Constrained Component Deployment in Wide-Area Networks Using AI Planning Techniques
نویسندگان
چکیده
Component-based models represent a dominant trend in the construction of wide-area network applications, making possible the integration of diverse functionality contained in modules distributed across the network. Although linkages between modules have traditionally been specified statically, a growing number of frameworks are investigating approaches where appropriate components are dynamically selected and deployed in the network. Dynamic approaches enable flexible adaptation of the application to achieve load-balancing, satisfy QoS requirements, and in general, enable customization to changing client and network characteristics. A key element of dynamic component-based frameworks is the deployment plan, which describes the choice of components, their locations, and linkages. The problem of finding a valid component deployment is harder than traditional optimization problems because one needs to decide on the set of components while satisfying various constraints resulting from application semantic requirements, network resource limitations, and interactions between the two. Partly because of this complexity, existing component frameworks typically address only a limited case of the general deployment problem. In this paper, we propose a general model for the component placement problem (CPP) and present an algorithm for it, which is based on planning algorithms developed by the Artificial Intelligence community. These algorithms have benefited from several decades of research and offer substantial expressibility with good efficiency. We validate the effectiveness of our algorithm by demonstrating its scalability with respect to network size and number of components in the context of deployments generated for two example applications – a security-sensitive mail service, and a webcast service – in a variety of network environments.
منابع مشابه
Sekitei: An AI planner for Constrained Component Deployment in Wide-Area Networks
Wide-area network applications are increasingly being built using component-based models, enabling integration of diverse functionality in modules distributed across the network. In such models, dynamic component selection and deployment enables an application to flexibly adapt to changing client and network characteristics, achieve loadbalancing, and satisfy QoS requirements. Unfortunately, th...
متن کاملConstruction of Component-Based Applications by Planning
Many modern wide-area distributed systems are component-based. This approach provides great flexibility in adapting applications to the changing state of the environment and user requirements, but increases the complexity of configuring the applications. Because of the scale and heterogeneity of modern wide-area environments, manual configuration is hard, inefficient, suboptimal, and error-pron...
متن کاملTimeless Planning and the Component Placement Problem
Planning is traditionally associated with the search for sequences of actions spread over time. In this paper we present a component placement problem (CPP), which is concerned with sequences of actions spread in the space of wide-area networks. We argue that, despite the lack of a time component, the CPP is a planning problem. We discuss complexity of the CPP and similarities between the CPP a...
متن کاملThroughput Optimization of Unplanned Wireless Mesh Networks Deployment Using Partitioning Hierarchical Cluster (PHC)
----Wireless mesh networks based on IEEE 802.11 technology are a scalable and efficient solution for next generation wireless networking to provide wide-area wideband internet access to a significant number of users. The deployment of these wireless mesh networks may be within different authorities and without any planning, they are potentially overlapped partially or completely in the same ser...
متن کاملApplying Generic Bootstrapping Architecture for use with Constrained Devices
This paper discusses the possible use and required modifications of the 3GPP Generic Authentication Architecture as a security framework for constrained devices within Internet of Things deployments. The deployment architecture in this paper assumes a cellular operator running the requires backend infrastructure and also providing the wide area network access over a cellular wireless broadband....
متن کامل