Sekitei: An AI planner for Constrained Component Deployment in Wide-Area Networks
نویسندگان
چکیده
Wide-area network applications are increasingly being built using component-based models, enabling integration of diverse functionality in modules distributed across the network. In such models, dynamic component selection and deployment enables an application to flexibly adapt to changing client and network characteristics, achieve loadbalancing, and satisfy QoS requirements. Unfortunately, the problem of finding a valid component deployment is hard because one needs to decide on the set of components while satisfying various constraints resulting from application semantic requirements, network resource limitations, and interactions between the two. In this paper, we describe a general model for the component placement problem and present an algorithm for it, which is based on AI planning algorithms. We validate the effectiveness of our algorithm by demonstrating its scalability with respect to network size and number of components in the context of deployments generated for two example applications – a security-sensitive mail service, and a webcast service – in a variety of network environments.
منابع مشابه
Constrained Component Deployment in Wide-Area Networks Using AI Planning Techniques
Component-based models represent a dominant trend in the construction of wide-area network applications, making possible the integration of diverse functionality contained in modules distributed across the network. Although linkages between modules have traditionally been specified statically, a growing number of frameworks are investigating approaches where appropriate components are dynamical...
متن کاملApplying Generic Bootstrapping Architecture for use with Constrained Devices
This paper discusses the possible use and required modifications of the 3GPP Generic Authentication Architecture as a security framework for constrained devices within Internet of Things deployments. The deployment architecture in this paper assumes a cellular operator running the requires backend infrastructure and also providing the wide area network access over a cellular wireless broadband....
متن کاملAn artificial intelligence model based on LS-SVM for third-party logistics provider selection
The use of third-party logistics (3PL) providers is regarded as new strategy in logistics management. The relationships by considering 3PL are sometimes more complicated than any classical logistics supplier relationships. These relationships have taken into account as a well-known way to highlight organizations' flexibilities to regard rapidly uncertain market conditions, follow core competenc...
متن کاملAdaptation Layer Translator (ALX) Design and Application
High quality video-conferencing is an efficient tool for interactive scientific collaboration in the research community, especially for researchers separated by substantial distance. With the wide deployment of broadband wide area IP networks such as the Internet2, there is an increasing demand for improved remote collaboration with these networks. In order to make the high quality video-confer...
متن کاملArchitecture-Level Support for Software Component Deployment in Resource Constrained Environments
Software deployment comprises activities for installing or updating an already implemented software system. These activities include (1) deployment of a system onto a new host, (2) component upgrade in an existing system, (3) static analysis of the proposed system configuration, and (4) dynamic analysis of the configuration after the deployment. In this paper, we describe an approach that suppo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004