1 Christophe S. Jelger, Michael Kleis, Burak Simsek, Rolf Stadler, Ralf König, Danny Raz Theories/formal methods in support of autonomic management Dagstuhl.

Slides:



Advertisements
Similar presentations
Approaches, Tools, and Applications Islam A. El-Shaarawy Shoubra Faculty of Eng.
Advertisements

Pat Langley Computational Learning Laboratory Center for the Study of Language and Information Stanford University, Stanford, California
Trustworthy Service Selection and Composition CHUNG-WEI HANG MUNINDAR P. Singh A. Moini.
Resource Management §A resource can be a logical, such as a shared file, or physical, such as a CPU (a node of the distributed system). One of the functions.
Imbalanced data David Kauchak CS 451 – Fall 2013.
CROWN “Thales” project Optimal ContRol of self-Organized Wireless Networks WP1 Understanding and influencing uncoordinated interactions of autonomic wireless.
© Chinese University, CSE Dept. Software Engineering / Software Engineering Topic 1: Software Engineering: A Preview Your Name: ____________________.
Sponsored by the U.S. Department of Defense © 2005 by Carnegie Mellon University 1 Pittsburgh, PA Dennis Smith, David Carney and Ed Morris DEAS.
Net-Centric Software and Systems I/UCRC Copyright © 2011 NSF Net-Centric I/UCRC. All Rights Reserved. High-Confidence SLA Assurance for Cloud Computing.
SBSE Course 3. EA applications to SE Analysis Design Implementation Testing Reference: Evolutionary Computing in Search-Based Software Engineering Leo.
Efficient Autoscaling in the Cloud using Predictive Models for Workload Forecasting Roy, N., A. Dubey, and A. Gokhale 4th IEEE International Conference.
1 Sensor Networks and Networked Societies of Artifacts Jose Rolim University of Geneva.
Chapter 4 DECISION SUPPORT AND ARTIFICIAL INTELLIGENCE
Analyzing the tradeoffs between breakup and cloning in the context of organizational self-design By Sachin Kamboj.
Systems Engineering for Automating V&V of Dependable Systems John S. Baras Institute for Systems Research University of Maryland College Park
Energy Management and Adaptive Behavior Tarek Abdelzaher.
Autonomous Localization in Wireless Sensor Networks Michael Allen Cogent Applied Research Centre Coventry University.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
CSC 402, Fall Requirements Analysis for Special Properties Systems Engineering (def?) –why? increasing complexity –ICBM’s (then TMI, Therac, Challenger...)
Agent-based Simulation of Financial Markets Ilker Ersoy.
Artificial Intelligence: Its Roots and Scope
A Research Agenda for Accelerating Adoption of Emerging Technologies in Complex Edge-to-Enterprise Systems Jay Ramanathan Rajiv Ramnath Co-Directors,
Foundations of Educating Healthcare Providers
Virtual Machine Hosting for Networked Clusters: Building the Foundations for “Autonomic” Orchestration Based on paper by Laura Grit, David Irwin, Aydan.
Composing Adaptive Software Authors Philip K. McKinley, Seyed Masoud Sadjadi, Eric P. Kasten, Betty H.C. Cheng Presented by Ana Rodriguez June 21, 2006.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
K. J. O’Hara AMRS: Behavior Recognition and Opponent Modeling Oct Behavior Recognition and Opponent Modeling in Autonomous Multi-Robot Systems.
Session 2a, 10th June 2008 ICT-MobileSummit 2008 Copyright E3 project, BUPT Autonomic Joint Session Admission Control using Reinforcement Learning.
Software Engineering Principles Principles form the basis of methods, techniques, methodologies and tools Principles form the basis of methods, techniques,
Kavita Singh CS-A What is Swarm Intelligence (SI)? “The emergent collective intelligence of groups of simple agents.”
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
Agent-Based Hybrid Intelligent Systems and Their Dynamic Reconfiguration Zili Zhang Faculty of Computer and Information Science Southwest University
Combining Theory and Systems Building Experiences and Challenges Sotirios Terzis University of Strathclyde.
A Novel Multicast Routing Protocol for Mobile Ad Hoc Networks Zeyad M. Alfawaer, GuiWei Hua, and Noraziah Ahmed American Journal of Applied Sciences 4:
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
GTRI_B-1 ArtificiaI Intelligence Methods for Detection and Handling of Software Behavior Anomalies Chris Simpkins Georgia Tech Research Institute
Chapter 13 Artificial Intelligence and Expert Systems.
1 ACTIVE FAULT TOLERANT SYSTEM for OPEN DISTRIBUTED COMPUTING (Autonomic and Trusted Computing 2006) Giray Kömürcü.
1 COPYRIGHT © 2015 ALCATEL-LUCENT. ALL RIGHTS RESERVED. Cognitive Security: Security Analytics and Autonomics for Virtualized Networks Lalita Jagadeesan.
Program analysis with dynamic change of precision. Philippe Giabbanelli CMPT 894 – Spring 2008.
OOAD Unit – I OBJECT-ORIENTED ANALYSIS AND DESIGN With applications
THE VISION OF AUTONOMIC COMPUTING. WHAT IS AUTONOMIC COMPUTING ? “ Autonomic Computing refers to computing infrastructure that adapts (automatically)
Agents that Reduce Work and Information Overload and Beyond Intelligent Interfaces Presented by Maulik Oza Department of Information and Computer Science.
Algorithmic, Game-theoretic and Logical Foundations
Chapter 2: Signal Detection and Absolute Judgement
Distributed Models for Decision Support Jose Cuena & Sascha Ossowski Pesented by: Gal Moshitch & Rica Gonen.
CS 484 Load Balancing. Goal: All processors working all the time Efficiency of 1 Distribute the load (work) to meet the goal Two types of load balancing.
SelfCon Foil no 1 Variability in Self-Adaptive Systems.
The Macroscopic behavior of the TCP Congestion Avoidance Algorithm.
Self-Adaptive Embedded Technologies for Pervasive Computing Architectures Self-Adaptive Networked Entities Concept, Implementations,
PnP Networks Self-Aware Networks Self-Aware Networks Self-Healing and Self-Defense via Aware and Vigilant Networks PnP Networks, Inc. August, 2002.
Artificial Intelligence: Research and Collaborative Possibilities a presentation by: Dr. Ernest L. McDuffie, Assistant Professor Department of Computer.
1 Architecture and Behavioral Model for Future Cognitive Heterogeneous Networks Advisor: Wei-Yeh Chen Student: Long-Chong Hung G. Chen, Y. Zhang, M. Song,
A field of study that encompasses computational techniques for performing tasks that require intelligence when performed by humans. Simulation of human.
Distributed cooperation and coordination using the Max-Sum algorithm
Risk-Aware Mitigation for MANET Routing Attacks Submitted by Sk. Khajavali.
PART1: NETWORK COMPONENTS AND TRANSMISSION MEDIUM Wired and Wireless network management 1.
Decisive Themes, July, JL-1 ARTEMIS Decisive Theme for Integrasys Pedro A. Ruiz Integrasys July, 2011.
Web Servers load balancing with adjusted health-check time slot.
4/22/20031/28. 4/22/20031/28 Presentation Outline  Multiple Agents – An Introduction  How to build an ant robot  Self-Organization of Multiple Agents.
Introduction to Machine Learning, its potential usage in network area,
Dynamics of Learning & Distributed Adaptation
Intelligent Systems Software Assurance Symposium 2004
Software Defined Networking (SDN)
A Cognitive Approach for Cross-Layer Performance Management
Presentation Title Global-scale systems that know when they are behaving badly NSF workshop on grand challenges in distributed systems Jeff Mogul, HP.
Presented By: Darlene Banta
Introduction to Artificial Intelligence Instructor: Dr. Eduardo Urbina
Genetic Algorithm Soft Computing: use of inexact t solution to compute hard task problems. Soft computing tolerant of imprecision, uncertainty, partial.
Horizon: Balancing TCP over multiple paths in wireless mesh networks
Presentation transcript:

1 Christophe S. Jelger, Michael Kleis, Burak Simsek, Rolf Stadler, Ralf König, Danny Raz Theories/formal methods in support of autonomic management Dagstuhl Seminar on Autonomic Network management July 2007

2 What is Autonomic Management? Systems that optimize their behavior while evaluating the situation and the re-configuring themselves to be in an optimal working point Systems that optimize their behavior while evaluating the situation and the re-configuring themselves to be in an optimal working point In a system composed of different entities (agents) it is a celebrative decision to assigned roles so that the group will manage and/or optimized itself In a system composed of different entities (agents) it is a celebrative decision to assigned roles so that the group will manage and/or optimized itself There is an underlying target and a measurement technique to estimate the level of success in this goal There is an underlying target and a measurement technique to estimate the level of success in this goal

3 What is autonomic management? Is there always a metric the management task, or is it sometime a 0/1 (managed no managed) problem? Is there always a metric the management task, or is it sometime a 0/1 (managed no managed) problem? Do we always have to have a managed system and a management system with clear boundary? Do we always have to have a managed system and a management system with clear boundary? Some of the answer is related self awareness, but what is the exactly self awareness? What is the difference between a simple control loop and a self awareness system? Some of the answer is related self awareness, but what is the exactly self awareness? What is the difference between a simple control loop and a self awareness system? Where is the boundary between automated and autonomic systems? (and what about autonomous?) Where is the boundary between automated and autonomic systems? (and what about autonomous?)

4 TCP Example TCP – flow/congestion control mechanism Adjust the rate according to current network conditions Work (extremely) well under normal working conditions Without self-awareness Built-in resilience (autonomous) When TCP works over wireless (high loss, over GPRS,..) does not work so well Need to adjust parameters – configure (receiver window, number of Acks,..) For that needs self-awareness For that needs self-awareness

5 TCP Example (2) Inside the enveloped - resilient Outside the enveloped – not resilient Re-configuration

6 The Envelope Model Internal autonomic components –with feedback –no self-awareness System state within the designed working envelope Component self awareness: the observe- detect-react loop –detects if system state is outside the envelope –use reconfiguration to put component inside Why not do all inside the component? –predefined behavior –self-awareness is adaptive Monitor reconfigure detect

7 The Holon Model Each element has internal control loop that deals with a simple problem Several such systems can be combine and more general control mechanism can be used to control the complex system This can be done again and again to create more complex control Makes the use of formal methods practical since they can be applied to small problems Do not need to solve everything at first attempt Monitor reconfigure detect Monitor reconfigure detect

8 Important research challenges Composition and well defines API’s Composition and well defines API’s Theoretical/Formal Models Theoretical/Formal Models – Define the important aspects of of the system and create a formal (well defined model) – Apply formal/theoretical techniques that provide good (provable) results with respect to the model – Construct real system based on the principles developed and check how well they perform in the real world

9 Formal theoretic modeled used Queuing theory Queuing theory – Autonomous load balancing management – Traffic management and admission control Control theory Control theory – TCP – congestion/flow control – Resource allocation and tradeoff management in servers Distributed algorithms Distributed algorithms – Routing and multicast trees – (gossiping) sever migration and load management Complexity theory, state machine, graph theory, Petri Nets, Fuzzy logics, … Complexity theory, state machine, graph theory, Petri Nets, Fuzzy logics, …

10 emerging modeling techniques Bio-Inspired techniques Bio-Inspired techniques – Swarm intelligence – Firefly synchronization – Genetic Algorithms Resource allocation Resource allocation routing routing Network planning (any large multi-dimensional problem) Network planning (any large multi-dimensional problem) – more …

11 Why is formal methods important in particular for autonomic management? To increase reliability of the automatic management system To increase reliability of the automatic management system No human in the system and more management interaction thus more confidence is needed No human in the system and more management interaction thus more confidence is needed Management systems have “a lot of power” and to replace them by an automatic system requires more trust Management systems have “a lot of power” and to replace them by an automatic system requires more trust It is important to distinguish between the same phenomenon that looks like 2 different ones It is important to distinguish between the same phenomenon that looks like 2 different ones Gives an inherent understanding of the domain that can be used to derive good protocol that works under different conditions Gives an inherent understanding of the domain that can be used to derive good protocol that works under different conditions Give predictability in general but simulation is good only in the domain that was measured Give predictability in general but simulation is good only in the domain that was measured

12

13 Challenges How much management How much management – Too little – not good – Too much – takes resources from system Separate management processes Separate management processes – makes things simpler – cannot be optimal - uses only the API