A Progressive Fault Tolerant Mechanism in Mobile Agent Systems

Size: px
Start display at page:

Download "A Progressive Fault Tolerant Mechanism in Mobile Agent Systems"

Transcription

1 A Progressve Fault Tolerant Mechansm n Moble Agent Systems Mchael R. LYU and Tsz Yeung WONG Computer Scence & Engneerng Department The Chnese Unversty of Hong Kong Shatn, Hong Kong flyu,tywongg@cse.cuhk.edu.hk Abstract We present the approach of deployng cooperatng agents to detect falures as well as recover servces n a moble agent system. In addtonal to server falure detecton, we use cooperatng agents to handle agent falure detecton. Two types of agents are nvolved. One s the agent performng the computaton delegated by the owner, whch we call the actual agent. Another s the agent that montors the actual agent, namely the wtness agent. We ntroduce a protocol by usng a message passng mechansm between these two knds of agents to detect agent falures and recover agent servces. Ths approach can handle server falures, agent falures, and falures n message passng. It s capable of detectng and recoverng most falure scenaros n moble agent systems. We descrbe the desgn of our wtness agent approach to moble agent systems, and conduct relablty evaluaton for our approach. The evaluaton results show our approach s a promsng technque n achevng moble agent system relablty. Keywords: Software Agents, Fault Tolerance, Recovery, Modelng, Measurement. INTRODUCTION Moble agents are autonomous objects capable of mgratng from one server to another server n a computer network []. When an agent travels to another server, the agent s code, data as well as executon state are captured and transferred to the next server. It s re-nstantated after arrval at the next server. The ablty to roam the net s provded by a mddle-ware platform, a moble agent executon envronment (e.g. Aglets [2], Concorda [3] and Mole [4]). Relablty as well as fault-tolerance are vtal ssues for the deployment of a moble agent system. A number of research work s done n these areas. Some researchers adopt the use of replcaton as well as maskng [5, 6]. The dea s to use replcated servers to mask the falures. When one server s down, we can stll use the results from other servers n order to contnue the computaton. The advantage of ths approach s that the computaton wll not be blocked when a falure happens. However, ths fault-tolerance scheme s expensve snce we have to mantan multple physcal servers for just one logcal server. Snce a falure s a rare event, t s not cost-effectve to mantan multple servers. Moreover, every replcated server has ts own data, and the data n all the replcated servers must be consstent among themselves. On the other hand, the computaton on dfferent servers may not produce the same and correct result. Thus, t s a tough task n preservng server consstency, especally when the servers are wdely separated, snce the latency of the network wll affect the speed of consstency checkng as well as preservaton. Alternatvely, our approach focuses on the agent falure detecton and recovery. Our approach s rooted from the approach suggested n [7]. We dstngush two types of agents. One type s performng the requred computaton for the user. We name t the actual agent. Another type s to detect and recover the actual agent. We call t the wtness agent. These two types of agents communcate by usng a peer-to-peer messages passng mechansm. In addton to the ntroducton of the wtness agent and the messages passng mechansm, we also need to log the actons performed by the actual agent snce when falures happen, we need to abort uncommtted actons when we perform rollback recovery [8]. We also use checkponted data [9] to recover the lost agent. The key dfference between the protocol suggested n [7] and our protocol s that the former depends on a relable broadcast, whle we allow the network to be unrelable. That s, we can handle the falures n transmsson of messages as well as the lost of the agent n the network, for example n network parttonng. In [7], the protocol uses message broadcastng wth a lot of redundant messages. Our message passng mechansm, on the other hand, s a peerto-peer one, so we can save a lot of redundant messages. Moreover, our protocol handles the falures of the wtness agents.

2 2 SERVER FAILURE DETECTION AND RECOVERY Agent Communcaton Channel Agent The server falure s much easer to be detected and recovered than the agent falure. Nevertheless, server falure detecton as well as recovery are mportant ssues n the desgn of a relable moble agent system. An agent requres a server to be hosted and an envronment to execute. If the hostng server fals, the agent wll be lost as an agent s just a pece of runnng program. On the other hand, the agent has manpulated objects (or data) n the server. These objects n the server wll become nconsstent f the modfcatons done by the agents are not handled properly. We have to tackle ths nconsstency problem. Moreover, f the server to whch the agent mgrates fals, the agent cannot travel to that server. Snce a server hosts an agent and the agent manpulates objects on the server, we have to log every acton of the agent nvolvng the modfcatons of the objects n the server. If a falure happens, all the uncommtted transactons done by the agent should be aborted. Hence, whle the server s restartng, we have to nspect the log on the permanent storage, and undo all the uncommtted changes. Durng the recovery of the server, we cannot recover any lost agents snce t s mpossble for a server to re-nstantate an agent that s foregn to t. If the agent cannot detect whether the target server s avalable or not, we may lose t when sendng t to a faled server. Therefore, we have to mplement the ablty to detect the avalablty of a server for the moble agent. We have mplemented a method smlar to png for ths purpose. Wth ths mplementaton, an agent decdes to wat n the current server f the target server ahead s faled. The agent contnues watng untl the target server becomes avalable. In ths mplementaton, the agent can contnue ts tnerary. However, whle the agent s watng, there s a chance that a falure happens to the server where the agent resdes. In ths case, we requre an agent falure detecton and recovery mechansm. Ths s covered n Secton 3.3 Our mechansm to detect and recover a server falure s to launch a daemon n a machne, whch s not error-prone. Ths daemon s to montor the avalablty of all the servers. We name ths daemon the server montor. The server hostng ths daemon s not a server responsble for recevng and executng any agent; t s an ndependent server whch s not vulnerable to falures. The advantage of ths approach s that t s easy to mplement. However, we may encounter the problem of sngle pont falure. In order to ease ths problem, we can ntroduce more backup worker servers. The worker servers wll montor the prmary server. If the prmary one fals, one of the workers wll replace the prmary one, by launchng the daemon and replacng the prmary server. Messages Checkpont Messages Checkpont Server S Server S + Fgure. The server desgn 3 AGENT FAILURE DETECTION AND RECOVERY 3. System Archtecture In our agent system desgn, n order to detect the falures of an actual agent as well as recover the faled actual agent, we desgnate another type of agents, namely the wtness agent, to montor whether the actual agent s alve or dead. In addton to the wtness agent, we have to desgn a communcaton mechansm between both types of agents. In our desgn, agents are capable of sendng messages to each other. We call ths type of messages the drect messages. The drect message s a peer-to-peer message. Snce a wtness agent always lags behnd the actual agent, the actual agent can assume that the wtness agent s at the server that the actual agent just prevously vsted. Moreover, the actual agent always knows the address of the prevously vsted server. Therefore, the peer-to-peer message passng mechansm can be establshed. There are cases that the actual agent cannot send a drect message to a wtness agent for several reasons, e.g., the wtness agent s on the way to the target server. Then, there should be a malbox at each server that keeps those unattended messages. We call ths type of messages the ndrect messages. These ndrect messages wll be kept n the permanent storage of the target servers. Every server has to log the actons performed by an agent. The loggng actons are nvoked by the agent. The nformaton logged by the agent s vtal for falure detecton as well as recovery. Also, the hostng servers have to log whch objects have been updated. Ths log fle s requred when performng the rollback recovery. Last but not the least, when a server falure happens, we have to recover the lost agent due to the falure. However, an agent has ts nternal data, whch may be lost due to the falure. Moreover, f we allow the agent to start computng from the startng pont of the tnerary, the exactly-once [] property wll be volated. Therefore, we have to checkpont the data of an agent as well as rollback the computaton when necessary [8]. We requre a permanent storage to store the checkponted data n the server. Moreover, we log messages n the log of the server n order to perform rollback of executons. The overall desgn of the server archtecture s shown n Fgure.

3 3.2 Protocol Desgn (2) Our protocol s based on message passng as well as message loggng to acheve falure detecton. Assume that, currently, the actual agent s at server S whle the wtness agent s at server S ;. Both the actual agent and the wtness agent have just d at S and S ;, respectvely. We label the actual agent as, and the wtness agent as! ;. We dscuss the behavor of the actual agent frst. The actual agent plays an actve role n ths protocol. After has d at S, t mmedately logs a message, log,on the permanent storage n S. The purpose of ths message s to let the comng wtness agent know that has successfully landed on ths server. Next, nforms! ; that t has d at S safely by sendng a message, msg,to! ;. performs the computatons delegated by the owner on S. When t fnshes, t mmedately checkponts ts nternal data to the permanent storage of S. Then, t logs a message log n S. The purpose of ths message to let the comng wtness agent know that has completed ts computaton, and t s ready to travel to the next server S +. In the next step, sends! ; a message, msg, n order to nform! ; that s ready to S. At last, s S and travels to S +. On the other hand, the wtness agent s more passve than the actual agent n ths protocol. It wll not send any messages to the actual agent. Instead, t only lstens to the messages comng from the actual agent. We assume that the wtness agent,! ;, s at S ;. Before! ; can advance further n the network, t wats for the messages sent from. When! ; s n S ;, t expects recevng two messages: one s msg and another one s. msg If the messages are out-of-order, msg wll be kept n the permanent storage of S ;. That s, msg s consdered as unattended, and becomes an ndrect message un- tl! ; receves msg. When! ; has receved both msg and,tspawns anewwtness agent msg called!. The reason of spawnng a new agent nstead of lettng! ; mgrate to S s that orgnally! ; s wtnessng the avalablty of. If a server falure happens just before! ; mgrates to S, then no one can guarantee the avalablty of the actual agent. More detals about ths problem wll be dscussed n Secton 3.3. Note that the new wtness agent knows where to go,.e. S, because msg or contans nformaton about the locaton of S where has just vsted. msg Fgure 2 shows the flow of the protocol. The actual agent s at S and the wtness agent! ; also s at S ;. Frst, logs the message log n S [Step ()]. Then, sends the message msg to! ; [Step (2)]. then performs the computaton. After has fnshed all the tasks, t checkponts ts data n S [Step (3)]. We assume that the checkpontng acton s one of the computatons of the actual agent. That s, f the checkpontng acton fals, the actual agent wll abort the whole transacton. Ths s an Checkpont Wtness (5) Checkpont Agent Server S - Server S () log message (2) send message (3) after computaton, checkpont the data. (4) log message (5) send message log msg log msg Fgure 2. Steps n the wtness protocol. mportant step snce ths property guarantees that the checkponted data wll be avalable f the actual agent has already fnshed computng. Also, t s mportant for the recovery of the lost actual agent. Then, logs the message msg n S [Step (4)]. Before s S, t sends the message msg to! ; [Step (5)]. Fnally, s S and travels to S +. Upon recevng msg,! ; spawns!, and! travels to S. The procedure goes on untl reaches the last destnaton n ts tnerary. 3.3 Falure and Recovery Scenaros The purpose of the logs and the messages s to guarantee the actual agent has fnshed up to a certan pont of the executon of the actual agent. If a server falure occurs n between a log and a message, we can determne when and where the actual agent fals. We assume that there wll be no hardware falures such that the log message cannot be recorded n a the permanent storage. However, other knds of falures lke the software faults n the moble agents or n the moble agent platforms can happen. In followng subsectons, we wll cover dfferent knds of falures ncludng the loss of the actual agents, and the loss of the wtness agents. We descrbe several scenaros as follows. 3.3.! ; fals to receve msg The reasons that! ; fals to receve msg can be:. The message s lost due to an unrelable network; 2. The message s after the tmeout perod of! ;; 3. s dead when t s ready to S ;; 4. s dead when t has just d at S wthout loggng; or 5. s dead when t has just d at S wth loggng. For the frst two reasons,.e., the actual agent does not de, and the message logged n S, log, can help solvng ths problem, as log s a proof for the exstence (3) () (4)

4 Wtness () (2) (4) Probe (3) to S n the same network, they suffer from more or less the same network latency. Although there may be many routes from S ; to S, we can set the tmeout of! ; to be large enough to overcome the dfference of speeds among these routes. Checkpont Checkpont Server S - Server S 3.3.2! ; fals to receve msg () wtness agent spawn a probe. The probe travels to S (2) probe s carryng the checkponted data (3) probe nspects the n S (4) f the n S has log then the probe re-transmt t. (5) If not, recover the agent by usng the checkpont data Fgure 3.! ; fals to receve msg of nsde S. The wtness agent can send out a probe, another agent, to search for log n S. If found, can re-transmt msg n order to recover the lost messages. If! ; fals to receve msg because of the loss of the actual agent, we may have the problem of mssng detecton when, n the ffth case, the probe wll wrongly determne that the actual agent s stll alve. Ths cases wll be dscussed n the next subsecton. If the falure s caused by the thrd or the forth cases, the probe wll not be able to fnd log n S. Then, we can use the checkponted data stored n S ; to recover the lost actual agent. Therefore, the probe s requred to carry along the checkponted data when t travels to S. Fgure 3 shows the executon steps of the probe to detect agent falures when the wtness fals to receve log.! ; wats for the message, msg, for a tmeout perod. If the tmeout perod s reached, t creates the probe. then travels to S [Step ()]. Snce t may be requred to recover a lost agent, t travels wth the checkponted data [Step (2)]. Upon arrvng at S,t searches the log fle n S for the message log [Step (3)]. If log s found, t re-transmts msg n order to recover the lost message [Step (4)]. However, mss- ng detecton may happen at ths step. If the log message s not found, wll recover n S by usng the checkponted data [Step (5)]. At last, re-transmts the message msg. Note that we recover the lost actual agent n S nstead of S ; because when detects that a recovery s requred, we can mmedately recover that actual agent n S. If we perform the recovery n S ;, has to send a message to S ; n order to nform! ; that a recovery s requred. There s a rsk of losng such message. In the meanwhle,! ; wats for another tmeout perod. Ths s mportant snce the message that s re-transmtted from S ; may be lost agan. Or, another falure may strke S. Such a falure may termnate both the probe and the just-recovered actual agent. Therefore,! ; should wat untl the message msg s. Note that t s possble that reaches S whle s stll on the way. However, the occurrence probablty of ths case should be low. Snce both and have to travel from S ; The reasons that! ; fals to receve msg can be:. The message s lost due to an unrelable network; 2. The message s after the tmeout perod of! ;; 3. s dead when t has just sent the message msg ; or 4. s dead when t has just logged the message log. As t s mentoned n the prevous subsecton, the ffth case of the prevous subsecton wll be nvestgated here. Ths case wll result n mssng detecton and the probe wll re-transmt the expected message, msg, agan regardless of the avalablty of the actual agent. Thus, we can ex- pect that the wtness agent s not able to receve msg. Therefore, the last case of the prevous subsecton can be categorzed as the thrd case of ths subsecton. If the falure happens because of the frst two reasons, t can be solved by the smlar way as the prevous subsecton.! ; can send a probe, agan, to search for log n the log fle of S. However, we may also have the problem of mssng detecton f the reason of the falures s the fourth or the ffth cases. That s, the actual agent s dead but we have not detected t. These two cases can be covered. When re-transmts msg,! ; assumes that has successfully left S. Therefore,! ; spawns!, and, eventually,! travels to S. However,! wll never receve msg + from snce s already dead and does not exst n S +. Consequently, we can successfully detect the agent falure by the thrd case of the prevous subsecton. For the thrd case, we can handle t by detectng f log exsts. Snce s absent, ths mples that log the actual agent s lost whle t s performng ts computaton. In ths case, snce the actual agent s lost, the partally completed task by the actual agent should be undone. Therefore, t s requred to rollback those operatons by the method proposed n [8] n order to preserve the data consstency n S. We treat the whole computaton process as a sngle transacton. Snce the transacton s not commtted, we have to abort all the uncommtted actons. We can use the log n S to recover the data nsde S. The rollback recovery s not done by the probe,. Instead, t s performed durng the recovery of the server. Therefore, when the probe cannot fnd the log message log, t can mmedately use the checkponted data to recover the actual agent. After the recovery s completed, the recovered actual agent can start performng ts computaton n S. The executon steps of the probe when log s mssng s very smlar to the steps n Fgure 3. Note the recovery

5 () Server S -2 Server S - Server S (3) (4) Wtness (2) Probe Wtness Wtness Agent (3) (4) () (2) Checkpont Checkpont Server S - Server S () Falure strkes server S - () wtness agent spawn a probe. The probe travels to S (2) probe s carryng the checkponted data (3) probe nspects the n S (4) f the n S has log then the probe re-transmt t. (5) If not, recover the agent by usng the checkpont data Fgure 4.! ; fals to receve msg of the actual agent takes place on the server where the actual agent s expected to be hosted,.e., n S. Moreover, when the actual agent s recovered, t mmedately performs the computaton n S regardless of the state before the falure occurs. Ths smplfes the mplementaton of the agent falure detecton mechansm Falures of wtness agent and recovery scenaros Before the actual agent completes ts tnerary, there are wtness agents spawned along the tnerary of actual agent. The youngest (.e., the most recently created) wtness agent s wtnessng the actual agent. On the other hand, the elder wtness agents are nether dle nor termnated; they have another mportant responsblty: an earler wtness agent montors the wtness agent that s just one server closer to the actual agent n ts tnerary. That s :!!!!! 2! :::!!! where! represents the montorng relaton. We name the above dependency the wtnessng dependency. Ths dependency cannot be broken. For nstance, f s n S.! ; s montorng, and! ;2 s montorng! ;. Assumng we have the followng falure sequence : S ; crushes and then S crushes. Snce S ; crashes,! ; s lost, hence no one montorng. If no one recovers! ; n S ;, then no one can recover after S has crushed. Ths s not desrable. Therefore, we need a mechansm to montor and to recover the faled wtness agents. Ths s acheved by the preservng the wtnessng dependency: the recovery of! ; can be performed by! ;2, so that can be recovered by! ;. Fgure 5 llustrates ths scenaro. Note that there are other more complex scenaros, but as long as the wtnessng dependency s preserved, agent falure detecton and recovery can always be acheved. In order to preserve the wtnessng dependency, the wtness agents that are not montorng the actual agent receve message from the wtness agent that s montorng t. That s,! sends a perodc message to! ; n order to let! ; knows that! s alve. We label ths message msg. alve When! ; cannot receve msg from! alve, the reasons can be: Wtness dependency s broken (2) Falure strkes server S Actual agent s termnated (3) Wtness agent at S recovers Wtness agent at S -2 - (4) Wtness agent at S recovers the actual agent - Fgure 5. Wtness agent falure scenaro. The network s congested or unrelable; 2. The system load of S s hgh; or 3.! s dead. No matter what the reason of the falure s,! ; can always assume that! s dead.! ; wll spawn a new wtness agent, namely!, n order to replace the lost wtness agent n S. Snce there s no specal data stored n the wtness agent, only ntalzng the states of the new wtness agent s requred (see Fgure??). When! s at S,t re-transmts the message msg to! alve ;. If t s a falsedetecton,.e., the message s lost, but the wtness agent s stll n S, we can prohbt multple nstances of! from executng by exchangng messages between 2 nstances of! Catastrophc falures The wtness agent protocol cannot guarantee that all falures are detected and recovered. Frst of all, the wtnessng dependency cannot be always preserved. The weakness s at the head of the wtness dependency,!, whch s not montored by any agents. Hence, when S fals,! cannot be recovered. Ths wll shorten the wtness dependency. Secondly, f the above shortenng process goes on, the whole wtnessng dependency wll collapse when a seres of falures completely destroy the wtnessng dependency. Though the possblty of such falure seres s extremely small, f t happens, the protocol wll fal. In order to handle ths falure seres, the owner of the actual agent can send a wtness agent to the frst server, S, n the tnerary of the agent wth a tmeout mechansm. The effect of sendng ths wtness agent s smlar to the case when a wtness agent,!, fals to receve msg +. alve Ths method can recover! and the wtness dependency effectvely wth an approprate tmeout perod.

6 3.3.5 Smplfcaton Note the wtnessng dependency s useful only when several servers fal n a short perod of tme. However, ths dependency uses a lot of resources along the tnerary of the actual agent. If we assume that no two or more servers can fal at the same perod of tme, we can smplfy our mechansm by shortenng the wtnessng dependency. The dependency then becomes:! ;!!! where! represents the montorng relaton. Snce no two servers can fal smultaneously, two wtness agents are suffcent to guarantee the avalablty of the actual agent. When a falure occurs n S,! ; can recover! after the server s recovered. When a falure happens n S ;, we can let the dependency to be further shortened. It s because when travels to S +2, a new dependency nvolvng!,! +, and wll be formed, and the smplfed protocol resumes. Fnally, when! spawns! +, we can termnate! ; by sendng a message from S to S ;. 4 RELIABILITY EVALUATION The relablty evaluaton of our protocol s conducted by Stochastc Petr Net smulaton [, 2] usng SPNP [3] as well as agent code mplementaton by usng Concorda [3]. Relablty n our experment s measured by the successful rato of actual agents n completng ther scheduled round-trp travels n a network of agent servers. We ntroduce a server called home,.e., the machne of the agent owner. The home server s responsble for transmttng agents when the agents start travelng as well as for recevng agents when they fnsh travelng on the network. We carry out the experment by usng dfferent tnerares wth varous lengths. We assume that the home s errorfree whle the other servers are error-prone. We nject falures nto every server. In each server, we create a daemon runnng together wth the agent server (or the agent platform). The daemon wll randomly kll the process of the agent server. When the server montor, another daemon that montors all the servers, dscovers that an agent server s dead, t restarts the agent server process wthn a specfed tme. 4. Server Falure Detecton Analyss Fgure 6 shows the Stochastc Petr Net that models the server falure detecton mechansm for one server. The shaded part on the left descrbes the states of an agent nsde a server. The transtons on that part are manly tmed transtons. They model the tme spent on travelng between two servers and the tme requred for the computaton of an agent. The shaded regon on the rght s the server montor. It also contans tmed transtons. These transtons model the tme spent on detectng the avalablty of a server and T-_ atnode_ T_ jobdone_ T_ T_2 aval_ Agent Itnerary T_3 T_4 T_7 Falure_ T_6 recover_ montor_ Server montor T_5 guard arc nput/output arc nhbtor arc Fgure 6. A server model wth server falure detecton Successful Percentage Level and Level Mechansms Analyss Level (Concorda) Level (Concorda) Level (Smulaton) Level (Smulaton) Fgure 7. Evaluaton result of server falure detecton the tme requred to perform a recovery. The non-shaded place n the mddle states the avalablty of the server. When a token s nsde that place, the server s avalable. However, f there s no token nsde that place, the server fals, and all agents nsde the server are lost. Fgure 6 only shows the model of one server. We can put several servers together to form a chan. That chan represents the tnerary of the agent. Our experment s carred out by connectng dfferent numbers of these modules to represent dfferent numbers of servers n the agent tnerary. The results of usng both the Concorda mplementaton and the SPNP smulaton are shown n Fgure 7. The experment compares two scenaros, one wthout server falure detecton (Level ) and the other wth server falure detecton (Level ). Ths experment llustrates how much the relablty s mproved by the server detecton and recovery mechansm wth a gven server falure rate. The result shows that the successful percentage of an agent wth server falure detecton and recovery drops much slower than an agent wthout ths mplementaton. Wth the measurement of 2 servers n the agent tnerary, the successful rato of the agents wth fault-tolerance server mplementaton falls

7 Relablty Improvement of Level Mechansm over Level Level and Level 2 Mechansms Smulaton Analyss 8 7 Relablty Improved (%) Successful Percentage Fgure 8. Relablty mprovement wth server falure detecton between 55 and 6 percents. The successful percentage of agent wthout fault-tolerance server mplementaton, on the other hand, falls below percent for both smulaton and Concorda mplementaton. Fgure 8 shows the overall mprovement of the fault-tolerance server mplementaton (Level ) versus the non-fault-tolerance mplementaton (Level ). The ncreasng slope mples that the advantage of the fault-tolerance mplementaton becomes more sgnfcant as the number of servers ncreases. The result measured by usng smulaton shows a monotonc ncreasng relaton between the successful rato and the number of servers. As the number of servers ncreases, the number of successful round-trp-travels decreases progressvely. It s reasonable snce the chance of watng for the recovery of a faled server ncreases, the probablty of the agent loss whle t s watng wll also ncrease. 4.2 Agent Falure Detecton Analyss We perform the same experment for the evaluaton of the agent falure detecton and recovery. In the prevous subsecton, we can observe that wth the server falure detecton and recovery, the system stll suffers from the loss of agents. Therefore, the goal of the agent falure detecton and recovery mechansm s to ncrease the percentage of successful round-trp travels by wtness agent mechansm. We construct the Stochastc Petr Net that models both the falure detecton and recovery for both servers and agents. Our experment s carred out by smulaton wth up to 2 servers, whch s shown n Fgure 9. The prmary result ndcates that the successful percentage of a roundtrp travel n our fault-tolerance mechansm (Level 2, whch further ncorporates the wtness agents) s further mproved wth respect to that wth only the fault-tolerance server mplementaton (Level ). Our fault-tolerance mechansm can always recover faled agents,.e., we have a % recovery. Fgure, depcts the relablty mprovement of the agent/server fault-tolerance mechansm (Level 2) over the server-only fault-tolerance mechansm (Level ). The result shows that the relablty s further enhanced. It reaches about 8% wth an tnerary of twenty servers. However, Fgure 9. Server vs. smulaton result. Relablty Improved (%) Level Smulaton Level 2 Smulaton agent falure detecton Relablty Improvement of Level 2 Mechansm over Level Mechansm Fgure. Relablty mprovement wth agent falure detecton and recovery one sde effect s that whenever we have recovered an agent, the new agent may encounter another falure. Ths generates many extra agents. Fgure shows the results of the number of extra agents (n percentage) per successful round-trp travel aganst the number of servers. It ndcates that as the tnerary becomes longer, more extra agents wll be requred, and consequently the complexty of the system s ncreased. 5 CONCLUSION In ths paper, we propose an approach to enhance moble agent systems wth better relablty. We also analyze dfferent falure scenaros that may happen n the moble agent systems, and desgn a progressve fault-tolerance scheme that can detect the server and the agent falures. We further dscuss the mechansm, whch uses a global daemon, communcaton messages, and checkpontng technques, that enables us to detect and recover these falures by employng cooperatve wtness agents. We conduct relablty evaluaton of the proposed mechansm for server falures and agent falures. The result shows that, under the condton

8 4 Extra Agents Requred Applcatons and Technques of Web Agents (3) (Baltzer Scence Publshers, 998), pp Extra agent (%) Fgure. Extra agent per successful roundtrp travel. for up to 2 servers, wth the server falure detecton only, we acheve a sgnfcant mprovement for the successful rato of the agent round-trp travels. In addton to the server falure detecton, we further mprove the relablty by usng the agent falure detecton over server falure detecton. However, the cost becomes hgher when we want to acheve a hgher level of fault-tolerance. Quanttatve results for trade-off study between cost and relablty of the proposed scheme are provded n ths paper. 6 ACKNOWLEDGMENT The work descrbed n ths paper was fully supported by a grant from the Research Grants Councl of the Hong Kong SAR, Chna (Project No. CUHK493/E). References [] Anthony H.W. Chan, T.Y. Wong, Cars K.M. Wong, and Mchael R. Lyu. Desgn, Implementaton and Expermentaton on Moble Agent Securty for Electronc Commerce Applcatons. Proceedngs of the Internatonal Conference on Parallel and Dstrbuted Processng Technques and Applcatons. pp [2] D. Lange and M. Oshma. Moble agents wth java: the aglet API. Specal Issue on Dstrbuted World Wde Web Processng: Applcatons and Technques of Web Agents (3) (Baltzer Scence Publshers, 998), pp.-2. [3] D. Wong, N. Pacorek, T. Walsh, J. DCele, M. Young, and B. Peet, Concorda: an nfrastructure for collaboratng moble agents, n Moble Agents, Proceedngs of st Internatonal Workshop, MA 97, Lecture Notes n Computer Scence 29, pp [5] Stefan Plesh and Andre Schper. Modelng Fault- Tolerant Moble Agent Executon as a Sequence of Agreement Problems. Proceedngs of the 9th IEEE Symposum on Relable Dstrbuted System 2 (SRDS-2), pp.-2 [6] Stefan Plesch and Andre Schper. FATOMAS - A Fault Tolerant Moble Agent System Based on the Agent-Dependent Approach. The Internatonal Conference on Dependable Systems and Networks, 2, pp [7] Dag Johansen, Keth Marzullo, Fred B. Schneder, Kjetl Jacobsen, and Dmtrl Zagorodnov. NAP: Practcal Fault-Tolerance for Itnerant Computatons. Proceedngs of the 9th IEEE Internatonal Conference on Dstrbuted Computng Systems, 999., pp [8] Markus Strasser and Kurt Pothernel. System Mechansms for Partal Rollback of Moble Agent Executon. Proceedngs of 2th Internatonal Conference on Dstrbuted Computng Systems 2, pp [9] Vctor F. Ncola. Checkpontng and the Modelng of Program Executon Tme. Software Fault Tolerance, M. Lyu (ed.), John Wley & Sons, 994, pp [] Kurt Rothermel and Markus Stasser. A Fault- Tolerant Protocol for Provdng the Exactly-Once Property of Moble Agents. Proceedngs of 7th IEEE Symposum on Relable Dstrbuted Systems 998, pp.-8. [] Lorre Tomek and K.S. Trved. Analyses Usng Stochastc Reward Nets. Software Fault Tolerance, M. Lyu (ed.), John Wley & Sons, 994, pp [2] Danxang Xu and Y Deng. Modelng Moble Agent Systems wth Hgh Level Petr Nets. IEEE Systems, Man, and Cybernetcs, 2, pp [3] C. Hrel, B. Tuffn, and K.S. Trved. SPNP: Stochastc Petr Nets, Verson 6.. th Internatonal Conference of Computer performance evaluaton: Modelng tools and technques. Schaumburg, Il., USA, B. Haverkort, H. Bohnenkamp, C. Smth(eds.), Lecture Notes n Computer Scence 786, Sprnger Verlag, 2. [4] J. Baumann, F. Hohl, K. Rothermel and M. Strasser. Mole - concepts of a moble agent system. Specal Issue on Dstrbuted World Wde Web Processng:

Fault Tolerance Mobile Agent System Using Witness Agent in 2- Dimensional Mesh Network

Fault Tolerance Mobile Agent System Using Witness Agent in 2- Dimensional Mesh Network IJCSI Internatonal Journal of Computer Scence Issues, Vol. 7, Issue 5, September 2010 ISSN (Onlne): 1694-0814 153 Fault Tolerance Moble Agent System Usng Wtness Agent n 2- Dmensonal Mesh Network Ahmad

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

A New Transaction Processing Model Based on Optimistic Concurrency Control

A New Transaction Processing Model Based on Optimistic Concurrency Control A New Transacton Processng Model Based on Optmstc Concurrency Control Wang Pedong,Duan Xpng,Jr. Abstract-- In ths paper, to support moblty and dsconnecton of moble clents effectvely n moble computng envronment,

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Improved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment

Improved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment JOURNAL OF COMPUTERS, VOL. 4, NO. 9, SEPTEMBER 2009 873 Improved Resource Allocaton Algorthms for Practcal Image Encodng n a Ubqutous Computng Envronment Manxong Dong, Long Zheng, Kaoru Ota, Song Guo School

More information

Real-Time Guarantees. Traffic Characteristics. Flow Control

Real-Time Guarantees. Traffic Characteristics. Flow Control Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak

More information

A Novel Fault Tolerant Scheduling Technique In Real-Time Heterogeneous Distributed Systems Using Distributed Recovery Block

A Novel Fault Tolerant Scheduling Technique In Real-Time Heterogeneous Distributed Systems Using Distributed Recovery Block Proceedngs of Natonal Conference VISION 07 on Hgh Performance Computng 2 nd Aprl 07 Government College of Engneerng, Department of CSE, Trunelvel, Taml Nadu, INDIA A Novel Fault Tolerant Schedulng Technque

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Transaction-Consistent Global Checkpoints in a Distributed Database System

Transaction-Consistent Global Checkpoints in a Distributed Database System Proceedngs of the World Congress on Engneerng 2008 Vol I Transacton-Consstent Global Checkponts n a Dstrbuted Database System Jang Wu, D. Manvannan and Bhavan Thurasngham Abstract Checkpontng and rollback

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

Avoiding congestion through dynamic load control

Avoiding congestion through dynamic load control Avodng congeston through dynamc load control Vasl Hnatyshn, Adarshpal S. Seth Department of Computer and Informaton Scences, Unversty of Delaware, Newark, DE 976 ABSTRACT The current best effort approach

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Real-time Fault-tolerant Scheduling Algorithm for Distributed Computing Systems

Real-time Fault-tolerant Scheduling Algorithm for Distributed Computing Systems Real-tme Fault-tolerant Schedulng Algorthm for Dstrbuted Computng Systems Yun Lng, Y Ouyang College of Computer Scence and Informaton Engneerng Zheang Gongshang Unversty Postal code: 310018 P.R.CHINA {ylng,

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Efficient Content Distribution in Wireless P2P Networks

Efficient Content Distribution in Wireless P2P Networks Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,

More information

Information Sciences

Information Sciences Informaton Scences 79 (9) 369 367 ontents lsts avalable at ScenceDrect Informaton Scences ournal homepage: www.elsever.com/locate/ns Necessary and suffcent condtons for transacton-consstent global checkponts

More information

The Performance of Checkpointing and Replication Schemes for Fault Tolerant Mobile Agent Systems

The Performance of Checkpointing and Replication Schemes for Fault Tolerant Mobile Agent Systems The Performance of Checkpontng an Replcaton Schemes for Fault Tolerant Moble Agent Systems Taesoon Park an Ilsoo Byun Sejong Unversty Department of Computer Engneerng Seoul 143-747, KOREA tspark,weps @sejong.ac.kr

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Petri Net Based Software Dependability Engineering

Petri Net Based Software Dependability Engineering Proc. RELECTRONIC 95, Budapest, pp. 181-186; October 1995 Petr Net Based Software Dependablty Engneerng Monka Hener Brandenburg Unversty of Technology Cottbus Computer Scence Insttute Postbox 101344 D-03013

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

CS 268: Lecture 8 Router Support for Congestion Control

CS 268: Lecture 8 Router Support for Congestion Control CS 268: Lecture 8 Router Support for Congeston Control Ion Stoca Computer Scence Dvson Department of Electrcal Engneerng and Computer Scences Unversty of Calforna, Berkeley Berkeley, CA 9472-1776 Router

More information

Partitioning vs. Replication for Token-Based Commodity Distribution

Partitioning vs. Replication for Token-Based Commodity Distribution Parttonng vs. Replcaton for Token-Based Commodty Dstrbuton 8 XUdHWLQWHPHO Insttute for Advanced Computer Studes, Department of Computer Scence, Unversty of Maryland, College Park ugur@cs.umd.edu Banu Özden

More information

Design and Evaluation of a Window-Consistent Replication Service

Design and Evaluation of a Window-Consistent Replication Service 986 IEEE TRANSACTIONS ON COMPUTERS, VOL. 46, NO. 9, SEPTEMBER 1997 Desgn and Evaluaton of a Wndow-Consstent Replcaton Servce Ashsh Mehra, Student Member, IEEE, Jennfer Rexford, Member, IEEE, and Farnam

More information

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm , pp.197-202 http://dx.do.org/10.14257/dta.2016.9.5.20 Research of Dynamc Access to Cloud Database Based on Improved Pheromone Algorthm Yongqang L 1 and Jn Pan 2 1 (Software Technology Vocatonal College,

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

A MapReduce-supported Data Center Networking Topology

A MapReduce-supported Data Center Networking Topology A MapReduce-supported Data Center Networkng Topology Zelu Dng*,, Xue Lu, Deke Guo*, Honghu Chen*, Xueshan Luo* * Natonal Unversty of Defense Technology, Chna McGll Unversty, Canada Abstract Several novel

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Quantifying Performance Models

Quantifying Performance Models Quantfyng Performance Models Prof. Danel A. Menascé Department of Computer Scence George Mason Unversty www.cs.gmu.edu/faculty/menasce.html 1 Copyrght Notce Most of the fgures n ths set of sldes come from

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

Solution Brief: Creating a Secure Base in a Virtual World

Solution Brief: Creating a Secure Base in a Virtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Abstract The adopton rate of Vrtual Machnes has exploded at most organzatons, drven by the mproved

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

Memory Modeling in ESL-RTL Equivalence Checking

Memory Modeling in ESL-RTL Equivalence Checking 11.4 Memory Modelng n ESL-RTL Equvalence Checkng Alfred Koelbl 2025 NW Cornelus Pass Rd. Hllsboro, OR 97124 koelbl@synopsys.com Jerry R. Burch 2025 NW Cornelus Pass Rd. Hllsboro, OR 97124 burch@synopsys.com

More information

with `ook-ahead for Broadcast WDM Networks TR May 14, 1996 Abstract

with `ook-ahead for Broadcast WDM Networks TR May 14, 1996 Abstract HPeR-`: A Hgh Performance Reservaton Protocol wth `ook-ahead for Broadcast WDM Networks Vjay Svaraman George N. Rouskas TR-96-06 May 14, 1996 Abstract We consder the problem of coordnatng access to the

More information

Evaluation of Parallel Processing Systems through Queuing Model

Evaluation of Parallel Processing Systems through Queuing Model ISSN 2278-309 Vkas Shnde, Internatonal Journal of Advanced Volume Trends 4, n Computer No.2, March Scence - and Aprl Engneerng, 205 4(2), March - Aprl 205, 36-43 Internatonal Journal of Advanced Trends

More information

Pass by Reference vs. Pass by Value

Pass by Reference vs. Pass by Value Pass by Reference vs. Pass by Value Most methods are passed arguments when they are called. An argument may be a constant or a varable. For example, n the expresson Math.sqrt(33) the constant 33 s passed

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK Wghtman Moblty Quck Reference Gude THIS SPACE INTENTIONALLY LEFT BLANK WIGHTMAN MOBILITY BASICS How to Set Up Your Vocemal 1. On your phone s dal screen, press and hold 1 to access your vocemal. If your

More information

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract

More information

The Shortest Path of Touring Lines given in the Plane

The Shortest Path of Touring Lines given in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He

More information

Shared Running Buffer Based Proxy Caching of Streaming Sessions

Shared Running Buffer Based Proxy Caching of Streaming Sessions Shared Runnng Buffer Based Proxy Cachng of Streamng Sessons Songqng Chen, Bo Shen, Yong Yan, Sujoy Basu Moble and Meda Systems Laboratory HP Laboratores Palo Alto HPL-23-47 March th, 23* E-mal: sqchen@cs.wm.edu,

More information

Adaptive Power-Aware Prefetch in Wireless Networks

Adaptive Power-Aware Prefetch in Wireless Networks Adaptve Power-Aware Prefetch n Wreless Networks Langzhong Yn, Student Member, IEEE, and Guohong Cao, Member, IEEE Abstract Most of the prefetch technques used n the current cache management schemes do

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261

More information

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and

More information

IR-HARQ vs. Joint Channel-Network coding for Cooperative Wireless Communication

IR-HARQ vs. Joint Channel-Network coding for Cooperative Wireless Communication Cyber Journals: ultdscplnary Journals n Scence and Technology, Journal of Selected Areas n Telecommuncatons (JSAT), August Edton, 2 IR-HARQ vs. Jont Channel-Network codng for Cooperatve Wreless Communcaton

More information

Some material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier

Some material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier Some materal adapted from Mohamed Youns, UMBC CMSC 611 Spr 2003 course sldes Some materal adapted from Hennessy & Patterson / 2003 Elsever Scence Performance = 1 Executon tme Speedup = Performance (B)

More information

Maintaining temporal validity of real-time data on non-continuously executing resources

Maintaining temporal validity of real-time data on non-continuously executing resources Mantanng temporal valdty of real-tme data on non-contnuously executng resources Tan Ba, Hong Lu and Juan Yang Hunan Insttute of Scence and Technology, College of Computer Scence, 44, Yueyang, Chna Wuhan

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach Dstrbuted Resource Schedulng n Grd Computng Usng Fuzzy Approach Shahram Amn, Mohammad Ahmad Computer Engneerng Department Islamc Azad Unversty branch Mahallat, Iran Islamc Azad Unversty branch khomen,

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs

More information

Synchronous Distributed Wireless Network Emulator for High-Speed Mobility: Implementation and Evaluation

Synchronous Distributed Wireless Network Emulator for High-Speed Mobility: Implementation and Evaluation Synchronous Dstrbuted Wreless Network Emulator for Hgh-Speed Moblty: Implementaton and Evaluaton Mnoru Kozum, Tomoch Ebata Yokohama Research Laboratory, Htach, Ltd., 292 Yoshda-cho, Totsuka-ku, Yokohama,

More information

Intro. Iterators. 1. Access

Intro. Iterators. 1. Access Intro Ths mornng I d lke to talk a lttle bt about s and s. We wll start out wth smlartes and dfferences, then we wll see how to draw them n envronment dagrams, and we wll fnsh wth some examples. Happy

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Advanced Computer Networks

Advanced Computer Networks Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture Goals and Approach CS 194: Dstrbuted Systems Resource Allocaton Goal: acheve predcable performances Three steps: 1) Estmate applcaton s resource needs (not n ths lecture) 2) Admsson control 3) Resource

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

USING GRAPHING SKILLS

USING GRAPHING SKILLS Name: BOLOGY: Date: _ Class: USNG GRAPHNG SKLLS NTRODUCTON: Recorded data can be plotted on a graph. A graph s a pctoral representaton of nformaton recorded n a data table. t s used to show a relatonshp

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Analysis of Dependencies of Checkpoint Cost and Checkpoint Interval of Fault Tolerant MPI Applications

Analysis of Dependencies of Checkpoint Cost and Checkpoint Interval of Fault Tolerant MPI Applications Mallkarjuna Shastry P M et al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Analyss of Dependences of Checkpont Cost and Checkpont Interval of Fault Tolerant MPI Applcatons Mallkarjuna

More information

Performance analysis of distributed cluster-based MAC protocol for multiuser MIMO wireless networks

Performance analysis of distributed cluster-based MAC protocol for multiuser MIMO wireless networks RESEARCH Open Access Performance analyss of dstrbuted cluster-based MAC protocol for multuser MIMO wreless networks Azadeh Ettefagh *, Marc Kuhn, Celal Eşl and Armn Wttneben Abstract It s known that multuser

More information

IMPACT OF RADIO MAP SIMULATION ON POSITIONING IN INDOOR ENVIRONTMENT USING FINGER PRINTING ALGORITHMS

IMPACT OF RADIO MAP SIMULATION ON POSITIONING IN INDOOR ENVIRONTMENT USING FINGER PRINTING ALGORITHMS IMPACT OF RADIO MAP SIMULATION ON POSITIONING IN INDOOR ENVIRONTMENT USING FINGER PRINTING ALGORITHMS Jura Macha and Peter Brda Unversty of Zlna, Faculty of Electrcal Engneerng, Department of Telecommuncatons

More information

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme Contemporary Engneerng Scences, Vol. 7, 2014, no. 26, 1475-1482 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.49186 Securty Vulnerabltes of an Enhanced Remote User Authentcaton Scheme Hae-Soon

More information

ELEC 377 Operating Systems. Week 6 Class 3

ELEC 377 Operating Systems. Week 6 Class 3 ELEC 377 Operatng Systems Week 6 Class 3 Last Class Memory Management Memory Pagng Pagng Structure ELEC 377 Operatng Systems Today Pagng Szes Vrtual Memory Concept Demand Pagng ELEC 377 Operatng Systems

More information

PERFORMANCE ANALYSIS OF ROUTING ALGORITHMS OF RD-C/TDMA PACKET RADIO NETWORKS UNDER DYNAMIC RANDOM TOPOLOGY1

PERFORMANCE ANALYSIS OF ROUTING ALGORITHMS OF RD-C/TDMA PACKET RADIO NETWORKS UNDER DYNAMIC RANDOM TOPOLOGY1 PERFORMANCE ANALYSIS OF ROUTING ALGORITHMS OF 1- RD-C/TDMA PACKET RADIO NETWORKS UNDER DYNAMIC RANDOM TOPOLOGY1 A Thess Presented to The Faculty of the College of Engneerng and Technology Oho Unversty

More information

An Improved User Authentication and Key Agreement Scheme Providing User Anonymity

An Improved User Authentication and Key Agreement Scheme Providing User Anonymity 35 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 9, NO. 4, DECEMBER 0 An Improved User Authentcaton and Key Agreement Scheme Provdng User Anonymty Ya-Fen Chang and Pe-Yu Chang Abstract When accessng

More information

an assocated logc allows the proof of safety and lveness propertes. The Unty model nvolves on the one hand a programmng language and, on the other han

an assocated logc allows the proof of safety and lveness propertes. The Unty model nvolves on the one hand a programmng language and, on the other han UNITY as a Tool for Desgn and Valdaton of a Data Replcaton System Phlppe Quennec Gerard Padou CENA IRIT-ENSEEIHT y Nnth Internatonal Conference on Systems Engneerng Unversty of Nevada, Las Vegas { 14-16

More information

WITH rapid improvements of wireless technologies,

WITH rapid improvements of wireless technologies, JOURNAL OF SYSTEMS ARCHITECTURE, SPECIAL ISSUE: HIGHLY-RELIABLE CPS, VOL. 00, NO. 0, MONTH 013 1 Adaptve GTS Allocaton n IEEE 80.15.4 for Real-Tme Wreless Sensor Networks Feng Xa, Ruonan Hao, Je L, Naxue

More information

SRB: Shared Running Buffers in Proxy to Exploit Memory Locality of Multiple Streaming Media Sessions

SRB: Shared Running Buffers in Proxy to Exploit Memory Locality of Multiple Streaming Media Sessions SRB: Shared Runnng Buffers n Proxy to Explot Memory Localty of Multple Streamng Meda Sessons Songqng Chen,BoShen, Yong Yan, Sujoy Basu, and Xaodong Zhang Department of Computer Scence Moble and Meda System

More information

Routing in Degree-constrained FSO Mesh Networks

Routing in Degree-constrained FSO Mesh Networks Internatonal Journal of Hybrd Informaton Technology Vol., No., Aprl, 009 Routng n Degree-constraned FSO Mesh Networks Zpng Hu, Pramode Verma, and James Sluss Jr. School of Electrcal & Computer Engneerng

More information

Hybrid Job Scheduling Mechanism Using a Backfill-based Multi-queue Strategy in Distributed Grid Computing

Hybrid Job Scheduling Mechanism Using a Backfill-based Multi-queue Strategy in Distributed Grid Computing IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.12 No.9, September 2012 39 Hybrd Job Schedulng Mechansm Usng a Backfll-based Mult-queue Strategy n Dstrbuted Grd Computng Ken Park

More information

Network-Driven Layered Multicast with IPv6

Network-Driven Layered Multicast with IPv6 Network-Drven Layered Multcast wth IPv6 Ho-pong Sze and Soung C. Lew Department of Informaton Engneerng, The Chnese Unversty of Hong Kong, Shatn, N.T., Hong Kong {hpsze8, soung}@e.cuhk.edu.hk Abstract.

More information

Scalable Group Management in Large-Scale Virtualized Clusters Wei Zhou 1, Lei Wang 1, Dan Meng 1,2, Lin Yuan 1, Jianfeng Zhan 1

Scalable Group Management in Large-Scale Virtualized Clusters Wei Zhou 1, Lei Wang 1, Dan Meng 1,2, Lin Yuan 1, Jianfeng Zhan 1 Scalable Group Management n Large-Scale Vrtualzed Clusters We Zhou 1, Le Wang 1, Dan Meng 1,2, Ln Yuan 1, Janfeng Zhan 1 1 Insttute of Computng Technology, Chnese Academy of Scences 2 Bureaus of Hgh-Tech

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

Fault tolerant workflow scheduling based on replication and resubmission of tasks in Cloud Computing

Fault tolerant workflow scheduling based on replication and resubmission of tasks in Cloud Computing Fault tolerant workflow schedulng based on replcaton and resubmsson of tasks n Cloud Computng Jayadvya S K* Department of Computer Scence & Engneerng Natonal Insttute of Technology Truchrappall, Taml Nadu,

More information

Reliability and Performance Models for Grid Computing

Reliability and Performance Models for Grid Computing Relablty and Performance Models for Grd Computng Yuan-Shun Da,2, Jack Dongarra,3,4 Department of Electrcal Engneerng and Computer Scence, Unversty of Tennessee, Knoxvlle 2 Department of Industral and Informaton

More information

Fault Detection in Rule-Based Software Systems

Fault Detection in Rule-Based Software Systems Fault Detecton n Rule-Based Software Systems Dong Wang, Rubng Hao and Davd Lee Bell Labs Research Chna Bejng, Chna, 100080 {wangd, rbhao, leedavd}@lucent.com Abstract Motvated by packet flterng of frewall

More information

A New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1

A New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1 A New Feature of Unformty of Image Texture Drectons Concdng wth the Human Eyes Percepton Xng-Jan He, De-Shuang Huang, Yue Zhang, Tat-Mng Lo 2, and Mchael R. Lyu 3 Intellgent Computng Lab, Insttute of Intellgent

More information

5.1 The ISR: Overvieui. chapter

5.1 The ISR: Overvieui. chapter chapter 5 The LC-3 n Chapter 4, we dscussed the basc components of a computer ts memory, ts processng unt, ncludng the assocated temporary storage (usually a set of regsters), nput and output devces, and

More information

Real-time Scheduling

Real-time Scheduling Real-tme Schedulng COE718: Embedded System Desgn http://www.ee.ryerson.ca/~courses/coe718/ Dr. Gul N. Khan http://www.ee.ryerson.ca/~gnkhan Electrcal and Computer Engneerng Ryerson Unversty Overvew RTX

More information

Gateway Algorithm for Fair Bandwidth Sharing

Gateway Algorithm for Fair Bandwidth Sharing Algorm for Far Bandwd Sharng We Y, Rupnder Makkar, Ioanns Lambadars Department of System and Computer Engneerng Carleton Unversty 5 Colonel By Dr., Ottawa, ON KS 5B6, Canada {wy, rup, oanns}@sce.carleton.ca

More information