DOI QR코드

DOI QR Code

Autonomic Self Healing-Based Load Assessment for Load Division in OKKAM Backbone Cluster

  • 발행 : 2009.06.30

초록

Self healing systems are considered as cognation-enabled sub form of fault tolerance system. But our experiments that we report in this paper show that self healing systems can be used for performance optimization, configuration management, access control management and bunch of other functions. The exponential complexity that results from interaction between autonomic systems and users (software and human users) has hindered the deployment and user of intelligent systems for a while now. We show that if that exceptional complexity is converted into self-growing knowledge (policies in our case), can make up for initial development cost of building an intelligent system. In this paper, we report the application of AHSEN (Autonomic Healing-based Self management Engine) to in OKKAM Project infrastructure backbone cluster that mimics the web service based architecture of u-Zone gateway infrastructure. The 'blind' load division on per-request bases is not optimal for distributed and performance hungry infrastructure such as OKKAM. The approach adopted assesses the active threads on the virtual machine and does resource estimates for active processes. The availability of a certain server is represented through worker modules at load server. Our simulation results on the OKKAM infrastructure show that the self healing significantly improves the performance and clearly demarcates the logical ambiguities in contemporary designs of self healing infrastructures proposed for large scale computing infrastructures.

키워드

참고문헌

  1. Firetide www.firedide.com
  2. Doufexi, A. Tameh, E. Nix, A. Armour, S. Molina, A. 'Hotspot wireless LANs to enhance the performance of 3G and beyond cellular networks', Communications Magazine, IEEE, Publication Date: July, 2003, Vol.41, Issue7, On pp.58-65
  3. Shafique Ahmad Chaudhry, Ali Hammad Akbar, Ki- Hyung Kim, Suk-Kyo Hong, Won-Sik Yoon, 'HYWINMARC: An Autonomic Management Architecture for Hybrid Wireless Networks' Network Centric Ubiquitous Systems (NCUS 2006)
  4. Burke Richard, 2004, 'Network Management. Concepts and Practice: A Hands-on Approach', Pearson Education, Inc
  5. Minseok Oh. Network management agent allocation scheme in mesh networks Communications Letters, IEEE Vol.7, Issue12, Dec., 2003, pp.601-603
  6. Kishi Y. Tabata, K.; Kitahara, T.; Imagawa, Y.; Idoue, A.; Nomoto, S.; Implementation of the integrated network and link control functions for multi-hop mesh networks in broadband fixed wireless access systems Radio and Wireless Conference, 2004 IEEE 19-22 Sept., 2004, pp.43-46
  7. S. Yong-Lin, G. DeYuan, P. Jin, S. PuBing, A mobile agent and policy-based network management architecture, Proceedings, Fifth International Conference on Computational Intelligence and Multimedia Applications ICCIMA 2003, 27-30 Sept., 2003, pp.177-181
  8. Robert Steinke, Micah Clark, Elihu Mcmahon, 'A new pattern for flexible worker threads with in-place consumption message queues', Vol.39, Issue2, (April 2005) table of contents pp.71-73 Year of Publication: 2005 https://doi.org/10.1145/1055218.1055224
  9. Junaid Ahsenali Chaudhry, and Seung-Kyu Park, Some Enabling Technologies for Ubiquitous Systems, Journal of computer Science 2 (8): 627-633, 2006 https://doi.org/10.3844/jcssp.2006.627.633
  10. S. Garfinkel, 'PGP: Pretty Good Privacy,' O'Reily & Associates Inc., 1995
  11. Junaid Ahsenali Chaudhry, and Seungkyu Park, 'Using Artificial Immune Systems for Self Healing in Hybrid Networks', in Encyclopedia of Multimedia Technology and Networking, Published by Idea Group Inc., 2006. [To appear in 2008-09]
  12. Ma J., Zhao Q., Chaudhary V., Cheng J., Yang L. T., Huang H., and Jin Q., Ubisafe Computing: Vision and Challenges (I), Springer LNCS Vol.4158, Proc. of ATC-06, 2006
  13. Shelton, C. & Koopman, P., 'Improving System Dependability with Alternative Functionality,' DSN04, June, 2004
  14. Morikawa, H. (2004). The design and implementation of context-aware services. Proceedings of IEEE saintw 2004, 293-298
  15. D. C. Schmidt, 'Reactor: An Object Behavioral Pattern for Concurrent Event Demultiplexing and Event Handler Dispatching,' in Pattern Languages of Program Design (J. O. Coplien and D. C. Schmidt, eds.), pp.529-545, Reading, MA: Addison-Wesley, 1995
  16. D. C. Schmidt, 'Acceptor and Connector: Design Patterns for Initializing Communication Services,' in Pattern Languages of Program Design (R. Martin, F. Buschmann, and D. Riehle, eds.), Reading, MA: Addison-Wesley, 1997
  17. Junaid Ahsenali Chaudhry, Seungkyu Park, 'A Novel Autonomic Rapid Application Composition Scheme for Ubiquitous Systems', The 3rd International Conference on Autonomic and Trusted Computing (ATC-06), 2006
  18. Wolfgang Trumler, Jan Petzold, Faruk Bagci, Theo Ungerer, AMUN. Autonomic Middleware for Ubiquitious eNvironments Applied to the Smart Doorplate Project, International Conference on Autonomic Computing (ICAC-04), New York, NY, May 17-18, 2004
  19. Gao, J.; Kar, G.; Kermani, P.; Approaches to building self healing systems using dependency analysis, Network Operations and Management Symposium, 2004. NOMS 2004. IEEE/IFIP Vol.1, 19-23 April 2004 pp.119-132 Vol.1
  20. Junaid Chaudhry, and Seungkyu Park, 'On Seamless Service Delivery', The 2nd International Conference on Natural Computation (ICNC'06) and the 3rd International Conference on Fuzzy Systems and Knowledge Discovery (FSKD'06) 2006
  21. Ilgun, K.; Kemmerer, R.A.; Porras, P.A., 'State transition analysis: a rule-based intrusion detection approach,' Software Engineering, IEEE Transactions on, Vol.21, No.3, pp.181-199, Mar., 1995 https://doi.org/10.1109/32.372146
  22. T. F. Lunt, 'Real-time intrusion detection,' in Proc. COMPCON, San Francisco, CA, Feb., 1989
  23. T. F. Lunt et al., 'A real-time intrusion detection expert system,' SRI CSL Tech. Rep. SRI-CSL-90-05, June, 1990
  24. T. F. Lunt et al., 'A real-time intrusion detection expert system (IDES),' Final Tech. Rep., Comput. Sci. Laboratory, SRI Int., Menlo Park, CA, Feb., 1992
  25. Radosavac, S.; Seamon, K.; Baras, J.S., 'Short Paper: bufSTAT-a tool for early detection and classification of buffer overflow attacks,' Security and Privacy for Emerging Areas in Communications Networks, 2005. SecureComm 2005. First International Conference on, Vol., No., pp.231-233, 05-09 Sept., 2005
  26. J. Hu, I. Pyarali, and D. C. Schmidt, 'Applying the Proactor Pattern to High-Performance Web Servers,' in Proceedings of the 10th International Conference on Parallel and Distributed Computing and Systems, IASTED, Oct. 1998
  27. P. J. Denning: Thrashing: Its Causes and Prevention. Proc. AFlPS FJCC 33, 1968, pp.915-922 https://doi.org/10.1145/1476589.1476705
  28. Turing, Alan M., On Computable Numbers, with an Application to the Entscheidungs Problem. Proceedings of the London Mathematical Society, 2 (42):230-265, 1936
  29. Hideyuki Takahashi, Takuo Suganuma, Norio Shiratori: AMUSE: An Agent-based Middleware for Contextaware Ubiquitous Services. ICPADS (1) 2005: 743-749 https://doi.org/10.1109/ICPADS.2005.66