SlideShare a Scribd company logo
1 of 3
Download to read offline
IOSR Journal of Computer Engineering (IOSRJCE)
ISSN: 2278-0661 Volume 3, Issue 6 (Sep-Oct. 2012), PP 36-38
www.iosrjournals.org

         A middleware approach for high level overlay network
                                            Mary Metilda. J
         Assistant Professor, Department of CSE, Roever Engineering College, Perambalur - 621 212

Abstract: In network management middle wares are required to enhance reliability and efficiency of
distributed systems. The proposed approach uses swarm-intelligence networks at the monitoring level to provide
self-organization, adaptability, scalability and reactivity features. Resource management is performed by a
multi-agent based layer. Knowledge exchange between the monitoring and management layers is mediated by a
data warehouse.
General Terms: Management, Performance, Reliability, Algorithms.
Keywords: Intelligent middleware, Network Management, Swarm intelligence, Ant algorithms.

                                              I.          Introduction
         The design of distributed applications for large scale dynamic networks, such as ad-hoc networks or
wireless mesh networks, introduces several challenges which cannot be entirely solved by traditional network
management techniques. Low-level network management is not sufficient to ensure reliable and persistent
connectivity of pervasive devices, making it difficult to meet user specified Quality of Service (QoS). It is
possible to further improve the performance of existing mechanisms for known low-level problems like network
devices supervision, higher level solutions may prove to be more effective and simpler to implement. High-level
management is typically tied to specific information and requirements, and is likely expected to deal with more
abstract problems. It is thus worth implementing intelligent high-level network management middleware’s that
the dynamic, heterogeneous and volatile nature of the network to provide a robust, reliable, and efficient
platform to meet requirement. Those goals are imply proactive and reactive behaviors, prediction and the
capability environmental changes. This paper presents a modular approach to high-level network management,
which aims at supporting various kinds of complex distributed systems and overlay networks, such as
computing grids or Peer to Peer systems. Whereas the traditional network management relies on complex, task
specific appliances and protocols, the proposed architecture completely separates the network monitoring part
from the management logics.
          The multilayer architecture is composed of a higher resource management layer and a lower ant-based
monitoring layer. The upper layer uses information gathered by the lower one in order to accomplish their tasks
of controlling, coordinating, and allocating network resources. An additional intermediate layer provides an
interface for information exchange. The monitoring activity is based on the ant colony paradigm, which has
already proved to be a suitable solution to a wide range of network management related problems, such as
routing, resource discovery, and load-balancing. Ant colony optimization is a branch of swarm intelligence
inspired by the social behavior of ants. Artificial ants are simple mobile software agents that move across the
network and collect information about visited nodes, such as available resources or system status. The adoption
of a swarm intelligence approach in the signaling layer aims at providing the required self organization,
adaptability, scalability, and reactivity features to the platform.
         The resource management layer is implemented upon distributed agent based architecture. Intelligent
agents provide an interface to the user, and fulfill the requests by the mean of coordination and collaboration
mechanisms. The ability of each agent to adapt and learn increases the efficiency and robustness of the system.
Both layers are independent from each other, and it can be easily replaced or adapted to different management
requirements and scenarios, ranging from wireless networks to computing grids or sensor networks. To enforce
this independence, interaction between the signaling and management layers is mediated by a data warehouse
layer that provides stateful information.

                                      II.         System Analysis
         The present’s system work in the domain of adaptive and self-organizing network management
middleware’s. Although research on adaptive middleware’s provides several examples of self-organizing
solutions for both low and high-level network management, like in, the focus here is on self organization
through the social insect paradigm. An example of low-level management inspired by a biological behavior can
be found in the Ecomobile middleware. Ecomobile implements a bio-inspired method to configure, monitor,
analyze, and control optical transport networks. The system architecture is based on different kinds of mobile
agents that separate the navigation and coordination tasks from the computational one. Monitoring and

                                            www.iosrjournals.org                                      36 | Page
A modular middleware for high level network management
management activities are performed at the same level: information is collected, moved, exchanged, and
exploited directly by agents through a coordinated behavior. Concerning high-level management, Messor and
ARMS. Both architectures are completely uncoupled and highly modular. Messor is aimed at P2P systems, and
achieves self-organization by using an ant-based algorithm to perform load balancing between nodes. Ants are
mobile agents that can move across the network, access services made available by visited nodes, and monitor
their workload. Despite the simple logics behind single ants, the emergent behavior of the whole colony allows
quick balancing of the system.
         An ARM is a multi-agent grid computing middleware that supports process scheduling and load
balancing. Agents are organized hierarchically and can exchange information about available resources and
forward incoming requests that they cannot satisfy. In order to find the best match for every request, resources
and applications are modeled by the middleware. An ARM has been subsequently improved to use an ant
algorithm similar to Messor for the load balancing task. In ARMS, ants are just XML documents that carry
information about node workload, whereas agents act as nests and implement the logics of the ant algorithm

                                III.         SmartG System Architecture
         SmartG is a generic and modular middleware that aims at supporting intelligent network management
using swarm intelligence algorithms for the monitor task. With respect to existing projects presented in the
previous section, which were all application-specific, SmartG is flexible and easily adaptable to different
scenarios. The monitoring and management activities can be customized independently depending on both the
requirements of the application, and the nature of the underlying network.
         The middleware architecture is composed of two main layers connected by the mean of an intermediate
data warehouse layer. Figure 1 shows an overview of this design: the Smart Signaling Layer (SSL) is located at
bottom; the Smart Resource Management Layer (SRML) is on top. Interaction between the top and bottom
layers is mediated by a data warehouse; this architecture may be considered as loosely coupled, because
components are able to operate independently in the event of a communication failure. This section describes
each layer and its functionality.




                                                                                             .
                                         Figure 1: SmartG architecture

3.1 Smart Signaling Layer
         The SSL is an incharge of retrieving information about the network status and storing them in the data
warehouse. This layer operates in a completely decentralized way, achieving its monitoring task by mean of
mobile swarm agents. Each node of the network acts as a nest by running a software application that provides an
environment for the execution of ant-colony algorithms. The advantage of such a distributed approach is an
increase in the robustness and adaptability of the system. Ants moving across the network retrieve information
about visited resources such as their status, availability or location. Collected information is stored locally in the
node, to be used by other individuals in the colony, or directly in the data warehouse. Birth and death of ants are
triggered by events coming from devices, requests made by other individuals, and by changes in data stored in
the data warehouse. At this level, network topology is highly dynamic, and requires a fully connectionless
design between nodes.
         The concept of node neighborhood depends on the underlying system: in P2P systems the actual
topology has a one-to-one correspondence with the overlay network, whereas in mobile ad-hoc networks it may
depend on the physical position and proximity of devices. Several different types of colonies can be executed on
the platform to gather and spread information required by resource management processes such as discovery,
routing and load balancing. The signaling layer implementation has to be lightweight enough in order not to

                                              www.iosrjournals.org                                          37 | Page
A modular middleware for high level network management
interfere with normal network operations. A lightweight design also has the advantage of being able to run on
small devices with limited capabilities, in order to support heterogeneous networks consisting of both fixed and
mobile devices (for example, notebooks, PDA, mobile phones).

3.2 Smart Resource Management Layer
          The SRML manages higher-level tasks of the middleware typically using application-specific
intelligent agents that can collaborate and coordinate to meet application requirements. Agents work both upon
receiving new requests from the application, and in an autonomous way, to continuously assure QoS of running
processes; if a request cannot be fulfilled, an agent can forward it to its neighbors. The decision process is driven
both by local information saved by the agent itself, and some global information retrieved by the monitoring
layer and stored in the data warehouse.
          The type of required information heavily depends on the goal to achieve: as an example, service
discovery may require a model of the requested service, a list of available offers matching the request, and the
cost of reaching them. As the systems aims at being adaptive in respect of the high level requirements and low-
level resource status, full interaction between the SRML and applications is required. On the one hand,
applications must be able to communicate with the management layer to request services and resources, specify
QoS requirements, and control the middleware.
          On the other hand, management agents should be able to interact with the application not only to
provide the requested data, but also to rearrange and adapt requirements with respect to actual resource
availability. For example, a resource discovery agent can store the parameters of a request and inform the
corresponding application as soon as resources that better fulfills quality levels are available.

3.3 Data warehouse
         The data warehouse layer mediates communication between the SSL and SRML and provides stateful
information storage and knowledge exchange to both layers. Different approaches to implement a distributed
data warehouse can be considered depending on the usage scenario. In highly dynamic networks the flow of
information coming from the underlying layer can be important and could represent an issue. In these situations,
high performance databases are required to avoid bottlenecks and delays, and ensure reliability. On the other
hand, mobile platforms require local smaller databases or local caching, to optimize communication between the
device and the network.

                                                  IV.            Conclusion
          Actual implementation of the model is conducted in the framework of a grid management middleware,
to evaluate the viability of the approach in large scale environments. The proposed model aims at increasing the
reliability and efficiency of distributed systems by mean of proactive and reactive management. The multi-layer
architecture completely separates the monitoring from the management tasks, allowing customizing the
middleware to different scenarios. The lightweight network activity uses ant-colony algorithms and is able to
self-organize and rapidly react to environmental changes. Resource management is performed by intelligent
agents using information gathered by the monitoring layer. A data warehouse layer is used to interface
monitoring and management and to provide a knowledge exchange channel.

                                                            References
[1]    Akyildiz, I. F., Wang, X., A Survey on Wireless Mesh Network, Sept. 2005.
[2]    Janacik, P., Kao, O., Rerrer, U., A routing approach using swarm-intelligence for resource sharing in wireless and ad hoc networks,
       2004.
[3]    Rossier-Ramuz, D., Towards Active Network Management with Ecomobile, an Ecosystem-inspired Mobile Agent Middleware.
       October 2002.
[4]    Hirsbrunner, B., Courant, M., Brocco, A., Kuonen, P., SmartGRID: Swarm Agent-Based Dynamic Scheduling for Robust, Reliable,
       and Reactive Grid Computing, October 2006.
[5]    Brocco, A., Hirsbrunner, B., Courant, M., Solenopsis: A Framework for the Development of Ant Algorithms, 2007.
[ 6]   diuf.unifr.ch/pai/solenopsis.
[7]    www.haslerstiftung.ch.




                                                     www.iosrjournals.org                                                     38 | Page

More Related Content

What's hot

IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
3. 7769 8114-1-pb
3. 7769 8114-1-pb3. 7769 8114-1-pb
3. 7769 8114-1-pbIAESIJEECS
 
Ijarcet vol-2-issue-3-925-932
Ijarcet vol-2-issue-3-925-932Ijarcet vol-2-issue-3-925-932
Ijarcet vol-2-issue-3-925-932Editor IJARCET
 
MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY
MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY
MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY IJCNCJournal
 
Live Matches , Streaming , Scores
Live Matches , Streaming , ScoresLive Matches , Streaming , Scores
Live Matches , Streaming , Scoreswebcric .site
 
communication in distributed systems
communication in distributed systemscommunication in distributed systems
communication in distributed systemsmohammed alrekabe
 
Ijarcet vol-2-issue-4-1398-1404
Ijarcet vol-2-issue-4-1398-1404Ijarcet vol-2-issue-4-1398-1404
Ijarcet vol-2-issue-4-1398-1404Editor IJARCET
 
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...ijasuc
 
Review of access control models for cloud computing
Review of access control models for cloud computingReview of access control models for cloud computing
Review of access control models for cloud computingcsandit
 
Re-Engineering Databases using Meta-Programming Technology
Re-Engineering Databases using Meta-Programming TechnologyRe-Engineering Databases using Meta-Programming Technology
Re-Engineering Databases using Meta-Programming TechnologyGihan Wikramanayake
 
Analysis of programming aspects of wireless sensor networks
Analysis of programming aspects of wireless sensor networksAnalysis of programming aspects of wireless sensor networks
Analysis of programming aspects of wireless sensor networksiaemedu
 
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...IOSR Journals
 
2013-2014 IEEE Projects & Application Projects
2013-2014 IEEE Projects & Application Projects2013-2014 IEEE Projects & Application Projects
2013-2014 IEEE Projects & Application ProjectsHari Krishnan
 

What's hot (17)

IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
3. 7769 8114-1-pb
3. 7769 8114-1-pb3. 7769 8114-1-pb
3. 7769 8114-1-pb
 
Ijarcet vol-2-issue-3-925-932
Ijarcet vol-2-issue-3-925-932Ijarcet vol-2-issue-3-925-932
Ijarcet vol-2-issue-3-925-932
 
MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY
MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY
MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY
 
Live Matches , Streaming , Scores
Live Matches , Streaming , ScoresLive Matches , Streaming , Scores
Live Matches , Streaming , Scores
 
communication in distributed systems
communication in distributed systemscommunication in distributed systems
communication in distributed systems
 
Intelligent Agents in Telecommunications
Intelligent Agents in TelecommunicationsIntelligent Agents in Telecommunications
Intelligent Agents in Telecommunications
 
Ijarcet vol-2-issue-4-1398-1404
Ijarcet vol-2-issue-4-1398-1404Ijarcet vol-2-issue-4-1398-1404
Ijarcet vol-2-issue-4-1398-1404
 
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
 
Review of access control models for cloud computing
Review of access control models for cloud computingReview of access control models for cloud computing
Review of access control models for cloud computing
 
Re-Engineering Databases using Meta-Programming Technology
Re-Engineering Databases using Meta-Programming TechnologyRe-Engineering Databases using Meta-Programming Technology
Re-Engineering Databases using Meta-Programming Technology
 
Analysis of programming aspects of wireless sensor networks
Analysis of programming aspects of wireless sensor networksAnalysis of programming aspects of wireless sensor networks
Analysis of programming aspects of wireless sensor networks
 
Iw qo s09 (1)
Iw qo s09 (1)Iw qo s09 (1)
Iw qo s09 (1)
 
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
 
Report_Internships
Report_InternshipsReport_Internships
Report_Internships
 
2013-2014 IEEE Projects & Application Projects
2013-2014 IEEE Projects & Application Projects2013-2014 IEEE Projects & Application Projects
2013-2014 IEEE Projects & Application Projects
 
Abstract
AbstractAbstract
Abstract
 

Viewers also liked (8)

C0361419
C0361419C0361419
C0361419
 
A0120105
A0120105A0120105
A0120105
 
H0324143
H0324143H0324143
H0324143
 
B0120610
B0120610B0120610
B0120610
 
H0114044
H0114044H0114044
H0114044
 
I0114549
I0114549I0114549
I0114549
 
H0124246
H0124246H0124246
H0124246
 
A0140107
A0140107A0140107
A0140107
 

Similar to E0363638

A middleware approach for high level overlay network
A middleware approach for high level overlay networkA middleware approach for high level overlay network
A middleware approach for high level overlay networkIOSR Journals
 
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...IJCNCJournal
 
Network Monitoring and Traffic Reduction using Multi-Agent Technology
Network Monitoring and Traffic Reduction using Multi-Agent TechnologyNetwork Monitoring and Traffic Reduction using Multi-Agent Technology
Network Monitoring and Traffic Reduction using Multi-Agent TechnologyEswar Publications
 
Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc Networks
Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc NetworksMulti-Level Secret Sharing Scheme for Mobile Ad-Hoc Networks
Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc NetworksEswar Publications
 
Chapter 1 - Introduction to the basic concepts of networks.ppt
Chapter 1 - Introduction to the basic concepts of networks.pptChapter 1 - Introduction to the basic concepts of networks.ppt
Chapter 1 - Introduction to the basic concepts of networks.pptssuser3acfba
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Ieee transactions on 2018 network and service management
Ieee transactions on 2018 network and service managementIeee transactions on 2018 network and service management
Ieee transactions on 2018 network and service managementtsysglobalsolutions
 
Software defined optical communication
Software defined optical communicationSoftware defined optical communication
Software defined optical communicationRonak Vyas
 
A framework forselfmanagemented
A framework forselfmanagementedA framework forselfmanagemented
A framework forselfmanagementedPrem Parkash
 
A novel resource efficient dmms approach for network monitoring and controlli...
A novel resource efficient dmms approach for network monitoring and controlli...A novel resource efficient dmms approach for network monitoring and controlli...
A novel resource efficient dmms approach for network monitoring and controlli...ijwmn
 
Discovery and verification Documentation
Discovery and verification DocumentationDiscovery and verification Documentation
Discovery and verification DocumentationSambit Dutta
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Alexander Decker
 
Distributed computing file
Distributed computing fileDistributed computing file
Distributed computing fileberasrujana
 
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...ijseajournal
 
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...Learning-based Orchestrator for Intelligent Software-defined Networking Contr...
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...ijseajournal
 
A SCALABLE MONITORING SYSTEM FOR SOFTWARE DEFINED NETWORKS
A SCALABLE MONITORING SYSTEM FOR SOFTWARE DEFINED NETWORKSA SCALABLE MONITORING SYSTEM FOR SOFTWARE DEFINED NETWORKS
A SCALABLE MONITORING SYSTEM FOR SOFTWARE DEFINED NETWORKSijdpsjournal
 

Similar to E0363638 (20)

A middleware approach for high level overlay network
A middleware approach for high level overlay networkA middleware approach for high level overlay network
A middleware approach for high level overlay network
 
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
 
WSN-Proposal
WSN-ProposalWSN-Proposal
WSN-Proposal
 
Network Monitoring and Traffic Reduction using Multi-Agent Technology
Network Monitoring and Traffic Reduction using Multi-Agent TechnologyNetwork Monitoring and Traffic Reduction using Multi-Agent Technology
Network Monitoring and Traffic Reduction using Multi-Agent Technology
 
F0361026033
F0361026033F0361026033
F0361026033
 
Secure final
Secure finalSecure final
Secure final
 
Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc Networks
Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc NetworksMulti-Level Secret Sharing Scheme for Mobile Ad-Hoc Networks
Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc Networks
 
Chapter 1 - Introduction to the basic concepts of networks.ppt
Chapter 1 - Introduction to the basic concepts of networks.pptChapter 1 - Introduction to the basic concepts of networks.ppt
Chapter 1 - Introduction to the basic concepts of networks.ppt
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Ieee transactions on 2018 network and service management
Ieee transactions on 2018 network and service managementIeee transactions on 2018 network and service management
Ieee transactions on 2018 network and service management
 
Software defined optical communication
Software defined optical communicationSoftware defined optical communication
Software defined optical communication
 
A framework forselfmanagemented
A framework forselfmanagementedA framework forselfmanagemented
A framework forselfmanagemented
 
A novel resource efficient dmms approach for network monitoring and controlli...
A novel resource efficient dmms approach for network monitoring and controlli...A novel resource efficient dmms approach for network monitoring and controlli...
A novel resource efficient dmms approach for network monitoring and controlli...
 
Discovery and verification Documentation
Discovery and verification DocumentationDiscovery and verification Documentation
Discovery and verification Documentation
 
Analytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANETAnalytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANET
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...
 
Distributed computing file
Distributed computing fileDistributed computing file
Distributed computing file
 
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...
 
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...Learning-based Orchestrator for Intelligent Software-defined Networking Contr...
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...
 
A SCALABLE MONITORING SYSTEM FOR SOFTWARE DEFINED NETWORKS
A SCALABLE MONITORING SYSTEM FOR SOFTWARE DEFINED NETWORKSA SCALABLE MONITORING SYSTEM FOR SOFTWARE DEFINED NETWORKS
A SCALABLE MONITORING SYSTEM FOR SOFTWARE DEFINED NETWORKS
 

More from iosrjournals (20)

G0145458
G0145458G0145458
G0145458
 
G0135059
G0135059G0135059
G0135059
 
G0123541
G0123541G0123541
G0123541
 
G0113839
G0113839G0113839
G0113839
 
F0144153
F0144153F0144153
F0144153
 
F0134249
F0134249F0134249
F0134249
 
F0122934
F0122934F0122934
F0122934
 
F0112937
F0112937F0112937
F0112937
 
E0143640
E0143640E0143640
E0143640
 
E0133641
E0133641E0133641
E0133641
 
E0112128
E0112128E0112128
E0112128
 
D0142635
D0142635D0142635
D0142635
 
D0133235
D0133235D0133235
D0133235
 
D0121720
D0121720D0121720
D0121720
 
D0111420
D0111420D0111420
D0111420
 
C0141625
C0141625C0141625
C0141625
 
C0132131
C0132131C0132131
C0132131
 
C0121116
C0121116C0121116
C0121116
 
B0140815
B0140815B0140815
B0140815
 
B0130820
B0130820B0130820
B0130820
 

Recently uploaded

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

E0363638

  • 1. IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 3, Issue 6 (Sep-Oct. 2012), PP 36-38 www.iosrjournals.org A middleware approach for high level overlay network Mary Metilda. J Assistant Professor, Department of CSE, Roever Engineering College, Perambalur - 621 212 Abstract: In network management middle wares are required to enhance reliability and efficiency of distributed systems. The proposed approach uses swarm-intelligence networks at the monitoring level to provide self-organization, adaptability, scalability and reactivity features. Resource management is performed by a multi-agent based layer. Knowledge exchange between the monitoring and management layers is mediated by a data warehouse. General Terms: Management, Performance, Reliability, Algorithms. Keywords: Intelligent middleware, Network Management, Swarm intelligence, Ant algorithms. I. Introduction The design of distributed applications for large scale dynamic networks, such as ad-hoc networks or wireless mesh networks, introduces several challenges which cannot be entirely solved by traditional network management techniques. Low-level network management is not sufficient to ensure reliable and persistent connectivity of pervasive devices, making it difficult to meet user specified Quality of Service (QoS). It is possible to further improve the performance of existing mechanisms for known low-level problems like network devices supervision, higher level solutions may prove to be more effective and simpler to implement. High-level management is typically tied to specific information and requirements, and is likely expected to deal with more abstract problems. It is thus worth implementing intelligent high-level network management middleware’s that the dynamic, heterogeneous and volatile nature of the network to provide a robust, reliable, and efficient platform to meet requirement. Those goals are imply proactive and reactive behaviors, prediction and the capability environmental changes. This paper presents a modular approach to high-level network management, which aims at supporting various kinds of complex distributed systems and overlay networks, such as computing grids or Peer to Peer systems. Whereas the traditional network management relies on complex, task specific appliances and protocols, the proposed architecture completely separates the network monitoring part from the management logics. The multilayer architecture is composed of a higher resource management layer and a lower ant-based monitoring layer. The upper layer uses information gathered by the lower one in order to accomplish their tasks of controlling, coordinating, and allocating network resources. An additional intermediate layer provides an interface for information exchange. The monitoring activity is based on the ant colony paradigm, which has already proved to be a suitable solution to a wide range of network management related problems, such as routing, resource discovery, and load-balancing. Ant colony optimization is a branch of swarm intelligence inspired by the social behavior of ants. Artificial ants are simple mobile software agents that move across the network and collect information about visited nodes, such as available resources or system status. The adoption of a swarm intelligence approach in the signaling layer aims at providing the required self organization, adaptability, scalability, and reactivity features to the platform. The resource management layer is implemented upon distributed agent based architecture. Intelligent agents provide an interface to the user, and fulfill the requests by the mean of coordination and collaboration mechanisms. The ability of each agent to adapt and learn increases the efficiency and robustness of the system. Both layers are independent from each other, and it can be easily replaced or adapted to different management requirements and scenarios, ranging from wireless networks to computing grids or sensor networks. To enforce this independence, interaction between the signaling and management layers is mediated by a data warehouse layer that provides stateful information. II. System Analysis The present’s system work in the domain of adaptive and self-organizing network management middleware’s. Although research on adaptive middleware’s provides several examples of self-organizing solutions for both low and high-level network management, like in, the focus here is on self organization through the social insect paradigm. An example of low-level management inspired by a biological behavior can be found in the Ecomobile middleware. Ecomobile implements a bio-inspired method to configure, monitor, analyze, and control optical transport networks. The system architecture is based on different kinds of mobile agents that separate the navigation and coordination tasks from the computational one. Monitoring and www.iosrjournals.org 36 | Page
  • 2. A modular middleware for high level network management management activities are performed at the same level: information is collected, moved, exchanged, and exploited directly by agents through a coordinated behavior. Concerning high-level management, Messor and ARMS. Both architectures are completely uncoupled and highly modular. Messor is aimed at P2P systems, and achieves self-organization by using an ant-based algorithm to perform load balancing between nodes. Ants are mobile agents that can move across the network, access services made available by visited nodes, and monitor their workload. Despite the simple logics behind single ants, the emergent behavior of the whole colony allows quick balancing of the system. An ARM is a multi-agent grid computing middleware that supports process scheduling and load balancing. Agents are organized hierarchically and can exchange information about available resources and forward incoming requests that they cannot satisfy. In order to find the best match for every request, resources and applications are modeled by the middleware. An ARM has been subsequently improved to use an ant algorithm similar to Messor for the load balancing task. In ARMS, ants are just XML documents that carry information about node workload, whereas agents act as nests and implement the logics of the ant algorithm III. SmartG System Architecture SmartG is a generic and modular middleware that aims at supporting intelligent network management using swarm intelligence algorithms for the monitor task. With respect to existing projects presented in the previous section, which were all application-specific, SmartG is flexible and easily adaptable to different scenarios. The monitoring and management activities can be customized independently depending on both the requirements of the application, and the nature of the underlying network. The middleware architecture is composed of two main layers connected by the mean of an intermediate data warehouse layer. Figure 1 shows an overview of this design: the Smart Signaling Layer (SSL) is located at bottom; the Smart Resource Management Layer (SRML) is on top. Interaction between the top and bottom layers is mediated by a data warehouse; this architecture may be considered as loosely coupled, because components are able to operate independently in the event of a communication failure. This section describes each layer and its functionality. . Figure 1: SmartG architecture 3.1 Smart Signaling Layer The SSL is an incharge of retrieving information about the network status and storing them in the data warehouse. This layer operates in a completely decentralized way, achieving its monitoring task by mean of mobile swarm agents. Each node of the network acts as a nest by running a software application that provides an environment for the execution of ant-colony algorithms. The advantage of such a distributed approach is an increase in the robustness and adaptability of the system. Ants moving across the network retrieve information about visited resources such as their status, availability or location. Collected information is stored locally in the node, to be used by other individuals in the colony, or directly in the data warehouse. Birth and death of ants are triggered by events coming from devices, requests made by other individuals, and by changes in data stored in the data warehouse. At this level, network topology is highly dynamic, and requires a fully connectionless design between nodes. The concept of node neighborhood depends on the underlying system: in P2P systems the actual topology has a one-to-one correspondence with the overlay network, whereas in mobile ad-hoc networks it may depend on the physical position and proximity of devices. Several different types of colonies can be executed on the platform to gather and spread information required by resource management processes such as discovery, routing and load balancing. The signaling layer implementation has to be lightweight enough in order not to www.iosrjournals.org 37 | Page
  • 3. A modular middleware for high level network management interfere with normal network operations. A lightweight design also has the advantage of being able to run on small devices with limited capabilities, in order to support heterogeneous networks consisting of both fixed and mobile devices (for example, notebooks, PDA, mobile phones). 3.2 Smart Resource Management Layer The SRML manages higher-level tasks of the middleware typically using application-specific intelligent agents that can collaborate and coordinate to meet application requirements. Agents work both upon receiving new requests from the application, and in an autonomous way, to continuously assure QoS of running processes; if a request cannot be fulfilled, an agent can forward it to its neighbors. The decision process is driven both by local information saved by the agent itself, and some global information retrieved by the monitoring layer and stored in the data warehouse. The type of required information heavily depends on the goal to achieve: as an example, service discovery may require a model of the requested service, a list of available offers matching the request, and the cost of reaching them. As the systems aims at being adaptive in respect of the high level requirements and low- level resource status, full interaction between the SRML and applications is required. On the one hand, applications must be able to communicate with the management layer to request services and resources, specify QoS requirements, and control the middleware. On the other hand, management agents should be able to interact with the application not only to provide the requested data, but also to rearrange and adapt requirements with respect to actual resource availability. For example, a resource discovery agent can store the parameters of a request and inform the corresponding application as soon as resources that better fulfills quality levels are available. 3.3 Data warehouse The data warehouse layer mediates communication between the SSL and SRML and provides stateful information storage and knowledge exchange to both layers. Different approaches to implement a distributed data warehouse can be considered depending on the usage scenario. In highly dynamic networks the flow of information coming from the underlying layer can be important and could represent an issue. In these situations, high performance databases are required to avoid bottlenecks and delays, and ensure reliability. On the other hand, mobile platforms require local smaller databases or local caching, to optimize communication between the device and the network. IV. Conclusion Actual implementation of the model is conducted in the framework of a grid management middleware, to evaluate the viability of the approach in large scale environments. The proposed model aims at increasing the reliability and efficiency of distributed systems by mean of proactive and reactive management. The multi-layer architecture completely separates the monitoring from the management tasks, allowing customizing the middleware to different scenarios. The lightweight network activity uses ant-colony algorithms and is able to self-organize and rapidly react to environmental changes. Resource management is performed by intelligent agents using information gathered by the monitoring layer. A data warehouse layer is used to interface monitoring and management and to provide a knowledge exchange channel. References [1] Akyildiz, I. F., Wang, X., A Survey on Wireless Mesh Network, Sept. 2005. [2] Janacik, P., Kao, O., Rerrer, U., A routing approach using swarm-intelligence for resource sharing in wireless and ad hoc networks, 2004. [3] Rossier-Ramuz, D., Towards Active Network Management with Ecomobile, an Ecosystem-inspired Mobile Agent Middleware. October 2002. [4] Hirsbrunner, B., Courant, M., Brocco, A., Kuonen, P., SmartGRID: Swarm Agent-Based Dynamic Scheduling for Robust, Reliable, and Reactive Grid Computing, October 2006. [5] Brocco, A., Hirsbrunner, B., Courant, M., Solenopsis: A Framework for the Development of Ant Algorithms, 2007. [ 6] diuf.unifr.ch/pai/solenopsis. [7] www.haslerstiftung.ch. www.iosrjournals.org 38 | Page