Download presentation
Presentation is loading. Please wait.
Published byCharity Whitehead Modified over 8 years ago
1
E 3 – ICT SUMMIT 2008 (10-12.06.08 – Stockholm) Slide 1 Self-Configuring Autonomic System - Prototyping Environment (CASPER) University of Athens E 3 – ICT SUMMIT 2008 10-12.06.08 – Stockholm
2
E 3 – ICT SUMMIT 2008 (10-12.06.08 – Stockholm) Slide 2 From theory to prototyping Knowledge & Context Management Performance Management (PeM) Profile Management (PrM) Resource Management (RsM) Decision-Making and Reconfiguration Management Autonomic Decision-Making (ADM) Reconfiguration Management (RM) Policy-Management and Self-Governance (PMSG) Self-Configuration & Self-Management Self-Configuration (SeCo) Cognitive Self-Healing (CoSH) Software Download Management (SDM) Pervasive Access and Security Control (PASeC) Reconfiguration Charging Control (RCC) Cognitive Service Provision Content and Service Adaptation (CSA) Reconfiguration Services Discovery (RSD) Realization of the Reconfiguration Management Plane (RMP) on the network and terminal side Context gathering, policy distribution over CPC, Service provisioning, etc
3
E 3 – ICT SUMMIT 2008 (10-12.06.08 – Stockholm) Slide 3 CPC 1 CPC 2 GRPS RMP UMTS RMP WiMax RMP WLAN RMP Service Provider Self-management and control of terminal mobility 1.Retrieve network information from CPC 2.Connect to network 3.Start consuming service 1.Retrieve network information from CPC 2.Connect to new network 3.Adapt service 1. Service experiences low QoS 1.Retrieve network information from CPC 2.Reconfigure terminal 3. Connect to new network 3.Adapt service 1.Retrieve network information from CPC 2.Evaluate against user profile 3. Adapt service
4
E 3 – ICT SUMMIT 2008 (10-12.06.08 – Stockholm) Slide 4 Autonomic Decision Making and Protocol Reconfiguration 1. A mobile device connects to a WLAN network using the information provided by the CPC controller 1 2. The user terminal locates a software error. 3. The software download manager, which is implemented with UDT is launched and initiates the downloading of the required software from the software repository that resides on the server side. 4. During this process, UDT is reconfigured. The latter is triggered by ADM upon realizing that the congestion control algorithm employed exhibits high RTT (threshold based policy evaluation). 5. As soon as the software package is downloaded, it is installed and the terminal runs smoothly. 6. Load is injected in the network. This has a direct consequence the triggering of a handover from the WLAN_1 network to WLAN_2 7. Terminal leaves coverage of CPC controller 1. Evaluates information provided by CPC controller 2 and connects to the WLAN_3
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.