AN APPROACH FOR FAULT MANAGEMENT BASED ON AUTONOMIC COMPUTING PLUS MOBILE AGENTS

Similar documents
Autonomic Computing. Pablo Chacin

INTELLIGENT SYSTEMS OVER THE INTERNET

Self-Adaptive Middleware for Wireless Sensor Networks: A Reference Architecture

Planning for Performance Assurance No Longer an Afterthought

Chapter 5 INTRODUCTION TO MOBILE AGENT

Identifying and Preventing Distributed-Denial-Of-Service Attacks

International Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN

Vortex OpenSplice. Python DDS Binding

S5 Communications. Rev. 1

Towards an Adaptive and Intelligent MPLS Network

1 Mobile Agents. 2 What is a Mobile Agent? 2.1 Mobile agent = code + state

Video AI Alerts An Artificial Intelligence-Based Approach to Anomaly Detection and Root Cause Analysis for OTT Video Publishers

SOLUTION BRIEF NETWORK OPERATIONS AND ANALYTICS. How Can I Predict Network Behavior to Provide for an Exceptional Customer Experience?

Executing Evaluations over Semantic Technologies using the SEALS Platform

Monitoring Multicast Traffic in Wireless Heterogeneous Networks

Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery

System Models. 2.1 Introduction 2.2 Architectural Models 2.3 Fundamental Models. Nicola Dragoni Embedded Systems Engineering DTU Informatics

SNMP Basics BUPT/QMUL

ITIL Event Management in the Cloud

Ultra-high-speed In-memory Data Management Software for High-speed Response and High Throughput

Part I: Future Internet Foundations: Architectural Issues

Networking for a smarter data center: Getting it right

Cisco SP Wi-Fi Solution Support, Optimize, Assurance, and Operate Services

Critical Systems. Objectives. Topics covered. Critical Systems. System dependability. Importance of dependability

Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV

Design and Analysis of a Proactive Application Management System (PAMS)

Cisco IOS Classic Firewall/IPS: Configuring Context Based Access Control (CBAC) for Denial of Service Protection

ARC VIEW. Critical Industries Need Active Defense and Intelligence-driven Cybersecurity. Keywords. Summary. By Sid Snitkin

Announcements. me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris

CYBERSECURITY FOR STARTUPS AND SMALL BUSINESSES OVERVIEW OF CYBERSECURITY FRAMEWORKS

Introduction to Mobile Ad hoc Networks (MANETs)

Unified management of heterogeneous sensors for complex event processing

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Managing Agent Platforms with AgentSNMP

Networking for a dynamic infrastructure: getting it right.

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS

SPECTRUM MPLS Transport Manager

Cisco ISR G2 Management Overview

Wireless Sensor Networks --- Concepts and Challenges

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

Medical practice: diagnostics, treatment and surgery in supercomputing centers

SD-WAN: A Simplified Network for Distributed Enterprises

How can we gain the insights and control we need to optimize the performance of applications running on our network?

Trust4All: a Trustworthy Middleware Platform for Component Software

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

Figure 1: Ad-Hoc routing protocols.

Unicast Routing. Information About Layer 3 Unicast Routing CHAPTER

Wireless Sensor Networks --- Concepts and Challenges

Cisco EnergyWise: Power Management Without Borders

Grid Computing with Voyager

2/18/2009. Introducing Interactive Systems Design and Evaluation: Usability and Users First. Outlines. What is an interactive system

TRW. Agent-Based Adaptive Computing for Ground Stations. Rodney Price, Ph.D. Stephen Dominic TRW Data Technologies Division.

CyberP3i Course Module Series

Data Communication. Chapter # 1: Introduction. By: William Stalling

Jade: Java Agent DEvelopment Framework Overview

MANAGEMENT ASPECTS OF A HYBRID FIBER COAXIAL (HFC) NETWORK by Gojo Strkic, Mark Chapman Philips Broadband Networks Inc.

A Study of Future Internet Applications based on Semantic Web Technology Configuration Model

A tutorial report for SENG Agent Based Software Engineering Course Instructor: Dr. Behrouz H. Far. Mobile Agents.

Broker Clusters. Cluster Models

Cisco EnergyWise Optimize and Cost Saving. Traditional IT Power Management

Active Adaptation in QoS Architecture Model

Unifying Agent and Component Concepts - Jadex Active Components

Virtualization and Softwarization Technologies for End-to-end Networking

Application of Autonomous Mobile Agents to Provide Security in Wireless Networks

Chapter 3 Managing System Settings

Basic Concepts of Reliability

SNMP and Network Management

CSCD 433/533 Advanced Networks

Routing Protocols in MANET: Comparative Study

Header Compression Capacity Calculations for Wireless Networks

A framework to evaluate 5G networks for smart and fail-safe communications

When, Where & Why to Use NoSQL?

D DAVID PUBLISHING. Big Data; Definition and Challenges. 1. Introduction. Shirin Abbasi

CE4031 and CZ4031 Database System Principles

System Requirements VERSION 2.5. Prepared for: Metropolitan Transportation Commission. Prepared by: April 17,

Caching Use Cases in the Enterprise

A Firewall Architecture to Enhance Performance of Enterprise Network

System models for distributed systems

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0. Feature and Technical Overview

Outline Network Management MIB naming tree, MIB-II SNMP protocol Network management in practice. Network Management. Jaakko Kotimäki.

Cisco 5921 Embedded Services Router

Challenges for Future Networked Embedded Systems

LAN-WAN-LAN end-to-end Network Simulation with NS2

Diagnostics in Testing and Performance Engineering

International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: Issue 2, Volume 2 (February 2015)

EPRO. Electric Infrastructure Protection Initiative EPRO BLACK SKY SYSTEMS ENGINEERING PROCESS

Chapter 3. Design of Grid Scheduler. 3.1 Introduction

Dealing with Artifact-Centric Systems: a Process Mining Approach

Introduction to Systems and Network Management

Application Oriented Networks: An SOA Perspective

Fully Distributed Service Configuration Management

The power quality intelligent monitoring system based on cloud computing Jie Bai 1a, Changpo Song 2b

CE4031 and CZ4031 Database System Principles

TOWARDS A CONCEPTUAL FRAMEWORK FOR DIGITAL DOSSIER MANAGEMENT IN CRIMINAL PROCEEDINGS

SBG-1000 SMART COMMUNICATIONS SMART BUSINESSES

The Establishment of Large Data Mining Platform Based on Cloud Computing. Wei CAI

A service based on Linked Data to classify Web resources using a Knowledge Organisation System

F O U N D A T I O N. OPC Unified Architecture. Specification. Part 1: Concepts. Version 1.00

Dana Sinno MIT Lincoln Laboratory 244 Wood Street Lexington, MA phone:

W H I T E P A P E R : O P E N. V P N C L O U D. Implementing A Secure OpenVPN Cloud

Transcription:

AN APPROACH FOR FAULT MANAGEMENT BASED ON AUTONOMIC COMPUTING PLUS MOBILE AGENTS Sergio Armando Gutiérrez, Ms.Eng 1, John Willian Branch, PhD 2 12 Facultad de Minas, Universidad Nacional de Colombia, Sede Medellín Email: saguti jwbranch@unal.edu.co Abstract - In this paper, a new approach for Fault Management, based on the autonomic computing paradigm and mobile agents technology is introduced. The main features of this approach are discussed, its main benefits are presented and some result of its application are evaluated.. Keywords: Autonomic computing, mobile agents, expert systems, fault management 1 Introduction The capacity of detecting failures in a given system is a very important challenge which arises in many engineering disciplines. When dealing with expensive equipment s, large and complex systems, or an infrastructure on which critical services or processes depend, requirements of availability and reliability increase dramatically. This is a reason why fault management becomes a very important research topic in areas such as chemical, aerospatial, nuclear, and electrical engineering, among many others [1]. An emergent field in which expensive equipment and critical systems arise is telecommunications (TELCO). Today s TELCO networks are very complex systems involving hundreds and even thousands of components, every one having multiple variables and features to be evaluated in order to assess how well the services running on them are performing. Due to need of quality service, and because of the growing dependency that organizations and people have on these services, networks (and the infrastructure and platforms where services run), need to have a high degree of availability as well as the capacity to react to failures and problems which might arise during their operation. Every day, critical mission is becoming a more commonly used term for designating the infrastructure which is used to run TELCO services. Critical mission means that systems should be available 100% of the time, and must not be interrupted under any circumstance, as an interruption might mean that a critical process cannot be performed [2]. This requirement of high availability implies that any event associated to failures in any component of the system be managed in such a way that the degradation or unavailability of a system be avoided or minimized as much as possible. This is the reason why fault management has become a big issue in the field of operation and engineering. As in many cases, the ability of human operators and supervisors is not quick and efficient enough to respond in the best way to the event of a failure. This work presents an alternative to conventional fault management based on Expert Systems by using two emergent technologies as Mobile Agents and Autonomic Computing 2 Fundamentals 2.1 Autonomic Computing Autonomic Computing is a concept inherited from bioinspired computing in its beginnings. The first work where Autonomy Oriented Computing is introduced is the work by Liu et al [3]. This work defines the fundamentals of Autonomy in computing and the four main characteristics which should be exhibited by a computing system according to this paradigm: Autonomy: The entities in the system are rational individuals, which are capable to act in an independent way; in other words, the system does not have a central component and manager. Emergent: When system entities cooperate and work together, they exhibit behaviors not available or possible to obtain by individual entities separately. Adaptive: System components are capable to modify their behavior according to changes present in the environment where system operates. Self-organized: The system components are capable to organize themselves to achieve the previous commented behaviors. This paper also presents the several types of Autonomy Oriented Computing according to how autonomy is achieved by the system. In Jin and Liu [4], Autonomy Oriented Computing is formally defined, by employing set notation to express the concepts associated: Environment, computing entity, state, behavior, goal are some of the concepts which are expressed in a formal language. From a more applied point of view, and again from a bioinspired perspective, Horn [5] presents the approach to Autonomic Computing from perspective of a industry leader as IBM.

Following Horn, there are eight keys elements which has an Autonomic Computing System: Self-Awareness: This is, the system should know itself. It will need detailed knowledge of its components, current status, ultimate capacity, and all connections with other systems to govern itself. It will need to know the extent of its owned resources, those it can borrow or lend, and those that can be shared or should be isolated. Self-Configuration: System configuration or setup must occur automatically. Also, the system must modify itself, in such a way that its configuration be the most adequate to cope with environment conditions. Self-Optimization: This is, the system will always try to find other ways to improve its functioning. It will monitor its constituent parts and fine-tune workflow to achieve predetermined system goals. Self-Healing: System must be able to recover from events that might cause malfunctioning. The system also must be able to detect problem or potential problems, and according to this, define alternate ways to perform, applying reconfiguration to keep the system working. Self-Protection: Starting from the fact of the potentially aggressive and hostile environment where system resides, it must be able to detect, protect and identify potential attacks or vulnerabilities, so that it can protect itself and maintaining working in a secure and consistent state. Self-adaptability: This is, the system must know its environment, the context which surrounds it when operating, and the other entities cohabitating with it. It must be able to adapt to this environment, and its changing conditions, by reconfiguring itself or optimizing itself. Openness: The components in system must be open to communicate each other, and must be able to work with shared technologies. Proprietary solutions are not compatible with Autonomic Computing philosophy. Self-containment: Components within an Autonomic Computing System must be able to perform the task or tasks they have assigned, not requiring external interventions for the performing itself, and hiding the complexity to end user. Complementing the work by Horn, Lin et al [6] review Autonomic Computing from the perspective of Software Engineering. They present a proposal of metrics which could be used to evaluate the quality of frameworks based on Autonomic Computing. In other side, the works of Sterritt [7], Magedanz et al [8], Ionescu et al [9] and Tizghadam et al [10] evidentiate how Autonomic Computing has become a very important research topic in the field of Information Technologies, both for academic communities and for industries, in solving many problems which are becoming difficult to face with traditional and conventional approaches. 2.2 Mobile Agents Agents are enjoying a lot of popularity as a novel abstraction for structuring distributed applications. It is a technology from the field of Artificial Intelligence. Although, there is not a precise and widely adopted definition for Agents, the tendency is define it through the features they should expose [11]. Following to Yubao and Renyuan [12], an agent is an entity possessing the following characteristics: Self-government: Agents should have the ability to governate themselves, without external interference from the outside world while they are performing their tasks. Smart: Agents should implement certain functions and be able to choose the required information to complete their tasks. They also should be able to get knowledge from the performing of their tasks. Lasting: The agents should survive, according to their participation in the tasks. Co-relation: This is the social behavior defined by theoretical definitions. In real world, the cooperation is presented as messages exchange among the agents in the system. Figure 1 presents a classification of software agents according their functions, their properties, or other relevant features which can be assigned to them. Specifically, a feature relevant in the approach to be proposed is mobility. That is, the capacity of the agent to move itself autonomously across the environment where it runs, with the goal to execute its designated task at other locations where be required. Figure 1: Software Agent Classification [12] 3 Proposed Architecture For the goal of offering high availability and reliability on critical systems, increasing the reliability of Fault Management (FM) component or components is a very important goal to achieve. The elements detecting Faults, with the goal of detect them, isolating them or event correct them should become very smart and reliable, and should adapt to the complexity of the systems where they are meant to be used.

The approach to FM which is proposed consists in implementing Mobile Agents (MA), which exhibit the eight fundamental features of AC defined by Horn [Horn, 2001]. These agents will be designated to monitor specific resources, and will use a Knowledge Database which will store criteria defining faults for the associated resource. According to these criteria, the agents will be able to anticipate to faults on the component, by analyzing and detecting patterns on the designated assess metrics for the resource and by means of mobility feature, agents would be able to move across the system to monitor the designated resource at other locations. The architecture for the proposed approach is composed by the following components: Knowledge Database (KDB): Is a database containing the criteria which are going to use by the agents to determine faults and how to react before them. Data Collector (DC): It is a component which will receive the data coming from the agents, and will send them information regarding changes in the criteria for fault detection. Mobile Agent (MA): It is an agent which will perform the actions on the resource and will traverse the network monitoring similar resources in other hosts. Managed Resource (MR): It is the resource in the hosts which will be supervised by the agents, for possible faults and problems in its performance. This resource can be a hardware element, a software element, or the behavior of a particular metric or behavior. Figure 2 illustrates the architecture. what kind of files to delete. Also, according to the functionality which performs the system component, the collected data would be useful to predict that a failure is yet to come, and so, indicate a proactive action triggered on the MA. Data collector would be the entity which communicates with the MA. It will have two purposes. The first, collect the data from the MA, by receiving on them, or by triggering a data query to them. The other will be to perform smart analysis on data collected, and if possible, to modify the criteria of fault detection and notify these changes on criteria to MA. For example, if MR is a filesystem, the data collector could analyze the growing rate of a particular file and predict that it might cause a failure by full filesystem and notify this to MA. Also, the data collector would be useful to notify exceptions to MA, so that they could ignore the application of a criteria. The DC could be an agent itself. Mobile Agent would be the entity performing the detection and correction of failures on the hosts. It would be implemented in such a way to apply criteria to solve faults in a particular resource, and it could choose to travel or to clone itself to send a copy of itself to another host requiring supervision in the same resource. Managed Resource would be the system component under supervision and control by Mobile Agents. It might be a hardware or software element, or even a service or task. 4 Experiments and Results The present section describes de tests performed to validate the advantages of the proposed approach for fault management. For these tests, a preliminary implementation of the proposed approach was performed, and run on a typical platform for the voice over IP Service. Two aspects were assessed. The time required to detect a failure, and the bandwidth consumed. For the validation of the approach proposed in this work, a typical platform in the Voice over IP Services was chosen. This kind of platform was chosen, because of its criticity, and the relationships established between the components, which tend to induce failures in the other components, when a problem occurs. The figure 3 depicts the testbed which was used for the implementation. Figure 2: Proposed approach architecture. Database as mentioned, will have two purposes. First, it will be to contain the data reported by the agents, for example, whenever it performs a correction because of a failure, or according to periodic monitoring if defined. The other purpose will be to store rules or instructions defining the criteria to act when a faulty behavior is detected. For example, if a failure is a filesystem full, the criteria could be what files to delete, or

Figure 3: Testbed platform For the implementation of the agents, the used tool was JADE, a very popular framework for implementing Mobile Agents on Java Programming Language. For the testing, three scenarios were defined and tested. The three scenarios consist in inducing failures on a Resource node, and measuring the time used to detect (and correct) the failure. 4.1 Full filesystem event On the first scenario, the first failure to be induced was a filesystem full on Relational Database. The failure was induced by creating an increasing size file, by means of an infinite loop script which concatenated 1MB files to an existing file until the whole filesystem was filled. The SNMP based detection was performed by running a shell script which invocated snmpwalk system command once every second, querying the OID referencing the filesystem to be monitored. For the agent scenario, platform was started up, and a monitor agent was created on the supervised host, indicating it what filesystem to monitor. For this first test, no action was defined for the monitoring agent at startup time. At failure occurrence, DCA instructed the agent the action to perform, which in in this case was deleting the file causing the filesystem full. Table 1 presents the results of the execution of this test scenario. Table 1 : Data for the test of full filesystem fault at database The SNMP based detection was performed by running a shell script which invocated snmpwalk system command once every second, querying the OID referencing the entry of the process within the system process table exposed through SNMP. For the agent scenario, platform was started up, and a monitor agent was created on the supervised host, indicating the name of the executable associated to process. In this case, a single process was monitored, although the approach is valid for multiple instances of same process. For this test, no action was defined for the monitoring agent at start time. At failure occurrence, DCA instructed the monitoring agent to restart the process. Table 2 presents the results of the test for a system dead process. Table 2: Data of the test of dead system process at SIP Server 4.3 Network interface missconfiguration The second test scenario is the detection of a missconfiguration within the Mediaserver. The failure is induced by modifying the network interface configuration, changing the duplex mode from full to half. This is a very common error on this kind of equipments, and usually causes malfunction in the service it offers. The SNMP based detection was performed by running a shell script which invocated snmpwalk system command once every second, querying the OID referencing the duplex mode of the main network interface of the mediaserver. In this case, the monitoring script was capable, after detecting the error, to perform a correction by setting the parameter of duplex mode, by executing snmpset system command. For the agent scenario, platform was started up, and a monitor agent was created on the supervised host, indicating the name of the main network interface in the host. For this test, no action was defined for the monitoring agent at start time. At failure occurrence, DCA instructed the monitoring agent to reconfigure the network interface. Table 3 presents the results of the execution of this test scenario. 4.2 Dead system process The second test scenario is the detection of a dead process within the SIP Proxy. The failure is induced by killing the process, making it disappears from system processes table.

Table 3: Data of the test of network interface missconfiguration at mediaserver. 5 Results Discussion In this section, a discussion on the results obtained from the tests will be presented. A very important point to state is the fact that in the first two tests, besides of the fault detection, from the information that DCA returns at failure occurrence, the agent is capable to perform an action to correct the fault condition. The concept behind the implemented platform is providing the agents with logic and actions (behaviors) allowing that, from the information provided by the DCA in this case, they be capable to apply corrections. In the standard implementation, SNMP based detection is not capable to correct complex faults as it should have external mechanisms to apply any correction. SNMP can solve very specific faults, if the correction consists in modifying a single variable, as seen on the third scenario, where the script could restore the network interface configuration. In the other cases, an autonomous correction y means of SNMP is not possible, and the intervention of a human operator is required. The fault correction is reactive, not proactive. The agents implementation, by default is capable to provide mechanisms to apply corrections when particular types of faults are detected. Also, because of the local memory the agents have, they can try to apply corrections when faults are detected, without the need to ask for information to DCA, in an autonomous way. The agents, provided information to react to faults are capable to apply corrections in a proactive way. The traditional approaches, based on SNMP, are just based on notifications, and focused on alarm and notification triggering, leaving the action performed to correct the fault condition itself to an external entity (usually a human operator). It can be observed that the elapsed time, measured since monitoring was started until the fault condition was detected (and corrected), is a longer for agents than for SNMP. This can be explained as the agent platform (main container and satellital container) require some time for its initialization. In SNMP case, monitoring starts by just run the script executing snmpwalk. The average packet size is also greater for agents than SNMP because the network transport protocol that agent platform uses. JADE uses TCP for the communication, different to SNMP, which uses UDP. The usage of TCP as communication protocol in the agent platform increases the reliability of monitoring, as delivery of messages is guaranteed, and monitoring agents do not require to have additional logic for handling message delivery. Another fact which can be observed is that agent approach requires less packets to be exchanged. As the agent communicates with DCA only for notifications and initialization tasks, and not for monitoring per se, less traffic is required. For SNMP, more packets are required, as the decision to detect the fault is taken at monitoring station, not in the monitored resource itself. Briefing, from the point of view of the two variables assessed, the proposed approach, based on agents, shows to be more efficient, by exhibiting lower times to detect the fault, less traffic requirements, and besides, provides added value by the capability of executing and performing proactive corrective actions, to eliminate and avoid the fault conditions. 6 Conclusions In this work, an approach for fault management using Autonomic Computing and Mobile Agents has been proposed. This approach ha showed to offer more advantages than conventional approaches by exhibiting the following features. From the architectural point of view, it is not server centric, as traditional systems, usually based on a master component which queries satelital agents to obtain information. Although the proposed approach has a master component, the monitoring agents do not require the communication with this component to perform their tasks, as they are designed to operate in autonomous way. It provides self-learning capacities. Traditional systems just report the fault by triggering an alarm when a threshold is reached, or when the fault itself arises, but they lack of efficient mechanisms to correct the fault. The agents in the proposed approach have the capacity to analyze causes of the detected problems, and perform further actions to avoid the fault occurrence. It provides a richer communication protocol among the involved entities, allowing having a detailed information regarding facts and actions to be performed. The concept of agents ontology provides a very robust mechanism for the communication protocol regarding message formats and interpretation. Traditional approaches are based on a simple request/response protocol, with very strict and limited message formats. It provides mobility, which allows to monitoring agents to move across the network to detect and correct faults. Traditional systems are based on static monitoring systems, which are confined to run at a single host. These features present a system which is very suitable for platforms as the ones used in Telecommunications service, which nowadays require high levels of availability because of the criticity of

the services they offer. Also, the implementation of the features previously mentioned contribute to improve the task of fault management, by providing added value to monitoring tasks, and correction for some of the limitations of traditional approaches. 7 References [1] I. Hwang, S. Kim, Y. Kim, and C. E. Seah, A survey of fault detection, isolation, and reconfiguration methods, IEEE Transactions on Control Systems Technology, vol. 18, pp. 636 653, 2010 [11] S. Franklin and A. Graesser, It s an agent or just a program?: A taxonomy for autonomous agents, in Proceedings of the Third International Workshop on Agent Theories, Architectures, and Languages,, 1996. [12] M. Yubao and D. Renyuan, Mobile agent technology and its application in distributed data mining, in First International Workshop on Database Technology and Applications, 2009. [2] T. Fujisaki, M. Hamada, and K. Kageyama, A scalable fault-tolerant network management system built using distributed object technology, in Proc. First International Enterprise Distributed Object Computing Workshop., 1997. [3] J. Liu, K. Tsui, and J. Wu, Introducing autonomy oriented computation, in Proceedings of First International Workshop on Autonomy Oriented Computation, 2001. [4] X. L. Jin and J. M. Liu, Agents and Computational Autonomy: Potential, Risks, and Solutions., ch. From Individual Based Modeling to Autonomy Oriented Computation, pp. 151 169. University of Bath, 2004. [5] P. Horn, Autonomic computing: Ibm s perspective on the state of information technology, tech. rep., IBM Corp, 2001. [6] P. Lin, A. MacArthur, and J. Leaney, Defining autonomic computing: A software engineering perspective, in Proc. of the 2005 Australian Software Engineering Conference (ASWEC 05), 2005. [7] Sterritt, R. (2001). Discovering rules for fault management. In Proc.Eighth Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems, 2001. ECBS 2001. [8] T. Magedanz, Report on FET consultation meeting on communication paradigms for 2020, tech. Rep., Fraunhoffer FOKUS, 2004. [9] D. Ionescu, B. Solomon, M. Litoiu, and M. Mihaescu, A robust autonomic computing architecture for server virtualization, in International Conference on Intelligent Engineering Systems, 2008. INES 2008. [10] A. Tizghadam and I. A. Leon-Garcia, Autonomic traffic engineering for network robustness, IEEE journal on selected areas in communications, vol. 28, pp. 39 50, 2010.