The underlying fabric for communication among intelligent
agents will in many cases be provided by telecommunication
networks. But telecommunication networks have been seen as
a natural domain for the investigation and application of
intelligent agents’ technology as it emerged from the area of
Distributed Artificial Intelligence (DAI). Telecommunication
network administrations are vast organizations dedicated to
operating and managing networks with broad functional
segmentations: telephone network outside plant, switching and
transmission plants, public network, all supporting different
layers of specialized customer or service networks. These
networks are organized into multiple physical and logical
layers built with large quantities of repeated network elements
and sub network structures. All these elements need to be
configured, monitored, and controlled. In the future, this will
preferably be done by automated operation support systems
and without substantial human intervention.
SELF-ORGANIZATION AND AUTONOMOUS NETWORK SURVEYIJNSA Journal
The autonomic network gathers several aspects of Self-organization, which is depicted, into different
autonomous function such as the Self- configuration, the Self-optimization, the Self-repair, the Selfprotection, and the Self-cure. The latter is considered as one of the autonomous functions wished of a system network, which could be described by autonomous behavior is realized by structures of the control
loops and loop of control.
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...ijcsa
Intelligent networks are becoming more enveloping and dwelling a new generation of applications are
deployed over the peer-to-peer networks. Intelligent networks are very attractive because of their role in
improving the scalability and enhancing performance by enabling direct and real-time communication
among the participating network stations. A suitable solution for resource management in distributed wireless systems is required which should support fault-tolerant operations, requested resources (at shortest path), minimize overhead generation during network management, balancing the load distribution between the participating stations and high probability of lookup success and many more. This article
presents a Movement Assisted Component Based Scalable Framework (MAC-SF) for the distributed
network which manages the distributed wireless resources and applications; monitors the behavior of the
distributed wireless applications transparently and attains accurate resource projections, manages the
connections between the participating network stations and distributes the active objects in response to the
user requests and changing processing and network conditions. This system is also compared with some
exiting systems. Results shows that MAC-SF is a better system and can be used in any wireless network.
Due to an explosion of demand for high speed wireless
services such as wireless internet,email,stock quotes and cellular
video conferencing wireless communication has become one of the
important field in modern engineering.Wireless networks are broadly
classified into four different kinds such as wireless lans,satellite
networks,cellular networks and personal networks. In most of the
scenarios WLAN’s systems are based on single hop operation but in
now a day’s significant study has been done on WLAN’s with multihop
operation.In this research article we have studied the various
security issues of wlan especially with respect to bluetooth.wireless
local area networks are different from Wired networks in terms of
cost,security,high reliability,resource
sharing,scalability,communication media etc. One of the important
problem for wireless network is limited frequency spectrum. In now
a day’s wireless local area network consists of multiple stations that
coexist with in a limited geographic jurisdiction and share a common
wireless channel to communicate with each other.This research work
proposes a mathematical model based security issues of wlan by
investigating,design,implementation and performance analysis using
Digital Signal Processing(DSP) Space Time Processing.Space time
processing technology which uses more than one antennas
with an appropriate signaling and receiver methodology
provides a powerful tool for improving the performance of
WLAN’s.
Proposed Scheme for Secured Routing in MANETIJAEMSJORNAL
A Mobile Adhoc Network (MANET) is characterized by mobile nodes, multihop wireless connectivity, infrastructure less environment and dynamic topology. A recent trend in Ad Hoc network routing is the reactive on-demand philosophy where routes are established only when required. Stable Routing, Security and Power efficiency are the major concerns in this field. This paper is an effort to study security problems associated with MANETS and solutions to achieve more reliable routing. The ad hoc environment is accessible to both legitimate network users and malicious attackers. The study will help in making protocol more robust against attacks to achieve stable routing in routing protocols.
Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...IJECEIAES
A mobile agent offers discrete advantage both in facilitating better transmission as well as controlling the traffic load in Mobile Adhoc Network (MANET). Hence, such forms of network offers maximized dependencies on mobile agents in terms of its trust worthiness. At present, there are various work being carried out towards resisting security breach in MANET; however approaches using mobile agent based mechanism is few to found. Therefore, the proposed system introduces a novel mathematical model where an extensive decision making system has been constructed for identifying the malicious intention of mobile agents in case they go rogues. By adopting multi-tier communication policy and fairness concept, the proposed system offers the capability to resist any form of malicious activity of mobile agent without even presence of any apriori information of adversary. The outcome shows proposed system outshines existing security scheme in MANET.
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityEditor IJCATR
Cloud computing is becoming prominent trend which offers the number of significant advantages. One of the ground laying
advantage of the cloud computing is the pay-as-per-use, where according to the use of the services, the customer has to pay. At present,
user’s storage availability improves the data generation. There is requiring farming out such large amount of data. There is indefinite
large number of Cloud Service Providers (CSP). The Cloud Service Providers is increasing trend for many number of organizations and
as well as for the customers that decreases the burden of the maintenance and local data storage. In cloud computing transferring data to
the third party administrator control will give rise to security concerns. Within the cloud, compromisation of data may occur due to
attacks by the unauthorized users and nodes. So, in order to protect the data in cloud the higher security measures are required and also
to provide security for the optimization of the data retrieval time. The proposed system will approach the issues of security and
performance. Initially in the DROPS methodology, the division of the files into fragments is done and replication of those fragmented
data over the cloud node is performed. Single fragment of particular file can be stored on each of the nodes which ensure that no
meaningful information is shown to an attacker on a successful attack. The separation of the nodes is done by T-Coloring in order to
prohibit an attacker to guess the fragment’s location. The complete data security is ensured by DROPS methodology
Analysis of back propagation and radial basis function neural networks for ha...IJECEIAES
In mobile systems, handoff is a vital process, referring to a process of allocating an ongoing call from one BS to another BS. The handover technique is very important to maintain the Quality of service. Handover algorithms, based on neural networks, fuzzy logic etc. can be used for the same purpose to keep Quality of service as high as possible. In this paper, it is proposed that back propagation networks and radial basis functions may be used for taking handover decision in wireless communication networks. The performance of these classifiers is evaluated on the basis of neurons in hidden layer, training time and classification accuracy. The proposed approach shows that radial basis function neural network give better results for making handover decisions in wireless heterogeneous networks with classification accuracy of 90%.
SELF-ORGANIZATION AND AUTONOMOUS NETWORK SURVEYIJNSA Journal
The autonomic network gathers several aspects of Self-organization, which is depicted, into different
autonomous function such as the Self- configuration, the Self-optimization, the Self-repair, the Selfprotection, and the Self-cure. The latter is considered as one of the autonomous functions wished of a system network, which could be described by autonomous behavior is realized by structures of the control
loops and loop of control.
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...ijcsa
Intelligent networks are becoming more enveloping and dwelling a new generation of applications are
deployed over the peer-to-peer networks. Intelligent networks are very attractive because of their role in
improving the scalability and enhancing performance by enabling direct and real-time communication
among the participating network stations. A suitable solution for resource management in distributed wireless systems is required which should support fault-tolerant operations, requested resources (at shortest path), minimize overhead generation during network management, balancing the load distribution between the participating stations and high probability of lookup success and many more. This article
presents a Movement Assisted Component Based Scalable Framework (MAC-SF) for the distributed
network which manages the distributed wireless resources and applications; monitors the behavior of the
distributed wireless applications transparently and attains accurate resource projections, manages the
connections between the participating network stations and distributes the active objects in response to the
user requests and changing processing and network conditions. This system is also compared with some
exiting systems. Results shows that MAC-SF is a better system and can be used in any wireless network.
Due to an explosion of demand for high speed wireless
services such as wireless internet,email,stock quotes and cellular
video conferencing wireless communication has become one of the
important field in modern engineering.Wireless networks are broadly
classified into four different kinds such as wireless lans,satellite
networks,cellular networks and personal networks. In most of the
scenarios WLAN’s systems are based on single hop operation but in
now a day’s significant study has been done on WLAN’s with multihop
operation.In this research article we have studied the various
security issues of wlan especially with respect to bluetooth.wireless
local area networks are different from Wired networks in terms of
cost,security,high reliability,resource
sharing,scalability,communication media etc. One of the important
problem for wireless network is limited frequency spectrum. In now
a day’s wireless local area network consists of multiple stations that
coexist with in a limited geographic jurisdiction and share a common
wireless channel to communicate with each other.This research work
proposes a mathematical model based security issues of wlan by
investigating,design,implementation and performance analysis using
Digital Signal Processing(DSP) Space Time Processing.Space time
processing technology which uses more than one antennas
with an appropriate signaling and receiver methodology
provides a powerful tool for improving the performance of
WLAN’s.
Proposed Scheme for Secured Routing in MANETIJAEMSJORNAL
A Mobile Adhoc Network (MANET) is characterized by mobile nodes, multihop wireless connectivity, infrastructure less environment and dynamic topology. A recent trend in Ad Hoc network routing is the reactive on-demand philosophy where routes are established only when required. Stable Routing, Security and Power efficiency are the major concerns in this field. This paper is an effort to study security problems associated with MANETS and solutions to achieve more reliable routing. The ad hoc environment is accessible to both legitimate network users and malicious attackers. The study will help in making protocol more robust against attacks to achieve stable routing in routing protocols.
Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...IJECEIAES
A mobile agent offers discrete advantage both in facilitating better transmission as well as controlling the traffic load in Mobile Adhoc Network (MANET). Hence, such forms of network offers maximized dependencies on mobile agents in terms of its trust worthiness. At present, there are various work being carried out towards resisting security breach in MANET; however approaches using mobile agent based mechanism is few to found. Therefore, the proposed system introduces a novel mathematical model where an extensive decision making system has been constructed for identifying the malicious intention of mobile agents in case they go rogues. By adopting multi-tier communication policy and fairness concept, the proposed system offers the capability to resist any form of malicious activity of mobile agent without even presence of any apriori information of adversary. The outcome shows proposed system outshines existing security scheme in MANET.
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityEditor IJCATR
Cloud computing is becoming prominent trend which offers the number of significant advantages. One of the ground laying
advantage of the cloud computing is the pay-as-per-use, where according to the use of the services, the customer has to pay. At present,
user’s storage availability improves the data generation. There is requiring farming out such large amount of data. There is indefinite
large number of Cloud Service Providers (CSP). The Cloud Service Providers is increasing trend for many number of organizations and
as well as for the customers that decreases the burden of the maintenance and local data storage. In cloud computing transferring data to
the third party administrator control will give rise to security concerns. Within the cloud, compromisation of data may occur due to
attacks by the unauthorized users and nodes. So, in order to protect the data in cloud the higher security measures are required and also
to provide security for the optimization of the data retrieval time. The proposed system will approach the issues of security and
performance. Initially in the DROPS methodology, the division of the files into fragments is done and replication of those fragmented
data over the cloud node is performed. Single fragment of particular file can be stored on each of the nodes which ensure that no
meaningful information is shown to an attacker on a successful attack. The separation of the nodes is done by T-Coloring in order to
prohibit an attacker to guess the fragment’s location. The complete data security is ensured by DROPS methodology
Analysis of back propagation and radial basis function neural networks for ha...IJECEIAES
In mobile systems, handoff is a vital process, referring to a process of allocating an ongoing call from one BS to another BS. The handover technique is very important to maintain the Quality of service. Handover algorithms, based on neural networks, fuzzy logic etc. can be used for the same purpose to keep Quality of service as high as possible. In this paper, it is proposed that back propagation networks and radial basis functions may be used for taking handover decision in wireless communication networks. The performance of these classifiers is evaluated on the basis of neurons in hidden layer, training time and classification accuracy. The proposed approach shows that radial basis function neural network give better results for making handover decisions in wireless heterogeneous networks with classification accuracy of 90%.
Comparative Study of Optic Fibre and Wireless Technologies in Internet Connec...Editor IJCATR
Most of the activities going on in the world today demand information and data sharing in one form or the other.
Consequently, the Internet and its connectivity has gradually become a household concern. The connection to the Internet requires
physical transfer of signal (data/information) from one point to another. This can either be through physical medium (wire) or through
the air (wireless). This paper a comparative study of Fiber Optics and Wireless Technologies in Internet connectivity seeks to identify
which of the two technologies is better for signal transmission in terms of bandwidth utilization, performance, reliability, cost
effectiveness, resilience, and security. The study adopted the use of secondary sources for the sourcing of materials. A lot of journal
articles, research publications, testbooks, white papers and many more were critically studies and comparatively analysed. It was clear
that both media have hitches and challenges. The study showed that although initial cost of acquisition is an inhibitive factor for fibre
optic connection, unlimited bandwidth delivery and high Quality of Service (QoS) placed Fiber optics above wireless connectivity in
their overall performance.
A survey of models for computer networks managementIJCNCJournal
The virtualization concept along with its underlyin
g technologies has been warmly adopted in many fiel
ds
of computer science. In this direction, network vir
tualization research has presented considerable res
ults.
In a parallel development, the convergence of two d
istinct worlds, communications and computing, has
increased the use of computing server resources (vi
rtual machines and hypervisors acting as active
network elements) in network implementations. As a
result, the level of detail and complexity in such
architectures has increased and new challenges need
to be taken into account for effective network
management. Information and data models facilitate
infrastructure representation and management and
have been used extensively in that direction. In th
is paper we survey available modelling approaches a
nd
discuss how these can be used in the virtual machin
e (host) based computer network landscape; we prese
nt
a qualitative analysis of the current state-of-the-
art and offer a set of recommendations on adopting
any
particular method.
An Intelligent Approach for Handover Decision in Heterogeneous Wireless Envir...CSCJournals
Vertical handoff is the basic requirement of the convergence of different access technologies. It is also the key characteristic and technology of overlay wireless network with appropriate network interfaces. The integration of diverse but complementary cellular and wireless technologies in the next generation wireless networks requires the design of intelligent vertical handoff decision algorithms to enable mobile users equipped with contemporary multi-interfaced mobile terminals to seamlessly switch network access and experience uninterrupted service continuity anywhere and anytime. Most existing vertical handoff decision strategies are designed to meet individual needs that may not achieve a good system performance. In this paper an intelligent approach is used for vertical handover decision. The intelligence is based on the fuzzy logic approach. So here, fuzzy logic is used for network selection and decision making for vertical handover.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed
A decentralized paradigm for resource-aware computing in wireless Ad hoc netw...TELKOMNIKA JOURNAL
A key factor limiting the democratisation of networked systems is the lack of trust, particularly in the wake of data-intensive applications that work on sensitive and private data, which requires providing strong network security guarantees via encryption and authentication algorithms, as well as rethinking algorithms to compute on the network peripheries without moving data. In many security and privacy-critical domains such as Home Automation IoT networks, AUV networks etc., the existence of a centralized privileged node leads to a vulnerability for leakage of sensitive information. In this paper, we have proposed a decentralized networking architecture that adopts collaborative processing techniques and operates within the tradeoff between network security and performance. We have investigated the design and sustainability of autonomous decentralized systems and evaluated the efficiency of the proposed scheme with the help of extensive simulation tools.
A WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIESijcsit
Wireless network implementation is a viable option for building network infrastructure in rural communities. Rural people lack network infrastructures for information services and socio-economic development. The aim of this study was to develop a wireless network infrastructure architecture for network services to rural dwellers. A user-centered approach was applied in the study and a wireless network infrastructure was designed and deployed to cover five rural locations. Data was collected and
analyzed to assess the performance of the network facilities. The results shows that the system had been performing adequately without any downtime with an average of 200 users per month and the quality of service has remained high. The transmit/receive rate of 300Mbps was thrice as fast as the normal Ethernet transmit/receive specification with an average throughput of 1 Mbps. The multiple output/multiple input
(MIMO) point-to-multipoint network design increased the network throughput and the quality of service experienced by the users.
Cooperative hierarchical based edge-computing approach for resources allocati...IJECEIAES
Using mobile and Internet of Things (IoT) applications is becoming very popular and obtained researchers’ interest and commercial investment, in order to fulfill future vision and the requirements for smart cities. These applications have common demands such as fast response, distributed nature, and awareness of service location. However, these requirements’ nature cannot be satisfied by central systems services that reside in the clouds. Therefore, edge computing paradigm has emerged to satisfy such demands, by providing an extension for cloud resources at the network edge, and consequently, they become closer to end-user devices. In this paper, exploiting edge resources is studied; therefore, a cooperative-hierarchical approach for executing the pre-partitioned applications’ modules between edges resources is proposed, in order to reduce traffic between the network core and the cloud, where this proposed approach has a polynomial-time complexity. Furthermore, edge computing increases the efficiency of providing services, and improves end-user experience. To validate our proposed cooperative-hierarchical approach for modules placement between edge nodes’ resources, iFogSim toolkit is used. The obtained simulation results show that the proposed approach reduces network’s load and the total delay compared to a baseline approach for modules’ placement, moreover, it increases the network’s overall throughput.
Capillary Networks play an important role in the growth of the Internet-of-Things, enabling wireless sensor networks to connect and use the capabilities of cellular networks through Capillary Gateways. Capillary Gateways facilitate the seamless integration of wireless sensor networks with cellular networks. Therefore, an optimal selection of the Capillary Gateways by the wireless sensor network is crucial for balancing the load between the gateways and optimizing the end-to-end path through both networks.
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networksiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A novel architecture for sdn based cellular network ijwmn
In this paper, we propose a novel SDN-based cellular network architecture that will be able to utilize the
opportunities of centralized administration of today’s emerging mobile network. Our proposed architecture
would not depend on a single controller, rather it divides the whole cellular area into clusters, and each
cluster is controlled by a separate controller. A number of controller services are provided on top of each
controller to manage all the major functionalities of the network and help to make the network
programmable and more agile, and create opportunities for policy-driven supervision and more
automation.
The networks not present of any centralized or pre-established structure are known as Ad hoc networks. Ad hoc Networks are the class of wireless networks that use multiple hop radio relay. Mobile Ad-hoc Network (MANET) is a combination of wireless mobile nodes and connected other in a dynamic way. ThesisScientist.com
Comparative Study of Optic Fibre and Wireless Technologies in Internet Connec...Editor IJCATR
Most of the activities going on in the world today demand information and data sharing in one form or the other.
Consequently, the Internet and its connectivity has gradually become a household concern. The connection to the Internet requires
physical transfer of signal (data/information) from one point to another. This can either be through physical medium (wire) or through
the air (wireless). This paper a comparative study of Fiber Optics and Wireless Technologies in Internet connectivity seeks to identify
which of the two technologies is better for signal transmission in terms of bandwidth utilization, performance, reliability, cost
effectiveness, resilience, and security. The study adopted the use of secondary sources for the sourcing of materials. A lot of journal
articles, research publications, testbooks, white papers and many more were critically studies and comparatively analysed. It was clear
that both media have hitches and challenges. The study showed that although initial cost of acquisition is an inhibitive factor for fibre
optic connection, unlimited bandwidth delivery and high Quality of Service (QoS) placed Fiber optics above wireless connectivity in
their overall performance.
A survey of models for computer networks managementIJCNCJournal
The virtualization concept along with its underlyin
g technologies has been warmly adopted in many fiel
ds
of computer science. In this direction, network vir
tualization research has presented considerable res
ults.
In a parallel development, the convergence of two d
istinct worlds, communications and computing, has
increased the use of computing server resources (vi
rtual machines and hypervisors acting as active
network elements) in network implementations. As a
result, the level of detail and complexity in such
architectures has increased and new challenges need
to be taken into account for effective network
management. Information and data models facilitate
infrastructure representation and management and
have been used extensively in that direction. In th
is paper we survey available modelling approaches a
nd
discuss how these can be used in the virtual machin
e (host) based computer network landscape; we prese
nt
a qualitative analysis of the current state-of-the-
art and offer a set of recommendations on adopting
any
particular method.
An Intelligent Approach for Handover Decision in Heterogeneous Wireless Envir...CSCJournals
Vertical handoff is the basic requirement of the convergence of different access technologies. It is also the key characteristic and technology of overlay wireless network with appropriate network interfaces. The integration of diverse but complementary cellular and wireless technologies in the next generation wireless networks requires the design of intelligent vertical handoff decision algorithms to enable mobile users equipped with contemporary multi-interfaced mobile terminals to seamlessly switch network access and experience uninterrupted service continuity anywhere and anytime. Most existing vertical handoff decision strategies are designed to meet individual needs that may not achieve a good system performance. In this paper an intelligent approach is used for vertical handover decision. The intelligence is based on the fuzzy logic approach. So here, fuzzy logic is used for network selection and decision making for vertical handover.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed
A decentralized paradigm for resource-aware computing in wireless Ad hoc netw...TELKOMNIKA JOURNAL
A key factor limiting the democratisation of networked systems is the lack of trust, particularly in the wake of data-intensive applications that work on sensitive and private data, which requires providing strong network security guarantees via encryption and authentication algorithms, as well as rethinking algorithms to compute on the network peripheries without moving data. In many security and privacy-critical domains such as Home Automation IoT networks, AUV networks etc., the existence of a centralized privileged node leads to a vulnerability for leakage of sensitive information. In this paper, we have proposed a decentralized networking architecture that adopts collaborative processing techniques and operates within the tradeoff between network security and performance. We have investigated the design and sustainability of autonomous decentralized systems and evaluated the efficiency of the proposed scheme with the help of extensive simulation tools.
A WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIESijcsit
Wireless network implementation is a viable option for building network infrastructure in rural communities. Rural people lack network infrastructures for information services and socio-economic development. The aim of this study was to develop a wireless network infrastructure architecture for network services to rural dwellers. A user-centered approach was applied in the study and a wireless network infrastructure was designed and deployed to cover five rural locations. Data was collected and
analyzed to assess the performance of the network facilities. The results shows that the system had been performing adequately without any downtime with an average of 200 users per month and the quality of service has remained high. The transmit/receive rate of 300Mbps was thrice as fast as the normal Ethernet transmit/receive specification with an average throughput of 1 Mbps. The multiple output/multiple input
(MIMO) point-to-multipoint network design increased the network throughput and the quality of service experienced by the users.
Cooperative hierarchical based edge-computing approach for resources allocati...IJECEIAES
Using mobile and Internet of Things (IoT) applications is becoming very popular and obtained researchers’ interest and commercial investment, in order to fulfill future vision and the requirements for smart cities. These applications have common demands such as fast response, distributed nature, and awareness of service location. However, these requirements’ nature cannot be satisfied by central systems services that reside in the clouds. Therefore, edge computing paradigm has emerged to satisfy such demands, by providing an extension for cloud resources at the network edge, and consequently, they become closer to end-user devices. In this paper, exploiting edge resources is studied; therefore, a cooperative-hierarchical approach for executing the pre-partitioned applications’ modules between edges resources is proposed, in order to reduce traffic between the network core and the cloud, where this proposed approach has a polynomial-time complexity. Furthermore, edge computing increases the efficiency of providing services, and improves end-user experience. To validate our proposed cooperative-hierarchical approach for modules placement between edge nodes’ resources, iFogSim toolkit is used. The obtained simulation results show that the proposed approach reduces network’s load and the total delay compared to a baseline approach for modules’ placement, moreover, it increases the network’s overall throughput.
Capillary Networks play an important role in the growth of the Internet-of-Things, enabling wireless sensor networks to connect and use the capabilities of cellular networks through Capillary Gateways. Capillary Gateways facilitate the seamless integration of wireless sensor networks with cellular networks. Therefore, an optimal selection of the Capillary Gateways by the wireless sensor network is crucial for balancing the load between the gateways and optimizing the end-to-end path through both networks.
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networksiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A novel architecture for sdn based cellular network ijwmn
In this paper, we propose a novel SDN-based cellular network architecture that will be able to utilize the
opportunities of centralized administration of today’s emerging mobile network. Our proposed architecture
would not depend on a single controller, rather it divides the whole cellular area into clusters, and each
cluster is controlled by a separate controller. A number of controller services are provided on top of each
controller to manage all the major functionalities of the network and help to make the network
programmable and more agile, and create opportunities for policy-driven supervision and more
automation.
The networks not present of any centralized or pre-established structure are known as Ad hoc networks. Ad hoc Networks are the class of wireless networks that use multiple hop radio relay. Mobile Ad-hoc Network (MANET) is a combination of wireless mobile nodes and connected other in a dynamic way. ThesisScientist.com
Current issues - International Journal of Network Security & Its Applications...IJNSA Journal
nternational Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
MANETs have unique characteristics like dynamic topology, wireless radio medium, limited resources and lack of centralized administration; as a result, they are vulnerable to different types of attacks in different layers of protocol stack. wormhole attack detection in wireless sensor networks
Network Monitoring and Traffic Reduction using Multi-Agent TechnologyEswar Publications
In this paper the algorithms which could improve Transmission band and Network Traffic reduction for computer network has been shown. Problem solving is an area with which many Multiagent-based applications are concerned. Multiagent systems are computational systems in which several agents interact or work together to achieve some purposes. It includes distributed solutions to problems, solving distributed problems and distributed techniques for problem solving. Multiagent using for maximizing group performance with planning, execution, monitoring, communication and coordination. This paper also addresses some critical issues in developing
Multi agent-based traffic control and monitoring systems, such as interoperability, flexibility, and extendibility. Finally, several future research directions toward the successful deployment of Multiagent technology in traffic control and monitoring systems are discussed.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Improvements for DMM in SDN and Virtualization-Based Mobile Network Architectureijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP preservation and optimal data path management according to application needs. A functional setup validates and assays the proposed evolution in terms of inter-system handover preparation, interruption and completion time relative to control plane delay requirements of the 5G networks.
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of
managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP preservation and optimal data path management according to application needs. A functional setup validates and assays the proposed evolution in terms of inter-system handover preparation, interruption
and completion time relative to control plane delay requirements of the 5G networks.
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP
preservation and optimal data path management according to application needs. A functional setup
validates and assays the proposed evolution in terms of inter-system handover preparation, interruption and completion time relative to control plane delay requirements of the 5G networks.
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5Gijwmn
Machine to Machine communication or M2M, refers to a model of communication where devices communicate directly with each other using the available wired or wireless channels. M2M is a new concept proposed under 3GPP(3rd Generation Partnership Project); several research are working on providing solutions for M2M communication for the 5G networks. Challenges associated with M2M communication are the lack of standards, security, poor infrastructure, interoperability and diverse architecture. In this paper, we propose a new mechanism called TM2M5G (The Machine to Machine for 5G) based on SOFTNET platform which results in support of 5G heterogeneous network. In this paper, we
propose the architecture for M2M communication based on SOFTNET and provide new features support like security algorithms for data transmission among devices and scheduling algorithm for seamless transmission of data packets over the network. Finallysimulation results ofthis algorithm based on a system level simulator, considering two different approaches for analyzing the parameters such as delay, throughput and bandwidth are presented.
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5Gijwmn
Machine to Machine communication or M2M, refers to a model of communication where devices
communicate directly with each other using the available wired or wireless channels. M2M is a new
concept proposed under 3GPP(3rd Generation Partnership Project); several research are working on
providing solutions for M2M communication for the 5G networks. Challenges associated with M2M
communication are the lack of standards, security, poor infrastructure, interoperability and diverse
architecture. In this paper, we propose a new mechanism called TM2M5G (The Machine to Machine for
5G) based on SOFTNET platform which results in support of 5G heterogeneous network. In this paper, we
propose the architecture for M2M communication based on SOFTNET and provide new features support
like security algorithms for data transmission among devices and scheduling algorithm for seamless
transmission of data packets over the network. Finallysimulation results ofthis algorithm based on a system
level simulator, considering two different approaches for analyzing the parameters such as delay,
throughput and bandwidth are presented.
A Mobile Ad hoc Network generally called MANET[1][2] consists of a set of mobile nodes equipped with wireless communication interfaces, forming a network without resorting to any fixed infrastructure or centralized administration, this research topic has attracted increasing interest among researchers given their characteristics and potential applications and subsets (VANET[3], WSN[4]). This paper treats both scientific and technological research aimed at presenting an in-depth study of these networks and evaluating solutions to address their problems, particularly that of routing, in order to facilitate their deployment.
Delay Tolerant Networks (DTNs) have high end-to-end latency, which is often faces disconnection, and unreliable wireless connections. It does not mean a delay service instead DTNs provides a service where network imposes disruption or delay. It operates in challenged networks with extremely limited resources such as memory size, CPU processing power etc. This paper presents an efficient trust managing mechanism for providing secure environment. The proposed dynamic trust management protocol uses a dynamic threshold updating which overcomes the problems with time changing dynamic characteristics by dynamically updating the criteria in response to changing network conditions. This reduces overheads and increases the efficient use of routing network even in conditions change. Also the dynamic threshold update reduces the false detection probability of the malicious nodes. To show the effectiveness of the proposed system, a detailed simulation in the presence of selfish and malicious nodes is performed with ONE simulator. Finally a comparative analysis of our proposed routing with previous routing protocols is also performed. The results demonstrate that presented algorithm deals effectively with selfish behavior with providing significant gain on effective delivery ratio in trade off with message overhead and delay
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
1. Intelligent Agents in Telecommunications.
Nwagu, Chikezie Kenneth; Omankwu, Obinnaya Chinecherem; and Inyiama, Hycient
1
Computer Science Department, Nnamdi Azikiwe University, Awka Anambra State, Nigeria,
Nwaguchikeziekenneth@hotmail.com
2
Computer Science Department, Michael Okpara University of Agriculture, Umudike
Umuahia, Abia State, Nigeria
saintbeloved@yahoo.com
3
Electronics & Computer Engineering Department, Nnamdi Azikiwe University, Awka
Anambra State, Nigeria.
ABSTRACT
The underlying fabric for communication among intelligent
agents will in many cases be provided by telecommunication
networks. But telecommunication networks have been seen as
a natural domain for the investigation and application of
intelligent agents’ technology as it emerged from the area of
Distributed Artificial Intelligence (DAI). Telecommunication
network administrations are vast organizations dedicated to
operating and managing networks with broad functional
segmentations: telephone network outside plant, switching and
transmission plants, public network, all supporting different
layers of specialized customer or service networks. These
networks are organized into multiple physical and logical
layers built with large quantities of repeated network elements
and sub network structures. All these elements need to be
configured, monitored, and controlled. In the future, this will
preferably be done by automated operation support systems
and without substantial human intervention.
Keywords
Distributed Artificial Intelligence (DAI), Telecommunication
network administrations.
INTRODUCTION
The telecommunication networks have been seen as a natural
domain for the investigation and application of intelligent
agents’ technology as it emerged from the area of Distributed
Artificial Intelligence (DAI). Telecommunication network
administrations are vast organizations dedicated to operating
and managing networks with broad functional segmentations:
telephone network outside plant, switching and transmission
plants, public network, all supporting different layers of
specialized customer or service networks. These networks are
organized into multiple physical and logical layers built with
large quantities of repeated network elements and sub network
structures. All these elements need to be configured,
monitored, and controlled. In the future, this will preferably be
done by automated operation support systems and without
substantial human intervention.
Although many recent efforts in applying DAI techniques
have come from the telecommunications industry, the legacy
information infrastructure that services interoperations in this
industry has so far dampened immediate attempts at
introducing DAI-based systems in the field. Consequently, the
experimental DAI-based systems that have been developed
for telecommunications have been primarily aimed at future
networks and laboratory environments.
This paper presents a brief survey of recent efforts in
applying DAI to telecommunications including some of our
specific experiences with such applications. Applications and
domain descriptions thus take precedence over focused
analytical study of the corresponding agent systems and their
theoretical justifications.
Our communication engineering and automated 'coarse-
grained' co-operative agent perspective leads us to omit
treatment of human-computer interaction themes, 'information
agents,' etc. Thus, we do not consider here applications based
on mobile agents and scripting languages such as offered by
Java and TeleScript, which lack explicit support for co-
operative behavior, even though these types of agents have
received a lot of attention in the telecommunications domain
over the last couple of years. This is not to say that this
technology is not promising. In fact, the commercial
application of mobile agents and scripting languages may be
closer than that of intelligent, co-operative agents.
Overview of Distributed Artificial Intelligence (DAI) and
Telecommunications
After providing the basic rationale for DAI and
telecommunications, this section briefly surveys the field with
a small classification that also serves to ground the
bibliography.
Rationale for DAI in Telecommunications
Inherent distribution and interconnectedness of
telecommunication networks and their constituent components
provide the basic rationale for DAI approaches to the solution
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 8, August 2017
331 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
2. of telecommunication problems. DAI approaches address a
number of dimensions of this distribution:
1. Between physical network elements and logical network
management layers, such as facility agents and customer
agents in TEAM-CPS, e.g., (Appleby, 1994; Weihmayer,
1992).
2. Between information, knowledge, and capabilities
belonging to different entities and roles in a
telecommunication system and its environment, such as
the service profiles of different users in the negotiating
agents approach, e.g., (Griffeth, 1993b).
Distribution is not the only criterion for determining the
relevance and appropriateness of application of DAI
techniques. DAI can be rationalized in terms of performance,
partitioning global information (privacy domains), and
requirements for intelligent co-ordination and negotiation
between the different agents (users, subscribers, service
providers, network operators, etc.) of future
telecommunication software infrastructures.
Broad Survey of Applications
DAI techniques have been applied to a wide range of different
telecommunication problems. This is illustrated in Table 11.1.
First, we recognize the following layering of
telecommunication systems: the transmission and switching
layer, the network control layer, and the service layer; second,
we distinguish between the network development and
maintenance tasks of network design, network manage-ment,
and service management; and third, we single out process
support, i.e., systems that support and automate (typical
telecommunications) business processes.
We are aware of one application in the transmission and
switching layer. Nishibe et al. have presented an approach to
dynamically allocating channe1s in an ATM (asynchronous
transfer mode) network.
We are aware of one application in the transmission and
switching layer. Nishibe et al. have presented an approach to
dynamically allocating channe1s in an ATM (asynchronous
transfer mode) network.
Two applications focus on the network control layer: the
work by Fleteher and Deen (Fleteher, 1994) on dynamic
routing and congestion control; and some of the work by
Weihmayer et al. (Weihmayer, 1993), on mediation between
control wielded by public network provisioning systems and
integrated private network management systems.
One application focuses on the service layer. This
approach uses DAI techniques to mediate between preferences
users may have for the behavior of a telecommunications
system and as it is typically implemented by their subscribing
to particular service features (Griffeth, 1993); This work
builds on an agent-based service execution environment on
top of a network. This approach has since been adopted by
various others (Busuoic, 1996; Rizzo, 1995; Zibman, 1996). A
related approach uses mobile agent technology within the
constraints of the Intelligent Network architecture to offer
services in a fully deregulated environment (Magedanz, 1996).
The work by Pujolle proposes to use DAI techniques to
integrate standardized architectural concepts for the areas of
service provisioning (in the service layer), service
management, and network management.
Service management is furthermore addressed by
Weihmayer et al. (Weihmayer et al, 1992) and Griffiths and
Whitney in their applications of DAI to distributed service
provisioning among service maintenance agents and customer
agents.
Network management is the most frequently addressed
application area. Three of the more advanced applications in
this group are described in more detail in Section 11.3. In
network management, a distinction can be made between the
traditional network management functions: configuration
management, fault management, accounting management,
performance management, and security management. Not all
of these functions have been addressed by DAI approaches:
accounting and security management are, as yet, uncharted
grounds, although Reilly has studied in particular the security
aspects involved in extending TMN-based network
management systems with mobile agent technology.
In several cases, one system combines more than one
functionality, e.g., fault and performance management, but
most approaches focus on fault management. We mention:
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 8, Augus 2017
332 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
3. Work on the Multistage Negotiation protocol developed with
the task of restoring transmission paths in telecommunication
networks in mind (Conry, 1991);
Two applications are mentioned in the literature for
network design: one by Lirov and Melamed (1991) where
loosely coupled expert systems perform sub-sequent tasks in
finding an optimal network configuration; and one by van
Liempd et al. (1990) where blackboard-based nodes are used
to configure sections of network connections spanning
multiple administrative domains.
The last application referenced in Table 11.1 addresses a
process support task which is particular to
telecommunications, requiring co-ordination among many
operations support and database systems.
Several activities studying the application of DAI
techniques to telecommunications have abstracted from
particular network architectures workflow management for
support of provisioning of digital telecommunications
services, but others address a particular type of network.
TCPIIP-based LANs have been used in a number of
applications (So, 1992; Sugawara, 1992), probably because
this type of network is readily accessible for experimentation
in many research organizations. One application looked at
network configuration of a leased-line corporate network
(Liempd, 1990). The work by Weihmayer et al. addressed the
interplay between a virtual corporate networks implemented
over a voice/data PBX network with public Tl links
(Weihmayer, 1992). The MAlTE system was targeted at a
network of 800 interconnected PBXs (Garijo, 1992). In
(Nishibe et al., 1993), Nishibe et al. describe an application
for the ATM network concept.
Present-day public telephony networks have not been the
subject of detailed study according to our survey.
DAI Techniques.
It may be too early, given how few implementation efforts we
have found, to begin a classification according to DAI
techniques used. We found that a few well-established DAI
techniques are mostly referred to in current applications to
telecommunications, for example: blackboard systems in
(Adler, 1989; Garijo, 1992; Liempd, 1990); the Contract Net
Protocol in (Biron, 1992; So, 1992).. Most other references
use specialized representations or algorithms for such aspects
as agent architecture and organization, negotiation and co-
ordination, planning, etc.
Overview of Four Applications
The significance of the four DAI applications presented in this
section lies in the range of DAI techniques used, the
underlying domain analysis, and the extent of experimentation
work.
'Distributed Big Brother': Campus Network Management
'Big Brother' is a centralized LAN manager operating at the
University of Michigan's Computer Aided Engineering
Network (CAEN). 'Distributed Big Brother' (DBB) is a
research test bed built at CAEN to investigate higher
performance and more robust LAN management techniques
using a combination of a number of DAI techniques.
The specific domain under consideration is management
of campus-level LAN inter connect systems, i.e., multiple
LANs connected with bridges, routers, gate-ways, etc.,
(spanning less than 10 miles) without intervening WAN. The
target functionality is system support, specifically for fault
management (So, 1992)
The operational requirements for DBB include
maintaining a centralized view of network fault management,
improving the robustness of network management processing,
and increasing its performance and parallelism. Individual
LAN segments and local subnets are loosely coupled in this
domain but interdependent inasmuch as they share
components, e.g., multiport bridges, and as decisions
regarding these components have impact across subnet
boundaries. In DBB, those are the entities across which
distribution takes place.
The rationale for a DAI approach is to manage a distributed
set of homogeneous LAN managers as a dynarnically self-
reconfigurable organization driven by fault conditions in the
campus LAN network. This organization is hierarchical
because centralized control remains embodied in a root
management agent that maintains a global network view but
operates under a delegation of authority scheme to manage
distributed manager agents. The intelligence of co-operative
agents is thus geared toward maintaining this organization,
through organization structuring and hierarchical control;
performing load management, e.g., which agents manage what
entities in the network; as well as contracting and voting to
distribute roles.
DBB agents are fairly large and complex entities loosely
coupled in their activities. No single DBB agent, regardless of
organizational role or position in the hierarchy, can be a single
point of failure. DBB uses the Contract Net Protocol to
announce, bid on, and award roles and tasks. Hierarchical
control is applied within the context of election procedures,
with simple rules to designate agents that officiate election to
network management roles.
Agents are structured as interacting communication,
contracting, and task processes. They use control problem
solving and domain problem solving message types. DBB
agents are homogeneous and are implemented as UNIX
processes in their host workstation. An internal rule base
specializes agent behavior based on dynamically assigned
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 8, Augus 2017
333 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
4. roles. Inter-agent communication occurs 'in-band' using UDP
over the TCPIIP LANs managed by DBB.
Customer Network Control and TEAM-CPS
TEAM-CPS (Testbed Environment for Autonomous Multi-
agent Co-operative Problem Solving; Tan, 1992; Weihmayer,
1992) evolved from a number of communication domains,
each requiring distributed problem solving among geo-
graphically and functionally distributed problem solvers
performing inter-dependent planning tasks. An industry
perspective on this effort is provided in (Mantelman, 1990).
Customer networks are integrated voice/data networks in
which switching and transmission facilities can be owned by
the customer and/or leased from the public network. A
distributed co-operative agent-based architecture for customer
network control was developed. Facility provisioning in the
public network is assigned to a computer system with the
ability to satisfy real-time demand for circuit addition and
deletion requests from multiple customer network systems.
This is the physical network layer, in contrast to the logical
customer network layer.
The DAI approach to this problem models the joint problem
solving and co-ordination that the respective network
managers go through in resource constrained situations where
compromise solutions need to be found to partially or fully
restore failed circuits. The problem solvers are by necessity
distinct and heterogeneous; the customer manages his logical
network layer, which is functionally separated and involves
private data and proprietary operations on services, traffic,
and usage; the same applies to the public network, which
delivers a complex service using a distinct and private
infrastructure in a competitive environment. The local
problem solving required is in both cases complex and
knowledge intensive, and integrates lots of information, e.g.,
fault management, trunk network design, and provisioning in
the public network; and traffic, service, session, and
configuration control in the customer network.
TEAM-CPS evolved as a framework for building co-
operative agents that are heterogeneous at the domain
problem solving level but for which common agent control
abstractions can be applied to co-ordinate their problem
solving behavior. Customer and public network agents share
agent control and problem solving mechanisms but can be
endowed with different domain models for planning and
problem solving as weH as different control policies,
represented as mIes in agent programs. The TEAM-CPS
framework integrates Agent-Oriented Programming (AOP)
and c1assical AI planning as the 'head' and 'body,'
respectively, of problem solving agents.
A more flexible and general agent control structure was
needed to model plan interactions using higher level
knowledge and to deal with pragmatic issues in managing
compromise and query dialogues among the agents. Agent-
Oriented Programming (Shoham, 1993) is a framework that
integrates agent control and communication. In AOP, agents
have persistent mental states that use techniques of modal and
temporal logic to represent agent beliefs and commitments to
other agents. Speech-act models of communication are used to
support simple communication to inform, request, and commit
about actions.
TEAM-CPS integrates this form of agent control with
planning-based problem solving by providing common
representation of world states in planning and belief in agent
mental states. Agent programs are constructed with simple
heuristics to generate proposals and counterproposals. Co-
ordination in systems of up to three agents was studied.
LODES: Distributed TCPIIP Fault Management
LODES (Large-intemetwork Observation and Diagnostic
Expert System) are an expert system for detecting and
diagnosing problems in a segment of a local area network
(Sugawara, 1992). Different LODES system copies, or
instances, can monitor and manage different network
segments. LODES is designed in such a way that LODES
instances co-operate with each other as agents of a multi-
agent system. Co-operation is necessary when it is not c1ear
in which segment the cause of a problem is located, when a
problem occurs in a part of the network monitored by more
than one LODES agent, or when one agent needs additional
information from another agent to perform its own tasks.
LODES were developed for TCPIIP local area networks
(LANs) that consist of several constituent networks connected
through routers. Each constituent network has its own
LODES diagnostic system. LODES address connection
establishment problems due to unintentional disconnections,
slow transmission, and net-work congestion which arise in
such networks.
An expert system approach was taken to overcome these
difficulties in the diagnostic task. Furthermore, a distributed
approach was chosen over a centralized approach to reflect
natural physical and functional distribution of net-works, to
localize private information, such as passwords, within the
boundaries of separate administrative domains, and to increase
performance.
The LODES system was primarily developed as a research
testbed; however, the system has been tried on real equipment
and laboratory-configured networks with some success.
Feature Interaction and the Negotiating Agents
Approach
The negotiating agents approach was developed to detect and
resolve certain kinds of feature interactions that occur in
telecommunications systems (Griffeth, 1993). Features in a
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 8, Augus 2017
334 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
5. telecommunications system provide packages of added
functionality to basic communication services (e.g., call-
forwarding and caller-ID). The operation of one feature may
influence that of another feature. Sometimes such influences,
called feature interactions, are intended. However, at other
times, these interactions can be unexpected and undesired and
need to be detected and resolved.
Features are a way for subscribers to tailor their use of
telecommunications services to their specific needs and
intentions. However, different parties to a call may have
different needs and intentions, which lead to conflicts between
the intentions and, analogously, to interactions between the
corresponding features.
The negotiating agents approach recognizes that a
significant sub set of feature interactions are the result of
conflicting intentions of different subscribers, who are not
necessarily party to the same call. These conflicts may arise
over which medium and protocol to use for a call, over the use
of shared resources such as terminals and bridges, over what
information can be transmitted as part of a call, etc.
The negotiating agents approach uses an agent for each
entity that may have an interest in how calls are set up and
conducted in a telecommunications system (users, network
providers, information providers, etc.). An agent is given
information about the intentions of its owning entity and
negotiates with other agents to detect and resolve conflicts.
The negotiation mechanism was specifically designed for this
application to search for winlwin solutions and to deal with
agents that are not prepared to disclose too much about their
preferences. A DAI approach was chosen to separate user
preferences and to build on DAI expertise in the area of
automated negotiation processes.
The negotiating agents approach has been implemented
and tested on top of a multimedia desktop conferencing
research prototype.
DAI and Telecommunications: Where Do We Stand?
Although quite a bit of industrial activity in applying DAI
technology to real-world domains has been in
telecommunications (Bond, 1992; Durfee, 1991; Jennings,
1994), there are currently no fielded DAI systems in public or
private telecommunications. We discuss the issues that have
hindered the emergence of fielded DAI systems in
telecommunications so far and paint a direction in which we
expect real-world applications to come about in the next few
years.
Problems with DAI Approaches
There are several reasons why DAI systems are slow to be
fielded in mainstream telecommunication systems in spite of
the clear rationale and need for their introduction.
One reason is the absence of adequate infrastructure for
autonomous agent-based control in present-day
communication systems. Another is that the modemization of
public networks is a relatively slow process because backward
compatibility must be maintained to meet high reliability and
availability requirements. DAI adds distribution to the
complexity of AI and may thus still be seen as too high a risk.
The technology is still emerging and is only beginning to
provide a solid foundation, principled practices, and
engineering methodologies required to produce mainstream
applications. We note that the basic approach in all four
examples in Section 11.3 was to consider a problem for which
a co-operative agent solution appears to be the best approach
and where there is no 'legacy' system to integrate. Such an
approach is suitable for proof-of-concept experimentation and
allows a co-operative solution to be built from the ground up.
However, it is not conducive to fielded systems. We believe
that DAI-based systems will appear along a different path.
Actually, the penetration of expert systems may offer a good
predictor for the emergence of DAI-based applications. Good
opportunities for the success of DAI in telecommunications
will be in network management and operations support for
public and private networks. Expert systems are slowly
penetrating those areas. Our thesis is that they will provide the
intelligent systems infrastructure and potentially the agents of
future co-operative systems. Of course, many different AI and
reasoning paradigms, not just rule-based reasoning, will
provide the intelligence substrate for those mainstream expert
systems. In this perspective, we consider the emergence of
communication and knowledge sharing between these
systems as requiring a DAI technology base that goes beyond
basic co-ordination among rule-based inference engines and
their knowledge bases.
The Road to Fielded Applications: An Example
Here is an example that illustrates how we believe that fielded
DAI applications will emerge in telecommunications. A
recent survey (Goyal, 1994) provides information on expert
system deployment in various telecommunication domains.
One such system, SSCFI (Special Service Circuit Fault
Isolation; Goyal, 1994) is an example of advanced
deployment of geographically distributed local intelligence.
It is an expert system that is currently being deployed in all
the GTE telephone companies in the United States. It
functions as an expert test technician that reads and interprets
trouble reports on special service circuits; decides to conduct
tests and interpret the results of those tests, using in the
process a number of remote test and database systems; and,
formally, routes the report to the appropriate repair group with
the results of its analysis. The first important feature of SSCFI
for this discussion is its autonomy. Besides a minimal
administrative interface, SSCFI processes operate in the
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 8, Augus 2017
335 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
6. background and have full control over the trouble report
queues to which they are initially assigned. SSCFIs are, in a
sense, our model of practical, narrow, but intelligent
autonomous systems performing their tasks without direct
human operational control. These tasks are not to present
information to people, but to act within the context of a
workflow system where field repair crews are at the receiving
end.
The current evolution of SSCFI is pointing toward some
form of homogeneous multi-agent task allocation system
involving SSCFIs throughout the GTE regions. SSCFIs need
fast local access to all the OSSs, database resources, test
systems, and test points involved in testing circuits. To
maximize throughput, these resources are locally available on
their LANs. SSCFIs can do simple load balancing by
spawning child processes to jointly handle test loads. The
spawning is constrained by the availability of computing
resources. DAI begins to come into the picture as load sharing
at a national level between all SSCFIs is being considered to
exploit time zone differences and sharing of computing
resources across regions. Some ideas under discussion include
using contracting schemes to have a local SSCFI request other
SSCFIs to accept responsibility for testing circuits along with
remote control of the resources required to perform those tests
and to negotiate the conditions under which this is done.
Conclusion
The notion of intelligent agents is certainly quite pervasive
today. A special issue of Communications 0/ the ACM (ACM,
1994) shows how intelligent agents are being promoted as the
basic building blocks of information systems. If agents are
coming, co-operative agents cannot be far.
In telecommunications, requirements for intelligent agents
are even more immediate especially since te1ecommunication
networks are canonical distributed systems.
References
Adler, M. R., Davis, A. B., Weihrnayer, R., Worrest, R. W.
(1989) Conflict-resolution strategies for nonhierarchical
distributed agents. In: L. Gasser, M. N. Huhns (Eds.)
Distributed Artificial Intelligence, Vol II, Research
Notes in Artificial Intelligence, Chapter 7, 139-161.
Pitrnan, London.
Appleby, A., Steward, S. (1994) Mobile software agents for
control in telecommunications networks. British Telecom
Technology, 12(2), April.
Biron, B., Laasri, H., Rezzouk, 1. (1992) A multi-agent
framework for diagnosing faults in large
telecommunication networks. In: Proceedings 6th RACE
TMN Conference, International Conference on
Communications Management for Broadband Networks
and Services, Funchal, Madeira Island, Portugal,
September 1-3.
Bond, A. H., Gasser, L. (1992) A subject-indexed
bibliography of distributed artificial intelligence. IEEE
Transactions on Systems, Man, and Cybernetics, 22(6),
1260-1281, NovemberlDecember.
Busuioc, M., Griffiths, D. (1993) Co-operating intelligent
agents for service management in communications
networks. In: S. M. Deen (Ed.) CKBS-SIG Proceedings
1993,213-226, University of Keele, September.
Huhns, M., Singh, M. (1994) Automating workflows for
service provisioning: integrating AI and database
technologies.ln: Proceedings 10th IEEE Conference on
Artificial Intelligence Applications, San Antonio, Texas,
March 1-4.
Ingrand, F. F., Georgeff, M. P., Rao, A. S. (1992) An
architecture for real-time reasoning and system control,
IEEE Expert, December.
Ishida, T., Sasaki, Y., Fukuhara, Y. (1991) Use of procedural
prograrnming languages for controlling production
systems. In: Proceedings IEEE Conference on Artificial
Intelligencefor Applications (CAIA '91), 71-75.
Ishida, T., Sasaki, Y., Fukuhara, Y. (1992) A transaction
model for multi-agent production systems. In:
Proceedings IEEE Conference on Artificial Intelligence
for Applications (CAIA '92), 288-294.
Jennings, N. R. (1994) Co-operation in industrial multi-agent
systems. In: World Scientific Series in Computer
Science, Vo143. World Scientific, Singapore.
Kuwabara, K., Lesser, V. R. (1989) Extended protocol for
multistage negotiation. In:
Proceedings 9th Workshop on Distributed Artificial
Intelligence, 129-161, East-sound, WA.
Kuwabara, K., Ishida, T. (1992) Symbiotic approach to
distributed resource allocation: toward co-ordinated
reasoning. In: A. Cesta, R. Conte, M. Miceli (Eds.)
Proceedings MAAMA W'92, San Martino al Cimino,
Italy.
Lesser, V. (1991) A retrospective view of FAiC distributed
problem solving. IEEE Transactions on Systems, Man,
and Cybernetics, 21(6), 1347-1362, November/
December.
van Liempd, E. P. M., Velthuijsen, H., Florescu, A. (1990)
BLONDIE-III: a distributed implementation of a
network configuration problem. IEEE Expert, 5(4), 48-
55.
Lirov, Y., Me1amed, B. (1991) Expert design systems for
te1ecommunications. Expert Systems with Applications,
2, 219-228.
Magedanz, T. (1996) Mobile agent-based service provision in
intelligent networks. In:
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 8, Augus 2017
336 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
7. Proceedings ECAI Workshop on Intelligent Agents for
Telecom Applications (lA TA '96), Budapest, August 13.
Mantelman, L. (1990) Orchestrating people and computers in
their networks. In: Data Network Design Strategies,
McGraw-HilllData Communications Book Series, Vol 4,
255-266.
Minton, S. et al. (1989) PRODIGY 2.0: Tbe manual and
tutorial. Technical Report CMU-CS-89-146, Camegie
Mellon University.
Nishibe, Y., Kuwabara, K., Suda, T., Ishida, T. (1993)
Distributed channe1 allocation in ATM networks. In:
Proceedings IEEE Globecom '93,12.2.1-12.2.7, Houston,
TX.
Rao, A. S., Georgeff, M. P. (1990) Intelligent real-time
network management. In:
Proceedings JOth International Conference on Artificial
Intelligence, Expert Systems, and Natural Language
(Avignon '90), Avignon, France.
Reilly, J. (1996) Security aspects ofintelligent agent based
extensions to the TMN manage-ment framework. In:
Proceedings ECAI Workshop on Intelligent Agents for
Telecom Applications (lA TA '96), Budapest, August 13.
Riecken, D. (Guest Ed.) (1994) Special issue on intelligent
agents. Communications ofthe ACM, 37(7), July.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 8, Augus 2017
337 https://sites.google.com/site/ijcsis/
ISSN 1947-5500