Sekitei: An AI planner for Constrained Component Deployment in Wide-Area Networks

نویسندگان

  • Tatiana Kichkaylo
  • Anca Ivan
  • Vijay Karamcheti
چکیده

Wide-area network applications are increasingly being built using component-based models, enabling integration of diverse functionality in modules distributed across the network. In such models, dynamic component selection and deployment enables an application to flexibly adapt to changing client and network characteristics, achieve loadbalancing, and satisfy QoS requirements. Unfortunately, the problem of finding a valid component deployment is hard because one needs to decide on the set of components while satisfying various constraints resulting from application semantic requirements, network resource limitations, and interactions between the two. In this paper, we describe a general model for the component placement problem and present an algorithm for it, which is based on AI planning algorithms. We validate the effectiveness of our algorithm by demonstrating its scalability with respect to network size and number of components in the context of deployments generated for two example applications – a security-sensitive mail service, and a webcast service – in a variety of network environments.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Constrained Component Deployment in Wide-Area Networks Using AI Planning Techniques

Component-based models represent a dominant trend in the construction of wide-area network applications, making possible the integration of diverse functionality contained in modules distributed across the network. Although linkages between modules have traditionally been specified statically, a growing number of frameworks are investigating approaches where appropriate components are dynamical...

متن کامل

Applying Generic Bootstrapping Architecture for use with Constrained Devices

This paper discusses the possible use and required modifications of the 3GPP Generic Authentication Architecture as a security framework for constrained devices within Internet of Things deployments. The deployment architecture in this paper assumes a cellular operator running the requires backend infrastructure and also providing the wide area network access over a cellular wireless broadband....

متن کامل

An artificial intelligence model based on LS-SVM for third-party logistics provider ‎selection

The use of third-party logistics (3PL) providers is regarded as new strategy in logistics management. The relationships by considering 3PL are sometimes more complicated than any classical logistics supplier relationships. These relationships have taken into account as a well-known way to highlight organizations' flexibilities to regard rapidly uncertain market conditions, follow core competenc...

متن کامل

Adaptation Layer Translator (ALX) Design and Application

High quality video-conferencing is an efficient tool for interactive scientific collaboration in the research community, especially for researchers separated by substantial distance. With the wide deployment of broadband wide area IP networks such as the Internet2, there is an increasing demand for improved remote collaboration with these networks. In order to make the high quality video-confer...

متن کامل

Architecture-Level Support for Software Component Deployment in Resource Constrained Environments

Software deployment comprises activities for installing or updating an already implemented software system. These activities include (1) deployment of a system onto a new host, (2) component upgrade in an existing system, (3) static analysis of the proposed system configuration, and (4) dynamic analysis of the configuration after the deployment. In this paper, we describe an approach that suppo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004