PIRR: a Methodology for Distributed Network Management in Mobile Networks

نویسنده

  • FILIPPO NERI
چکیده

The current centralized Network Management approach in mobile networks may lead to problems with being able to scale up when new customer services and network nodes will be deployed in the network. The next generation mobile networks proposed by 3rd Generation Partnership Project (3GPP) envision a flat network architecture comprising some thousands of network nodes, each of which will need to be managed, in a timely and efficient fashion. This consideration has prompted a research activity to find alternative application architectures that could overcome the limits of the current centralized approaches. section approach to deal with the increasing network size and complexity is to move from a centralized Network Management system to a more distributed or decentralized approach where each Network Management application consists of a controller part and a set of distributed parts running on the individual network elements. This approach however raises questions of how to measure and estimate the resource requirements when planning to distribute the Network Management applications in the mobile networks before starting to produce commercial systems. In this paper, we describe the PIRR methodology we have developed to measure resource requirements for distributed applications in mobile networks and the experimental findings of its application to new Network Management applications. Key–Words: Software Agents, JADE, Telecom network management system, distributed simulation systems, 3G cellular system.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Estimating resource requirements for distributed Network Management applications in mobile networks

he current centralized Network Management approach in mobile networks may lead to problems with being able to scale up when new customer services and network nodes will be deployed in the network. This consideration has prompted a research activity to find alternative application architectures that could overcome the limits of the current centralized approaches. In this paper, we describe the P...

متن کامل

Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface

Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...

متن کامل

Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface

Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...

متن کامل

Dynamic Obstacle Avoidance by Distributed Algorithm based on Reinforcement Learning (RESEARCH NOTE)

In this paper we focus on the application of reinforcement learning to obstacle avoidance in dynamic Environments in wireless sensor networks. A distributed algorithm based on reinforcement learning is developed for sensor networks to guide mobile robot through the dynamic obstacles. The sensor network models the danger of the area under coverage as obstacles, and has the property of adoption o...

متن کامل

DALD:-Distributed-Asynchronous-Local-Decontamination Algorithm in Arbitrary Graphs

Network environments always can be invaded by intruder agents. In networks where nodes are performing some computations, intruder agents might contaminate some nodes. Therefore, problem of decontaminating a network infected by intruder agents is one of the major problems in these networks. In this paper, we present a distributed asynchronous local algorithm for decontaminating a network. In mos...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008