Presented by: Saurav Kumar Bengani

Slides:



Advertisements
Similar presentations
A Data Dissemination Method for Supporting Mobile Sinks in Hierarchical Routing Protocol of WSN APAN 2008 Jieun Cho 4, August,
Advertisements

IEEE INFOCOM 2004 MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card.
Multirate adaptive awake-sleep cycle in hierarchical heterogeneous sensor network BY HELAL CHOWDHURY presented by : Helal Chowdhury Telecommunication laboratory,
GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications Rongxing Lu, Xu Li, Xiaohui Liang, Xuemin (Sherman) Shen, and Xiaodong.
Achieving Better Privacy Protection in WSNs Using Trusted Computing Yanjiang YANG, Robert DENG, Jianying ZHOU, Ying QIU.
1 Introduction to Load Balancing: l Definition of Distributed systems. Collection of independent loosely coupled computing resources. l Load Balancing.
SensIT PI Meeting, April 17-20, Distributed Services for Self-Organizing Sensor Networks Alvin S. Lim Computer Science and Software Engineering.
Adaptive Traffic Light Control with Wireless Sensor Networks Presented by Khaled Mohammed Ali Hassan.
Mobile Agents in Wireless Sensor Networks Ivan Vukasinovic Zoran Babovic Goran Rakocevic.
Intrusion Detection System for Wireless Sensor Networks: Design, Implementation and Evaluation Dr. Huirong Fu.
Adaptive QoS Management for IEEE Future Wireless ISPs 通訊所 鄭筱親 Wireless Networks 10, 413–421, 2004.
Jason Ernst and Mieso Denko
1 Adaptive QoS Framework for Wireless Sensor Networks Lucy He Honeywell Technology & Solutions Lab No. 430 Guo Li Bin Road, Pudong New Area, Shanghai,
An affinity-driven clustering approach for service discovery and composition for pervasive computing J. Gaber and M.Bakhouya Laboratoire SeT Université.
EMP: A Network Management Protocol for IP-Based Wireless Sensor Networks 2010 International Conference on Communication in Wireless Environments and Ubiquitous.
Dart: A Meta-Level Object-Oriented Framework for Task-Specific Behavior Modeling by Domain Experts R. Razavi et al..OOPSLA Workshop DSML‘ Dart:
An Autonomic Framework in Cloud Environment Jiedan Zhu Advisor: Prof. Gagan Agrawal.
Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks.
Distributed Anomaly Detection in Wireless Sensor Networks Ksutharshan Rajasegarar, Christopher Leckie, Marimutha Palaniswami, James C. Bezdek IEEE ICCS2006(Institutions.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 1 Wireless Sensor Network Wireless Sensor Network Based.
High Level Architecture (HLA)  used for building interactive simulations  connects geographically distributed nodes  time management (for time- and.
MagicNET: Security System for Protection of Mobile Agents.
Cerberus: A Context-Aware Security Scheme for Smart Spaces presented by L.X.Hung u-Security Research Group The First IEEE International Conference.
1 Policy-based architecture. 2 Policy management view of the architecture IP MMed domain is a converged services domain where voice, video, data are provided.
NGMAST 2008 A Proactive and Distributed QoS Negotiation Approach for Heterogeneous environments Anis Zouari, Lucian Suciu, Jean Marie Bonnin, and Karine.
COGNITIVE RADIO NETWORKING AND RENDEZVOUS Presented by Vinay chekuri.
Integrating Computing Resources on Multiple Grid-enabled Job Scheduling Systems Through a Grid RPC System Yoshihiro Nakajima, Mitsuhisa Sato, Yoshiaki.
Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks Y.J. Yang, J.Y. Zhou, R.H. Deng, F. Bao Presenter: Jianying Zhou.
An Energy-Efficient and Low-Latency Routing Protocol for Wireless Sensor Networks Antonio G. Ruzzelli, Richard Tynan and G.M.P. O’Hare Adaptive Information.
KAIS T Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks Wei Wang, Vikram Srinivasan, Kee-Chaing Chua MobiCom ‘05 Presentation by.
Seminar on Joint Scheduling for Wireless Sensor Network (Proposed by: Chong Liu, Kui Wu, Yang Xiao, Bo Sun) Presented by: Saurav Kumar Bengani.
A Protocol for Tracking Mobile Targets using Sensor Networks H. Yang and B. Sikdar Department of Electrical, Computer and Systems Engineering Rensselaer.
CMSC 691B Multi-Agent System A Scalable Architecture for Peer to Peer Agent by Naveen Srinivasan.
Euro-Par, HASTE: An Adaptive Middleware for Supporting Time-Critical Event Handling in Distributed Environments ICAC 2008 Conference June 2 nd,
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
Distributed Localization Using a Moving Beacon in Wireless Sensor Networks IEEE Transactions on Parallel and Distributed System, Vol. 19, No. 5, May 2008.
Source : 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) Auther : Nacer Khalil, Mohamed.
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
In the name of God.
CHAPTER 25 - Distributed Databases and Client–Server Architectures
Authors: Jiang Xie, Ian F. Akyildiz
University of Maryland College Park
Introduction to Load Balancing:
Energy Constrained Routing Algorithm for Wireless Networks
Distributed Algorithms for Mobile Sensor Networks
Presented by: Rohit Rangera
World-Leading Research with Real-World Impact!
Wireless Sensor Network Architectures
Design and Implementation of Spacecraft Avionics Software Architecture based on Spacecraft Onboard Interface Services and Packet Utilization Standard Beijing.
Energy-Efficient Communication Protocol for Wireless Microsensor Networks by Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan Presented.
Algorithms for Big Data Delivery over the Internet of Things
Aziz Nasridinov and Young-Ho Park*
Introduction to Wireless Sensor Networks
Multiple Robots For Multiple Missions: Architecture for Complex Collaboration Noa Agmon1, Oleg Maksimov1, Ariel Rosenfeld2, Shai Shlomai1, Sarit Kraus1.
Mobile Agents.
An Adaptive Middleware for Supporting Time-Critical Event Response
Assoc. Prof. Dr. Syed Abdul-Rahman Al-Haddad
Wireless Sensor Networks
Modeling and Simulation of WSN for Target Tracking
Architectural Requirements for the Effective Support of Adaptive Mobile Applications Lawrence Li ICS 243F.
Wide Area Workload Management Work Package DATAGRID project
Architectural Requirements for the Effective Support of Adaptive Mobile Applications Lawrence Li ICS 243F.
Market-based Dynamic Task Allocation in Mobile Surveillance Systems
AAA: A Survey and a Policy- Based Architecture and Framework
Subject Name: Adhoc Networks Subject Code: 10CS841
Optimizing Energy Consumption in Wireless Sensor
Resource Allocation for Distributed Streaming Applications
SUBJECT –AWSN (ELECTIVE-III)
Substation Automation IT Needs
Presentation transcript:

Presented by: Saurav Kumar Bengani Seminar on Mobile Agent Based Policy Management for Wireless Sensor Network (Proposed by: ZHOU Ying, Xiao Debao) Presented by: Saurav Kumar Bengani

Contents Introduction Mobile Agent Technology Policy Technology Structural Model of Network Management Hierarchical Architecture of policy management Mobile Agent-Based Network Management Conclusion References

Introduction WSN network management critical problem when a large number of sensor nodes are involved. In order to simultaneously satisfy limitations like power constraints, limited bandwidth, distributed coordination and deployment we need an efficient network management in WSN. Mobile Agent-based policy network management system for wireless sensor networks, which aims at providing effective management mechanism

Mobile Agent Technology Mobile agent is the combination of distributed and artificial intelligence technologies the main concept of it is to execute in distribution. Mobile agent is a section of code that can implement user tasks autonomously. A mobile agent can suspend its execution on a node, and then migrate and transfer its code, data state, to another node on the network. Thus, it can save the network communication bandwidth effectively, and improve the degree of parallelism and real-time performance of the task execution.

Advantage of Mobile Agents Reduce the flow quantity Integrate with distributed structure seamlessly Pervasive computing

Policy Technology Policy management is useful in various areas, e.g. Configuration management, Quality of service control , Traffic engineering , etc. The architectural components of the Policy Framework include a Policy Decision Point (PDP) and Policy Enforcement Points (PEP), and a policy repository. Network management functionality can be realized by policy agents.

Structural Model of Network Management There are three types of network management structural models: Centralized: Single Manager Station. Distributed: Multiple Manager Stations. Hierarchical: Different level of Manager Stations.

Hierarchical Architecture of policy Management The three levels of this hierarchical architecture are Policy Manager (PM) at the highest level, Cluster Policy Agent (CPA), Local Policy Agent (LPA). An LPA manages a node. A CPA can manage multiple LPAs. A PM manages multiple CPAs; it is also a policy agent actually.

Mobile Agent-Based Network Management A complete node in the network includes agent execution environment, policy agent and the real managed node. The policy information base (PIB) is an ordered set representing data types. Each agent is kept on standby any time, so the real-time performance is improved effectively. The common node informs the agent with data to the cluster head after received information.

Conclusion The management system described in this paper shows that a reduction in management traffic overhead can be achievable by mobile agents and policy management. This architecture reduces the network management requirement for bandwidth, and upgrades the imitativeness, adaptability and re-configurability of network management system. It has a good practical and research value for geographically distributed network environment.

References Migas N, Buchanan WJ, McArtney K. Migration of Mobile Agents in Ad-hoc, Wireless Networks. Proceedings of the 11th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems (ECBS’04) 2004 R. Bhatia et al., “Policy Evaluation for network Management”, INFOCOM2000.

Thank You Queries?