Automatic Self Healing Using Immune Systems

Author(s):  
Junaid Ahsenali Chaudhry

The networking technologies are moving very fast in pursuit of optimum performance, which has triggered the importance of non-conventional computing methods. In the modern world of pervasive business systems, time is money. The more the system fulfills the needs of the requesting user, the more revenue the business will generate. The modern world is service-oriented, and therefore, providing customers with reliable and fast service delivery is of paramount importance. In this article we present a scheme to increase the reliability of business systems. The arrival of ubiquitous computing has triggered the need previously mentioned even further, and people hold high exceptions from this technology. In Morikawa (2004), the authors characterize the vision of ubiquitous computing into two categories: “3C everywhere and physical interaction.” 3C consists of “computing everywhere,” “content everywhere,” and “connectivity everywhere.” “Physical interaction” connects the hidden world of ubiquitous sensors with the real world. This wide area of coverage and high scalability makes a ubiquitous system quite fragile toward not only external threats, but internal malfunctioning too. With the high probability of “abnormal behavior” it is more important to have knowledge of fault and its root causes. As described in Yau, Wang, and Karim (2002), application failures are like diseases, and there can be many types of faults with matching symptoms, thus fault localization and categorization are very important. Unlike in Hung et al. (2005) and Steglich and Arbanowski (2004), we cannot categorize all abnormal functionalities into fault tolerance or (re)configuration domains simply because faults do not have any predefined pattern; rather we have to find those pattern. Moreover, as in Steglich and Arbanowski (2004) the “without foresight” type of repair in ubiquitous systems is desired. The conventional FCAPS (Fault, Configuration, Accounting, Performance, Security), network management model categorizes management functions in one group, but we argue that categorizing management functions into different segment is mandatory in self management paradigms. Since in highly dynamic and always available very wide area networks, one fault can be atomic (caused because of one atomic reason) or it can be a set of many faults (caused because of many atomic or related reasons). It is often a good practice to break the problem into smaller atomic problems and then solve them (Chaudhry, Park, & Hong, 2006). If we classify all different types of faults (atomic, related, and composite) into one fault management category, the results would not be satisfactory, nor would the system be able to recover from the “abnormal state” well. Since the side effects of system stability and self healing actions are not yet known (Yau et al., 2002), we cannot afford to assume that running self management modules along with functional modules of the core system will not have a negative effect on the system performance. For example, if the system is working properly, there is no need for fault management modules to be active. Lastly, instead of having a fault-centric approach, we should have a recovery-centric approach because of our objective that is to increase the system availability In this article we present autonomic self healing engine (ASHE) architecture for ubiquitous smart systems. We identify the problem context through artificial immune system techniques and vaccinate (deploy solution to) the system through dynamically composed applications. The services involved in the service composition process may or may not be related, but when they are composed into an application they behave in a way it is specified in their composition scheme. The vaccines are dissolved to liberate the system resources (because they take the system’s own resources to recover it) after the system recovery. When the system is running in a normal state, all self management modules are turned off except context awareness and self optimization. These two are always on to monitor and optimize the system respectively.

2021 ◽  
Vol 15 (2) ◽  
pp. 1-25
Author(s):  
Amal Alhosban ◽  
Zaki Malik ◽  
Khayyam Hashmi ◽  
Brahim Medjahed ◽  
Hassan Al-Ababneh

Service-Oriented Architectures (SOA) enable the automatic creation of business applications from independently developed and deployed Web services. As Web services are inherently a priori unknown, how to deliver reliable Web services compositions is a significant and challenging problem. Services involved in an SOA often do not operate under a single processing environment and need to communicate using different protocols over a network. Under such conditions, designing a fault management system that is both efficient and extensible is a challenging task. In this article, we propose SFSS, a self-healing framework for SOA fault management. SFSS is predicting, identifying, and solving faults in SOAs. In SFSS, we identified a set of high-level exception handling strategies based on the QoS performances of different component services and the preferences articled by the service consumers. Multiple recovery plans are generated and evaluated according to the performance of the selected component services, and then we execute the best recovery plan. We assess the overall user dependence (i.e., the service is independent of other services) using the generated plan and the available invocation information of the component services. Due to the experiment results, the given technique enhances the service selection quality by choosing the services that have the highest score and betters the overall system performance. The experiment results indicate the applicability of SFSS and show improved performance in comparison to similar approaches.


Symmetry ◽  
2020 ◽  
Vol 12 (4) ◽  
pp. 552 ◽  
Author(s):  
Rocksan Choi ◽  
SeungGwan Lee ◽  
Sungwon Lee

In our modern world, many Internet of Things (IoT) technologies are being researched and developed. IoT devices are currently being used in many fields. IoT devices use Wi-Fi and Bluetooth, however, communication distance is short and battery consumption is high. In areas such as smart cities and smart farms, IoT technology is needed to support a wide coverage with low power consumption. Low Power Wide Area (LPWA), which is a transmission used in IoT supporting a wide area with low power consumption, has evolved. LPWA includes Long Range (LoRa), Narrowband (NB-IoT), and Sigfox. LoRa offers many benefits as it communicates the longest distances, is cheap and consumes less battery. LoRa is used in many countries and covers a range of hundreds of square kilometers (km2) with a single gateway. However, if there are many obstacles to smart cities and smart farms, it causes communication problems. This paper proposes two (2) solutions to this problem: the relay method which is a multi-hop method and the Automatic Repeat Request (ARQ) system that detects packet loss in real-time and requests retransmission for LoRa. In this study, the actual performance of LoRa in the problematic environment was measured and the proposed method was applied. It was confirmed that the transmission rate of LoRa dropped when there were many obstacles such as trees. To use LoRa in a smart farm with a lot of space, multi-hop was observed to be better. An ARQ system is needed to compensate for the unexpected drop in the forward rate due to the increase in IoT devices. This research focused on reliability, however, additional network methods and automatic repeat request (ARQ) systems considering battery time should be researched in symmetry. This study covers the interdisciplinary field of computer science and wireless low power communication engineering. We have analyzed the LoRa/LoRaWAN technology in an experimental approach, which has been somewhat less studied than cellular network or WiFi technology. In addition, we presented and improved the performance evaluation results in consideration of various local and climatic environments.


Author(s):  
Stamatis Karnouskos

As we move towards service-oriented complex infrastructures, what is needed, security, robustness, and intelligence distributed within the network. Modern systems are too complicated to be centrally administered; therefore, the need for approaches that provide autonomic characteristics and are able to be self sustained is evident. We present here one approach towards this goal, i.e., how we can build dynamic infrastructures based on mobile agents (MA) and active networks (AN). Both concepts share common ground at the architectural level, which makes it interesting to use a mix of them to provide a more sophisticated framework for building dynamic systems. We argue that by using this combination, more autonomous systems can be built that can effectively possess at least at some level of self-* features, such as self-management, self-healing, etc., which, in conjunction with cooperation capabilities, will lead to the deployment of dynamic infrastructures that autonomously identify and adapt to external/internal events. As an example, the implementation of an autonomous network-based security service is analyzed, which proves that denial of service attacks can be managed by the network itself intelligently and in an autonomic fashion.


Author(s):  
Charalampos Z. Patrikakis ◽  
Ioannis G. Nikolakopoulos ◽  
Athanasios Voulodimos

In this chapter, we are addressing the issue of privacy in our modern world of Internet, Web 2.0, personalization, location based services, and ubiquitous computing. The issue is initially viewed from the perspective of user profiles, starting from existing approaches used in social networking and mobile computing applications. Emphasis is given on the separation of personal and public information and the way it can be used in Web and mobile applications. Furthermore, identifying the importance and the actual meaning of privacy in an online world is a crucial and difficult task, which has to be carried out before trying to propose ways to protect the users’ privacy.


Sensors ◽  
2019 ◽  
Vol 19 (5) ◽  
pp. 1033 ◽  
Author(s):  
Peng Zhou ◽  
Decheng Zuo ◽  
Kun Hou ◽  
Zhan Zhang ◽  
Jian Dong ◽  
...  

Cyber Physical Systems (CPS) has been a popular research area in the last decade. The dependability of CPS is still a critical issue, and few surveys have been published in this domain. CPS is a dynamic complex system, which involves various multidisciplinary technologies. To avoid human errors and to simplify management, self-management CPS (SCPS) is a wise choice. To achieve dependable self-management, systematic solutions are necessary to verify the design and to guarantee the safety of self-adaptation decisions, as well as to maintain the health of SCPS. This survey first recalls the concepts of dependability, and proposes a generic environment-in-loop processing flow of self-management CPS, and then analyzes the error sources and challenges of self-management through the formal feedback flow. Focusing on reducing the complexity, we first survey the self-adaptive architecture approaches and applied dependability means, then we introduce a hybrid multi-role self-adaptive architecture, and discuss the supporting technologies for dependable self-management at the architecture level. Focus on dependable environment-centered adaptation, we investigate the verification and validation (V&V) methods for making safe self-adaptation decision and the solutions for processing decision dependably. For system-centered adaptation, the comprehensive self-healing methods are summarized. Finally, we analyze the missing pieces of the technology puzzle and the future directions. In this survey, the technical trends for dependable CPS design and maintenance are discussed, an all-in-one solution is proposed to integrate these technologies and build a dependable organic SCPS. To the best of our knowledge, this is the first comprehensive survey on dependable SCPS building and evaluation.


2012 ◽  
Vol 251 ◽  
pp. 75-78
Author(s):  
Yan Li ◽  
Yao Chen

It was presented how to design a management system under FreeBSD. The system can be used in Mechanical devices to authenticate and charge the client through PPPoE based on RADIUS.And the built-in batch card generation, management functions can help in the number of user connections and bandwidth control,thus to achieve powerful management capabilities and user self-management capabilities.


2004 ◽  
Vol 8 (2) ◽  
pp. 71-81 ◽  
Author(s):  
Adrian David Cheok ◽  
Kok Hwee Goh ◽  
Wei Liu ◽  
Farzam Farbiz ◽  
Siew Wan Fong ◽  
...  

2021 ◽  
Vol 22 ◽  
pp. 88-100
Author(s):  
Adomas Vincas Rakšnys ◽  
Dangis Gudelis ◽  
Arvydas Guogis

This interdisciplinary article presents a concept of the 21st century and phenomena that are products of the 4th industrial revolution – big data and Artificial Intelligence technologies – as well as the opportunities of their application in public governance and social policy. This paper examines the advantages and disadvantages of big data, problems of data collection, its reliability and use. Big data can be used for the analysis and modeling of phenomena relevant to public governance and social policy. Big data consist of three main types: a) historical data, b) present data with little delay, c) prognostic data for future forecasting. The following categories of big data can be defined as: a) data from social networks, b) traditional data from business systems, c) machine-generated data, such as water extraction, pollution, satellite information. The article analyzes the advantages and disadvantages of big data. There are big data challenges such as data security, lack of cooperation in civil service and social work, in rare situations – data fragmentation, incompleteness and erroneous issues, as well as ethical issues regarding the analysis of data and its use in social policy and social administration. Big data, covered by Artificial Intelligence, can be used in public governance and social policy by identifying “the hot spots” of various phenomena, by prognosing the meanings of variables in the future on the basis of past time rows, and by calculating the optimal motion of actions in the situations where there are possible various alternatives. The technologies of Artificial Intelligence are used more profoundly in many spheres of public policy, and in the governance of COVID-19 pandemics too. The substantial advantages of the provided big data and Artificial Intelligence are a holistic improvement of public services, possibilities of personalization, the enhancement of citizen satisfaction, the diminishing of the costs of processing expenditure, the targeting of adopted and implemented decisions, more active involvement of citizens, the feedback of the preferences of policy formation and implementation, the observation of social phenomenas in real time, and possibilities for more detailed prognosing. Challenges to security of data, necessary resources and competences, the lack of cooperation in public service, especially rare instances of data fragmentation, roughness, falseness, and ethical questions regarding data analysis and application can be evaluated as the most significant problems of using big data and Artificial Intelligence technologies. Big data and their analytics conducted using Artificial Intelligence technologies can contribute to the adequacy and objectivity of decisions in public governance and social policy, effectively curbing corruption and nepotism by raising the authority and confidence of public sector organizations in governance, which is so lacking in the modern world.


Sign in / Sign up

Export Citation Format

Share Document