SlideShare una empresa de Scribd logo
1 de 14
Descargar para leer sin conexión
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014
DOI : 10.5121/ijcnc.2014.6309 107
DOMAIN-PARTITIONED ELEMENT MANAGEMENT
SYSTEMS EMPLOYING MOBILE AGENTS FOR
DISTRIBUTED NETWORK MANAGEMENT
Anish Saini1
& Atul Mishra2
1
Assistant Professor, Department of Computer Science & Engineering, Echelon Institute
of Technology, Faridabad, INDIA
2
Associate Professor, Department of Computer Engineering, YMCA University of
Science & Technology Faridabad, INDIA
ABSTRACT
Network management systems based on mobile agents are efficiently a better alternative than typical
client/server based architectures. Centralized management models like SNMP or CMIP based management
models suffer from scalability and flexibility issues which are addressed to great extent by flat bed or static
mid-level manager models based on mobile agents, yet the use of mobile agents to distribute and delegate
management tasks for above stated agent-based management frameworks like initial flat bed models and
static mid-level managers cannot efficiently meet the demands of current networks which are growing in
size and complexity. In view of the above mentioned limitations, we proposed a domain partitioned network
management model based-on mobile agent & Element Management Systems in order to minimize
management data flow to a centralized server. Intelligent agent allocated to specific EMS performs local
network management and reports the results to the superior manager and finally the global manager
performs global network management using those submitted management results. Experimental results of
various scenarios of the proposed model have been presented to support the arguments given in favor of the
prototype system based on mobile agents.
KEYWORDS
Mobile agents, Network Management, Distributed, SNMP, Scalability
1. INTRODUCTION
The need for data communication has evolved rapidly since the earliest days of computing.
Industrial enterprises are increasingly dependent upon networked system serving their
information backbones. A typical organization model of a network management system is based
on SNMP[1][2] Client/Server architecture. It consists of two major components: network agent
process and the network manager process. The network agent process resides on the managed
network devices such as routers, switches, servers etc. The network manager is housed on the
NMS station from where it manages the various devices, by accessing the management
information, through the agents residing on them as shown in Figure 1. The management
information consists of collection of managed objects, stored in Management Information Base
(MIB). Based on SNMP model, the management of networks from the Network Operation
Centers (NOC) is mostly done by a Network Manager which deploys several element
management system(EMS). EMSs in turn manage their specific zones or domains. These EMSs
provide ISO’s five functional categories: Fault Management, Configuration Management,
Accounting, Performance Management and Security Management. Network Manager acts as a
client to the EMSs, which in turn act as network manager to network devices for retrieval and
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014
108
provisioning of data. The data retrieved by EMSs are stored in databases on the EMSs platforms
and used for management of network devices
These existing management models traditionally adopt a centralized, Client/Server (C/S)
approach wherein the management application, with the help of a manager, acting as clients,
periodically accesses the data collected by a set of software modules, agents, placed on network
devices by using an appropriate protocol.
These centralized architectures suffer from the lack of scalability and flexibility. Furthermore, the
staleness of gathered data (due to network latency involved) and probable error in the selection of
management task being carried over (owing to the staleness of data) reduces the reliability of the
management applications. Thus, controlling and managing the traffic in these networks is a
challenging task [3].
Figure 1. SNMP Model
In view of the above mentioned limitations, we proposed a domain partitioned network
management model based-on mobile agent & Element Management Systems in order to minimize
management data flow to a centralized server. Intelligent agent allocated to specific EMS
performs local network management and reports the results to the superior manager and finally
the global manager performs global network management using those submitted management
results.
The Mobile Agent (MA) paradigm has emerged within the distributed computing field. The term
MA refers to autonomous programs with the ability to move from host to host to resume or restart
their execution and act on behalf of users towards the completion of a given task.[4] One of the
most popular topics in MA research community has been distributed NM [5][6][7], wherein MAs
have been proposed as a means to balance the burden associated with the processing of
management data and decrease the traffic associated with their transfers (data can be filtered at
the source).
Goldszmidit et al [8], introduces the concept of management by delegation, the management
station can extend the capability of the agents at runtime thereby invoking new services and
dynamically extending the ones present in the agent on the device. Mobile agent based strategies
have distinct advantages over the others as it allowed for easy programmability of remote nodes
by migrating and transferring functionality wherever it is required.
Bellavista[9] et al. proposed a secure and open mobile agent environment, MAMAS (Mobile
Agents for the Management of Applications and Systems) for the management of networks,
services and systems. Sahai & Morin [10] introduce the concept of mobile network managers
(MNM), which is a location independent network manager and assists the administrator to
remotely control his/her managed network, through launching MAs to carry out distributed
SNMP RESPONSE
NETWORK
MANAGEMENT
STATION
NETWORK
ELEMENT
(AGENT
DEVICE)
SNMP TRAP
SNMP REQUEST
MDB MIB
SNMP Community
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014
109
management tasks. In, Oliveira and Lopes propose how the integration of MA-based sub-system
could be carried out in the IETF’s DISMAN framework. In [11], I. Satoh proposes how a network
and application independent MA based framework could be designed. Manoj Kumar Kona et al.
[12] described an SNMP based efficient mobile agent network management structure, in order to
cooperate with conventional management system;
For transferring less network monitoring data and managing devices more effectively, Damianos
Gavalas et al.[5] propose a scalable and flexible MA based platform for network management;
MAGENTA (Mobile AGENT environment for distributed Applications) introduces Mobile
Network Manager (MNM) which is a location independent network manager [13].
Figure 2. Management Entity & Interaction Model
The network managers in this architecture utilize client- server technology and/or mobile agent
technology as and when required depending on the functionality implemented and their location.
CLIENT-1
MANAGEMENT
APPLICATION
CLIENT-N
MANAGEMENT
APPLICATION
CONFIG FILE NMD
CONFIG File NMD
G
N
M
SPAWN CHILD
M-SNLMS
SPAWN CHILD
M-SNLMS
M-
SNLM
M-
SNLM
M-
SNLM
RPT MGMT
DATA
RPT MGMT
DATA
MANAGE
NMD
EMS
MANAGE
NMDEMS
MANAGE
NMDEMS
PUBLIC SUBSCRIBE MESSAGING BUS
SUBSCRIBE
SUBSCRIBE
SUBNET-1
AGENT
MIBAGENT
MIB
AGENT
MIB
SUBNET-2
AGENT
MIBAGENT
MIB
AGENT
MIB
SUBNET-N
AGENT
MIBAGENT
MIB
AGENT
MIB
PUBLISH
PUBLISH
PUBLISH
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014
110
Damianos Gavalas et al.[4] proposed a hierarchical and scalable management model where
middle managers are themselves mobile and based on certain policies they dynamically segment
the network and deploy other mobile middle managers for data collection.
2. HIGH LEVEL DESIGN OF EMS BASED NETWORK MANAGEMENT MODEL
DEPLOYING MOBILE AGENTS
A.K. Sharma et al. proposed IMASNM model [16] which discusses strategies for large scale
network partitioning, fixing of management scope and deployment of mobile M-SNLMs in
various sub-network domains. In IMASNM hierarchal network management model, the mobile
managers (M-SNLMs) move in their domains and manages network device with a flat bed model
scheme. The manager works with quite good efficiency if the size of domain falls in a specified
range. If the domain size increases from that specified range then efficiency of network manager
goes down due to management cost of flat bed model which is the main problem of IMASNM
model.
Considering above, we proposed an EMS based mobile agent network management model shown
in Figure 2. In this scheme, the managed network is divided into many domains based on the
geographical layout of the network or number of nodes a manager can efficiently manage or
average load on the entire network or certain kind of administrative relationship. In each domain,
an Element manager is appointed and for the overall managed network a set of various
management applications along with a network manager acting as a Global Network Manager
(GNM) are appointed. Element managers (EM) exist at the lowest level of the managers’
hierarchy. Each Element manager controls and monitors a set of network element
(SONET/DWDM/Ethernet) via specialized protocol independent mediators as shown in Figure 3.
After initial discovery of the network, EMS keeps database changes in the sub-network by means
of publish/subscribe paradigm. Additionally a hierarchy of
Mobile-Subnetwork Layer Manager (M-SNLM) is appointed in between the GNM and leaf-level
EMSs. First levels of M-SNLMs (appointed by GNM) are dispatched to platforms where EMSs
are running. M-SNLMs along with EMSs take over a portion of the network from their parent M-
SNLMs and act as local managers for that portion of the network for all management needs.
Depending upon the growth in their domain, M-SNLMs spawn additional child M-SNLMs for
scalable management of the network. M-SNLMs not only interact with the EMSs they are
assigned to but also could visit other EMSs platforms depending upon the need as they are mobile
agents in themselves
Highlights of the Proposed Model
EMS based domain partitioned network management system based-on mobile agent has many
technology advantages over conventional network fault management system and other MA based
network management models presented by researchers.
Earlier work presented by researchers [5][16] assumed the presence of mobile agent
runtime environment on the network devices. This may not be true for many telecomm
elements and legacy devices. Proposed model make the architecture independent of this
constraint.
Earlier models [5][16] dispatch data agents to devices in the sub-network and bear a cost
associated with it. Proposed model saves this cost by retrieving that data from the
database present on the EMS platform only. It also controls the number of mobile agents
present in the system as a given M-SNLM can not only manage its assigned domain but
can also visit other domains and interact with EMSs to manage the network.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014
111
Bottleneck problem of convention centralized network management are addressed and
static communication problems in distributed network is solved efficiently. The basic
concept which is adopted in this framework is: “M-SNLMs solve problems locally and
the supervisors/parent M-SNLMs worry about the issues which are propagated to them.”
Figure 3. Management Entity & Interaction Model
The proposed architecture is based on mobile agent technology with the advantages:
Balancing of Network loads,
The framework is adaptive with network size change,
The feature of mobile agents disconnecting with GNM when working on managed
devices saves bandwidth effectively. In addition, mobile agents are endurable with
network state and they can execute continually after network recovery, it is also what
mobile agent technology exceeds other network management technologies.
The proposed architecture is based on mobile agent technology Proposed model offers a
hierarchical network management model that can reduce network management
complexity and minimize the management data transferred to and fro in the network.
PROP
Agent
NE
EM SERVICES
SOFTWARE
MANAGEMENT
FAULT
MANAGEMENT
PERFORMANCE
MANAGEMENT
CONFIGURATION
MANAGEMENT
SECURITY
MANAGEMENT
MO1 MO2 MO3 MO4
PERFORMANCE
MANAGEMENT
DATABASE
MANAGED
DATABASE
ALARM
DATABASE
SESSION MANAGEMENT AND
COMMUNICATION SUB-SYSTEM
SESSION
MANAGEMENT
COMMUNICATI
ON
MANAGEMENT
MEDIATION LAYER
SNMP
SNMP
Agent
NE
SNMP
Agent
NE
CMIP
CMIP
Agent
NE
CMIP
Agent
NE
TL 1
TL 1 Agent
NE
TL 1P
Agent
NE
PROP.
PROP
Agent
NE
CONNECTOR TO
PROTOCOL
STACKS
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014
112
3. PERFORMANCE ANALYSIS
Many a times there arises a situation in network monitoring activities where one or two MIB
variables representing some managed object may not be able to give good assessment of the issue
(like performance degradation, signal failure, packet loss etc.). However, we need to access
multiple parameters and then make an assessment. In order to carry out the performance analysis
of the model presented in this work a bandwidth and throughput utilization function known as
health function (HF) [6] which is essentially an aggregate of multiple MIB variable. In this five
MIB-II [15] managed objects are combined to define the percentage E(t) of IP packets discarded
over the total number of packets sent within a specific time interval as shown in Equation 1
E(t) = {(ipOutDiscards + ipOutNoRoutes + ipFragFails) / (ipOutRequests +
ipForwDatagram)}*100 .....(1)
In simple client/server based SNMP model, either we have to issue five get requests to retrieve
the values or at the best we would issue a single get request and the response would carry all the
five parameters with their value. Back at manager level the value of E(t) would be computed and
necessary action would be planned. As suggested by Damianos Gavalas et al.[4] MAs can
compute HFs locally thereby providing a way to semantically compress large amount of data (five
variables, their IODs and return values and other SNMP Req/Res overheads) in a single value
returned to the manager, thereby relieving it from processing NM data, while MAs state size
remains as small as possible. But in case we have to compute this value for a collection of nodes,
MAs would have to travel to these nodes and we need to bear the cost presented in [16].
The proposed mechanism offers an EMS database solution where we could issue a simple SQL
query so that the needed values could be computed in a far less time and far less cost. For
example, the E(t) function shown in Equation (1), a simple SQL query similar to shown below
can easily compute the function value at database level itself. With appropriate measures taken as
schema design level like (indexes and data arrangement) similar SQL across series of nodes could
be carried out at fraction of the cost that a mobile agent based flat bed model would incur.
Consider the HealthFunction given below as a view or some database schema table
ipOutDiscard ipOutNoRoutes ipFragFails ipOutRequest ipForwDatagram
The corresponding SQL query would be as shown below:
SELECT ipOutDiscards + ipOutNoRoutes + ipFragFails AS “Packet Discarded”, ipOutRequests
+ ipForwDatagram AS “Total Packets”,Packet Discarded / Total Packets AS “Health
Function” From HealthFunction Where NE = `xxxx`;
4. NETWORK MANAGEMENT COST CALCULATION FOR THE PROPOSED
MODEL
The Network management cost for IMASNM Model is discussed in details by A.K. Sharma et. al.
[16] and has been used here as basis for cost calculation for the proposed model. The network
management cost calculation for the proposed model as shown in Equation (2) involves not only
the management traffic cost i.e. (messages between the managers and sub-domain managers) but
also the cost of setting up the managers as per the initial discovery of the network.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014
113
CTOTAL = CSETUP + CMGMTTR .....(2)
Where
CSETUP: cost for discovering the network and deploying the managers – both M- SNLM
& EMS.
CMGMTTR: cost of a typical polling to know whole network status at top most level.
CSETUP: the cost for discovering the network and deploying the managers – both M-
SNLM & EMS is computed as shown in Equation (3)
CSETUP = CMSNLM + CEMS .....(3)
The cost of setting up the top level M-SNLMs managers as per the initial discovery of the
network would be computed as shown in Equation (4)
CM-SNLM =∑ ∑ ‫ܨ‬ ݄, ݆ ‫כ‬ ‫ܣܯ‬ ܵ݅‫݁ݖ‬ெିଵ
௝ୀଵ
௅
௛ୀଵ ......(4)
Where
MASize: Size of mobile manager,
L: Number of mother manager in the network,
M: Number of child managers in the sub domains of hth
mother manager and
Fh,j: Sum of all the link cost coefficient between hth
mother manager to jth
child
manager’s sub domain.
The element managers would discover the domain element details in client/server mode and store
the data in the EMS platform data for the agents visiting their platforms. The cost for setting up
such platforms across the network would be computed as shown in Equation (5)
CEMS = {∑ ‫ܭ‬ 0,1 ‫כ‬ ሺܵ‫ݍ݁ݎ‬ ൅ ܵ‫ݏ݁ݎ‬ሻሽ ‫כ‬ ‫ܯ‬ ‫כ‬ ‫ܮ‬ே
௜ୀଵ .....(5)
Where
N: the no. of devices under the management of a given EMS,
L: Number of mother manager in the network,
M: Number of child managers in the sub domains of a mother manager
It may be noted that the deployment cost of the proposed model is higher than the IMASNM
Model as cost of EMS gets added to the mobile-manager deployment. But as suggested in the
proposed model architecture that it is a onetime cost and once the EMSs discover the network.
They keep the data fresh through publish/subscribe interface. So for long term polling operations
this cost could be ignored.
As discussed in IMASNM [16] model the management traffic cost for various polling operations
is given as shown in Equation (6)
CMGMTTR = ∑ ∑ ‫,݄ܨ‬ ݆ሺ‫ݏ݁ݎܣܯ‬ሻ ൅ ∑ ‫ܳܥ‬ொ
௝ୀଵ
ெିଵ
௝ୀ଴
௅
௛ୀଵ .....(6)
Where
MAres: Size of message sent by child to mother manager to report network health of its
underlying domain,
CQ: Flat bed model cost for Qth
domain’s M-SNLM.
CQ = MDASize*(RQ+1)*KQ .....(7)
Where
MDASize: Size of mobile data agent,
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014
114
RQ: number of managed node is Qth
domain and KQ : link coefficient of link’s of Qth
domain.
It may be noted that the flat bed cost increases in proportion to the cost coefficient of the links as
well as number of nodes being managed in a given sub-domain. In the proposed model, the SQL
performed by M-SNLMs would be local only and the cost incurred by flat bed model could be
saved in total.
Hence, under the assumption that the cost of sql query would be far less than the cost of
managing a domain by flat-bed model approach, the polling cost of the entire network could be
computer as shown in Equation (8).
CMGMTTR = ∑ ∑ ‫,݄ܨ‬ ݆ሺ‫ݏ݁ݎܣܯ‬ሻெିଵ
௝ୀ଴
௅
௛ୀଵ .....(8)
Ignoring the one time setup cost, Equation (2) could be shown as
CTOTAL ≈ CMGMTTR (which is already optimised)
5. EXPERIMENT RESULTS
To support the management cost calculation presented in the previous section an experimental
setup deploying Aglet version 2.0.2 as mobile agent platform, WebNMS Agent Toolkit Java
Edition 6 for MIB design and manipulation, jdk1.6.0_13 as java runtime and MYSQL database
was used. Experimental setup calculated the management cost in terms of time taken for
management activity.
For experiment results we consider three scenarios:
Scenario 1: Client/Server setup: Figure 4 shows the simple client server model, where the static
manager sends the SNMP request to agents, which sends the SNMP response back to manager.
Node0 acts as M-SNLM for a sub-network and it collects information from nodes (node 1, node 2
…) in its domain using req/resp mechanism.
Scenario 2: Flat-bed model: Figure 6 shows the Flat-Bed model in which the mobile agents are
responsible for accessing information by visiting one node to another. Node0 acting as M-SNLM
dispatches the mobile agents for collecting the information from all the nodes in its domain and
which they do in a flat-bed fashion and finally return back to Node0.
Scenario 3: Hybrid model: Figure 8 shows the “Hybrid model using EMS” in which the data is
accesses from MYSQL database through SQL queries. The M-SNLM collects the information
from nodes in its domain and keeps it in the database. The data is kept in sync with the nodes
through simple publish/subscribe model. Whenever this M-SNLM is inquired from upper layer it
simply queries the database and returns the result.
In the proposed experimental setup we calculate time for 50 get request & response for an
Integer32 data type which is made by static manager (node 0) to static MIB agent (node 1, node 2,
…) running on each node
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014
115
Figure 4. Experimental Setup for C/S network management model
TABLE I. EXPERIMENT RESULT OF CLIENT/SERVER BASED NETWORK MODEL
S. no Time1 Time2 Time3
1. 179 249 113
2. 159 145 122
3. 159 268 150
4. 239 131 210
5. 141 129 112
6. 422 144 88
7. 166 117 120
8. 71 195 322
9. 185 188 169
10. 91 137 227
11 152 164 100
12. 398 198 279
13. 221 188 138
14. 199 109 130
Average 198 168 162
Time1, Time2 and Time3 are respectively for
Node1, Node2 and Node3. All times in
milliseconds.
NODE 3
SNMP REQUEST &
RESPONSE PACKET
Configurations:
Node 0, Node 1, Node 2 Node 3:--
Processor: Intel Core i3 2.4GHz,
RAM: 3 GB,
Operating System: 64 bit Window7
STATIC MANAGER
JVM
SNMP
STATIC
AGENT
MIBMIB MIB
SNMP
STATIC
AGENT
SNMP
STATIC
AGENT
NODE 1 NODE 2
NODE 0
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014
116
Figure 4 is experimental setup for scenario 1 which is a client/server based network management
model. WebNMS toolkit is used for generating the client server applications for this setup. Table
I show the experimental results of client server based model and figure 5 shows the corresponding
graph.
Figure 5. Graph of table I data values
Figure 6. Experimental Setup for Flat- Bed model
Figure 6 is experimental setup for scenario 2 which is a MA based network management model.
Aglet platform is used to send mobile agent from one node to another.
0
50
100
150
200
250
300
350
400
450
1
3
5
7
9
11
13
Average
Time 1
Time 2
Time 3
NODE 3
AGLETSD
AT :4434
MAP
SNMP
STATIC
AGENT
MIB
NODE 0
NODE 1
AGLETS
D AT
:4434
MAP
SNMP
STATIC
AGENT
MIB
NODE 2
AGLETSD
AT :4434
MAP
SNMP
STATIC
AGENT
MIB
AGLETS
D AT
:4434
MAP
SNMP REQUEST &
RESPONSE PACKET
MOBILE AGENT PATH
Configurations:
Node 0, Node 1, Node 2 Node 3:--
Processor: Intel Core i3 2.4GHz,
RAM: 3 GB,
Operating System: 64 bit Window7
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014
117
TABLE II. EXPERIMENT RESULT OF MOBILE AGENT BASED NETWORK MODEL
S. no Time1 Time2 Time3
1. 290 191 199
2. 193 327 308
3. 328 125 381
4. 315 582 310
5. 304 539 316
6. 274 355 338
7. 266 265 281
8. 339 116 378
9. 237 176 200
10. 263 224 206
11 219 207 282
12. 230 292 194
13. 321 190 260
14. 308 218 216
15. 263 402 383
Average 276 280 283
Time1, Time2 and Time3 are respectively for
Node1, Node2 and Node3. All times in
milliseconds.
Figure 7. Graph of table II data values
Table II show the experimental results of mobile agent based model and figure 7 shows the
corresponding graph.
0
100
200
300
400
500
600
700
Time 1
Time 2
Time 3
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014
118
Figure 8. Experimental Setup for Hybrid model using ENMS
TABLE III. EXPERIMENT RESULT OF MOBILE AGENT BASED NETWORK MODEL ACCESSING MYSQL DATABASE
S. no Time1 Time2 Time3
1. 122 39 31
2. 47 31 31
3. 143 46 47
4. 31 25 19
5. 16 31 15
6. 30 23 18
7. 27 19 20
8. 44 33 32
9. 32 31 31
10. 16 31 16
11 44 35 34
12. 35 31 16
13. 30 20 20
14. 30 27 20
Average 46 30 25
Time1, Time2 and Time3 are respectively for Node1,
Node2 and Node3. All times in milliseconds.
NODE 0
NODE 1
AGLETSD
AT :4434
MAP
SNMP
STATIC
MIB
AGLETSD
AT :4434
MAP
SNMP
STATIC
MIB
NODE 2
AGLETSD
AT :4434
MAP
SNMP
STATIC
MIB
NODE 3
AGLETSD
AT :4434
MAP
SNMP REQUEST & RESPONSE
PACKET
MOBILE AGENT PATH
MYSQL DATABASESQL QUERY
Configurations:
Node 0, Node 1, Node 2 Node 3:--
Processor: Intel Core i3 2.4GHz,
RAM: 3 GB,
Operating System: 64 bit Window7
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014
119
Figure 9. Graph of table 5.1 data values
In figure 8 node 0 is accessing values of 3 nodes i.e node1, node2, and node 3. Node 0 is also
querying MYSQL database for the values which are stored in it, to do any operation. Table III
shows time taken to access a value from MYSQL database.
6. CONCLUSIONS
The experimental results obtained in the previous section clearly show that client server based
network management models takes less time as compare to mobile agent based models for a small
size network. As the network grows in size client server based request and response put heavy
load on network whereas mobile agents who operate locally at respective agent or node perform
much better then client server. Moreover the model deploying database at the M-SNLM side
performs even better than the mobile agent model. In client server model the management cost in
terms of the data transferred to the Global manager for the whole network is directly proportional
to the following factors:
Number of requests and responses to fetch the data remotely
Cost coefficient of the links on which information is exchanged.
The number of MIB accessed.
Whereas in the proposed model, EMSs manage the domains locally thereby minimizing the cost
incurred due to costly inter-domain link traversal of mobile agents. The cost of managing flat bed
model is also taken away as SQL interface will fetch the needed data from EMSs database and it
will be kept in sync with network elements by publish/subscribe interfaces and as the
experimental results also proves that MYSQL queries takes less time as comapre to mobile agent.
This simple experimental result shows that proposed EM based model would scale much better
than Client/Server as well as IMASNM model.
REFERENCES
[1] Y. Yemini, “The OSI Network Management Model”, IEEE Communications Magazine, vol.31, no.5,
pp.20-29. May 1993.
[2] W. Stallings, SNMP, SNMPv2, SNMPv3 and RMON 1 and 2, third ed. Addison Wesley, 1999.
[3] M. D’Arienzo, A. Pescape, and G. Ventre, “Dynamic Service Management in Heterogeneous
Networks”, JNSM: Vol. 12, No.3, 2004.
[4] D. Gavalas, D. Greenwood, M. Ghanbari and M. O’Mahony, “Hierarchical network management:
A scalable and dynamic mobile agent-based approach.” Computer Networks, 38: 693-711, 2002.
0
20
40
60
80
100
120
140
160
1 3 5 7 9 11 13 15
Time 1
Time 2
Time 3
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014
120
[5] D. Gavalas, G.E. Tsekouras, and C. Anagnostopoulos, “A mobile agent platform for distributed
network and system management”, Journal of Systems and Software, Vol 82, pp. 355-371, 2009
[6] Mydhili K Nair and V. Gopalakrishna, “Applying Web Services with Mobile Agents For Computer
Network Management”, International Journal of Computer Networks and Communications (IJCNC),
Vol. 3, No. 2, pp 125-144, March, 2011.
[7] S.S. Manvi and P. Venkataram, “Agent based subsystem for multimedia communications”. IEEE
Proceedings Software Journal 153 (1), 38–48, 2006.
[8] G. Goldszmidt, “Distributed Management by Delegation”, In Proceedings of the 15th International
conference on Distributed Computing Systems, 1995.
[9] P. Bellavista, A. Corradi and C. STefanelli, “An open secure mobile agent framework for systems
management.” Journal of Network and System management, 7:323-339, 2003.
[10]Akhil Sahai Christine Morin “Enabling a mobile network manager through mobile agents”
[11]I. Satoh, “Building and selecting mobile agents for network management.”, International Journal of
Network and Systems Management 14 (1), 147–169. March, 2006
[12]M. K. Kona and C. Z. Xu, “A Framework for Network Management Using Mobile Agents”, Parallel
and Distributed Processing Symposium, Proceedings International, pp. 227-234, IPDPS 2002.
[13]for Next Generation Telecommunications”, INFOCOM ’96, pp.24-28, 1996.
[14]Singh, V., Mishra, A., and Sharma, A.K. 2010. “A Mobile Agent Based Framework for Network
Management System”, International Conference on Computer Engineering and Technology, ICCET’
2010
[15]McCloghrieK., Rose M., “Management Information Base for Network Management of TCP/IP-based
Internets: MIB-II”, RFC 1213, March 1991.
[16]Sharma, A.K., Mishra A., Singh V.,“An Intelligent Mobile-Agent Based Scalable Network
Management Architecture for Large-Scale Enterprise System”, International Journal of Computer
Networks and Communications (IJCNC), Vol. 4, No. 1, pp 79-95, January, 2012.

Más contenido relacionado

La actualidad más candente

Chapter 1 introduction to scaling networks
Chapter 1   introduction to scaling networksChapter 1   introduction to scaling networks
Chapter 1 introduction to scaling networksJosue Wuezo
 
The Importance of an Integrated Network Management System
The Importance of an Integrated Network Management SystemThe Importance of an Integrated Network Management System
The Importance of an Integrated Network Management SystemIRIS Network Systems
 
Transaction processing, techniques
Transaction processing, techniquesTransaction processing, techniques
Transaction processing, techniquesijcsa
 
Self-Managed Micro-Containers for Service-Based Applications in the Cloud
Self-Managed Micro-Containers for Service-Based Applications in the CloudSelf-Managed Micro-Containers for Service-Based Applications in the Cloud
Self-Managed Micro-Containers for Service-Based Applications in the CloudMeryem Wannassi
 
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...ijcncs
 
A novel architecture for sdn based cellular network
A novel architecture for sdn based cellular network A novel architecture for sdn based cellular network
A novel architecture for sdn based cellular network ijwmn
 
Performance Enhancement of VNSIP approach, using MCAC algorithm
Performance Enhancement of VNSIP approach, using MCAC algorithmPerformance Enhancement of VNSIP approach, using MCAC algorithm
Performance Enhancement of VNSIP approach, using MCAC algorithmijcncs
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
An approach of software engineering through middleware
An approach of software engineering through middlewareAn approach of software engineering through middleware
An approach of software engineering through middlewareIAEME Publication
 
16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSNDhaya kanthavel
 
The real time publisher subscriber inter-process communication model for dist...
The real time publisher subscriber inter-process communication model for dist...The real time publisher subscriber inter-process communication model for dist...
The real time publisher subscriber inter-process communication model for dist...yancha1973
 
Unit 1 network management
Unit 1 network managementUnit 1 network management
Unit 1 network managementbhavikaorg
 
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...ijcncs
 
Performance evaluation of the mobility management towards 4 g wireless netwo
Performance evaluation of the mobility management towards 4 g wireless netwoPerformance evaluation of the mobility management towards 4 g wireless netwo
Performance evaluation of the mobility management towards 4 g wireless netwoIAEME Publication
 
Client server computing in mobile environments
Client server computing in mobile environmentsClient server computing in mobile environments
Client server computing in mobile environmentsPraveen Joshi
 

La actualidad más candente (20)

Chapter30
Chapter30Chapter30
Chapter30
 
Chapter 1 introduction to scaling networks
Chapter 1   introduction to scaling networksChapter 1   introduction to scaling networks
Chapter 1 introduction to scaling networks
 
The Importance of an Integrated Network Management System
The Importance of an Integrated Network Management SystemThe Importance of an Integrated Network Management System
The Importance of an Integrated Network Management System
 
Transaction processing, techniques
Transaction processing, techniquesTransaction processing, techniques
Transaction processing, techniques
 
Conceptual trusted incident reaction architecture
Conceptual trusted incident reaction architectureConceptual trusted incident reaction architecture
Conceptual trusted incident reaction architecture
 
Self-Managed Micro-Containers for Service-Based Applications in the Cloud
Self-Managed Micro-Containers for Service-Based Applications in the CloudSelf-Managed Micro-Containers for Service-Based Applications in the Cloud
Self-Managed Micro-Containers for Service-Based Applications in the Cloud
 
Report_Internships
Report_InternshipsReport_Internships
Report_Internships
 
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
 
A novel architecture for sdn based cellular network
A novel architecture for sdn based cellular network A novel architecture for sdn based cellular network
A novel architecture for sdn based cellular network
 
Performance Enhancement of VNSIP approach, using MCAC algorithm
Performance Enhancement of VNSIP approach, using MCAC algorithmPerformance Enhancement of VNSIP approach, using MCAC algorithm
Performance Enhancement of VNSIP approach, using MCAC algorithm
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
An approach of software engineering through middleware
An approach of software engineering through middlewareAn approach of software engineering through middleware
An approach of software engineering through middleware
 
16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN16 & 2 marks in i unit for PG PAWSN
16 & 2 marks in i unit for PG PAWSN
 
The real time publisher subscriber inter-process communication model for dist...
The real time publisher subscriber inter-process communication model for dist...The real time publisher subscriber inter-process communication model for dist...
The real time publisher subscriber inter-process communication model for dist...
 
Unit 1 network management
Unit 1 network managementUnit 1 network management
Unit 1 network management
 
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...
 
81-T48
81-T4881-T48
81-T48
 
Performance evaluation of the mobility management towards 4 g wireless netwo
Performance evaluation of the mobility management towards 4 g wireless netwoPerformance evaluation of the mobility management towards 4 g wireless netwo
Performance evaluation of the mobility management towards 4 g wireless netwo
 
Client server computing in mobile environments
Client server computing in mobile environmentsClient server computing in mobile environments
Client server computing in mobile environments
 
Ly3421472152
Ly3421472152Ly3421472152
Ly3421472152
 

Destacado

A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNNA NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNNIJCNCJournal
 
Secure routing and data transmission in mobile
Secure routing and data transmission in mobileSecure routing and data transmission in mobile
Secure routing and data transmission in mobileIJCNCJournal
 
Name a naming mechanism for delay disruption tolerant network
Name a naming mechanism for delay disruption tolerant networkName a naming mechanism for delay disruption tolerant network
Name a naming mechanism for delay disruption tolerant networkIJCNCJournal
 
Modified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksModified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksIJCNCJournal
 
RISK ASSESSMENT ALGORITHM IN WIRELESS SENSOR NETWORKS USING BETA DISTRIBUTION
RISK ASSESSMENT ALGORITHM IN WIRELESS SENSOR NETWORKS USING BETA DISTRIBUTIONRISK ASSESSMENT ALGORITHM IN WIRELESS SENSOR NETWORKS USING BETA DISTRIBUTION
RISK ASSESSMENT ALGORITHM IN WIRELESS SENSOR NETWORKS USING BETA DISTRIBUTIONIJCNCJournal
 
A novel hierarchical ant based qos aware intelligent routing scheme for manets
A novel hierarchical ant based qos aware intelligent routing scheme for manetsA novel hierarchical ant based qos aware intelligent routing scheme for manets
A novel hierarchical ant based qos aware intelligent routing scheme for manetsIJCNCJournal
 
AN IDE FOR ANDROID MOBILE PHONES WITH EXTENDED FUNCTIONALITIES USING BEST DEV...
AN IDE FOR ANDROID MOBILE PHONES WITH EXTENDED FUNCTIONALITIES USING BEST DEV...AN IDE FOR ANDROID MOBILE PHONES WITH EXTENDED FUNCTIONALITIES USING BEST DEV...
AN IDE FOR ANDROID MOBILE PHONES WITH EXTENDED FUNCTIONALITIES USING BEST DEV...IJCNCJournal
 
Distributed vertex cover
Distributed vertex coverDistributed vertex cover
Distributed vertex coverIJCNCJournal
 
Automated re allocator of replicas
Automated re allocator of replicasAutomated re allocator of replicas
Automated re allocator of replicasIJCNCJournal
 
My direct a middleware for p2 p mobile social networks
My direct a middleware for p2 p mobile social networksMy direct a middleware for p2 p mobile social networks
My direct a middleware for p2 p mobile social networksIJCNCJournal
 
New research directions in the area of
New research directions in the area ofNew research directions in the area of
New research directions in the area ofIJCNCJournal
 
A novel real time video and data capture of vehicular accident in intelligent...
A novel real time video and data capture of vehicular accident in intelligent...A novel real time video and data capture of vehicular accident in intelligent...
A novel real time video and data capture of vehicular accident in intelligent...IJCNCJournal
 
Cloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azureCloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azureIJCNCJournal
 
I AM 4 VHO: New Approach to improve Seamless Vertical Handover in Heterogeneo...
I AM 4 VHO: New Approach to improve Seamless Vertical Handover in Heterogeneo...I AM 4 VHO: New Approach to improve Seamless Vertical Handover in Heterogeneo...
I AM 4 VHO: New Approach to improve Seamless Vertical Handover in Heterogeneo...IJCNCJournal
 
Analyzing peer selection policies for
Analyzing peer selection policies forAnalyzing peer selection policies for
Analyzing peer selection policies forIJCNCJournal
 
Performance analysis of economic model and radio resource management in heter...
Performance analysis of economic model and radio resource management in heter...Performance analysis of economic model and radio resource management in heter...
Performance analysis of economic model and radio resource management in heter...IJCNCJournal
 
Interworking qos management subsystem into ims based architecture multi provi...
Interworking qos management subsystem into ims based architecture multi provi...Interworking qos management subsystem into ims based architecture multi provi...
Interworking qos management subsystem into ims based architecture multi provi...IJCNCJournal
 
Threats and Anti-threats Strategies for Social Networking Websites
Threats and Anti-threats Strategies for Social Networking WebsitesThreats and Anti-threats Strategies for Social Networking Websites
Threats and Anti-threats Strategies for Social Networking WebsitesIJCNCJournal
 

Destacado (19)

A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNNA NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
 
Secure routing and data transmission in mobile
Secure routing and data transmission in mobileSecure routing and data transmission in mobile
Secure routing and data transmission in mobile
 
Name a naming mechanism for delay disruption tolerant network
Name a naming mechanism for delay disruption tolerant networkName a naming mechanism for delay disruption tolerant network
Name a naming mechanism for delay disruption tolerant network
 
Modified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksModified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networks
 
RISK ASSESSMENT ALGORITHM IN WIRELESS SENSOR NETWORKS USING BETA DISTRIBUTION
RISK ASSESSMENT ALGORITHM IN WIRELESS SENSOR NETWORKS USING BETA DISTRIBUTIONRISK ASSESSMENT ALGORITHM IN WIRELESS SENSOR NETWORKS USING BETA DISTRIBUTION
RISK ASSESSMENT ALGORITHM IN WIRELESS SENSOR NETWORKS USING BETA DISTRIBUTION
 
A novel hierarchical ant based qos aware intelligent routing scheme for manets
A novel hierarchical ant based qos aware intelligent routing scheme for manetsA novel hierarchical ant based qos aware intelligent routing scheme for manets
A novel hierarchical ant based qos aware intelligent routing scheme for manets
 
AN IDE FOR ANDROID MOBILE PHONES WITH EXTENDED FUNCTIONALITIES USING BEST DEV...
AN IDE FOR ANDROID MOBILE PHONES WITH EXTENDED FUNCTIONALITIES USING BEST DEV...AN IDE FOR ANDROID MOBILE PHONES WITH EXTENDED FUNCTIONALITIES USING BEST DEV...
AN IDE FOR ANDROID MOBILE PHONES WITH EXTENDED FUNCTIONALITIES USING BEST DEV...
 
Distributed vertex cover
Distributed vertex coverDistributed vertex cover
Distributed vertex cover
 
Automated re allocator of replicas
Automated re allocator of replicasAutomated re allocator of replicas
Automated re allocator of replicas
 
My direct a middleware for p2 p mobile social networks
My direct a middleware for p2 p mobile social networksMy direct a middleware for p2 p mobile social networks
My direct a middleware for p2 p mobile social networks
 
New research directions in the area of
New research directions in the area ofNew research directions in the area of
New research directions in the area of
 
A novel real time video and data capture of vehicular accident in intelligent...
A novel real time video and data capture of vehicular accident in intelligent...A novel real time video and data capture of vehicular accident in intelligent...
A novel real time video and data capture of vehicular accident in intelligent...
 
Cloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azureCloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azure
 
I AM 4 VHO: New Approach to improve Seamless Vertical Handover in Heterogeneo...
I AM 4 VHO: New Approach to improve Seamless Vertical Handover in Heterogeneo...I AM 4 VHO: New Approach to improve Seamless Vertical Handover in Heterogeneo...
I AM 4 VHO: New Approach to improve Seamless Vertical Handover in Heterogeneo...
 
Analyzing peer selection policies for
Analyzing peer selection policies forAnalyzing peer selection policies for
Analyzing peer selection policies for
 
Performance analysis of economic model and radio resource management in heter...
Performance analysis of economic model and radio resource management in heter...Performance analysis of economic model and radio resource management in heter...
Performance analysis of economic model and radio resource management in heter...
 
Interworking qos management subsystem into ims based architecture multi provi...
Interworking qos management subsystem into ims based architecture multi provi...Interworking qos management subsystem into ims based architecture multi provi...
Interworking qos management subsystem into ims based architecture multi provi...
 
Ijcnc050209
Ijcnc050209Ijcnc050209
Ijcnc050209
 
Threats and Anti-threats Strategies for Social Networking Websites
Threats and Anti-threats Strategies for Social Networking WebsitesThreats and Anti-threats Strategies for Social Networking Websites
Threats and Anti-threats Strategies for Social Networking Websites
 

Similar a Domain partitioned element management systems employing mobile agents for distributed network management

Multi agent based network monitoring and management using jade
Multi agent based network monitoring and management using jadeMulti agent based network monitoring and management using jade
Multi agent based network monitoring and management using jadeAlexander Decker
 
SELF-ORGANIZATION AND AUTONOMOUS NETWORK SURVEY
SELF-ORGANIZATION AND AUTONOMOUS NETWORK SURVEYSELF-ORGANIZATION AND AUTONOMOUS NETWORK SURVEY
SELF-ORGANIZATION AND AUTONOMOUS NETWORK SURVEYIJNSA Journal
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Alexander Decker
 
Net Mng1.pptx
Net Mng1.pptxNet Mng1.pptx
Net Mng1.pptxtahaazad2
 
343492490-Network-Management-and-Administration.pptx
343492490-Network-Management-and-Administration.pptx343492490-Network-Management-and-Administration.pptx
343492490-Network-Management-and-Administration.pptxbilalazam34
 
Network Mnagement for WSN
Network Mnagement for WSNNetwork Mnagement for WSN
Network Mnagement for WSN@zenafaris91
 
Sensor Adhoc Networks SECOM paper-Final - format
Sensor Adhoc Networks SECOM paper-Final - formatSensor Adhoc Networks SECOM paper-Final - format
Sensor Adhoc Networks SECOM paper-Final - formatJohn A. Serri
 
Results of simulation modeling of technical parameters of a multiservice network
Results of simulation modeling of technical parameters of a multiservice networkResults of simulation modeling of technical parameters of a multiservice network
Results of simulation modeling of technical parameters of a multiservice networkTELKOMNIKA JOURNAL
 
Why we need to use NMS for 4G SIM Card Router.pdf
Why we need to use NMS for 4G SIM Card Router.pdfWhy we need to use NMS for 4G SIM Card Router.pdf
Why we need to use NMS for 4G SIM Card Router.pdfE-Lins Technology Co. Ltd.
 
Localization & management of sensor networks
Localization & management of sensor networksLocalization & management of sensor networks
Localization & management of sensor networksRushin Shah
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...ijseajournal
 
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...Learning-based Orchestrator for Intelligent Software-defined Networking Contr...
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...ijseajournal
 
Secure & fault tolerance handoff in vanet using special mobile agent
Secure & fault tolerance handoff in vanet using special mobile agentSecure & fault tolerance handoff in vanet using special mobile agent
Secure & fault tolerance handoff in vanet using special mobile agentcsandit
 
SECURE & FAULT TOLERANCE HANDOFF IN VANET USING SPECIAL MOBILE AGENT
SECURE & FAULT TOLERANCE HANDOFF IN VANET USING SPECIAL MOBILE AGENTSECURE & FAULT TOLERANCE HANDOFF IN VANET USING SPECIAL MOBILE AGENT
SECURE & FAULT TOLERANCE HANDOFF IN VANET USING SPECIAL MOBILE AGENTcscpconf
 
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 LinkedinNMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 LinkedinJavier Guillermo, MBA, MSc, PMP
 

Similar a Domain partitioned element management systems employing mobile agents for distributed network management (20)

Multi agent based network monitoring and management using jade
Multi agent based network monitoring and management using jadeMulti agent based network monitoring and management using jade
Multi agent based network monitoring and management using jade
 
SELF-ORGANIZATION AND AUTONOMOUS NETWORK SURVEY
SELF-ORGANIZATION AND AUTONOMOUS NETWORK SURVEYSELF-ORGANIZATION AND AUTONOMOUS NETWORK SURVEY
SELF-ORGANIZATION AND AUTONOMOUS NETWORK SURVEY
 
Cs702 Anm A Ds M
Cs702 Anm A Ds MCs702 Anm A Ds M
Cs702 Anm A Ds M
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...
 
Net Mng1.pptx
Net Mng1.pptxNet Mng1.pptx
Net Mng1.pptx
 
343492490-Network-Management-and-Administration.pptx
343492490-Network-Management-and-Administration.pptx343492490-Network-Management-and-Administration.pptx
343492490-Network-Management-and-Administration.pptx
 
Network Mnagement for WSN
Network Mnagement for WSNNetwork Mnagement for WSN
Network Mnagement for WSN
 
Network management systems in large enterprise
Network management systems in large enterpriseNetwork management systems in large enterprise
Network management systems in large enterprise
 
Sensor Adhoc Networks SECOM paper-Final - format
Sensor Adhoc Networks SECOM paper-Final - formatSensor Adhoc Networks SECOM paper-Final - format
Sensor Adhoc Networks SECOM paper-Final - format
 
E0363638
E0363638E0363638
E0363638
 
Results of simulation modeling of technical parameters of a multiservice network
Results of simulation modeling of technical parameters of a multiservice networkResults of simulation modeling of technical parameters of a multiservice network
Results of simulation modeling of technical parameters of a multiservice network
 
Why we need to use NMS for 4G SIM Card Router.pdf
Why we need to use NMS for 4G SIM Card Router.pdfWhy we need to use NMS for 4G SIM Card Router.pdf
Why we need to use NMS for 4G SIM Card Router.pdf
 
Localization & management of sensor networks
Localization & management of sensor networksLocalization & management of sensor networks
Localization & management of sensor networks
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...
 
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...Learning-based Orchestrator for Intelligent Software-defined Networking Contr...
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...
 
Intelligent Agents in Telecommunications
Intelligent Agents in TelecommunicationsIntelligent Agents in Telecommunications
Intelligent Agents in Telecommunications
 
Secure & fault tolerance handoff in vanet using special mobile agent
Secure & fault tolerance handoff in vanet using special mobile agentSecure & fault tolerance handoff in vanet using special mobile agent
Secure & fault tolerance handoff in vanet using special mobile agent
 
SECURE & FAULT TOLERANCE HANDOFF IN VANET USING SPECIAL MOBILE AGENT
SECURE & FAULT TOLERANCE HANDOFF IN VANET USING SPECIAL MOBILE AGENTSECURE & FAULT TOLERANCE HANDOFF IN VANET USING SPECIAL MOBILE AGENT
SECURE & FAULT TOLERANCE HANDOFF IN VANET USING SPECIAL MOBILE AGENT
 
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 LinkedinNMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
NMS Projects and POCs completed and ongoing for OSS NAM v 1.5 Linkedin
 

Más de IJCNCJournal

April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemIJCNCJournal
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSIJCNCJournal
 

Más de IJCNCJournal (20)

April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDS
 

Último

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Último (20)

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 

Domain partitioned element management systems employing mobile agents for distributed network management

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014 DOI : 10.5121/ijcnc.2014.6309 107 DOMAIN-PARTITIONED ELEMENT MANAGEMENT SYSTEMS EMPLOYING MOBILE AGENTS FOR DISTRIBUTED NETWORK MANAGEMENT Anish Saini1 & Atul Mishra2 1 Assistant Professor, Department of Computer Science & Engineering, Echelon Institute of Technology, Faridabad, INDIA 2 Associate Professor, Department of Computer Engineering, YMCA University of Science & Technology Faridabad, INDIA ABSTRACT Network management systems based on mobile agents are efficiently a better alternative than typical client/server based architectures. Centralized management models like SNMP or CMIP based management models suffer from scalability and flexibility issues which are addressed to great extent by flat bed or static mid-level manager models based on mobile agents, yet the use of mobile agents to distribute and delegate management tasks for above stated agent-based management frameworks like initial flat bed models and static mid-level managers cannot efficiently meet the demands of current networks which are growing in size and complexity. In view of the above mentioned limitations, we proposed a domain partitioned network management model based-on mobile agent & Element Management Systems in order to minimize management data flow to a centralized server. Intelligent agent allocated to specific EMS performs local network management and reports the results to the superior manager and finally the global manager performs global network management using those submitted management results. Experimental results of various scenarios of the proposed model have been presented to support the arguments given in favor of the prototype system based on mobile agents. KEYWORDS Mobile agents, Network Management, Distributed, SNMP, Scalability 1. INTRODUCTION The need for data communication has evolved rapidly since the earliest days of computing. Industrial enterprises are increasingly dependent upon networked system serving their information backbones. A typical organization model of a network management system is based on SNMP[1][2] Client/Server architecture. It consists of two major components: network agent process and the network manager process. The network agent process resides on the managed network devices such as routers, switches, servers etc. The network manager is housed on the NMS station from where it manages the various devices, by accessing the management information, through the agents residing on them as shown in Figure 1. The management information consists of collection of managed objects, stored in Management Information Base (MIB). Based on SNMP model, the management of networks from the Network Operation Centers (NOC) is mostly done by a Network Manager which deploys several element management system(EMS). EMSs in turn manage their specific zones or domains. These EMSs provide ISO’s five functional categories: Fault Management, Configuration Management, Accounting, Performance Management and Security Management. Network Manager acts as a client to the EMSs, which in turn act as network manager to network devices for retrieval and
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014 108 provisioning of data. The data retrieved by EMSs are stored in databases on the EMSs platforms and used for management of network devices These existing management models traditionally adopt a centralized, Client/Server (C/S) approach wherein the management application, with the help of a manager, acting as clients, periodically accesses the data collected by a set of software modules, agents, placed on network devices by using an appropriate protocol. These centralized architectures suffer from the lack of scalability and flexibility. Furthermore, the staleness of gathered data (due to network latency involved) and probable error in the selection of management task being carried over (owing to the staleness of data) reduces the reliability of the management applications. Thus, controlling and managing the traffic in these networks is a challenging task [3]. Figure 1. SNMP Model In view of the above mentioned limitations, we proposed a domain partitioned network management model based-on mobile agent & Element Management Systems in order to minimize management data flow to a centralized server. Intelligent agent allocated to specific EMS performs local network management and reports the results to the superior manager and finally the global manager performs global network management using those submitted management results. The Mobile Agent (MA) paradigm has emerged within the distributed computing field. The term MA refers to autonomous programs with the ability to move from host to host to resume or restart their execution and act on behalf of users towards the completion of a given task.[4] One of the most popular topics in MA research community has been distributed NM [5][6][7], wherein MAs have been proposed as a means to balance the burden associated with the processing of management data and decrease the traffic associated with their transfers (data can be filtered at the source). Goldszmidit et al [8], introduces the concept of management by delegation, the management station can extend the capability of the agents at runtime thereby invoking new services and dynamically extending the ones present in the agent on the device. Mobile agent based strategies have distinct advantages over the others as it allowed for easy programmability of remote nodes by migrating and transferring functionality wherever it is required. Bellavista[9] et al. proposed a secure and open mobile agent environment, MAMAS (Mobile Agents for the Management of Applications and Systems) for the management of networks, services and systems. Sahai & Morin [10] introduce the concept of mobile network managers (MNM), which is a location independent network manager and assists the administrator to remotely control his/her managed network, through launching MAs to carry out distributed SNMP RESPONSE NETWORK MANAGEMENT STATION NETWORK ELEMENT (AGENT DEVICE) SNMP TRAP SNMP REQUEST MDB MIB SNMP Community
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014 109 management tasks. In, Oliveira and Lopes propose how the integration of MA-based sub-system could be carried out in the IETF’s DISMAN framework. In [11], I. Satoh proposes how a network and application independent MA based framework could be designed. Manoj Kumar Kona et al. [12] described an SNMP based efficient mobile agent network management structure, in order to cooperate with conventional management system; For transferring less network monitoring data and managing devices more effectively, Damianos Gavalas et al.[5] propose a scalable and flexible MA based platform for network management; MAGENTA (Mobile AGENT environment for distributed Applications) introduces Mobile Network Manager (MNM) which is a location independent network manager [13]. Figure 2. Management Entity & Interaction Model The network managers in this architecture utilize client- server technology and/or mobile agent technology as and when required depending on the functionality implemented and their location. CLIENT-1 MANAGEMENT APPLICATION CLIENT-N MANAGEMENT APPLICATION CONFIG FILE NMD CONFIG File NMD G N M SPAWN CHILD M-SNLMS SPAWN CHILD M-SNLMS M- SNLM M- SNLM M- SNLM RPT MGMT DATA RPT MGMT DATA MANAGE NMD EMS MANAGE NMDEMS MANAGE NMDEMS PUBLIC SUBSCRIBE MESSAGING BUS SUBSCRIBE SUBSCRIBE SUBNET-1 AGENT MIBAGENT MIB AGENT MIB SUBNET-2 AGENT MIBAGENT MIB AGENT MIB SUBNET-N AGENT MIBAGENT MIB AGENT MIB PUBLISH PUBLISH PUBLISH
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014 110 Damianos Gavalas et al.[4] proposed a hierarchical and scalable management model where middle managers are themselves mobile and based on certain policies they dynamically segment the network and deploy other mobile middle managers for data collection. 2. HIGH LEVEL DESIGN OF EMS BASED NETWORK MANAGEMENT MODEL DEPLOYING MOBILE AGENTS A.K. Sharma et al. proposed IMASNM model [16] which discusses strategies for large scale network partitioning, fixing of management scope and deployment of mobile M-SNLMs in various sub-network domains. In IMASNM hierarchal network management model, the mobile managers (M-SNLMs) move in their domains and manages network device with a flat bed model scheme. The manager works with quite good efficiency if the size of domain falls in a specified range. If the domain size increases from that specified range then efficiency of network manager goes down due to management cost of flat bed model which is the main problem of IMASNM model. Considering above, we proposed an EMS based mobile agent network management model shown in Figure 2. In this scheme, the managed network is divided into many domains based on the geographical layout of the network or number of nodes a manager can efficiently manage or average load on the entire network or certain kind of administrative relationship. In each domain, an Element manager is appointed and for the overall managed network a set of various management applications along with a network manager acting as a Global Network Manager (GNM) are appointed. Element managers (EM) exist at the lowest level of the managers’ hierarchy. Each Element manager controls and monitors a set of network element (SONET/DWDM/Ethernet) via specialized protocol independent mediators as shown in Figure 3. After initial discovery of the network, EMS keeps database changes in the sub-network by means of publish/subscribe paradigm. Additionally a hierarchy of Mobile-Subnetwork Layer Manager (M-SNLM) is appointed in between the GNM and leaf-level EMSs. First levels of M-SNLMs (appointed by GNM) are dispatched to platforms where EMSs are running. M-SNLMs along with EMSs take over a portion of the network from their parent M- SNLMs and act as local managers for that portion of the network for all management needs. Depending upon the growth in their domain, M-SNLMs spawn additional child M-SNLMs for scalable management of the network. M-SNLMs not only interact with the EMSs they are assigned to but also could visit other EMSs platforms depending upon the need as they are mobile agents in themselves Highlights of the Proposed Model EMS based domain partitioned network management system based-on mobile agent has many technology advantages over conventional network fault management system and other MA based network management models presented by researchers. Earlier work presented by researchers [5][16] assumed the presence of mobile agent runtime environment on the network devices. This may not be true for many telecomm elements and legacy devices. Proposed model make the architecture independent of this constraint. Earlier models [5][16] dispatch data agents to devices in the sub-network and bear a cost associated with it. Proposed model saves this cost by retrieving that data from the database present on the EMS platform only. It also controls the number of mobile agents present in the system as a given M-SNLM can not only manage its assigned domain but can also visit other domains and interact with EMSs to manage the network.
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014 111 Bottleneck problem of convention centralized network management are addressed and static communication problems in distributed network is solved efficiently. The basic concept which is adopted in this framework is: “M-SNLMs solve problems locally and the supervisors/parent M-SNLMs worry about the issues which are propagated to them.” Figure 3. Management Entity & Interaction Model The proposed architecture is based on mobile agent technology with the advantages: Balancing of Network loads, The framework is adaptive with network size change, The feature of mobile agents disconnecting with GNM when working on managed devices saves bandwidth effectively. In addition, mobile agents are endurable with network state and they can execute continually after network recovery, it is also what mobile agent technology exceeds other network management technologies. The proposed architecture is based on mobile agent technology Proposed model offers a hierarchical network management model that can reduce network management complexity and minimize the management data transferred to and fro in the network. PROP Agent NE EM SERVICES SOFTWARE MANAGEMENT FAULT MANAGEMENT PERFORMANCE MANAGEMENT CONFIGURATION MANAGEMENT SECURITY MANAGEMENT MO1 MO2 MO3 MO4 PERFORMANCE MANAGEMENT DATABASE MANAGED DATABASE ALARM DATABASE SESSION MANAGEMENT AND COMMUNICATION SUB-SYSTEM SESSION MANAGEMENT COMMUNICATI ON MANAGEMENT MEDIATION LAYER SNMP SNMP Agent NE SNMP Agent NE CMIP CMIP Agent NE CMIP Agent NE TL 1 TL 1 Agent NE TL 1P Agent NE PROP. PROP Agent NE CONNECTOR TO PROTOCOL STACKS
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014 112 3. PERFORMANCE ANALYSIS Many a times there arises a situation in network monitoring activities where one or two MIB variables representing some managed object may not be able to give good assessment of the issue (like performance degradation, signal failure, packet loss etc.). However, we need to access multiple parameters and then make an assessment. In order to carry out the performance analysis of the model presented in this work a bandwidth and throughput utilization function known as health function (HF) [6] which is essentially an aggregate of multiple MIB variable. In this five MIB-II [15] managed objects are combined to define the percentage E(t) of IP packets discarded over the total number of packets sent within a specific time interval as shown in Equation 1 E(t) = {(ipOutDiscards + ipOutNoRoutes + ipFragFails) / (ipOutRequests + ipForwDatagram)}*100 .....(1) In simple client/server based SNMP model, either we have to issue five get requests to retrieve the values or at the best we would issue a single get request and the response would carry all the five parameters with their value. Back at manager level the value of E(t) would be computed and necessary action would be planned. As suggested by Damianos Gavalas et al.[4] MAs can compute HFs locally thereby providing a way to semantically compress large amount of data (five variables, their IODs and return values and other SNMP Req/Res overheads) in a single value returned to the manager, thereby relieving it from processing NM data, while MAs state size remains as small as possible. But in case we have to compute this value for a collection of nodes, MAs would have to travel to these nodes and we need to bear the cost presented in [16]. The proposed mechanism offers an EMS database solution where we could issue a simple SQL query so that the needed values could be computed in a far less time and far less cost. For example, the E(t) function shown in Equation (1), a simple SQL query similar to shown below can easily compute the function value at database level itself. With appropriate measures taken as schema design level like (indexes and data arrangement) similar SQL across series of nodes could be carried out at fraction of the cost that a mobile agent based flat bed model would incur. Consider the HealthFunction given below as a view or some database schema table ipOutDiscard ipOutNoRoutes ipFragFails ipOutRequest ipForwDatagram The corresponding SQL query would be as shown below: SELECT ipOutDiscards + ipOutNoRoutes + ipFragFails AS “Packet Discarded”, ipOutRequests + ipForwDatagram AS “Total Packets”,Packet Discarded / Total Packets AS “Health Function” From HealthFunction Where NE = `xxxx`; 4. NETWORK MANAGEMENT COST CALCULATION FOR THE PROPOSED MODEL The Network management cost for IMASNM Model is discussed in details by A.K. Sharma et. al. [16] and has been used here as basis for cost calculation for the proposed model. The network management cost calculation for the proposed model as shown in Equation (2) involves not only the management traffic cost i.e. (messages between the managers and sub-domain managers) but also the cost of setting up the managers as per the initial discovery of the network.
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014 113 CTOTAL = CSETUP + CMGMTTR .....(2) Where CSETUP: cost for discovering the network and deploying the managers – both M- SNLM & EMS. CMGMTTR: cost of a typical polling to know whole network status at top most level. CSETUP: the cost for discovering the network and deploying the managers – both M- SNLM & EMS is computed as shown in Equation (3) CSETUP = CMSNLM + CEMS .....(3) The cost of setting up the top level M-SNLMs managers as per the initial discovery of the network would be computed as shown in Equation (4) CM-SNLM =∑ ∑ ‫ܨ‬ ݄, ݆ ‫כ‬ ‫ܣܯ‬ ܵ݅‫݁ݖ‬ெିଵ ௝ୀଵ ௅ ௛ୀଵ ......(4) Where MASize: Size of mobile manager, L: Number of mother manager in the network, M: Number of child managers in the sub domains of hth mother manager and Fh,j: Sum of all the link cost coefficient between hth mother manager to jth child manager’s sub domain. The element managers would discover the domain element details in client/server mode and store the data in the EMS platform data for the agents visiting their platforms. The cost for setting up such platforms across the network would be computed as shown in Equation (5) CEMS = {∑ ‫ܭ‬ 0,1 ‫כ‬ ሺܵ‫ݍ݁ݎ‬ ൅ ܵ‫ݏ݁ݎ‬ሻሽ ‫כ‬ ‫ܯ‬ ‫כ‬ ‫ܮ‬ே ௜ୀଵ .....(5) Where N: the no. of devices under the management of a given EMS, L: Number of mother manager in the network, M: Number of child managers in the sub domains of a mother manager It may be noted that the deployment cost of the proposed model is higher than the IMASNM Model as cost of EMS gets added to the mobile-manager deployment. But as suggested in the proposed model architecture that it is a onetime cost and once the EMSs discover the network. They keep the data fresh through publish/subscribe interface. So for long term polling operations this cost could be ignored. As discussed in IMASNM [16] model the management traffic cost for various polling operations is given as shown in Equation (6) CMGMTTR = ∑ ∑ ‫,݄ܨ‬ ݆ሺ‫ݏ݁ݎܣܯ‬ሻ ൅ ∑ ‫ܳܥ‬ொ ௝ୀଵ ெିଵ ௝ୀ଴ ௅ ௛ୀଵ .....(6) Where MAres: Size of message sent by child to mother manager to report network health of its underlying domain, CQ: Flat bed model cost for Qth domain’s M-SNLM. CQ = MDASize*(RQ+1)*KQ .....(7) Where MDASize: Size of mobile data agent,
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014 114 RQ: number of managed node is Qth domain and KQ : link coefficient of link’s of Qth domain. It may be noted that the flat bed cost increases in proportion to the cost coefficient of the links as well as number of nodes being managed in a given sub-domain. In the proposed model, the SQL performed by M-SNLMs would be local only and the cost incurred by flat bed model could be saved in total. Hence, under the assumption that the cost of sql query would be far less than the cost of managing a domain by flat-bed model approach, the polling cost of the entire network could be computer as shown in Equation (8). CMGMTTR = ∑ ∑ ‫,݄ܨ‬ ݆ሺ‫ݏ݁ݎܣܯ‬ሻெିଵ ௝ୀ଴ ௅ ௛ୀଵ .....(8) Ignoring the one time setup cost, Equation (2) could be shown as CTOTAL ≈ CMGMTTR (which is already optimised) 5. EXPERIMENT RESULTS To support the management cost calculation presented in the previous section an experimental setup deploying Aglet version 2.0.2 as mobile agent platform, WebNMS Agent Toolkit Java Edition 6 for MIB design and manipulation, jdk1.6.0_13 as java runtime and MYSQL database was used. Experimental setup calculated the management cost in terms of time taken for management activity. For experiment results we consider three scenarios: Scenario 1: Client/Server setup: Figure 4 shows the simple client server model, where the static manager sends the SNMP request to agents, which sends the SNMP response back to manager. Node0 acts as M-SNLM for a sub-network and it collects information from nodes (node 1, node 2 …) in its domain using req/resp mechanism. Scenario 2: Flat-bed model: Figure 6 shows the Flat-Bed model in which the mobile agents are responsible for accessing information by visiting one node to another. Node0 acting as M-SNLM dispatches the mobile agents for collecting the information from all the nodes in its domain and which they do in a flat-bed fashion and finally return back to Node0. Scenario 3: Hybrid model: Figure 8 shows the “Hybrid model using EMS” in which the data is accesses from MYSQL database through SQL queries. The M-SNLM collects the information from nodes in its domain and keeps it in the database. The data is kept in sync with the nodes through simple publish/subscribe model. Whenever this M-SNLM is inquired from upper layer it simply queries the database and returns the result. In the proposed experimental setup we calculate time for 50 get request & response for an Integer32 data type which is made by static manager (node 0) to static MIB agent (node 1, node 2, …) running on each node
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014 115 Figure 4. Experimental Setup for C/S network management model TABLE I. EXPERIMENT RESULT OF CLIENT/SERVER BASED NETWORK MODEL S. no Time1 Time2 Time3 1. 179 249 113 2. 159 145 122 3. 159 268 150 4. 239 131 210 5. 141 129 112 6. 422 144 88 7. 166 117 120 8. 71 195 322 9. 185 188 169 10. 91 137 227 11 152 164 100 12. 398 198 279 13. 221 188 138 14. 199 109 130 Average 198 168 162 Time1, Time2 and Time3 are respectively for Node1, Node2 and Node3. All times in milliseconds. NODE 3 SNMP REQUEST & RESPONSE PACKET Configurations: Node 0, Node 1, Node 2 Node 3:-- Processor: Intel Core i3 2.4GHz, RAM: 3 GB, Operating System: 64 bit Window7 STATIC MANAGER JVM SNMP STATIC AGENT MIBMIB MIB SNMP STATIC AGENT SNMP STATIC AGENT NODE 1 NODE 2 NODE 0
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014 116 Figure 4 is experimental setup for scenario 1 which is a client/server based network management model. WebNMS toolkit is used for generating the client server applications for this setup. Table I show the experimental results of client server based model and figure 5 shows the corresponding graph. Figure 5. Graph of table I data values Figure 6. Experimental Setup for Flat- Bed model Figure 6 is experimental setup for scenario 2 which is a MA based network management model. Aglet platform is used to send mobile agent from one node to another. 0 50 100 150 200 250 300 350 400 450 1 3 5 7 9 11 13 Average Time 1 Time 2 Time 3 NODE 3 AGLETSD AT :4434 MAP SNMP STATIC AGENT MIB NODE 0 NODE 1 AGLETS D AT :4434 MAP SNMP STATIC AGENT MIB NODE 2 AGLETSD AT :4434 MAP SNMP STATIC AGENT MIB AGLETS D AT :4434 MAP SNMP REQUEST & RESPONSE PACKET MOBILE AGENT PATH Configurations: Node 0, Node 1, Node 2 Node 3:-- Processor: Intel Core i3 2.4GHz, RAM: 3 GB, Operating System: 64 bit Window7
  • 11. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014 117 TABLE II. EXPERIMENT RESULT OF MOBILE AGENT BASED NETWORK MODEL S. no Time1 Time2 Time3 1. 290 191 199 2. 193 327 308 3. 328 125 381 4. 315 582 310 5. 304 539 316 6. 274 355 338 7. 266 265 281 8. 339 116 378 9. 237 176 200 10. 263 224 206 11 219 207 282 12. 230 292 194 13. 321 190 260 14. 308 218 216 15. 263 402 383 Average 276 280 283 Time1, Time2 and Time3 are respectively for Node1, Node2 and Node3. All times in milliseconds. Figure 7. Graph of table II data values Table II show the experimental results of mobile agent based model and figure 7 shows the corresponding graph. 0 100 200 300 400 500 600 700 Time 1 Time 2 Time 3
  • 12. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014 118 Figure 8. Experimental Setup for Hybrid model using ENMS TABLE III. EXPERIMENT RESULT OF MOBILE AGENT BASED NETWORK MODEL ACCESSING MYSQL DATABASE S. no Time1 Time2 Time3 1. 122 39 31 2. 47 31 31 3. 143 46 47 4. 31 25 19 5. 16 31 15 6. 30 23 18 7. 27 19 20 8. 44 33 32 9. 32 31 31 10. 16 31 16 11 44 35 34 12. 35 31 16 13. 30 20 20 14. 30 27 20 Average 46 30 25 Time1, Time2 and Time3 are respectively for Node1, Node2 and Node3. All times in milliseconds. NODE 0 NODE 1 AGLETSD AT :4434 MAP SNMP STATIC MIB AGLETSD AT :4434 MAP SNMP STATIC MIB NODE 2 AGLETSD AT :4434 MAP SNMP STATIC MIB NODE 3 AGLETSD AT :4434 MAP SNMP REQUEST & RESPONSE PACKET MOBILE AGENT PATH MYSQL DATABASESQL QUERY Configurations: Node 0, Node 1, Node 2 Node 3:-- Processor: Intel Core i3 2.4GHz, RAM: 3 GB, Operating System: 64 bit Window7
  • 13. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014 119 Figure 9. Graph of table 5.1 data values In figure 8 node 0 is accessing values of 3 nodes i.e node1, node2, and node 3. Node 0 is also querying MYSQL database for the values which are stored in it, to do any operation. Table III shows time taken to access a value from MYSQL database. 6. CONCLUSIONS The experimental results obtained in the previous section clearly show that client server based network management models takes less time as compare to mobile agent based models for a small size network. As the network grows in size client server based request and response put heavy load on network whereas mobile agents who operate locally at respective agent or node perform much better then client server. Moreover the model deploying database at the M-SNLM side performs even better than the mobile agent model. In client server model the management cost in terms of the data transferred to the Global manager for the whole network is directly proportional to the following factors: Number of requests and responses to fetch the data remotely Cost coefficient of the links on which information is exchanged. The number of MIB accessed. Whereas in the proposed model, EMSs manage the domains locally thereby minimizing the cost incurred due to costly inter-domain link traversal of mobile agents. The cost of managing flat bed model is also taken away as SQL interface will fetch the needed data from EMSs database and it will be kept in sync with network elements by publish/subscribe interfaces and as the experimental results also proves that MYSQL queries takes less time as comapre to mobile agent. This simple experimental result shows that proposed EM based model would scale much better than Client/Server as well as IMASNM model. REFERENCES [1] Y. Yemini, “The OSI Network Management Model”, IEEE Communications Magazine, vol.31, no.5, pp.20-29. May 1993. [2] W. Stallings, SNMP, SNMPv2, SNMPv3 and RMON 1 and 2, third ed. Addison Wesley, 1999. [3] M. D’Arienzo, A. Pescape, and G. Ventre, “Dynamic Service Management in Heterogeneous Networks”, JNSM: Vol. 12, No.3, 2004. [4] D. Gavalas, D. Greenwood, M. Ghanbari and M. O’Mahony, “Hierarchical network management: A scalable and dynamic mobile agent-based approach.” Computer Networks, 38: 693-711, 2002. 0 20 40 60 80 100 120 140 160 1 3 5 7 9 11 13 15 Time 1 Time 2 Time 3
  • 14. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.3, May 2014 120 [5] D. Gavalas, G.E. Tsekouras, and C. Anagnostopoulos, “A mobile agent platform for distributed network and system management”, Journal of Systems and Software, Vol 82, pp. 355-371, 2009 [6] Mydhili K Nair and V. Gopalakrishna, “Applying Web Services with Mobile Agents For Computer Network Management”, International Journal of Computer Networks and Communications (IJCNC), Vol. 3, No. 2, pp 125-144, March, 2011. [7] S.S. Manvi and P. Venkataram, “Agent based subsystem for multimedia communications”. IEEE Proceedings Software Journal 153 (1), 38–48, 2006. [8] G. Goldszmidt, “Distributed Management by Delegation”, In Proceedings of the 15th International conference on Distributed Computing Systems, 1995. [9] P. Bellavista, A. Corradi and C. STefanelli, “An open secure mobile agent framework for systems management.” Journal of Network and System management, 7:323-339, 2003. [10]Akhil Sahai Christine Morin “Enabling a mobile network manager through mobile agents” [11]I. Satoh, “Building and selecting mobile agents for network management.”, International Journal of Network and Systems Management 14 (1), 147–169. March, 2006 [12]M. K. Kona and C. Z. Xu, “A Framework for Network Management Using Mobile Agents”, Parallel and Distributed Processing Symposium, Proceedings International, pp. 227-234, IPDPS 2002. [13]for Next Generation Telecommunications”, INFOCOM ’96, pp.24-28, 1996. [14]Singh, V., Mishra, A., and Sharma, A.K. 2010. “A Mobile Agent Based Framework for Network Management System”, International Conference on Computer Engineering and Technology, ICCET’ 2010 [15]McCloghrieK., Rose M., “Management Information Base for Network Management of TCP/IP-based Internets: MIB-II”, RFC 1213, March 1991. [16]Sharma, A.K., Mishra A., Singh V.,“An Intelligent Mobile-Agent Based Scalable Network Management Architecture for Large-Scale Enterprise System”, International Journal of Computer Networks and Communications (IJCNC), Vol. 4, No. 1, pp 79-95, January, 2012.