Differentiated Quality of Service in Application Layer Active Networks

  • Chris Roadknight
  • Ian W. Marshall
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1942)


A novel approach to quality of service control in an active service network (application layer active network) is described. The approach makes use of a distributed genetic algorithm based on the unique methods that bacteria use to transfer and share genetic material. We have used this algorithm in the design of a robust adaptive control system for the active nodes in an active service network. The system has been simulated and results show that it can offer clear differentiation of active services. The algorithm places the right software, at the right place, in the right proportions; allows different time dependencies to be satisfied and simple payment related increases in performance.


Adaptive Control Queue Length Admission Control Service Request Active Service 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    Fry M and Ghosh A, “Application Layer Active Networking” Computer Networks, 31, 7, pp. 655–667, 1999.CrossRefGoogle Scholar
  2. [2]
    Giaffreda R, Walker N and Ruiz RY, “Performance of the DNS name resolution infrastructure”, Proc. IEE colloquium on “ Control of Next Generation Networks”, London, Oct 1999.Google Scholar
  3. [3]
    Marshall IW, Hardwicke J, Gharib H, Fisher M and Mckee P, “Active management of multiservice networks”, Proc. IEEE NOMS2000 pp981–3Google Scholar
  4. [4]
    Waddington DG and Hutchison D, “Resource Partitioning in General Purpose Operating Systems, Experimental Results in Windows NT”, Operating Systems Review, 33, 4, 52–74, Oct 1999.Google Scholar
  5. [7]
    Jacobson V, “Support for differentiated services in router designs”, Proc. Network modelling in the 21st Century, Royal Society Dec 1999.Google Scholar
  6. [8]
    Paxson V and Floyd S, “Wide Area Traffic: The Failure of Poisson Modelling”, IEEE/ACM Transactions on Networking, 3, 3, pp 226–244, 1995.CrossRefGoogle Scholar
  7. [9]
    Crovella M and Bestavros A, “Self-Similarity in World Wide Web Traffic: Evidence and Possible Causes”, IEEE/ACM Transactions on Networking, 5, 6, pp 835–846, Dec 1997.CrossRefGoogle Scholar
  8. [10]
    Gibbens R, Sargood SK, Kelly FP, Azmoodeh H, MacFadyen R, MacFadyen N, “An Approach to Service Level Agreements for IP networks with Differentiated Services”, Submitted to Phil. Trans. A, Royal society, 2000 and available at
  9. [11]
    Tsypkin YZ, “Adaptation and learning in automatic systems”, Mathematics in Science and Engineering Vol 73, Academic press, 1971.Google Scholar
  10. [12]
    DiCaro G and Dorigo M, “AntNet: Distributed stigmergic control for communications networks”, J. Artificial Intelligence Research, 9, pp. 317–365, 1998.Google Scholar
  11. [13]
    Fisher DA and Lipson HF, “Emergent algorithms — a new method of enhancing survivability in unbounded systems”, Proc 32nd Hawaii international conference on system sciences, IEEE, 1999Google Scholar
  12. [14]
    Gregory M, White B, Fisch EA and Pooch UW, “Cooperating security managers: A peer based intrusion detection system”, IEEE Network, 14, 4, pp.68–78, 1996.Google Scholar
  13. [15]
    Lewis L, “A case based reasoning approach to the management of faults in telecommunications networks”, Proc. IEEE conf. on Computer Communications (Vol 3), pp. 1422–29, San Francisco, 1993.Google Scholar
  14. [16]
    Holland JH, “Adaptation in Natural and Artificial Systems” MIT press, 1992.Google Scholar
  15. [17]
    Forrest S and Jones T, “Modeling Complex Adaptive Systems with Echo”, In Complex Systems: Mechanisms of Adaptation, (Ed. R. J. Stonier and X. H. Yu), IOS press pp. 3–21, 1994.Google Scholar
  16. [18]
    Burkhart R, “The Swarm Multi-Agent Simulation System”, OOPSLA '94 Workshop on “The Object Engine”, 7 September 1994.Google Scholar
  17. [19]
    Kreft JU, Booth G, and Wimpenny JWT, “BacSim, a simulator for individual-based modelling of bacterial colony growth”, Microbiology, 144, pp. 3275–3287, 1997.CrossRefGoogle Scholar
  18. [20]
    Ackley DH and Littman ML, “Interactions between learning and evolution”. pp. 487–507 in Artificial Life II (ed C. G. Langton, C. Taylor, J. D. Farmer and S. Rasmussen), Adison Wesley, 1993.Google Scholar
  19. [21]
    Harvey I, “The Microbial Genetic Algorithm”, unpublished work, 1996, available at
  20. [22]
    Sonea S and Panisset M, “A new bacteriology” Jones and Bartlett, 1983.Google Scholar
  21. [23]
    Caldwell DE, Wolfaardt GM, Korber DR and Lawrence JR, “Do Bacterial Communities Transcend Darwinism?” Advances in Microbial Ecology, Vol 15, p.105–191, 1997.Google Scholar
  22. [24]
    Nawa NE, Furuhashi T, Hashiyama T and Uchikawa Y, “A Study on the Relevant Fuzzy Rules Using Pseudo-Bacterial Genetic Algorithm” Proc IEEE Int Conf. on evolutionary computation 1997.Google Scholar
  23. [25]
    Marshall IW and Roadknight C, “Adaptive management of an active services network”, British Telecom. Technol. J., 18, 3, July 2000Google Scholar
  24. [26]
    Dawkins R, “The Selfish Gene”, Oxford University Press, 1976.Google Scholar
  25. [27]
    Kauffman S, “The origins of order”, Oxford University Press 1993 York (1996)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2000

Authors and Affiliations

  • Chris Roadknight
    • 1
  • Ian W. Marshall
  1. 1.BT Adastral Park, Martlesham HeathSuffolkUK

Personalised recommendations