• Tidak ada hasil yang ditemukan

View of WIRELESS NETWORKS RESOURCE MANAGEMENT WITH PARTICULAR REFERENCE TO QUEUE MANAGEMENT & SCHEDULING IN COMPUTER NETWORKS

N/A
N/A
Protected

Academic year: 2023

Membagikan "View of WIRELESS NETWORKS RESOURCE MANAGEMENT WITH PARTICULAR REFERENCE TO QUEUE MANAGEMENT & SCHEDULING IN COMPUTER NETWORKS"

Copied!
4
0
0

Teks penuh

(1)

ACCENT JOURNAL OF ECONOMICS ECOLOGY & ENGINEERING Peer Reviewed and Refereed Journal, ISSN NO. 2456-1037

Available Online: www.ajeee.co.in/index.php/AJEEE

Vol. 07, Issue 08, August 2022 IMPACT FACTOR: 7.98 (INTERNATIONAL JOURNAL) 28 WIRELESS NETWORKS RESOURCE MANAGEMENT WITH PARTICULAR REFERENCE

TO QUEUE MANAGEMENT & SCHEDULING IN COMPUTER NETWORKS Priyanka Chauhan1, Mr. Vijay Kumar2

1Research Scholar, International Institute of Engineering and Technology, Samani, Haryana, India

2Assistant Professor, Electronic & Communication Engineering,

International Institute of Engineering and Technology, Samani, Haryana, India Abstract- Wireless broad band has become an essential technique in our current daily life.

Connecting to a wireless access point or base station allows people to access the Internet anytime, anywhere. Today, the Internet is a medium imbued with various online applications, such as business transactions, public services, entertainment, remote education, etc., each possessing a different quality of service (QoS) requirements.

Consequently, resource management will become an increasingly important component of the service-oriented next-generation Internet architecture in which the QoS-oriented MAC layer protocol design, the admission control, the load balancing and the package scheduling will be more targeted. How to provide better solutions for resource management emerges as a significant issue.

In this dissertation, we take on two critical issues in resource management of wireless networks. In the first part, we address queue management and packet scheduling in multi-radio multi-channel mesh networks and present a utility-based algorithm that assigns and schedules each incoming packet based on the utility value estimated by considering the corresponding flows QoS requirements and status. The utility value of each packet is dynamically adjusted using Reinforcement Learning. We analyze the performance of our algorithm using a discrete-event simulator. Simulation results show that our algorithm out performs prior known algorithms.

In the second part, we address access control in internetworking systems. Two inter- networking models are considered. Firstly, we provide a utility-based access control frame work for an integrated UMTS/WLAN dual system in which mobile stations make their own handover decisions. Secondly, we consider infra-structured Wi-Fi net works and address dynamic access point selection.

The contributions of this dissertation research are two-fold. Firstly, we lay out a framework for QoS-enabling queue management and scheduling techniques in multi-radio multi-channel mesh networks. Secondly, we present actual results for the problem of access point switching decisions in infra-structured Wi-Fi networks.

1 INTRODUCTION

Wireless broadband has become an essential technique in modern daily life.

One can access the Internet at anytime or place by connecting to a wireless access point or base station. This rich resource provides countless online applications such as business transactions, public services, entertainment, and remote education with complex quality of service (QoS) requirements.

Consequently, resource management, particularly admission control, load balancing, and scheduling, should play an integral role in service- oriented next-generation Internet architectures. In this dissertation, we tackle two defining issues of wireless network resource management: queue management and packet scheduling in multi-radio multi-channel mesh networks and access control schemes in

Internet working systems. In the following, the motivation of this dissertation research is briefly discussed, followed by its scope and the organization of this dissertation.

2 LITERATURESURVEY

[1] Kazi Wali Ullah and Abu Shohel Ahmed, "Demo Paper: Automatic Provisioning, Deploy and Monitoring of Virtual Machines based on Security Service Level Agreement in the Cloud"

2014 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing.

This demo presents a cloud security Service Level Agreement (SSLA) management solution. In this work, we aim to bind security in the Service Level Agreement (SLA) as a measurable and agreeable parameter between a cloud

(2)

ACCENT JOURNAL OF ECONOMICS ECOLOGY & ENGINEERING Peer Reviewed and Refereed Journal, ISSN NO. 2456-1037

Available Online: www.ajeee.co.in/index.php/AJEEE

Vol. 07, Issue 08, August 2022 IMPACT FACTOR: 7.98 (INTERNATIONAL JOURNAL) 29 service provider (CSP) and the customer.

We allow cloud customers to choose between different security levels when negotiating the SLA to achieve this. Then our automated SLA engine finds the requirements from the SSLA and deploys the Virtual Machine (VM) based on that.

Verdict: Monitoring of the security services from where the customer can review the current security status of the VMs. If there are any violations from the agreed SSLA, then the customer can immediately notice that and file an SLA breach complaint to the CSP.

[2] Anithakumari S, K Chandrasekaran,

"Monitoring and Management of Service Level Agreements in Cloud Computing" 2015 International Conference on Cloud and Autonomic Computing.

The Cloud computing environment consists of various interactive entities like cloud service providers, brokers, customers and end-users with different objectives and expectations. Service Level Agreements (SLAs) manage the relationship among cloud service providers and cloud consumers by defining the terms of the agreement for the participating entities and providing the bare ground for interactions among both parties. In this work, we proposed a framework to monitor and analyze the SLA parameters efficiently and tried to find out the possibility of the occurrence of SLA violations. Also, we implemented an adaptive resource allocation system by utilizing the results of predicted SLA violations. Our adaptive resource allocation system allocates computing resources to cloud applications and tries to reduce the occurrence of SLA violations by allocating additional resources for the detection of the possibility of occurrence of a violation.

Verdict: The experimental studies show that our proposed system works well in a private cloud computing environment and gives more efficient results.

[3] Al Amin Hossain, Eui-Nam Huh,

"Refundable Service through Cloud Brokerage" 2013 IEEE Sixth International Conference on Cloud Computing

Due to the lack of fairness in pricing and SLA violation of cloud computing, customers are dissatisfied

with the existing pricing model of the current cloud computing environment, and there has a significant chance of losing those dissatisfied customers.

Therefore, we wish to provide a solution that can preserve customers' appreciation through refundable service. This paper proposes a unique technique to boost customer satisfaction and diminish cloud service provider anxiety about continuing their business. We will apply a third-party cloud broker that can handle all business procedures instead of the cloud service provider. Our method offers refunding in case of unutilized resources and service quality degradation.

[4] Abdallah Ali Zainelabden A. IBRAHIM, Dzmitry Kliazovich, Pascal Bouvry,

"Service Level Agreement Assurance between Cloud Services Providers and Cloud Customers" 2016 16th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing.

Cloud services providers deliver cloud services to customers on a pay-per- use model. In contrast, the quality of the provided services is defined using service level agreements, also known as SLAs.

Unfortunately, no standard mechanism exists to verify and assure that delivered services automatically satisfy the signed SLA agreement. There is no guarantee in terms of quality. Those applications have many performance metrics. In this doctoral thesis, we propose a framework for SLA assurance that both cloud providers and users can use. We will define the performance metrics for the different applications inside the proposed framework. As mentioned in SLA, we will assess the application's performance in different testing environments to assure good service quality. The proposed framework will be evaluated through simulations and using test bed experiments. After testing the application's performance by measuring the performance metrics, we will review the time correlations between those metrics.

[5] Jayanta Datta, Indrajit Pan, S iddhartha Bhattacharyya, "TSLA: Turing based Service Level Agreement Assessment Model over Diverse Cloud Deployments" IEEE Explore 21017.

Cloud services are gaining popularity with the times. A service level

(3)

ACCENT JOURNAL OF ECONOMICS ECOLOGY & ENGINEERING Peer Reviewed and Refereed Journal, ISSN NO. 2456-1037

Available Online: www.ajeee.co.in/index.php/AJEEE

Vol. 07, Issue 08, August 2022 IMPACT FACTOR: 7.98 (INTERNATIONAL JOURNAL) 30 agreement (SLA) is a basic understanding

between the clients and cloud service providers (CSP). Ensuring secured and adequate service is a basic need of the customers. This work identifies a set of compliance parameters for cloud service level agreements. A generic rule base empowers the process with an automated model. Finally, a Turing model has been developed for automated monitoring and assessment of service level agreements between a cloud service provider and a cloud client. This generic model is suitable for cloud deployment models and attuned to the WS agreement set.

3 RESEARCH METHODOLOGY

We consider the important aspect of Quality of Service (QoS) in Multi-Radio Multi-Channel (MRMC) Wireless Mesh Networks, focusing on packet delays and packet drops.

We observe that the options of solely focusing on through put and only depending on the QoS type characterization by the application level protocol are notsufficient.

We suggest the reinforcement learning technique (RL) for the critical step of assigning the packet to one of the queues and present an implementation using the TD(0)algorithm.

The network has multiple data channels used for data transmission, each on a separate frequency. We assume all packets have the same size in our network, and ψ(l,c) denotes the transmission rate (packets/per time slot) the link l can provide on channel c, i.e., at each time slot, at most ψ(l,c) packets can be transmitted from the transmitter to the receive ronchannelc in linkl

RL-based Channel Assignment Algorithm

When a packet arrives at a link, it will be inserted at the end of an appropriate queue based on its QoS requirements.

Once a packet has entered aqueue, it cannot be relocated to another rqueue.

In the same link, the packets in a queue with higher priority are always transmitted before those in a queue with lower priority.

Multi-Access Control in Internet working Systems

Integration of the IEEE 802.11 wireless LANs (WLANs) and 3G networks,

such as Universal Mobile Tele communication Service (UMTS), has been intensively studied recently due to their complementary characteristics.

We only consider a typical Multi- access network with integrated WLAN and UMTS networks. Several network architectures for integrated WLAN/UMTS systems have been proposed.

We have developed and implemented a dual-mode UE (DMUE) in OPNET, which can switch between UMTS and WLAN networks.

Multi-Access Control in Internet working Systems

Integration of the IEEE 802.11 wireless LANs (WLANs) and 3G networks, such as Universal Mobile Tele communication Service (UMTS), has been intensively studied recently due to their complementary characteristics.

We only consider a typical Multi- access network with integrated WLAN and UMTS networks. Several network architectures for integrated WLAN/UMTS systems have been proposed.

We have developed and implemented a dual-mode UE (DMUE) in OPNET, which can switch between UMTS and WLAN networks.

Figure 1 Wireless mesh network architecture with mesh gateway,

routers, and mesh clients.

4 RESEARCH TOOLS

● RL (Rein for cement Learning) Based Proposed Routing Protocol

● Most RL algorithms can be classified in to becoming either model-free or model-based.

● In the model-based approach, the agent builds a model of the environment through hinter action with it is typically in the form of an MJS analogous

(4)

ACCENT JOURNAL OF ECONOMICS ECOLOGY & ENGINEERING Peer Reviewed and Refereed Journal, ISSN NO. 2456-1037

Available Online: www.ajeee.co.in/index.php/AJEEE

Vol. 07, Issue 08, August 2022 IMPACT FACTOR: 7.98 (INTERNATIONAL JOURNAL) 31 Figure 2 High-level structure of RL-

based routing 5 CONCLUSION

This dissertation research addressed two critical resource management issues in wireless networks. We first studied the queue management and packet scheduling in wireless mesh networks where QoS requirement is supported. We then discussed the multi-access control in a UMTS/WLAN internetworking system.

We also performed a theoretical analysis on the access point selection in infrastructure Wi-Fi networks when the switching penalty is concerned.

Queue Management and Scheduling in Multi-Radio Multi-Channel Wireless Mesh Networks We use a utility function to represent the QoS condition of an incoming packet.

The utility is automatically tuned using Reinforcement Learning. We use aqueue selection algorithm to decide which queue is chosen for the incoming packet.

We use ad is tribute channel selection algorithm to choose the channel for the transmission.

We discuss the channels witching problem when the switching penalty is considered, and we proved this is an NP- Complete problem in a tree network.

Multi-Access Control in Internetworking Systems

We have completed UMTS/WLAN dual- mode architecture design in OPNET.

We provided an access control frame work in a UMTS/WLAN multi-access network.

REFERENCES

1. A. Cuomo, G. Di Modica, S. Distefano, A.

Pulito, M. Rak, O. Tochio, S. Veque, and U.

Villano, “An SLA-based broker for cloud infra structures," Journal of grid computing, vol.11, no.1, pp.1–25, 2013.

2. B. Calder, “Inside windows azure: the challenges and opportunities of a cloud operating system,” in ACMSIGARCH

Computer Architecture News, vol. 42, no.1.

ACM, 2014, pp.1–2.

3. E. M. Maximilien and M. P. Singh, “A framework and ontology for dynamic web services selection,” Internet Computing, IEEE, vol. 8, no. 5, pp.84–93,2004.

4. M. Aliand M. H. Miraz, “Cloud Computing Applications,” International Conference on Cloud Computing and e Governance, 2013.

5. P. Patel, A. Ranabahu, and A. Sheth, “Service Level Agreement in Cloud Computing,” The Ohio Center of Excellence in Knowledge- Enabled Computing (Kno.e.sis),2009.

6. T. Wood, P. Shenoy, A. Venkataramani, and M. Yousif, “Sandpiper: Black-box and grey- box resource management for virtual machines, "Computer Networks, vol.53, no.17, p.2923: 2938, 2009.

7. Vecchiola, Christian, Xingchen Chu, and Rajkumar Buyya. "Aneka: a software platform for. NET-based cloud computing."High Speedand Large Scale Scientific Computing (2009):267-

8. Buyya, R., Garg, S. K., Calheiros, R. N. (2011, Decem- ber). SLA-oriented resource provisioning for cloud computing: Challenges, architecture, and solutions. International Conference on (pp. 1-10). IEEE on Cloudand Service Computing(CSC), 2011.

9. Ibrahim, Shadi, Bingsheng He, and Hai Jin.

”Towards pay- as-you-consume cloud computing.” In Services Computing (SCC), IEEE International Conference, pp. 370-377.

IEEE, 2011.

10. C. Muller, M. Oriol, M. Rodr ́ıguez, X. Franch, J.Marco, M. Resinas, and A.Ruiz-Cortes,

“Salmonada: A platform form on it ring and explaining violations of ws-agreement- compliant documents,” in Principles of Engineering Service-Oriented Systems (PESOS), 2012 ICSE Workshop on. IEEE, 2012, pp.43–49.

11. B. Koller and L. Schubert, “Towards autonomous SLA management using a proxy- like approach, "Multi agent and Grid Systems, vol. 3, no.3, pp. 313–325,2007.

12. H. M. Frutos and I. Kotsiopoulos, “Brein:

Business objective driven reliable and intelligent grids for real business.” IBIS, vol.

8, pp. 39–41, 2009.

Referensi

Dokumen terkait