Skip to main content

AHSEN – Autonomic Healing-Based Self Management Engine for Network Management in Hybrid Networks

  • Conference paper
Advances in Grid and Pervasive Computing (GPC 2007)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4459))

Included in the following conference series:

Abstract

In this paper, we present a novel self-healing engine for autonomic network management. A light weight Self Management Frame (SMF) performs monitoring and optimization functions autonomously and the other self management functions, driven by context, are invoked on demand from the server. The policies are maintained to calculate the trust factor for network entities and those trust factors will be used at the later stages of our project to enforce resource utilization policies. The plug-ins, residing at the server, are used to perform the on-demand management functions not performed by SMF at client side. A Simple Network Management Protocol (SNMP) based monitoring agent is applied that also triggers the local management entities and passes the exceptions to the server which determines the appropriate plug-in. Considering the amount of resources being put into current day management functions and contemporary autonomic management architectures our findings show improvement in certain areas that can go a long way to improve the network performance and resilience.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Firetide: Instant Mesh Networks: http://www.firetide.com

  2. Doufexi, A., et al.: Hotspot wireless LANs to enhance the performance of 3G and beyond cellular networks. IEEE Communications Magazine, 58- 65 (July 2003)

    Google Scholar 

  3. Chaudhry, S.A., et al.: HYWINMARC: An Autonomic Management Architecture for Hybrid Wireless Networks. In: EUC Workshops, pp. 193–202 (2006)

    Google Scholar 

  4. Burke, J.R.: Network Management: Concepts and Practice: A Hands-on Approach. Pearson Education, London (2004)

    Google Scholar 

  5. Minseok, O.: Network management agent allocation scheme in mesh networks. IEEE Communications Letters, 601–603 (Dec. 2003)

    Google Scholar 

  6. Kishi, Y., et al.: Implementation of the integrated network and link control functions for multi-hop mesh networks. In: IEEE Radio and Wireless Conference, September 2004, pp. 43–46 (2004)

    Google Scholar 

  7. Shi, Y., et al.: A mobile agent- and policy-based network management architecture. In: Proceedings of the Fifth International Conference on Computational Intelligence and Multimedia Applications (ICCIMA’03), September 2003, pp. 177–181 (2003)

    Google Scholar 

  8. IBM white paper, Autonomic Computing: Enabling Self-Managing Solutions, SOA and Autonomic Computing (December 2005)

    Google Scholar 

  9. Chaudhry, J.A., Park, S.: Some Enabling Technologies for Ubiquitous Systems. Journal of Computer Science, 627-633 (2006)

    Google Scholar 

  10. Garfinkel, S.: PGP: Pretty Good Privacy. O’Reilly & Associates Inc, Sebastopol (1995)

    Google Scholar 

  11. Chaudhry, J.A., Park, S.: Using Artificial Immune Systems for Self Healing in Hybrid Networks. To appear in Encyclopedia of Multimedia Technology and Networking. Idea Group Inc. (2006)

    Google Scholar 

  12. Ma, J., et al.: Ubisafe Computing: Vision and Challenges (I). In: Yang, L.T., et al. (eds.) ATC 2006. LNCS, vol. 4158, pp. 386–397. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  13. Shelton, C., Koopman, P.: Improving System Dependability with Alternative Functionality. In: Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN’04), June 2004, p. 295 (2004)

    Google Scholar 

  14. Morikawa, H.: The design and implementation of context-aware services. In: International Symposium on Applications and the Internet Workshops (SAINT-W’04), pp. 293–298 (2004)

    Google Scholar 

  15. Strowes, S., et al.: An Event Service Supporting Autonomic Management of Ubiquitous Systems for e-Health. In: 26th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS-W’06), pp. 22–22 (2006)

    Google Scholar 

  16. Park, S.-K., Chaudhry, J.A.: A Novel Autonomic Rapid Application Composition Scheme for Ubiquitous Systems. In: Yang, L.T., et al. (eds.) ATC 2006. LNCS, vol. 4158, pp. 48–56. Springer, Heidelberg (2006)

    Google Scholar 

  17. Trumler, W., et al.: AMUN – Autonomic Middleware for Ubiquitious eNvironments Applied to the Smart Doorplate Project. In: International Conference on Autonomic Computing (ICAC-04), May 2004, pp. 274–275 (2004)

    Google Scholar 

  18. Gao, J., Kar, G., Kermani, P.: Approaches to building self healing systems using dependency analysis. In: IEEE/IFIP Network Operations and Management Symposium 2004 (NOMS’04), April 2004, pp. 119–132 (2004)

    Google Scholar 

  19. Chaudhry, J.A., Park, S.: On Seamless Service Delivery. In: The 2nd International Conference on Natural Computation (ICNC’06) and the 3rd International Conference on Fuzzy Systems and Knowledge Discovery (FSKD’06), September 2006, pp. 253–261 (2006)

    Google Scholar 

  20. Ilgun, K., Kemmerer, R.A., Porras, P.A.: State transition analysis: a rule-based intrusion detection approach. IEEE Transactions on Software Engineering, !81-199 (March 1989)

    Google Scholar 

  21. Lunt, T.F.: Real-time intrusion detection. In: Thirty-Fourth IEEE Computer Society International Conference: Intellectual Leverage, Digest of Papers (COMPCON Spring ’89), March 1989, pp. 348–353 (1989)

    Google Scholar 

  22. Lunt, T.F., Jagannathan, R.: A prototype real-time intrusion-detection expert system. In: Proceedings of IEEE Symposium on Security and Privacy, Apr. 1988, pp. 59–66 (1988)

    Google Scholar 

  23. Lunt, T.F., et al.: IDES: a progress report [Intrusion-Detection Expert System]. In: Proceedings of the Sixth Annual Computer Security Applications Conference, Dec. 1990, pp. 273–285 (1990)

    Google Scholar 

  24. Radosavac, S., Seamon, K., Baras, J.S.: Short Paper: bufSTAT - a tool for early detection and classification of buffer overflow attacks. In: First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureComm 2005), Sep. 2005, pp. 231–233 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Christophe Cérin Kuan-Ching Li

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Chaudhry, J.A., Park, S. (2007). AHSEN – Autonomic Healing-Based Self Management Engine for Network Management in Hybrid Networks. In: Cérin, C., Li, KC. (eds) Advances in Grid and Pervasive Computing. GPC 2007. Lecture Notes in Computer Science, vol 4459. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72360-8_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-72360-8_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-72359-2

  • Online ISBN: 978-3-540-72360-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics