contains the received_ensamble_end_time
management attribute for the previous ensemble. Thus, it allows both node 0 and node 1 to have
sent_ensamble_start_time and received_ensamble_end_time of the ensemble sent and received.
The difference between these two management attributes has provided the time delay of an
ensemble between node 0 and node 1.
Table 8 shows the management attributes for finding the time delay using long term average
method for the transmission of first 10 ensembles of packets between node 0 and node 1 that we
have found from the real time simulation result.
Table 8. List of management attributes for first 10
ensembles that has used for finding the time delay
Ensemble
Number
sent_ensamble_
start_time (sec)
received_ensamb
le_end_time (sec)
0 1.02693 3.05757
1 3.07493 5.10581
2 5.12293 7.15323
3 7.17093 9.20191
4 9.21893 11.2523
6 13.3149 15.3485
7 15.3629 17.3936
8 17.4109 19.4448
9 19.4589 21.4925
10 21.5069 23.5374
Table 9. Calculated time delays and average
delays for first 10 ensembles
Ensemble
Number
Time delay
(sec)
Average time
delay (sec)
1 2.03063 2.03063
2 2.03087 2.03075
3 2.03029 2.030596667
4 2.03097 2.03069
5 2.03337 2.031226
6 2.03361 2.031623333
7 2.03069 2.03149
8 2.03391 2.0317925
9 2.03355 2.031987778
10 2.03049 2.031838
Figure 12. Delay of each ensemble by using long-
term average method using PHY_MO2
Figure 13. Average delays for 200 ensembles of
packets by using long-term average method using
PHY_MO2
Figure 12 shows the graph of the delay for each ensemble of packets where each ensemble
consists of 100 packets. Figure 13 shows the graph of average delay for 200 ensembles of packets
where the average delay is calculated after end of each ensemble.
We find the average time delay for each packet by ratio of total time delay for an ensemble and
number of packets in an ensemble. However, this average time delay for each packet is not the
18. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 1, February 2015
18
same as propagation delay because in the time delay we also consider the packets generation time.
In our simulation, we have considered data rate of 200 kbps and packet size is 512 bytes.
5.2. Simulation Results for Monitoring Function
We have also run the simulation to analyze the performances of DMMS for controlling purpose
on a particular user application of PL&T. In user application of PL&T [11], for sending PL&T
information from reference node to the Cluster Head, a large number of strings need to be
transmitted that requires large amount of bandwidth. Whereas, apply DMMS in PL&T, for
sending PL&T information from reference node to the Cluster Head, only related management
attributes need to be transmitted that requires comparatively less bandwidth. Thus, applying
DMMS, a PL&T method can be more bandwidth efficient. Figure 14 shows the comparison
between the data (bytes) need to transmit for performing PL&T using user application, PL&T
using management attributes for different size of the clusters and PL&T using management
attributes for 15% of nodes for different size of the cluster. From Figure 14, through simulation
results, we have shown that the message overhead of user application of PL&T is higher than the
message overhead of PL&T application that uses DMMS. In Table 10, we have given the
attributes list those are used to simulate the message overhead of PL&T.
Table 10. Management attributes and user application data list used for one node PL&T
User application
Attributes
Size Management
attributes
Size
X coordinate 32 bytes 3 Ranges (ToA - ToD) 48 bytes
Y coordinate 32 bytes
Node id 2 bytes
Node id 2 bytes
Figure 14. Message overheads of user application of
PL&T and PL&T application that uses DMMS.
Figure 15. Normalized capacity usages for CH and
average capacity usages of all the nodes
5.3 Performance Analysis of DMMS
To analyze the performance of DMMS, we have find out the capacity usage of a cluster. Here, we
have determined capacity usage of the CH and average capacity usage of all the nodes when CH
needs to know the throughputs of all the nodes in the cluster. CH broadcasted a request for
sending the management attributes of IP layer MO that are node id (1 bytes), 4 attributes id
(1+1+1+1 or 4 bytes), total packets sent and received (2+2 or 4 bytes), and total time takes to
send and receive those packets (8+8 or 16 bytes). Total attributes size for one node is 25 bytes. In
19. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 1, February 2015
19
our simulation, we assume that CH has 30% network capacity and rest of the node has 70%
network capacity. We use 20Mbps of total capacity, CBR application of 200 kbps data rate and
packet size is 512 bytes. If number of node increases, CH capacity remains the same but nodes
capacity decreasing. According to this request, all the nodes sequentially sent the listed
management attributes to the CH through a management packet that will interleave with an
ensemble of user data packets. After getting the management attributes, CH found the
throughputs of all the nodes in the cluster. In simulation, we have varied the number of nodes
from 10 to 100 for a cluster to find out the capacity usage. We are considering only the
management packets sent and received for finding the capacity usages.
When the number of nodes in a cluster increases, the maximum capacity of each node decreases.
Again, normalized capacity usage is the ratio of capacity usage and maximum capacity. Thus, if
the maximum capacity of each node decreases, it increases normalized capacity of all the nodes.
In Figure 15, we have seen that if we increase the number of nodes in a cluster, it increases the
capacity usage for management packet linearly.
We have also analyzed the impact of delay for finding the throughputs of all the nodes in a
cluster. CH cannot receive the management packet from all nodes at a time, since management
packet of each node is sent through several ensembles. Thus it causes delay to calculate the
throughput of all the nodes. Therefore, if the number of node in a cluster increases, it increases
the delay accordingly.
We interleave both management packets and user data packets. We create an ensemble of packets
to include the first two packets containing management information (Attributes and Managed
Objects) and the remaining packets correspond to the user data packets. Since the number of
management packets is significantly smaller within each ensemble compared to the user data
packets, the throughput for the management information exchange is only a fraction of the
throughput for data packets. It does not mean that the throughput is low for management packets.
If we rewrite the argument using the bandwidth concept, where the management is only allocated
2% of the total bandwidth while the user data packets are allocated 98% bandwidth (ignoring the
packet overhead), 2% is completely used for management and therefore, the throughput for
management is 100%. That is, this scenario identifies that you only need two management
packets per ensemble for management. This is also true whether the management packets are
inter-leaved or sent in a dedicated channel of a finite bandwidth for management. However, if the
network needs more management packets to be sent, then a dedicated channel would be more
efficient.
6. CONCLUSIONS
In this paper, we introduced resource efficient Distributed MANET Management System
(DMMS), which uses fully distributed management architecture. The general manger and the
“single point of failure” problems have solved by using DMMS. We developed a new set of
Management Information Base (MIB) elements or management attributes and stored the resource
activities in terms of counters, timer, status flag and threshold values. We have shown that the
abstract data is exchanged between different management agents residing in different resources
on a need-to-know basis and each agent logically executes management functions locally to
develop understanding of the behavior of all network resources for monitoring purposes (finding
throughput, delay) and controlling purposes (PL&T application, managing routing algorithm,
etc.). In this paper, we presented the MANET architecture with MIB based distributed network
management and demonstrated bandwidth efficiency for management operations that include
monitoring of resources, and performance management for multi-service provisioning. We have
also analyzed the performance of DMMS to show the efficient resource usages.
20. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 1, February 2015
20
ACKNOWLEDGEMENTS
This work is supported in part by the US Army Research Office under the Research Cooperative
Agreement Grant, W911NF-04-2-0054 to the ARO Center for Battlefield Communications
(CeBCom), National Science Foundation under the contract 0931679 and 1229744, Department
of Electrical and Computer Engineering, Prairie View A&M University (Texas A&M University
System). The views and conclusions contained in this dissertation are those of the author and
should not be interpreted as representing the official policies, either expressed or implied, of the
Army Research Office or the U.S. Government.
REFERENCES
[1] A. Leinwand, K. Fang, Network Management: A Practical Perspective, Reading, MA: Addison-
Wesley, 1993.
[2] W. Stallings, SNMP, SNMPv2, and CMIP: The Practical Guide to Network Management Standards,
1st edition. Reading, MA: Addison-Wesley, 1993.
[3] Chen, W., N. Jain, and S. Singh. 1999. “ANMP: Ad Hoc Network Management Protocol,” IEEE J. on
Select Areas Communication, Vol 1, No. 8, pp. 1506-1531.
[4] C. Tuduce, T. Gross, “Resource Monitoring Issues in Ad Hoc Networks,” International Workshop on
Wireless Ad-Hoc Networks, IEEE, pp. 259 – 264, Jun. 2004.
[5] Z. Zhao, W. Huangfu, Y. Liu, L. Sun, “Design and Implementation of Network Management System
for Large-scale Wireless Sensor Networks,” International Conference on Mobile Ad-hoc and Sensor
Networks, Beijing, pp. 130-137, 2011.
[6] J. Kim, H. Jeon, J. Lee, “Network Management Framework for Wireless Sensor Networks (WSN),”
Proceedings of Held as Part of the Future Generation Information Technology Conference (FGIT),
Part I, 2010.
[7] C. Shen, C. Jaikaeo, C. Srisathapornphat, Z. Huang, “The Guerrilla Management Architecture for Ad
hoc Networks,” in Proc. of MILCOM, Vol. 1, 2002.
[8] Ayari, M., Kamoun, F., Pujolle, G. 2008, “Towards Autonomous Mobile Ad Hoc Networks: A
Distributed Policy-Based Management Approach,” Wireless and Mobile Communications, 2008.
ICWMC '08, Page(s): 201 – 206
[9] L.B. Ruiz, J.M. Nogueira, and A.A.F. Loureiro, “MANNA: A Management Architecture forWireless
Sensor Networks,” IEEE Communications Magazine, vol. 41, no. 2, pp. 116–125, 2003.
[10] G.R. Khan, D.R. Vaman, “Modeling and Designing Resource Efficient Distributed MANET
Management System (DMMS)”, International journal of Computer Networks & Communications,
Vol.6, No.5, Sep. 2014.
[11] K. Patel, D.R. Vaman, “Graph Theoretic Routing Algorithm (GTRA) For Mobile Ad-Hoc Networks
(MANET)”, International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and
Sensor Networks (GRAPH-HOC), Vol 5, No. 4, Dec. 2013
[12] S. Khan, D. R. Vaman, S. T. Koay, “Highly Reliable Multi-Service Provisioning Using Sequential
Prediction of Zone and Pl&T of Nodes In Mobile Networks”, International Journal of Wireless &
Mobile Networks (IJWMN), vol. 6, No. 4, August, 2014
21. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 1, February 2015
21
Authors
Golam R. Khan is currently Ph.D candidate in Electrical Engineering from Prairie View A&M University
(PVAMU), TX and working as a Graduate Teaching Assistant in the same Department. Previously, he was
working as a Graduate Research Assistant in the Center of Battlefield Communication (CeBCom). His
advisors are Prof. Dhadesugoor R. Vaman, and Dr. Suxia Cui. His current research interest is “Modeling
and designing resource efficient Distributed MANET Management System (DMMS) for multi-service
applications”. He got his Bachelor of Science degree in Computer Science (CS) from American
International University Bangladesh (AIUB), Bangladesh in May 2006. After his B.Sc, he worked in
industries for 2 years. He also completed his Master’s degree in Electrical Engineering (EE) from Tuskegee
University (TU), AL in December 2010.
Sharmistha Khan got the B.Sc. degree in Computer Science from American International University-
Bangladesh (AIUB), Dhaka, Bangladesh in 2006, and the M.S. degree in Electrical Engineering from
Tuskegee University, Tuskegee, AL in 2011, respectively. She is currently pursuing her PhD degree in the
department of Electrical and Computer Engineering at the Prairie View A & M University, Prairie View,
TX. She is working under the supervision of Prof. Dhadesugoor R. Vaman and Prof. Siew T. Koay at
Prairie View A & M University. Her research area includes Mobile Adhoc Network, Cognitive Radio
Networks, Sensor Networks, Mobile WiMAX Technology, Handoff Management, and Handoff
Performance and Decision Making Algorithms for Broadband Wireless Networks.
Dhadesugoor R. Vaman was Texas Instrument Endowed Chair Professor and Founding Director of ARO
Center for Battlefield Communications (CeBCom) Research, ECE Department, Prairie View A&M
University (PVAMU). He has more than 38 years of research experience in telecommunications and
networking area. Prior to joining PVAMU, Dr. Vaman was the CEO of Megaxess (now restructured as
MXC) which developed a business ISP product to offer differentiated QoS assured multiservices with
dynamic bandwidth management and successfully deployed in several ISPs. Prior to being a CEO, Dr.
Vaman was a Professor of EECS and founding Director of Advanced Telecommunications Institute,
Stevens Institute of Technology (1984-1998); Member, Technology Staff in COMSAT (Currently
Lockheed Martin) Laboratories (1981-84) and Network Analysis Corporation (CONTEL)(1979-81);
Research Associate in Communications Laboratory, The City College of New York (1974-79); and
Systems Engineer in Space Applications Center (Indian Space Research Organization) (1971-1974). He
was also the Chairman of IEEE 802.9 ISLAN Standards Committee and made numerous technical
contributions and produced 4 standards. Dr. Vaman has published over 200 papers in journals and
conferences; widely lectured nationally and internationally; has been a key note speaker in many IEEE and
other conferences, and industry forums.
Suxia Cui is an associate professor in the Department of Electrical and Computer Engineering at Prairie
View A&M University (PVAMU). She received her BS and MS degrees both in Electrical Engineering
from Beijing University of Technology in 1996 and 1999 respectively. Right after obtained her PhD degree
in Computer Engineering from Mississippi State University in 2003, Dr. Cui joined Prairie View A&M
University. Her research interests include image and video processing, data compression, wavelets,
computer vision, remote sensing, and computing education. She has published numerous papers, and her
research is funded by United States Department of Agriculture, Department of Education and National
Science Foundation.