Functionality and performance issues in an agent based software deployment framework

Size: px
Start display at page:

Download "Functionality and performance issues in an agent based software deployment framework"

Transcription

1 Functionality and performance issues in an agent based software deployment framework Mario Kusek, Kresimir Jurasovic and Ignac Lovrek University of Zagreb Faculty of Electical Engineering and Computing Unska 3, HR Zagreb {mario.kusek, kresimir.jurasovic, Abstract. Deploying and maintaining software in a distributed system includes software delivery, remote installation, starting, stoping, and modifying in order to configure or re configure a system according to user needs. This paper deals with an agent based framework where intelligent and mobile agents provide the means to implement a distributed system and enable its evolution by taking partial or full responsibility for software deployment tasks. Agents are organised into agent teams, where one agent is the team leader responsible for planning, while the others are operational agents capable of executing a defined plan. The formal model, as well as functionality and performance issues, are elaborated. Special attention is paid to deployment strategies and their optimization, while taking into account characteristics of distributed system nodes and the network connecting them. Simulation-based evaluation of agent serialization, migration and deserialization parameters, and their influence on overall performance, is included. 1 Introduction Establishment and maintenance of distributed systems includes operations that provide software delivery to system nodes, remote installation, starting and stoping, and version handling. Furthermore, modification of software after delivery must be supported in order to correct faults, improve performance characteristics, adapt to a changed environment or improve maintainability. Distributed system software should be configured initially, and re configured if and when corrective, perfective, adaptive or preventive actions are required. Software deployment and maintenance strategies are important in order to configure or re configure distributed systems according to their requirements (i.e., where and what), and to achieve minimum configuration and re configuration setup times (i.e., when and how), taking into account the network and node characteristics, as well as operational conditions. Intelligent and mobile agents provide the means to implement a distributed system and enable its evolution, by taking partial or full responsibility for these resource intensive and costly tasks. Regarding system performance, configuration and re configuration should have minimum influence on system operation.

2 Consequently, software deployment and maintenance should be optimised in order to achieve acceptable total execution time. In this paper, functionality and performance issues of an agent-based framework are elaborated. Furthermore, system parameters related to agent migration and agent activation/deactivation, and their influence on overall performance, are discussed. The paper is organized as follows: Section 2 describes formal model of an agent based software deployment framework and introduces a prototype system MA RMS. Case study dealing with system parameters describing agent serialization/de serialization time and communication link capacity, including results of simulations is presented in Section 3. Section 4 concludes the paper. 2 The formal model of an agent based software deployment framework Software deployment has to take into account the functionality that a distributed system provides (i.e. services), as well as characteristics of nodes (i.e. capacity, operating system, agent platform, installed software) and the network connecting them (i.e. topology, link bandwidth). Furthermore, procedures specific to the system must be considered. Examples of distributed systems faced with such problems are network centric applications and networks themselves, with hundreds or thousands of nodes, e.g. access points in local networks or base stations in mobile networks [1, 2]. From the formal standpoint, a distributed system is defined by the tuple (S, N) where S denotes system nodes, S = {S 1, S 2,..., S i,..., S ns }, and N denotes a network connecting them. System nodes should be configured in order to provide support for a set of required elementary services, ES = {es 1, es 2,..., es j,..., es nes } provided by the system, i.e., a defined subset of elementary services s i = {es i1, es i2,..., es ij,..., es in } should be supported by each node S i. Distributed system configuration is defined with an initial set up where software components corresponding to elementary services from ES are delivered and activated at each node S i, according to its predefined functionality, s i. Re configuration is required when the ES changes (i.e. new elementary service is introduced or an existing one updated), when node S changes (i.e. new node is connected or an existing one functionally upgraded) or when network N changes (i.e. network topology or link capacity changes). An agent based software deployment system is organised as a multi agent system, A SD, which shares the set of nodes, S and the network N with the system under consideration, (A SD, S, N). A SD includes a planning agent a P and a team of operational agents, {a 1, a 2,..., a i,..., a na }. The planning agent a P is responsible for planning software deployment, allocating deployment tasks to operational agents in the team and co ordinating them. Operational agents are multi operational, capable of executing one or more deployment tasks to one or more nodes. Each individual task corresponds to an operation, such as software delivery to a system node, remote installation, starting or stoping, replacement/modification of the existing software, version handling and others.

3 Distributed System (S,N) Software Deployment and Maintenance MA-RMS Request Information Model of (S,N) ES, S, N, S i Execution a P-RMS Deployment task ES, S, N, S i Strategy selection/ optimisation Task allocation a 1-RMS a 1-RMS a 1-RMS 1 na Team of a i-rms Fig. 1. Service deployment framework MA RMS When deploying software components on a large number of nodes at remote locations using software agents, one of the major challenges faced is determining the number of operational agents to use and distributing the required tasks among them. Software deployment efficiency depends on agent team organisation and the strategy used. The simplest strategy is when a single agent executes all tasks on all nodes, while the most promising one is when team size and task assignment are optimized according to the system and network conditions. As an example, the role of planning agent a P, when ES should be re configured to ES (ES ES), is defined as follows: (1) Identify a subset of nodes S S that should be re configured, i.e. for which s i s i; (2) Define deployment tasks required for re configuration of each node S i S, for each elementary service es ij s i ; (3) Define a sub network N N which connects nodes from S ; (4) Collect node and network parameters for (S, N ); (5) Decide which deployment strategy to use, organize the agent team and let them work; (6) If deployment results with ES, all tasks were completed successfully. Otherwise the resulting configuration is ES x ES, and the procedure for re configuring ES x ES should be repeated until completion. Related work includes different aspects of the agent based approach for software (re)configuration, updating and maintenance [3 5]. Using agents in service oriented architectures has been studied mostly for service composition and orchestration [6]. The practical implementation can be difficult for complex distributed systems, from functionality and performance point of view. Some preliminary results show that rational agents based on BDI paradigm can cope with a complexity issues related to frequent changes, deployment errors or inconsistency and rollback ability. A service deployment framework, called the Multi Agent Remote Maintenance Shell (MA RMS) [4, 7] shown in Fig. 1, is based on a formal model of a mobile agent network [8].

4 The main goal of the planning agent, a p RMS, is to optimize the deployment strategy. This goal is divided into two sub goals. The first sub goal is to gather and analyse information regarding the nodes and the network. The second sub goal is to select a previously defined fixed strategy or an optimized one, taking into account the node and network characteristics and conditions. This goal consists of a set of plans, defined by triggering conditions and plan implementation. Triggering conditions define when the plan is applicable, while plan implementation activates operational agents according to the selected strategy. Planning agent a p RMS selects the predefined strategy which gives minimum completion time. The strategies are the following: (R1) a single agent executes all services on all nodes; (R2) an agent executes a single service on one node only; (R3) an agent executes all services on one node only; (R4) an agent executes a specific service on all nodes; (R5) services are assigned to the agents in order to exploit maximal parallelism in service execution (mutually independent services are assigned to different agents, in order to execute them simultaneously); (R6) a hybrid solution combining R4 and R3. An agent is responsible for a specific service on all nodes while other agents execute the remaining services each on a different node. Strategies R1 R6 are static, i.e., they always generate the same distribution of tasks among agents for a specific network topology, regardless of available link bandwidth or other conditions. An additional strategy, R7, based on a genetic algorithm for agent team optimization uses the network topology and link bandwidth as input parameters [9]. Operational agents, a i RMS, support full functionality required for software deployment and maintenance on nodes in an IP network. These agents know how to migrate, install, configure, start, stop and uninstall software. A mobile agent network simulator is applied to access performance issues [10]. It can simulate agent execution in different networks (i.e. nodes, switches and links), different operation execution times and different strategies, including the genetic algorithm. 3 Evaluating performance of the agent based software deployment solution The basic performance measure evaluated in the paper is the total execution time of the software deployment and maintenance process. The first group of parameters influencing this process describe the software under consideration (ES) and its distribution to system nodes (S). This distribution is defined by software configuration requirements for each node (s i ). The second group of parameters is related to agents, their complexity (i.e. the operations assigned to them, their size) and their life cycle, as shown in Fig. 2. Agent migration between nodes S i and S j when peforming some deployment task is defined by an agent transfer time, as follows: T ij = t pi + t ij + t aj where t pi is the agent preparation time needed for agent serialization at the originating node S i ; t ij is communication time needed for agent transfer from S i to S j ; and t aj is the

5 Fig.2. Agent transfer and holding time agent activation time which includes agent reception and de serialisation at the destination node. Handling of some deployment task at node S j is described by an agent holding time: t qj = t cj + t wj + t sj, where t cj is the inter agent communication time (i.e. the time an agent spends at node S j searching for the result of a deployment task performed by another agent); t wj is waiting time (i.e. the time an agent spends in a queue at S j waiting execution); and t sj is the serving time (i.e. the time needed for execution at S j ). The third group of parameters describes the characteristics and conditions of a distributed system that affect software deployment and maintenance. The basic node characteristics taken into consideration are node processing power influencing serving time, and agent serialization and de serialization (t sj, t pi, t aj ). All deployment tasks are treated the same with respect to t sj, which equals t. The basic characteristics of the network include its topology and available link bandwidth. For analysis purposes, all parameters related to timing are expressed in discrete time units, t. This approach provides a tool for analyzing the performance of a single agent. When extended to a multi agent system and a mobile agent network [11], it allows for analysis of the total execution time required to fulfill a software deployment and maintenance request. The total execution time is the time required by an agent team to execute all deployment tasks on all nodes. The case study that follows deals with the impact of agent serialization/de serialization (t pi and t aj on Fig. 2) and available link bandwidth on the total execution time. The sub network under consideration consists of 12 nodes and 6 switch components connected with a link of certain bandwidth (Fig. 3). Node S0 is used as a staring node hosting the planning agents and from which all agents start their execution. The set of elementary services that should be deployed to all nodes except S0 consists of 4 services. Three network scenarios are simulated by varying two parameters: a) the available link bandwidth, and b) the ratio of agent execution time to agent serialization/de serialization time. The aim of the simulation is to explore the influence of bandwidth variation and agent complexity on strategy selection. In the first scenario the bandwidth of the links in the network was set to 5 Mbit/s, in the second to 10 Mbit/s and in the third to 100 Mbit/s.

6 Fig. 3. Network topology Total execution time [ms] R1 R2 R3 R4 R5 R6 R7 Distribution strategies Service execution time to serialization/deserialization time ratio Fig.4. Scenario 1: Simulation result for link bandwidth of 5 Mbit/s In all scenarios, the service agent execution time to agent serialization/deserialization time ratio varies from 1 to the 128. The results of the simulations are shown in Fig. 4 (Sc. 1), Fig. 5 (Sc. 2) and Fig. 6 (Sc. 3). The graphs for all scenarios and all strategies show the same basic characteristic: growth of the total execution time as the ratio of agent execution time to agent serialization/de serialization time increases. The reason for this is evident: holding time increases with agent complexity. The difference between results obtained from different strategies is the speed of its growth. Each agent should be activated before execution and the strategy R3 with a single agent responsible for one node only is the best one in this respect. Such a conclusion will lead to the planning agent to define the triggering condition for R3 as low bandwidth & wide execution time span and make it applicable after detecting such situations (Sc. 1 and 2). Strategies R1, R4, and R6 have poor performance in slow networks because of intensive agent migration, while strategies R3 and R7 give acceptable total execution times (Sc. 1 and 2). With higher bandwidth available, strategies R2 and R6 become comparable to R3, because migration time has far less impact due to fast links (Sc. 3). Furthermore, faster networks compensate with higher agent ratio, making complex agents more attractive. Strategy R5 requires an triggering condition parallel capability.

7 Total execution time [ms] R1 R2 R3 R4 R5 R6 R7 Distribution strategies 1 10 Service execution time to serialization/deserialization time ratio Fig.5. Scenario 2: Simulation result for link bandwidth of 10 Mbit/s Total execution time [ms] R1 R2 R3 R4 R5 Distribution strategies R6 R Service execution time to serialization/deserialization time ratio Fig.6. Scenario 3: Simulation result for link bandwidth of 100 Mbit/s Optimized strategy R7 shows good performance in the worst conditions, i.e. in the case when the available bandwidth is low (Sc. 1 and 2). This discussion covers performance analysis assuming an ideal environment where software deployment and maintenance is completed as required. In reality, some agents might not perform as required due to network congestion, unavailable nodes, and errors or faults, leading to partial fulfilment of software deployment tasks. When detected, such events can be used as additional triggers for optimized strategies. 4 Conclusion An agent based framework for software deployment includes a multi-agent system with a planning agent and a team of operational agents. The intelligent planning agent needs to know the current state of system nodes and the network. Using this information, it can decide which strategy to choose in order

8 to obtain better performance characterists, i.e. acceptable total execution time. Simulations were performed to evaluate deployment strategies from the performance perspective. Three network scenarios were simulated with variations in the link bandwidth and the ratio of agent execution time to agent serialization/deserialization time. The obtained results demonstrate how bandwidth variation and agent complexity influence the total execution time. Future work will include further definition and implementation of the planning agent as a rational agent based on the BDI paradigm. Further on, robustness issues will be studied in order to exploit the full potential of an agent-based software deployment framework in a large scale environment. Acknowledgments. This work is part of research project Content Delivery and Mobility of Users and Services in New Generation Networks, supported by the Ministry of Science, Education and Sports of the Republic of Croatia. References 1. Sherif, M.H., Ho, S.: Evolution of operation support systems in public data networks. Computers and Communications, IEEE Symposium on 0 (2000) Houssos, N., Alonistioti, A., Merakos, L., Mohyeldin, E., Dillinger, M., Fahrmair, M., Schoenmakers, M.: Advanced adaptability and profile management framework for the support of flexible mobile service provision. Special Issue on (R)Evolution towards 4G Mobile Communication Systems 10(4) (August 2003) 3. Bettini, L., De Nicola, R., Loreti, M.: Software Update via Mobile Agent Based Programming. In: Proceedings of SAC, Special Track on Agents, Interactions, Mobility, and Systems, ACM Press (2002) Jezic, G., Kusek, M., Desic, S., Caric, A., Huljenic, D.: Multi agent remote maintenance shell for remote software operations. In: Grid Services Engineering and Management. Volume 2774 of LNAI., Springer-Verlag (2003) Dalpiaz, F., Giorgini, P., Mylopoulos, J.: Software self-reconfiguration: a bdibased approach. Proceedings of the 12th The Eight International Conference on Autonomous Agents and Multiagent Systems (2009) 6. Ventakesan, V., Portchlevic, V.: Architecture for services orchestration using bdi agent. ( ) 7. Lovrek, I., Caric, A., Huljenic, D.: Remote maintenance shell: Software operations using mobile agents. Proceedings of the International Conference on Telecommunications (2002) Sinkovic, V., Lovrek, I.: Generic model of a mobile agent network suitable for performance evaluation. In: KES. (2000) Jurasovic, K., Kusek, M.: Optimizing service distributions using a genetic algorithm. In: KES 08, Springer-Verlag (2008) Kusek, M., Jurasovic, K., Jezic, G.: Verification of the mobile agent network simulator - a tool for simulating multi-agent systems. International Journal of Software Engineering and Knowledge Engineering 18(5) (2008) Sinkovic, V., Kusek, M., Jezic, G., Lovrek, I.: Performance evaluation of a mobile agent network using network calculus. In: KES 08, Berlin, Heidelberg, Springer- Verlag (2008)

Performance Evaluation of Mobile Agent Network

Performance Evaluation of Mobile Agent Network Performance Evaluation of Mobile Agent Network Ignac LOVREK and Vjekoslav SINKOVIC University of Zagreb Faculty of Electrical Engineering and Computing, Department of Telecommunications HR-10000 Zagreb,

More information

Available online at ScienceDirect. Procedia Computer Science 35 (2014 )

Available online at   ScienceDirect. Procedia Computer Science 35 (2014 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 35 (214 ) 241 25 18 th International Conference on Knowledge-Based and Intelligent Information & Engineering Systems -

More information

A Finite State Mobile Agent Computation Model

A Finite State Mobile Agent Computation Model A Finite State Mobile Agent Computation Model Yong Liu, Congfu Xu, Zhaohui Wu, Weidong Chen, and Yunhe Pan College of Computer Science, Zhejiang University Hangzhou 310027, PR China Abstract In this paper,

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

Building Distributed Access Control System Using Service-Oriented Programming Model

Building Distributed Access Control System Using Service-Oriented Programming Model Building Distributed Access Control System Using Service-Oriented Programming Model Ivan Zuzak, Sinisa Srbljic School of Electrical Engineering and Computing, University of Zagreb, Croatia ivan.zuzak@fer.hr,

More information

Problems in Reputation based Methods in P2P Networks

Problems in Reputation based Methods in P2P Networks WDS'08 Proceedings of Contributed Papers, Part I, 235 239, 2008. ISBN 978-80-7378-065-4 MATFYZPRESS Problems in Reputation based Methods in P2P Networks M. Novotný Charles University, Faculty of Mathematics

More information

Migration Based Page Caching Algorithm for a Hybrid Main Memory of DRAM and PRAM

Migration Based Page Caching Algorithm for a Hybrid Main Memory of DRAM and PRAM Migration Based Page Caching Algorithm for a Hybrid Main Memory of DRAM and PRAM Hyunchul Seok Daejeon, Korea hcseok@core.kaist.ac.kr Youngwoo Park Daejeon, Korea ywpark@core.kaist.ac.kr Kyu Ho Park Deajeon,

More information

Implementation of a Wake-up Radio Cross-Layer Protocol in OMNeT++ / MiXiM

Implementation of a Wake-up Radio Cross-Layer Protocol in OMNeT++ / MiXiM Implementation of a Wake-up Radio Cross-Layer Protocol in OMNeT++ / MiXiM Jean Lebreton and Nour Murad University of La Reunion, LE2P 40 Avenue de Soweto, 97410 Saint-Pierre Email: jean.lebreton@univ-reunion.fr

More information

Investigation on OLSR Routing Protocol Efficiency

Investigation on OLSR Routing Protocol Efficiency Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova

More information

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS ABSTRACT Zhang Huijuan and Liu Kai School of Software Engineering, Tongji University, Shanghai, China

More information

Simulating a Finite State Mobile Agent System

Simulating a Finite State Mobile Agent System Simulating a Finite State Mobile Agent System Liu Yong, Xu Congfu, Chen Yanyu, and Pan Yunhe College of Computer Science, Zhejiang University, Hangzhou 310027, P.R. China Abstract. This paper analyzes

More information

FROM A RIGID ECOSYSTEM TO A LOGICAL AND FLEXIBLE ENTITY: THE SOFTWARE- DEFINED DATA CENTRE

FROM A RIGID ECOSYSTEM TO A LOGICAL AND FLEXIBLE ENTITY: THE SOFTWARE- DEFINED DATA CENTRE FROM A RIGID ECOSYSTEM TO A LOGICAL AND FLEXIBLE ENTITY: THE SOFTWARE- DEFINED DATA CENTRE The demand for cloud infrastructure is rapidly increasing, the world of information is becoming application and

More information

Configuration Management for Component-based Systems

Configuration Management for Component-based Systems Configuration Management for Component-based Systems Magnus Larsson Ivica Crnkovic Development and Research Department of Computer Science ABB Automation Products AB Mälardalen University 721 59 Västerås,

More information

Active Adaptation in QoS Architecture Model

Active Adaptation in QoS Architecture Model Active Adaptation in QoS Architecture Model Drago agar and Snjeana Rimac -Drlje Faculty of Electrical Engineering University of Osijek Kneza Trpimira 2b, HR-31000 Osijek, CROATIA Abstract - A new complex

More information

Generic and Domain Specific Ontology Collaboration Analysis

Generic and Domain Specific Ontology Collaboration Analysis Generic and Domain Specific Ontology Collaboration Analysis Frantisek Hunka, Steven J.H. van Kervel 2, Jiri Matula University of Ostrava, Ostrava, Czech Republic, {frantisek.hunka, jiri.matula}@osu.cz

More information

A Mobile Agent-based Model for Service Management in Virtual Active Networks

A Mobile Agent-based Model for Service Management in Virtual Active Networks A Mobile Agent-based Model for Service Management in Virtual Active Networks Fábio Luciano Verdi and Edmundo R. M. Madeira Institute of Computing, University of Campinas (UNICAMP), Campinas-SP, Brazil

More information

A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing

A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing Mare Lole and Branko Mikac Department of Telecommunications Faculty of Electrical Engineering and Computing,

More information

SPARE CAPACITY MODELLING AND ITS APPLICATIONS IN SURVIVABLE IP-OVER-OPTICAL NETWORKS

SPARE CAPACITY MODELLING AND ITS APPLICATIONS IN SURVIVABLE IP-OVER-OPTICAL NETWORKS SPARE CAPACITY MODELLING AND ITS APPLICATIONS IN SURVIVABLE IP-OVER-OPTICAL NETWORKS D. Harle, S. Albarrak, F. Ali Department of Electrical and Electronic Engineering, University of Strathclyde, U. K {d.harle,sbarrak,

More information

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Yingshu Li Department of Computer Science Georgia State University Atlanta, GA 30303 yli@cs.gsu.edu Donghyun Kim Feng

More information

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT PhD Summary DOCTORATE OF PHILOSOPHY IN COMPUTER SCIENCE & ENGINEERING By Sandip Kumar Goyal (09-PhD-052) Under the Supervision

More information

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile

More information

Design and Analysis of a Proactive Application Management System (PAMS)

Design and Analysis of a Proactive Application Management System (PAMS) Design and Analysis of a Proactive Application Management System (PAMS) Salim Hariri HPDC Laboratory The Department of Electrical and Computer Engineering, University of Arizona Tucson, AZ 85721, USA Hariri@ece.arizona.edu,

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

Discovering Periodic Patterns in System Logs

Discovering Periodic Patterns in System Logs Discovering Periodic Patterns in System Logs Marcin Zimniak 1, Janusz R. Getta 2, and Wolfgang Benn 1 1 Faculty of Computer Science, TU Chemnitz, Germany {marcin.zimniak,benn}@cs.tu-chemnitz.de 2 School

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

On the Deployment of AQM Algorithms in the Internet

On the Deployment of AQM Algorithms in the Internet On the Deployment of AQM Algorithms in the Internet PAWEL MROZOWSKI and ANDRZEJ CHYDZINSKI Silesian University of Technology Institute of Computer Sciences Akademicka 16, Gliwice POLAND pmrozo@go2.pl andrzej.chydzinski@polsl.pl

More information

A Software-Defined WAN is a Business Imperative

A Software-Defined WAN is a Business Imperative A Software-Defined WAN is a Business Imperative A CBTS White Paper Introduction: It s Time for the WAN to Evolve Almost every IT and business leader today is focused on creating a more agile business.

More information

CADIAL Search Engine at INEX

CADIAL Search Engine at INEX CADIAL Search Engine at INEX Jure Mijić 1, Marie-Francine Moens 2, and Bojana Dalbelo Bašić 1 1 Faculty of Electrical Engineering and Computing, University of Zagreb, Unska 3, 10000 Zagreb, Croatia {jure.mijic,bojana.dalbelo}@fer.hr

More information

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Fatiha Djemili Tolba University of Haute Alsace GRTC Colmar, France fatiha.tolba@uha.fr Damien Magoni University

More information

Hierarchical Addressing and Routing Mechanisms for Distributed Applications over Heterogeneous Networks

Hierarchical Addressing and Routing Mechanisms for Distributed Applications over Heterogeneous Networks Hierarchical Addressing and Routing Mechanisms for Distributed Applications over Heterogeneous Networks Damien Magoni Université Louis Pasteur LSIIT magoni@dpt-info.u-strasbg.fr Abstract. Although distributed

More information

CHAPTER 7 CONCLUSION AND FUTURE SCOPE

CHAPTER 7 CONCLUSION AND FUTURE SCOPE 121 CHAPTER 7 CONCLUSION AND FUTURE SCOPE This research has addressed the issues of grid scheduling, load balancing and fault tolerance for large scale computational grids. To investigate the solution

More information

A Hybrid Load Balance Mechanism for Distributed Home Agents in Mobile IPv6

A Hybrid Load Balance Mechanism for Distributed Home Agents in Mobile IPv6 A Hybrid Load Balance Mechanism for Distributed Home Agents in Mobile IPv6 1 Hui Deng 2Xiaolong Huang 3Kai Zhang 3 Zhisheng Niu 1Masahiro Ojima 1R&D Center Hitachi (China) Ltd. Beijing 100004, China 2Dept.

More information

Distributed Systems Conclusions & Exam. Brian Nielsen

Distributed Systems Conclusions & Exam. Brian Nielsen Distributed Systems Conclusions & Exam Brian Nielsen bnielsen@cs.aau.dk Definition A distributed system is the one in which hardware and software components at networked computers communicate and coordinate

More information

Virtualization and Softwarization Technologies for End-to-end Networking

Virtualization and Softwarization Technologies for End-to-end Networking ization and Softwarization Technologies for End-to-end Networking Naoki Oguchi Toru Katagiri Kazuki Matsui Xi Wang Motoyoshi Sekiya The emergence of 5th generation mobile networks (5G) and Internet of

More information

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Prashant Kumar Gupta M.Tech. Scholar, Computer Networks, Bhilai Institute of Technology, Durg (C.G.), India

More information

Online Optimization of VM Deployment in IaaS Cloud

Online Optimization of VM Deployment in IaaS Cloud Online Optimization of VM Deployment in IaaS Cloud Pei Fan, Zhenbang Chen, Ji Wang School of Computer Science National University of Defense Technology Changsha, 4173, P.R.China {peifan,zbchen}@nudt.edu.cn,

More information

Component-based Development Process and Component Lifecycle

Component-based Development Process and Component Lifecycle Journal of Computing and Information Technology - CIT 13, 2005, 4, 321-327 321 Component-based Development Process and Component Lifecycle Ivica Crnkovic 1, Stig Larsson 2 and Michel Chaudron 3 1 Mälardalen

More information

Combined Model for Congestion Control

Combined Model for Congestion Control Journal of Computing and Information Technology - CIT 14, 2006, 4, 337 342 doi:10.2498/cit.2006.04.10 337 Combined Model for Congestion Control Nguyen Hong Van 1, Oliver Popov 2, Iskra Popova 2 1 DSV,

More information

A Web Service Migration Framework

A Web Service Migration Framework A Web Service Migration Framework M. Mohanned Kazzaz Department of Information Systems Faculty of Information Technology Brno University of Technology Brno, Czech Republic Email: ikazzaz@fit.vutbr.cz Marek

More information

Knowledge-Defined Networking: Towards Self-Driving Networks

Knowledge-Defined Networking: Towards Self-Driving Networks Knowledge-Defined Networking: Towards Self-Driving Networks Albert Cabellos (UPC/BarcelonaTech, Spain) albert.cabellos@gmail.com 2nd IFIP/IEEE International Workshop on Analytics for Network and Service

More information

GROUP MANAGEMENT IN MOBILE ADHOC NETWORKS

GROUP MANAGEMENT IN MOBILE ADHOC NETWORKS American Journal of Applied Sciences 11 (7): 1059-1064, 2014 ISSN: 1546-9239 2014 K.S. Kumar et al., This open access article is distributed under a Creative Commons Attribution (CC-BY) 3.0 license doi:10.3844/ajassp.2014.1059.1064

More information

2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising

More information

Wavelength-Switched to Flex-Grid Optical Networks

Wavelength-Switched to Flex-Grid Optical Networks Book Chapter Review-Evolution from Wavelength-Switched to Flex-Grid Optical Networks Tanjila Ahmed Agenda ØObjective ØIdentifying the Problem ØSolution: Flex-Grid Network ØFixed-grid DWDM Architecture

More information

Implementation of a FIR Filter on a Partial Reconfigurable Platform

Implementation of a FIR Filter on a Partial Reconfigurable Platform Implementation of a FIR Filter on a Partial Reconfigurable Platform Hanho Lee and Chang-Seok Choi School of Information and Communication Engineering Inha University, Incheon, 402-751, Korea hhlee@inha.ac.kr

More information

CODING TCPN MODELS INTO THE SIMIO SIMULATION ENVIRONMENT

CODING TCPN MODELS INTO THE SIMIO SIMULATION ENVIRONMENT CODING TCPN MODELS INTO THE SIMIO SIMULATION ENVIRONMENT Miguel Mujica (a), Miquel Angel Piera (b) (a,b) Autonomous University of Barcelona, Faculty of Telecommunications and Systems Engineering, 08193,

More information

Minimal Test Cost Feature Selection with Positive Region Constraint

Minimal Test Cost Feature Selection with Positive Region Constraint Minimal Test Cost Feature Selection with Positive Region Constraint Jiabin Liu 1,2,FanMin 2,, Shujiao Liao 2, and William Zhu 2 1 Department of Computer Science, Sichuan University for Nationalities, Kangding

More information

The Virtual Machine Aware SAN

The Virtual Machine Aware SAN The Virtual Machine Aware SAN What You Will Learn Virtualization of the data center, which includes servers, storage, and networks, has addressed some of the challenges related to consolidation, space

More information

University of Groningen. Towards Variable Service Compositions Using VxBPEL Sun, Chang-ai; Aiello, Marco

University of Groningen. Towards Variable Service Compositions Using VxBPEL Sun, Chang-ai; Aiello, Marco University of Groningen Towards Variable Service Compositions Using VxBPEL Sun, Chang-ai; Aiello, Marco Published in: International Conference on Software Reuse IMPORTANT NOTE: You are advised to consult

More information

Infrastructure for Autonomous Mobile Robots Communication and Coordination

Infrastructure for Autonomous Mobile Robots Communication and Coordination 90 Work in Progress Session Infrastructure for Autonomous Mobile Robots Communication and Coordination Marcelo M. Sobral, Leandro B. Becker Dept of Automation and Systems Universidade Federal de Santa

More information

Performance Analysis of MANET Routing Protocols OLSR and AODV

Performance Analysis of MANET Routing Protocols OLSR and AODV VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz

More information

An agent-based peer-to-peer grid computing architecture

An agent-based peer-to-peer grid computing architecture University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2005 An agent-based peer-to-peer grid computing architecture J. Tang University

More information

Figure Minimum cost path

Figure Minimum cost path Research Article International Journal of Current Engineering and Technology ISSN 2277-4106 2013 INPRESSCO. All Rights Reserved. Available at http://inpressco.com/category/ijcet Application of Graph Theory

More information

WITH the evolution and popularity of wireless devices,

WITH the evolution and popularity of wireless devices, Network Coding with Wait Time Insertion and Configuration for TCP Communication in Wireless Multi-hop Networks Eiji Takimoto, Shuhei Aketa, Shoichi Saito, and Koichi Mouri Abstract In TCP communication

More information

Optimal Scheduling Algorithms for Communication Constrained Parallel Processing

Optimal Scheduling Algorithms for Communication Constrained Parallel Processing Optimal Scheduling Algorithms for Communication Constrained Parallel Processing D. Turgay Altılar and Yakup Paker Dept. of Computer Science, Queen Mary, University of London Mile End Road, E1 4NS, London,

More information

Dynamic Context Management and Reference Models for Dynamic Self Adaptation

Dynamic Context Management and Reference Models for Dynamic Self Adaptation Dynamic Context Management and Reference Models for Dynamic Self Adaptation Norha Villegas Icesi University (Colombia) and University of Victoria (Canada) Gabriel Tamura Icesi University (Colombia) Hausi

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

iserver Free Archimate ArchiMate 1.0 Template Stencil: Getting from Started Orbus Guide Software Thanks for Downloading the Free ArchiMate Template! Orbus Software have created a set of Visio ArchiMate

More information

ScienceDirect. Configuration of Quality of Service Parameters in Communication Networks

ScienceDirect. Configuration of Quality of Service Parameters in Communication Networks Available online at www.sciencedirect.com ScienceDirect Procedia Engineering 69 ( 2014 ) 655 664 24th DAAAM International Symposium on Intelligent Manufacturing and Automation, 2013 Configuration of Quality

More information

Detection of Missing Values from Big Data of Self Adaptive Energy Systems

Detection of Missing Values from Big Data of Self Adaptive Energy Systems Detection of Missing Values from Big Data of Self Adaptive Energy Systems MVD tool detect missing values in timeseries energy data Muhammad Nabeel Computer Science Department, SST University of Management

More information

University Course Timetabling Using ACO: A Case Study on Laboratory Exercises

University Course Timetabling Using ACO: A Case Study on Laboratory Exercises University Course Timetabling Using ACO: A Case Study on Laboratory Exercises Vatroslav Dino Matijaš, Goran Molnar, Marko Čupić, Domagoj Jakobović, and Bojana Dalbelo Bašić Faculty of Electrical Engineering

More information

Performance Study of Routing Algorithms for LEO Satellite Constellations

Performance Study of Routing Algorithms for LEO Satellite Constellations Performance Study of Routing Algorithms for LEO Satellite Constellations Ioannis Gragopoulos, Evangelos Papapetrou, Fotini-Niovi Pavlidou Aristotle University of Thessaloniki, School of Engineering Dept.

More information

Decentralization of BPEL Using Various Processes.

Decentralization of BPEL Using Various Processes. Decentralization of BPEL Using Various Processes. A.V.A Sushama Sarvani M.Tech Student, Department of CSE Vignan'sNirula Institute of Technology and Science for Women, Pedapalakaluru, Guntur-522 005 ABSTRACT:

More information

Why the Cloud is the Network

Why the Cloud is the Network Why the Cloud is the Network By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by VeloCloud Executive Summary Mission critical enterprise applications are moving to the cloud, driving the need

More information

Dynamic Minimal Spanning Tree Routing Protocol for Large Wireless Sensor Networks

Dynamic Minimal Spanning Tree Routing Protocol for Large Wireless Sensor Networks Dynamic Minimal Spanning Tree Routing Protocol for Large Wireless Sensor Networks Guangyan Huang 1, Xiaowei Li 1, and Jing He 1 Advanced Test Technology Lab., Institute of Computing Technology, Chinese

More information

Trace Driven Simulation of GDSF# and Existing Caching Algorithms for Web Proxy Servers

Trace Driven Simulation of GDSF# and Existing Caching Algorithms for Web Proxy Servers Proceeding of the 9th WSEAS Int. Conference on Data Networks, Communications, Computers, Trinidad and Tobago, November 5-7, 2007 378 Trace Driven Simulation of GDSF# and Existing Caching Algorithms for

More information

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group

More information

Dynamic Partial Reconfigurable FIR Filter Design

Dynamic Partial Reconfigurable FIR Filter Design Dynamic Partial Reconfigurable FIR Filter Design Yeong-Jae Oh, Hanho Lee, and Chong-Ho Lee School of Information and Communication Engineering Inha University, Incheon, Korea rokmcno6@gmail.com, {hhlee,

More information

Curriculum for the Bachelor's Degree Programme in Software Development National section

Curriculum for the Bachelor's Degree Programme in Software Development National section Curriculum for the Bachelor's Degree Programme in Software Development National section Contents 1. Programme structure... 3 2. Core areas of study... 3 2.1 Large-scale system development... 3 2.2 Databases

More information

QUT Digital Repository:

QUT Digital Repository: QUT Digital Repository: http://eprints.qut.edu.au/ This is the accepted version of this conference paper. To be published as: Ai, Lifeng and Tang, Maolin and Fidge, Colin J. (2010) QoS-oriented sesource

More information

Lazy Agent Replication and Asynchronous Consensus for the Fault-Tolerant Mobile Agent System

Lazy Agent Replication and Asynchronous Consensus for the Fault-Tolerant Mobile Agent System Lazy Agent Replication and Asynchronous Consensus for the Fault-Tolerant Mobile Agent System Taesoon Park 1,IlsooByun 1, and Heon Y. Yeom 2 1 Department of Computer Engineering, Sejong University, Seoul

More information

G BAM: A Generalized Bandwidth Allocation Model for IP/MPLS/DS-TE Networks

G BAM: A Generalized Bandwidth Allocation Model for IP/MPLS/DS-TE Networks International Journal of Computer Information Systems and Industrial Management Applications. ISSN 2150-7988 Volume 6 (2014) pp. 635-643 MIR Labs, www.mirlabs.net/ijcisim/index.html G BAM: A Generalized

More information

AN APPROACH FOR LOAD BALANCING FOR SIMULATION IN HETEROGENEOUS DISTRIBUTED SYSTEMS USING SIMULATION DATA MINING

AN APPROACH FOR LOAD BALANCING FOR SIMULATION IN HETEROGENEOUS DISTRIBUTED SYSTEMS USING SIMULATION DATA MINING AN APPROACH FOR LOAD BALANCING FOR SIMULATION IN HETEROGENEOUS DISTRIBUTED SYSTEMS USING SIMULATION DATA MINING Irina Bernst, Patrick Bouillon, Jörg Frochte *, Christof Kaufmann Dept. of Electrical Engineering

More information

Distributed Runtime Verification of JADE and Jason Multiagent Systems with Prolog?

Distributed Runtime Verification of JADE and Jason Multiagent Systems with Prolog? Distributed Runtime Verification of JADE and Jason Multiagent Systems with Prolog? Daniela Briola, Viviana Mascardi, and Davide Ancona DIBRIS, Genoa University, Italy daniela.briola,viviana.mascardi,davide.ancona@unige.it

More information

A Review: Optimization of Energy in Wireless Sensor Networks

A Review: Optimization of Energy in Wireless Sensor Networks A Review: Optimization of Energy in Wireless Sensor Networks Anjali 1, Navpreet Kaur 2 1 Department of Electronics & Communication, M.Tech Scholar, Lovely Professional University, Punjab, India 2Department

More information

The Industrial Intranet: a Cause For Change

The Industrial Intranet: a Cause For Change The Industrial Intranet: a Cause For Change by S Graham, Schneider Automation Electricity + Control March 2000 Most plant data collection applications today use a batch approach, where data is transmitted

More information

TCP START-UP BEHAVIOR UNDER THE PROPORTIONAL FAIR SCHEDULING POLICY

TCP START-UP BEHAVIOR UNDER THE PROPORTIONAL FAIR SCHEDULING POLICY TCP START-UP BEHAVIOR UNDER THE PROPORTIONAL FAIR SCHEDULING POLICY J. H. CHOI,J.G.CHOI, AND C. YOO Department of Computer Science and Engineering Korea University Seoul, Korea E-mail: {jhchoi, hxy}@os.korea.ac.kr

More information

Consulting Solutions WHITE PAPER Citrix XenDesktop XenApp Planning Guide: Virtualization Best Practices

Consulting Solutions WHITE PAPER Citrix XenDesktop XenApp Planning Guide: Virtualization Best Practices Consulting Solutions WHITE PAPER Citrix XenDesktop XenApp Planning Guide: Virtualization Best Practices www.citrix.com Overview Desktop virtualization comprises of many different types of virtual desktops.

More information

Application of intelligent agents in channel allocation strategies for mobile networks

Application of intelligent agents in channel allocation strategies for mobile networks Application of intelligent agents in channel allocation strategies for mobile networks Eliane L. Bodanese and Laurie G. Cuthbert Department of Electronic Engineering Queen Mary and Westfield College -

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

Multiprocessor Scheduling Using Parallel Genetic Algorithm

Multiprocessor Scheduling Using Parallel Genetic Algorithm www.ijcsi.org 260 Multiprocessor Scheduling Using Parallel Genetic Algorithm Nourah Al-Angari 1, Abdullatif ALAbdullatif 2 1,2 Computer Science Department, College of Computer & Information Sciences, King

More information

Basic Concepts of Reliability

Basic Concepts of Reliability Basic Concepts of Reliability Reliability is a broad concept. It is applied whenever we expect something to behave in a certain way. Reliability is one of the metrics that are used to measure quality.

More information

Layer 3: Network Layer. 9. Mar INF-3190: Switching and Routing

Layer 3: Network Layer. 9. Mar INF-3190: Switching and Routing Layer 3: Network Layer 9. Mar. 2005 1 INF-3190: Switching and Routing Network Layer Goal Enable data transfer from end system to end system End systems Several hops, (heterogeneous) subnetworks Compensate

More information

Chapter 5 INTRODUCTION TO MOBILE AGENT

Chapter 5 INTRODUCTION TO MOBILE AGENT Chapter 5 INTRODUCTION TO MOBILE AGENT 135 Chapter 5 Introductions to Mobile Agent 5.1 Mobile agents What is an agent? In fact a software program is containing an intelligence to help users and take action

More information

Innovative Strategy of SOMA Control Parameter Setting

Innovative Strategy of SOMA Control Parameter Setting Innovative Strategy of SOMA Control Parameter Setting PAVEL VAŘACHA Tomas Bata University in Zlin Faculty of Applied Informatics nam. T.G. Masaryka 5555, 76 1 Zlin CZECH REPUBLIC varacha@fai.utb.cz http://www.fai.utb.cz

More information

Data Storage in Sensor Networks for Multi-dimensional Range Queries

Data Storage in Sensor Networks for Multi-dimensional Range Queries Data Storage in Sensor Networks for Multi-dimensional Range Queries Ji Yeon Lee 1, Yong Hun Lim 2, Yon Dohn Chung 3,*, and Myoung Ho Kim 4 1 E-Government Team, National Computerization Agency, Seoul, Korea

More information

Towards ParadisEO-MO-GPU: a Framework for GPU-based Local Search Metaheuristics

Towards ParadisEO-MO-GPU: a Framework for GPU-based Local Search Metaheuristics Towards ParadisEO-MO-GPU: a Framework for GPU-based Local Search Metaheuristics N. Melab, T-V. Luong, K. Boufaras and E-G. Talbi Dolphin Project INRIA Lille Nord Europe - LIFL/CNRS UMR 8022 - Université

More information

EXAMINING OF RECONFIGURATION AND REROUTING APPROACHES: WDM NETWORKS

EXAMINING OF RECONFIGURATION AND REROUTING APPROACHES: WDM NETWORKS International Journal of Information Technology and Knowledge Management January-June 2012, Volume 5, No. 1, pp. 69-72 EXAMINING OF RECONFIGURATION AND REROUTING APPROACHES: WDM NETWORKS Sushil Chaturvedi

More information

Workload Characterization using the TAU Performance System

Workload Characterization using the TAU Performance System Workload Characterization using the TAU Performance System Sameer Shende, Allen D. Malony, and Alan Morris Performance Research Laboratory, Department of Computer and Information Science University of

More information

Chapter 3. Design of Grid Scheduler. 3.1 Introduction

Chapter 3. Design of Grid Scheduler. 3.1 Introduction Chapter 3 Design of Grid Scheduler The scheduler component of the grid is responsible to prepare the job ques for grid resources. The research in design of grid schedulers has given various topologies

More information

VisualNet: General Purpose Visualization Tool for Wireless Sensor Networks

VisualNet: General Purpose Visualization Tool for Wireless Sensor Networks VisualNet: General Purpose Visualization Tool for Wireless Sensor Networks S. Rizvi and K. Ferens Department of Electrical and Computer Engineering University of Manitoba Winnipeg, Manitoba, Canada Ken.Ferens@ad.umanitoba.ca

More information

Constraints in Particle Swarm Optimization of Hidden Markov Models

Constraints in Particle Swarm Optimization of Hidden Markov Models Constraints in Particle Swarm Optimization of Hidden Markov Models Martin Macaš, Daniel Novák, and Lenka Lhotská Czech Technical University, Faculty of Electrical Engineering, Dep. of Cybernetics, Prague,

More information

Panel: Research on Complex Enterprise Systems of Systems. Complex Adaptive Systems Conference 14-NOV-2013

Panel: Research on Complex Enterprise Systems of Systems. Complex Adaptive Systems Conference 14-NOV-2013 Panel: Research on Complex Enterprise Systems of Systems Complex Adaptive Systems Conference 14-NOV-2013 Dan DeLaurentis School of Aeronautics & Astronautics and Center for Integrated Systems in Aerospace

More information

Performance Assessment of Wavelength Routing Optical Networks with Regular Degree-Three Topologies of Minimum Diameter

Performance Assessment of Wavelength Routing Optical Networks with Regular Degree-Three Topologies of Minimum Diameter Performance Assessment of Wavelength Routing Optical Networks with Regular Degree-Three Topologies of Minimum Diameter RUI M. F. COELHO 1, JOEL J. P. C. RODRIGUES 2, AND MÁRIO M. FREIRE 2 1 Superior Scholl

More information

Network Design Considerations for Grid Computing

Network Design Considerations for Grid Computing Network Design Considerations for Grid Computing Engineering Systems How Bandwidth, Latency, and Packet Size Impact Grid Job Performance by Erik Burrows, Engineering Systems Analyst, Principal, Broadcom

More information

Semantic agents for location-aware service provisioning in mobile networks

Semantic agents for location-aware service provisioning in mobile networks Semantic agents for location-aware service provisioning in mobile networks Alisa Devlić University of Zagreb visiting doctoral student at Wireless@KTH September 9 th 2005. 1 Agenda Research motivation

More information

Agent-oriented Semantic Discovery and Matchmaking of Web Services

Agent-oriented Semantic Discovery and Matchmaking of Web Services Agent-oriented Semantic Discovery and Matchmaking of Web Services Ivan Mećar 1, Alisa Devlić 1, Krunoslav Tržec 2 1 University of Zagreb Faculty of Electrical Engineering and Computing Department of Telecommunications

More information

Realizing the Promise of SANs

Realizing the Promise of SANs Business without interruption. Realizing the Promise of SANs Bill North Director, Storage Network Programs Strategic Initiatives Group VERITAS Software Education Committee Chairman Storage Network Industry

More information

Semantic Web in a Constrained Environment

Semantic Web in a Constrained Environment Semantic Web in a Constrained Environment Laurens Rietveld and Stefan Schlobach Department of Computer Science, VU University Amsterdam, The Netherlands {laurens.rietveld,k.s.schlobach}@vu.nl Abstract.

More information

Time-Triggered Ethernet

Time-Triggered Ethernet Time-Triggered Ethernet Chapters 42 in the Textbook Professor: HONGWEI ZHANG CSC8260 Winter 2016 Presented By: Priyank Baxi (fr0630) fr0630@wayne.edu Outline History Overview TTEthernet Traffic Classes

More information

Evaluation of Commercial Web Engineering Processes

Evaluation of Commercial Web Engineering Processes Evaluation of Commercial Web Engineering Processes Andrew McDonald and Ray Welland Department of Computing Science, University of Glasgow, Glasgow, Scotland. G12 8QQ. {andrew, ray}@dcs.gla.ac.uk, http://www.dcs.gla.ac.uk/

More information