2011. 2. 17. Real-Time Systems Laboratory Seolyoung, Jeong The CASCADAS Framework for Autonomic Communications Autonomic Communication 2009. Springer.

Slides:



Advertisements
Similar presentations
The Next Generation Grid Kostas Tserpes, NTUA Beijing, 22 of June 2005.
Advertisements

Presented by: Thabet Kacem Spring Outline Contributions Introduction Proposed Approach Related Work Reconception of ADLs XTEAM Tool Chain Discussion.
A SLA evaluation Methodology in Service Oriented Architectures V.Casola, A.Mazzeo, N.Mazzocca, M.Rak University of Naples “Federico II”, Italy Second University.
OASIS Reference Model for Service Oriented Architecture 1.0
OASIS Service Oriented Architecture Reference Model Technical Committee (SOA-RM) BOOT CAMP April DRAFT: Not approved by the OASIS SOA RM TC.
Variability Oriented Programming – A programming abstraction for adaptive service orientation Prof. Umesh Bellur Dept. of Computer Science & Engg, IIT.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Knowledge Acquisitioning. Definition The transfer and transformation of potential problem solving expertise from some knowledge source to a program.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
1 Optimizing Utility in Cloud Computing through Autonomic Workload Execution Reporter : Lin Kelly Date : 2010/11/24.
Efficient OLAP Query Processing for Distributed Data Warehouses Michael O. Akinde, SMHI, Sweden & NDB, Aalborg University, Denmark Michael H. Böhlen, NDB,
Software Architecture April-10Confidential Proprietary Master Data Management mainly inspired from Enterprise Master Data Management – An SOA approach.
Development Principles PHIN advances the use of standard vocabularies by working with Standards Development Organizations to ensure that public health.
1 Autonomic Computing An Introduction Guenter Kickinger.
Katanosh Morovat.   This concept is a formal approach for identifying the rules that encapsulate the structure, constraint, and control of the operation.
Chapter 8 Architecture Analysis. 8 – Architecture Analysis 8.1 Analysis Techniques 8.2 Quantitative Analysis  Performance Views  Performance.
Mechanism to support establishment of charging policies Group Name: WG2-ARC Source: InterDigital Meeting Date: TP8 Agenda Item:
1st Workshop on Intelligent and Knowledge oriented Technologies Universal Semantic Knowledge Middleware Marek Paralič,
Formalizing the Asynchronous Evolution of Architecture Patterns Workshop on Self-Organizing Software Architectures (SOAR’09) September 14 th 2009 – Cambrige.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
A semi autonomic infrastructure to manage non functional properties of a service Pierre de Leusse Panos Periorellis Paul Watson Theo Dimitrakos UK e-Science.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
Page 1 WWRF Briefing WG2-br2 · Kellerer/Arbanowski · · 03/2005 · WWRF13, Korea Stefan Arbanowski, Olaf Droegehorn, Wolfgang.
Embedding Constraint Satisfaction using Parallel Soft-Core Processors on FPGAs Prasad Subramanian, Brandon Eames, Department of Electrical Engineering,
Geneva, Switzerland, 17 October 2011 Summary of Session 4: SDP standardization status and requirements Huilan Lu, Ph.D. SG 13 Vice Chairman ITU Workshop.
A Context Model based on Ontological Languages: a Proposal for Information Visualization School of Informatics Castilla-La Mancha University Ramón Hervás.
Grid programming with components: an advanced COMPonent platform for an effective invisible grid © 2006 GridCOMP Grids Programming with components. An.
1 Service Sharing with Trust in Pervasive Environment: Now it’s Time to Break the Jinx Sheikh I. Ahamed, Munirul M. Haque and Nilothpal Talukder Ubicomp.
Enabling Self-management of Component-based High-performance Scientific Applications Hua (Maria) Liu and Manish Parashar The Applied Software Systems Laboratory.
16/11/ Semantic Web Services Language Requirements Presenter: Emilia Cimpian
Course: COMS-E6125 Professor: Gail E. Kaiser Student: Shanghao Li (sl2967)
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
Jemerson Pedernal IT 2.1 FUNDAMENTALS OF DATABASE APPLICATIONS by PEDERNAL, JEMERSON G. [BS-Computer Science] Palawan State University Computer Network.
1 An infrastructure for context-awareness based on first order logic 송지수 ISI LAB.
1 Ji Wang and Dongsheng Li National Lab for Parallel and Distributed Processing Introduction of iVCE ( Internet-based V irtual C omputing E nvironment.
1 © 2013 Cengage Learning. All Rights Reserved. This edition is intended for use outside of the U.S. only, with content that may be different from the.
ARTEMIS SRA 2016 Trust, Security, Robustness, and Dependability Dr. Daniel Watzenig ARTEMIS Spring Event, Vienna April 13, 2016.
Designing a Federated Testbed as a Distributed System Robert Ricci, Jonathon Duerig, Gary Wong, Leigh Stoller, Srikanth Chikkulapelly, Woojin Seok 1.
SRA 2016 – Strategic Research Challenges Design Methods, Tools, Virtual Engineering Jürgen Niehaus, SafeTRANS.
DPNM, POSTECH 1/22 CSED702G/ITCE710E: Managing Convergence Networks Jonghwan Hyun 1, Jian Li 2 1 Dept. of Computer Science and Engineering 2 Division of.
1 The XMSF Profile Overlay to the FEDEP Dr. Katherine L. Morse, SAIC Mr. Robert Lutz, JHU APL
RESERVOIR Service Manager NickTsouroulas Head of Open-Source Reference Implementations Unit Juan Cáceres
In the name of God.
ORACLE SOA 11g ONLINE TRAINING
Presented by Edith Ngai MPhil Term 3 Presentation
Design Review.
Talal H. Noor, Quan Z. Sheng, Lina Yao,
Data Management on Opportunistic Grids
Integrated Planning of Transmission and Distribution Systems
Case Study -- Weather system
Self Healing and Dynamic Construction Framework:
Introduction to Design Patterns
Institute for Cyber Security
The GEMBus Architecture and Core Components
Securing the Network Perimeter with ISA 2004
Giannis F. Marias, Vassileios Tsetsos,
Web Ontology Language for Service (OWL-S)
Enterprise Data Model Enterprise Architecture approach Insights on application for through-life collaboration 2018 – E. Jesson.
The Extensible Tool-chain for Evaluation of Architectural Models
NAAS 2.0 Features and Enhancements
Chapter 20 Object-Oriented Analysis and Design
Composite Subscriptions in Content-based Pub/Sub Systems
The Anatomy and The Physiology of the Grid
Chapter 5 Architectural Design.
Design Yaodong Bi.
Concepts & Thoughts on Operational Resiliency (Feb 11)
Business Process Management and Semantic Technologies
Cryptography and Network Security
Concerning the Scope of ITU-T
Presentation transcript:

Real-Time Systems Laboratory Seolyoung, Jeong The CASCADAS Framework for Autonomic Communications Autonomic Communication Springer

Introduction CASCADAS Framework –ACE Component Model Semantic Self-Organization Situation-Awareness Pervasive Supervision Security and Self-Preservation Pervasive Behavioral Advertisement Scenario Conclusions Contents

CASCADAS (Component-ware for Autonomic Situation-aware Communications, And Dynamically Adaptable Services) 3 year project from 2006 – 2008 Consortium –IT (Telecom Italia) –BT (British Telecommunications), UK –12 partners from Academia and industry Goals –design, develop and validate a distributed framework (based on ACE) for composition and execution of situation-aware and dynamically adaptable communication services. –cope with dynamic and uncertain environments Introduction

CASCADAS Framework Fig. Architecture of the CASCADAS Framework considers developing and deploying applications and services in terms of ACE components or ACE aggregates. ACE-based tools to enforce specific properties concerned with actual network architectures and with physical sensing and embedded systems

ACE (Autonomic Communication Element) ACE Component Model Fig. State diagram of ACE’s lifecycle management Manager is in charge of lifecycle and internal event handling Supervision Bus and Gateway Checker Objects observing and controlling inter/intra communication events of an ACE Gateway for external communications Executor is the organ in charge of executing the plans Plan contains a set of states and transitions which have to be processed by the Executor Functionality Repository enables specific functionalities to be deployed and accessed on request Self Model is a set of predefined plans (in XML) representing the potential behaviors (e.g. in terms of invoked functionalities) of an ACE. Facilitator analyses it and uses its rules to continuously generate and/or update Plans. create/modify read execute call functionalities

Supports through algorithms for organized self-aggregation of ACEs. –clustering –differentiation –synchronization Two parallel approaches for introducing self-* algorithms: –extending the gateway –creating new self-models Semantic Self-Organization Fig. Self-organized aggregation through local rewiring with three ACEs. Fig. rewiring algorithm

Situation-Awareness Fig. Architecture of the KN KN is in charge of gathering and processing information to form a collection of Knowledge Atoms (KAs) KAs data model was created to represent any fact, in a simple and expressive way, by means of a 4-tuple of the form (Who, What, Where, When). This 4-tuple represents the basic unit of information in KAs and allows to account an entity (Who) involved in some activity (What) at a certain location (Where) at a certain moment (When). takes from context-awareness. advances with techniques to organize the amount of distributed information in proper, strongly distributed “knowledge networks” to support situated and adaptive service provisioning.

refers to the ongoing observation of ACEs and the issuing of corrective measures upon detection of hazardous situations Pervasive Supervision Fig. ACEs for pervasive supervision

A distinctive feature of ACEs framework is the absence of a centralized authority. A-priori trust relationships between ACEs belonging to different administrative domains cannot be assumed. –ACEs can show selfish, uncooperative or, in the worst-case, malicious behavior. Therefore, it becomes of paramount importance to address security issues in two distinct directions to cope with this wide range of attacks. Security and Self-Preservation

Pervasive Behavioral Advertisement Scenario Fig. The Pervasive Behavioral Advertisement scenario

ACE conceptualization and abstract model Development of pervasive supervision functionalities Evaluation and development of algorithms for automated aggregation Evaluation and development of self-preservation techniques for ACEs Identification of models for the organization, correlation, and composition of knowledge networks Quantitative evaluation of autonomic capabilities. Geographically distributed test-beds Conclusions

Thank you!