Skip to main content

Towards a Management Paradigm with a Constrained Benchmark for Autonomic Communications

  • Conference paper
Computational Intelligence and Security (CIS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4456))

Included in the following conference series:

Abstract

This paper describes a management paradigm to give effect to autonomic activation, monitoring and control of services or products in the future converged telecommunications networks. It suggests an architecture that places the various management functions into a structure that can then be used to select those functions which may yield to autonomic management, as well as guiding the design of the algorithms. The validation of this architecture, with particular focus on service configuration, is done via a genetic algorithm — Population Based Incremental Learning (PBIL). Even with this centralized adaptation strategy, the simulation results show that the proposed architecture and benchmark can be applied to this constrained benchmark, produces effective convergence performance in terms of finding nearly optimal configurations under multiple constraints.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Tech. Rep. TMF053, TMF: The ngoss technology neutral architecture specification v3.0. (2003)

    Google Scholar 

  2. Chiang, F., Braun, R., Hughes, J.: A biologically inspired multi-agent architecture for autonomic service management. Journal of Pervasive Computing and Communications 2(3), 261–275 (2006)

    Article  Google Scholar 

  3. Chiang, F., Braun, R., Magrath, S., Markovits, S.: Autonomic service configuration in telecommunication mass with extended role-based gaia and jadex. In: Proceeding of 2005 IEEE International Conference on Service Systems and Service Management, pp. 1319–1324 (2005)

    Google Scholar 

  4. Magrath, S., Chiang, F., Braun, R., Markovits, S., Cuervo, F.: Autonomic telecommunications service activation. In: Workshop on Autonomic Communication for Evolvable Next GenerationNetworks, 7th International Symposium on Autonomous Decentralized Systems, pp. 731–736 (2005)

    Google Scholar 

  5. Tech. rep. IBM: The redbook of autonomic computing. (2003)

    Google Scholar 

  6. Strassner, J.: Autonomic networking - theory and practice (tutorial session). In: Proceedings of IEEE/IFIP Network Operations and Management (2006)

    Google Scholar 

  7. Kephart, J.: Research challenges of autonomic computing. In: ICSE 2005, St. Louis, Missouri, USA (2005)

    Google Scholar 

  8. Chiang, F., et al.: Self-configuration of network services with nature-inspired learning and adaptation. Journal of Network and Systems Management 15, 87–116 (2006)

    Article  Google Scholar 

  9. Baluja, S., Caruana, R.: Removing the genetics from the standard genetic algorithm, pp. 38–46. Morgan Kaufmann Publishers, San Francisco (1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chiang, F., Braun, R. (2007). Towards a Management Paradigm with a Constrained Benchmark for Autonomic Communications. In: Wang, Y., Cheung, Ym., Liu, H. (eds) Computational Intelligence and Security. CIS 2006. Lecture Notes in Computer Science(), vol 4456. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74377-4_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74377-4_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74376-7

  • Online ISBN: 978-3-540-74377-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics