Control plane algorithms targeting challenging autonomic properties in grey systems

Autonomic self-configuration is an essential mechanism underpinning agile service provision, allowing predictive or non-predictive grey system domains to transform their underlying system behaviour. However, much more work is required to improve our understanding of the control plane algorithms for these systems to prevent challenging autonomic system properties from impacting service provisioning. Current research focuses upon three key ‘planes’; the knowledge plane, the control plane, and the data plane. This work proposes and presents a prototype for an autonomic self-configuration control framework, comprising of a Control Plane Control Protocol, and optional algorithmic overlay. The framework bridges the three networking planes, with the knowledge plane governance selecting the required configuration data, and the control plane controlling the negotiation and dissemination of the payload, through a generic control protocol, and an optional control plane overlay. The new framework can form part of a protective system infrastructure. A novel aspect of this framework is that it can address challenging autonomic properties through the control plan overlay. By autonomically controlling how a networked appliance responds to an external stimulus; a permanent or transitory change may ensue or self-configuration can be prevented. These framework attributes are evaluated using a prototype to demonstrate algorithms assessing actor hybridization and blocking avalanches of changes that may result in unrestrained, rapid actor hybridization.

[1]  Julie A. McCann,et al.  An adaptive middleware framework for context-aware applications , 2005, Personal and Ubiquitous Computing.

[2]  Václav Smídl,et al.  From Bayesian Decision-Makers to Bayesian Agents , 2005, SOAS.

[3]  Martin Randles,et al.  Monitoring Autonomic Networks through Signatures of Emergence , 2009, 2009 Sixth IEEE Conference and Workshops on Engineering of Autonomic and Autonomous Systems.

[4]  Dilip Krishnaswamy,et al.  OverMesh: network-centric computing [Accepted from Open Call] , 2007, IEEE Communications Magazine.

[5]  Karin A. Dahmen,et al.  Hysteresis, avalanches, and noise , 1999, Comput. Sci. Eng..

[6]  Bengt Ahlgren,et al.  Ambient networks: bridging heterogeneous network domains , 2005, 2005 IEEE 16th International Symposium on Personal, Indoor and Mobile Radio Communications.

[7]  Ann Nowé,et al.  Exploring selfish reinforcement learning in repeated games with stochastic rewards , 2007, Autonomous Agents and Multi-Agent Systems.

[8]  Sridhar Mahadevan,et al.  Hierarchical multi-agent reinforcement learning , 2001, AGENTS '01.

[9]  Leen-Kiat Soh,et al.  A Real-Time Negotiation Model and A Multi-Agent Sensor Network Implementation , 2005, Autonomous Agents and Multi-Agent Systems.

[10]  Arjan Durresi Topic: Designing the Future Internet , 2007, 21st International Conference on Advanced Information Networking and Applications (AINA '07).

[11]  Amy Greenwald,et al.  Bidding Algorithms for Simultaneous Auctions: A Case Study , 2005 .

[12]  Peter Gauer,et al.  The design of avalanche protection dams : recent practical and theoretical developments , 2009 .

[13]  Martin Hall-May Ensuring safety of systems : a policy-based approach , 2007 .

[14]  Yair Amir,et al.  A Cost-Benefit Approach to Fault Tolerant Communication and Information Access , 2004 .

[15]  Rajarshi Das,et al.  A Hybrid Reinforcement Learning Approach to Autonomic Resource Allocation , 2006, 2006 IEEE International Conference on Autonomic Computing.

[16]  Daniele Miorandi,et al.  Service Evolution in Bio-Inspired Communication Systems , 2006, Int. Trans. Syst. Sci. Appl..

[17]  Manasi Deval,et al.  Distributed Control Plane Architecture for Network Elements , 2003 .

[18]  Andrea C. Arpaci-Dusseau,et al.  Information and control in gray-box systems , 2001, SOSP.

[19]  Allen B. MacKenzie,et al.  Cognitive networks: adaptation and learning to achieve end-to-end performance objectives , 2006, IEEE Communications Magazine.

[20]  Kai Miao,et al.  OverMesh: Network-Centric Computing , 2007 .

[21]  Peter Druschel,et al.  Exploiting network proximity in peer-to-peer overlay networks , 2002 .