Abstract
Software systems that rely on ad-hoc networks are increasingly complex and prevalent. Some of these systems provide vital functionality to emergency services, military operations, and disaster relief; such systems may have significant impact on the safety of people involved in those operations. It is therefore important that those networks support critical software requirements, including those for latency of packet transfer. If a network ceases to meet the software’s requirements (e.g. due to a link failure) then engineers must be able to understand it well enough to reconfigure the network and restore it to a requirement-satisfying state. Given a complex network, it is difficult for a human to do this, especially under time pressure. Tool support would therefore be valuable. This paper presents a search-based tool which takes as input a network defined using the Network Description Language (NDL), annotated with a set of network-hosted applications and a set of latency requirements between each. The tool can evolve variants of the network configuration which meet the requirements and are robust to single link failures, using multi-objective optimisation to resolve the conflicting demands of robustness and low resource use. We have investigated how the Genetic Algorithm (GA) can be configured to find good results, and how the time taken to evolve networks scales with the size of the network. We conclude that the approach is effective for small networks (tens of nodes) but scales poorly beyond that.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Aitken JM, Alexander RD, Kelly TP (2010) A case for dynamic risk assessment in NEC systems of systems. In: 5th international conference on system of systems engineering. Loughborough
Aitken JM, Alexander R, Kelly T, Poulding S (2012) Evolving robust networks for systems-of-systems. In: Proceedings of the 4th symposium on search based software engineering. Springer, Berlin/Heidelberg pp 30–44
Ali S, Maciejewski AA, Siegel HJ, Kim KJ (2004) Robust resource allocation for sensor-actuator distributed computing systems. In: Proceedings of the international conference on parallel processing
Avižienis A, Laprie JC, Randell B, Landwehr CE (2004) Basic concepts and taxonomy of dependable and secure computing. IEEE Trans Dependable Secure Comput 1(1):11–33
Bhagchandani K, Sharma YM (2013) Exploration of VANET mobility models with new cluster based routing protocol. Int J Soft Comput Eng 2(6):224–227
Boyer M (2010) NC-maude: a rewriting tool to play with network calculus. In: 4th international symposium on leveraging applications of formal methods
Charara H, Scharbarg JL, Ermont J, Fraboul C (2006) Methods for bounding end-to-end delays on an AFDX network. In: 18th Euromicro conference on real-time systems
Crucitti P, Latora V, Marchiori M (2004) Model for cascading failures in complex networks. Phys Rev E 69: 045104
Cruz RL (1991a) A calculus for network delay, part I: network elements in isolation. IEEE Trans Inf Theory 37(1):114–131
Cruz RL (1991b) A calculus for network delay, part II: network analysis. IEEE Trans Inf Theory 37(1):132–141
Deb K, Pratap A, Agarwal S, Meyarivan T (2002) A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans Evol Comput 6(2):182–197
Ducatelle F, Gambardella LM, Kurant M, Nguyen HX, Thiran P (2006) Algorithms for failure protection in large ip-over-fiber and wireless ad hoc networks. In: Proceedings of research results of the DICS program
Elia A, Ferrarini L, Veber C (2006) Analysis of ethernet-based safe automation networks according to iec-61508. In: IEEE conference on emerging technology in factory automation. Prague
Georges JP, Krommenacker N, Divoux T, Rondeau E (2006) A design process of switched ethernet architectures according to real-time application constraints. Eng Appl Artif Intell 19:335–344
Georges JP, Divoux T, Rondeau E (2011) Network calculus: application to switched real-time networking. In: 5th international ICST conference on performance evaluation methodologies and tools, ValueTools
Kandula S, Sengupta S, Greenberg A, Patel P, Chaiken R (2009) The nature of datacenter traffic: measurements & analysis. In: Proceedings of the 9th ACM SIGCOMM conference on internet measurement conference, pp 202–208
Le Boudec JY, Thiran P (2011) A theory of deterministic queuing systems for the internet. Springer, Berlin
Leu G, Namatame A (2009) Evolving failure resilience in scale-free networks. In: Intelligent and evolutionary systems. Springer
Moulouna M, Gilson R, Kaskarolis-Kring E, Kring J, Hancock P (2001) Ergonomics of UAV/UCAV mission success: considerations for data link, control and display issues. In: Human factors and ergonomics society 45th meeting
Newth D, Ash J (2004) Evolving cascading failure resilience in complex networks. In: Proceedings of the 8th Asia Pacific symposium on intelligent and evolutionary systems
Nunes A, Laursen T (2004) Identifying the factors that contributed to the Überlingen mid-air collision. In: Proceedings of the 48th annual chapter meeting of the human factors and ergonomics society
Scharbarg JL, Ridouard F, Fraboul C (2009) A probabilistic analysis of end-to-end delays on an AFDX avionic network. IEEE Trans Indust Inform 5(1):38–48
Schmitt JB, Zdarsky FA (2006) The DISCO network calculator. In: First international conference on performance evaluation methodologies and tools
Sghairi M, Aubert JJ, Brot P, de Bonneval A, Crouzet Y, Laarouchi Y (2009) Distributed and reconfigurable architecture for flight control system. In: Digital avionics systems conference
Sinnott RW (1984) Virtues of the haversine. Sky Telesc 68(2):159
Skeie T, Johannessen S, Holmeide Ø (2006) Timeliness of real-time IP communication in switched industrial ethernet networks. IEEE Trans Indust Inform 2(1):25–39
van der Ham J, Dijkstra F, Travostino F, Andree HMA, de Laat CTAM (2006a) Using rdf to describe networks. Futur Gener Comput Syst 22(8):862–867
van der Ham J, Grosso P, de Laat CTAM (2006b) Semantics for hybrid networks using the network description language. In: ACM/IEEE conference on supercomputing
van der Ham J, Grosso P, van der Pol R, Toonk A, de Laat CTAM (2007) Using the network description language in optical networks. In: Integrated network management
Acknowledgments
The authors wish to thank Jeroen van der Ham of the University of Amsterdam for assistance with NDL, and David White of the University of Glasgow for discussions about issues with scaling and potential bottlenecks within the memory management of the Java Virtual Machine.
Author information
Authors and Affiliations
Corresponding authors
Additional information
Communicated by: Gordon Fraser and Jerffeson Teixeira de Souza
Rights and permissions
About this article
Cite this article
Aitken, J.M., Alexander, R., Kelly, T. et al. Evolving robust networks for systems-of-systems: is it viable for large networks?. Empir Software Eng 19, 1502–1530 (2014). https://doi.org/10.1007/s10664-013-9295-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10664-013-9295-3