The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The success of mainstream computing is largely due to the widespread availability of general-purpose architectures and of generic approaches that can be used to solve real-world problems cost-effectively and across a broad range of application domains. In this chapter, we propose that a similar generic framework is used to make the development of autonomic solutions cost effective, and to establish...
Increasingly, systems must have the ability to self-adapt to meet changes in their execution environment. Unfortunately, existing solutions require human oversight, or are limited in the kinds of systems and the set of quality-of-service concerns they address. Our approach, embodied in a system called Rainbow, uses software architecture models and architectural styles to overcome existing limitations...
Mobile agents (MAs) are referred to as autonomous application programs with the inherent ability to move from node to node towards a goal completion. In the context of wireless sensor networks (WSNs), MAs may be used by network administrators in the process of combining data and knowledge from different sources aiming at maximizing the useful information content. MAs have been initially developed...
Distributed software environments are increasingly complex anddifficult to manage, as they integrate various legacy software withspecific management interfaces. Moreover, the fact that management tasks are performed by humans leads to many configuration errors and low reactivity. This is particularly true in medium or large-scale distributed infrastructures. To address this issue, we explore the design...
An autonomic computing system is organized into building blocks that can be composed together to form a self-managing system. Architecturally, this matches service-based computing systems, which are the outcomes of the most recent effort to provide interoperability and usability through the use of services. Autonomic computing is an attractive information technology for managers and clients. Rather...
Dynamic spectrum access (DSA) has raisedthe attention of industrial and academic researchers due to the fact thatit is seen as a technologyable to overcome the lack of available spectrum for new communication services.In particular, autonomic DSA (ADSA) systems are indicated as a solution to spectrumscarcity caused by the current “command and control” allocationparadigm. However, ADSA requires a higher...
The main objective of this chapter is to describe a set of viable solutions aiming to enhance the robustness and the availability of current IMS-based architectures owing to the activation of autonomic-like techniques. This chapter adopts a Service Provider standpoint and clarifies the scope of autonomic behaviors within an administrative service domain owned and managed by a Service Provider. The...
In the past decade, the usage of portable communication devices hascontinued to increase. Autonomic communications (AC) represents anew frontier for mobile communications because they will allowautonomous and self-regulated network and communicationprotocols procedures. Dynamic observation of the spectrum andadaptive reactions of the autonomic terminal to wireless channelconditions are hence important...
With voluntary users participating in an autonomic manner, peer-to-peer (P2P) systems have been proliferating in an unprecedented pace. Indeed, it is widely known that P2P traffic now constitutes over 60% of total Internet traffic. P2P systems are now used for file sharing, media streaming, and various other social networking applications. Furthermore, P2P systems are also extending their reach to...
Autonomic networks present a fundamental shift in the design philosophy of networks and systems. Thus far, research has focused on addressing the self-management properties. In this book chapter, we illuminate two important issues in autonomic networks that are seldom addressed: knowledge management and self-stabilization. Through in-depth discussion on their concepts, challenges, and relevant works,...
In this chapter, we address autonomic networking in termsof wireless sensor networks (WSNs), a typical example of wirelessnetworks in pervasive computing. In order to investigate the stateof the art of autonomic networking in sensor networks and its futureprospects, we start with a short summary of autonomic networking andSensor networks. It follows the discussion of the appliance ofautonomic networking...
A key software engineering challenge in autonomic computing is the complexity of administrating operational policies of applications. In order to address this challenge, this chapter proposes and evaluates a new development environment, called iNetLab, which is designed to improve the productivity of designing, maintaining, and tuning operational policies in autonomic network applications. iNetLab...
High-performance interconnection networks such as InfiniBand, ASI, Autonet, and Myrinet have the property of link level flow control. As such, alterating the routing function while the network is operational is a complex process, because the danger of packet deadlocks must be addressed. Over the past 5–6 years this problem has been addressed and solved by the research community. This chapter...
Web services, which have evolved along with the World Wide Web, hold great potential for building multi-organizational dynamic workflows. The management of these networked Web service-based processes presents significant challenges. The varying workload of the Internet, the heterogeneous multi-component structure of the Web services environment, and the complexity in building and managing Web services-based...
Network protection should be a number one priority on every network operator’s list. Even the best network is useless, if an intruder can gain control. Although the research community has been working in this field for decades, we are still at a far remove from networks where successful attacks are the exception. Scant deployment of security solutions is not the only reason. The fast evolution of...
A new computing paradigm is currently on spot: autonomic computing (AC), which is inspired by the human autonomic nervous system. AC is characterized by its self-* facets such as self-configuration, self-healing, self-optimization, and self-protection. The overarching goal of AC is to realize computer systems, and thus networked computing systems, that can manage themselves without direct human interventions...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.