Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Network Management Itineraries for Mobile Agents Damianos Gavalas Department of Product & Systems Design Engineering, University of Aegean, Hermoupolis, Syros, Greece E-mail: dgavalas@aegean.gr Abstract - Proposed distributed management architectures, incorporating mobile agent (MA) technology, have not adequately management scalability problems, when monitoring tasks requiring the employment of itinerant agents is considered. Mechanisms building optimal agents itinerary are needed to minimise the total migration cost in terms of the round-trip latency and the incurred traffic. This is of particular importance when the management of networks spanning multiple subnets is involved. On this direction, we have designed and implemented an algorithm which adapts methods usually applied for solving network design problems in the specific problematic of MA itinerary planning. The algorithm not only suggests the optimal number of MAs that minimise the overall cost but also constructs optimal itineraries for each of them. The algorithm implementation has been integrated into our MA framework research prototype and tested into real network environments, demonstrating significant management cost savings. 1. INTRODUCTION The increasing complexity of networks has motivated the evolution of existing management models. These models traditionally adopt a centralised, Client/Server (CS) approach wherein the functionality of management entities is rigidly defined at design time. Concerning formal standardisation approaches in IP Network & Systems Management (NSM), the scene has been dominated, during the past decade, by the IETF Simple Network Management Protocol (SNMP)[13]. Despite its wide deployment base, SNMP follows the CS paradigm, typically associated with massive transfers of management data, which cause considerable strain on network throughput and processing bottlenecks at the manager host. The situation seriously deteriorates when considering managed networks that span multiple subnets or, even worse, include remote subnets connected to the manager site through expensive, low-bandwidth links. In such cases, the traffic associated with management tasks typically traverses several network segments and, when summed up, results in increased bandwidth waste [12]. These problems have motivated a trend towards distributed management intelligence that represents a rational approach to overcome the limitations of centralised NSM. The new trend in NSM involves using mobile agents (MAs) [3] to manage distributed network systems [2][8][9][10]. An MA can be used to locally retrieve and filter management data to monitor systems health and networking conditions in distributed environments. In particular, management tasks are assigned to an agent which delegates and executes management logic in a distributed and autonomous fashion. After completing these tasks, the results are either communicated through a messaging mechanism or carried back to the manager by the MA. Delegation of management logic may be realized with agents bound to single-hop mobility; the agents move from the managing node to remote managed nodes, where they statically execute their tasks [1]. What is not commonly exploited in management is the MA multiple-hop capability, where agents may move several times as they adapt to changing circumstances. While single-hop mobility can improve flexibility and scalability in the context of relatively static networked systems, it is the multiple-hop capability offered by MAs that needs to be exploited to meet the requirements of future networked systems, i.e. large scale and dynamics [8]. In addition, network monitoring based on multi-hop (itinerant) MAs is also advantageous for the following reasons (for a complete discussion of these issues, the interested reader may refer to [4]): ƒ ƒ Short-term distributed tasks: When distributed tasks are intended to run over a set of devices for a relatively short period, it is more efficient to use a multi-hop MA to sequentially visit the devices rather than broadcasting mobile code and obtain the results from every network element (NE). That also reduces the code deployment time. Local vs. global semantic compression of data: Single-hop mobility only involves a level of data filtering limited to a single device, and local to it. The itinerant MA paradigm, in contrast, enables global semantic filtering of data across all the network devices visited [9]. P8 / 1 ƒ Device vs. Domain-level view: In parallel to the previous argument, approaches based on single-hop mobility imply a local view of the device where the distributed code statically resides. Itinerant MAs offer a more simple solution to this problem as they can perform data correlation through sequentially visiting the entire set of devices. However, while in single-hop mobility, agent itinerary control is straightforward (the itinerary is restricted to the single destination host), this is not the case in multi-hop mobility, where slight variations on the set of visited hosts or even on the order that a specific set of nodes is visited may result in dramatic changes of the overall trip latency and migration traffic. In this article, we focus on multi-hop mobility, aiming at devising methods to optimise MA itineraries. The remainder of the paper is organised as follows: Section 2 explains the importance of optimal agent itinerary planning in management applications. Section 3 discusses the background and the functionality of an algorithm that addresses this issue, while Section 4 focuses on the implementation details and Section 5 presents experimental results. Section 6 reviews research projects of relevance to our work and Section 7 concludes the paper and describes ongoing research. 2. IMPORTANCE OF ITINERARY PLANNING IN AGENT-BASED MONITORING Despite the great potential of exploiting agent mobility in distributed applications, a naive use of MAs may lead to a highly inefficient design. In network monitoring applications for instance, using a single MA object launched from the manager platform that sequentially visits all the managed NEs, regardless of the underlying topology may actually lead to performance worse than the conventional SNMP-based approach (see Figure 1a). The performance further declines, when the monitoring MA collects monitoring data from multiple subnets, often interconnected by low-bandwidth links (see Figure 1b). 1 A 9 A Manager Manager D Subnet A D Subnet A Router Router C B 8 C B Bridge 6 2 Bridge Subnet B Subnet B 7 H H E Router E Router Remote LAN F G Remote LAN 5 3 F G 4 (a) (b) Figure 1. (a) Centralised monitoring, (b) ‘Flat’ MA-based monitoring This inefficient approach, known as ‘flat’ MA-based monitoring [4], presents serious scalability problems: in large networks the round-trip delay of the MA greatly increases as the overall travel time depends on the number of hops realised by the MA and also the network overhead imposed by the MA transfers grows exponentially with the network size [4]; the slope of the overhead curve becomes steeper in the case of high selectivity1 values. A rational approach to overcome such scalability problems is to partition the managed network into several logical/physical domains. For instance, inFigure 2, an MA object polls the devices of the remote LAN, whereas a second MA is assigned to the subnet local to the manager host as well as to another subnet, which is part of the same LAN. The partitioning criteria could be the number of nodes assigned to each MA (i.e. equal distribution of managed hosts among individual MAs), the physical distribution of polled devices (i.e. one MA object 1 Selectivity σ ( 0 ≤ σ ≤ 1 ) is a metric defined in as the proportion of data maintained to that retrieved from each host. For low selectivity values (the major part of the obtained data being filtered at the source) the MAs’ state size practically remains constant, otherwise the state rapidly grows [4]. P8 / 2 assigned to each network segment), or a combination of the previous criteria. An analytical evaluation of the partitioning criteria effect on the performance of management tasks, is given in [4]. 6 A Manager Router D Subnet A 2 1 B 5 C 4 3 1 Bridge Subnet B 4 H E Router Remote LAN 2 F G 3 Figure 2. Partitioning the network into two distinct domains Although partitioning the managed network into separate domains represents a step forward improving management scalability, it is clear that the scenario illustrated in Figure 2 represents an ideal case in terms of the WAN link utilisation. That is because the link is traversed only twice per polling interval (PI). For instance, network partitioning could be performed in such a way that the two MA objects would be required to visit NEs located in both the segment local to the manager station and the remote LAN. This is pictured in Figure3a, with the first MA following the itinerary BEF and the second ACGDH. In this case, the WAN link is traversed four times per PI. In a more pessimistic scenario, one of the MAs would not visit the remote LAN hosts in sequence, but traverse the link three times on each direction (itinerary: EBFCG); the second MA travel plan would be HDA (see Figure3b). Apparently, even when specific partitioning criteria are followed, the design of MA itineraries is almost random; itineraries scheduling process lacks a mechanism that would guarantee minimal use of links interconnecting individual management domains, hence optimal itineraries planning (OIP) is required. 4 1 A A Manager 1 Router Manager D 2 D 3 Router Subnet A Subnet A 2 5 C B 6 B C 1 1 Bridge Bridge Subnet B Subnet B 6 2 2 4 3 E Router H 3 4 3 Remote LAN F Router E Remote LAN F G 5 5 H 4 G (b) (a) Figure 3. Non-optimised partitioning scenarios 3. THE OPTIMAL ITINERARY PLANNING ALGORITHM Interestingly, the OIP problem exhibits many similarities with the Multi-point Line Topologies or Constrained Minimum Spanning Trees (CMST) problems. A CMST is a Minimum Spanning Tree2 with the additional constraint on the size of the subtrees rooted on the center (there is an upper limit on the number of nodes included on each of the subtrees originated at the tree’s root). CMST algorithms are used in graph theory, with the main application domain being network design problems. In such problems, the objective is the optimal selection of the links connecting terminals to concentrators3 or directly to the network center, 2 A Minimum Spanning Tree is defined as a tree (i.e. a connected graph without cycles) with the least total distance, cost, or some other metric of delay or reliability [7]. 3 Concentrators (or multiplexors) are nodes that consolidate low speed lines into higher speed lines, directed to the network center [7]. P8 / 3 resulting in the minimum possible total cost. The output of CMST algorithms typically comprises topologies partitioned on several multi-point lines (or tree branches), where groups of terminals share a subtree to a specific node (center). For instance, Figure 4a depicts a set of nodes with a given network center and costs for connecting individual pair of nodes, while Figure 4b presents the optimal multi-line topology that minimises the overall cost, where network nodes have been partitioned into two clusters or subtrees, each directed to the network center. In this particular scenario, the overall cost will comprise the sum of costs for connecting each link included in the problem solution: c = c5,3 + c3,1 + c1,0 + c 4, 2 + c 2, 0 = 35. Since CMST problems are NP-hard, several heuristics have been developed to efficiently deal with them; Esau-Williams (E-W) and Sharma's algorithms are the two most well known [7]. center center 0 0 7 8 1 1 2 10 5 7 17 3 2 10 concentrators 3 4 8 4 14 12 8 9 5 5 (a) term inals (b) Figure 4. CMST problem: (a) The unconnected graph; (b) The optimal multi-point line topology The input of E-W algorithm comprises the number N of terminals to be connected, the index of the central network site, constants wi,j and ci,j ( 1 ≤ i , j ≤ N ) that denote the traffic (weight) requirement and the cost for connecting terminals i and j respectively, and finally the aggregate cost wmax that sets a maximum limit for the traffic routed through each individual multi-point line (subtree)4. The algorithm’s output is a two-dimensional array including the endpoints (node indices) of the links included in the solution [7]. CMST algorithms are highly relevant to the OIP problem: partitioning a set of network terminals into multi-point lines is not semantically different to partitioning a set of managed devices into several domains. Besides, in both cases the objective remains to minimise the overall cost. The fact that CMST algorithms not only propose optimal clustering of the network into separate domains, but also decide on how the nodes included in each domain are interconnected (forming multi-point lines or subtrees) solves the problem of optimising the order that each MA visits the devices into its assigned domain: the MA object will simply have to traverse its respective subtree. In principle, our OIP algorithm derives from the E-W algorithm. That is, we have adapted the parameters described above (defined using network design problems terminology) to reflect the specific characteristics of the OIP problems. The prototype of the method implementing the OIP algorithm (in Java) and the definition of the parameters involved, follow: public int[][] OIP (int N, int center, int c[][], int w[], int wmax) ƒ ƒ N: the overall number of managed devices (to be visited by MAs); center: the index of the manager host; 4 The Esau-Williams algorithm evaluates a tradeoff function t , associated with each link (i,j), defined as follows: i,j t i , j = ci , j − c ci , where cci is the cost of connecting the component containing node i to the center [7]. Namely, it connects a node directly to the center only when that represents a solution ‘cheaper’ than connecting it to the nearest set of nodes already interconnected. P8 / 4 ƒ ƒ ƒ c: the cost matrix (dimensions: N × N ) determining the cost of agent migration between each pair of hosts; w: the amount of data collected from each visited device (dimension: N); wmax: the maximum number of nodes that may be visited by a single MA. The function’s output is a two-dimensional array including the endpoints of individual agent hops (migrations) included in the solution. In order to execute the OIP function, an important task is to assign specific values to the parameters listed above, reflecting the topology characteristics of the examined managed network. V = {S o , S1 ,.., S s } . The manager station, denoted as terminal 0 and located in subnet S0 is appointed as the In particular, the managed network V is defined as a union of its s individual subnets: center of the managed network (graph). Without loss of generality, the weight variables are set to: wi = 1, ∀i , in order to eliminate their effect on the proposed solution. Namely, we make the assumption that the amount of data collected from each host is constant. In addition, the cost variables are set to:  0, ∀ i, j ∈ S k ci , j =   c(k , l ), ∀ i ∈ S k , j ∈ S l , k ≠ l  (3-1) Therefore, for hosts i and j located in separate subnets the cost ci , j of an MA migration from i to j is not constant but depends on the actual ‘distance’ between their respective subnets, i.e. the number of intermediate subnets that need to be traversed, the bandwidth of their interconnecting links, etc. Moreover, the cost for traversing each link is proportional to the inverse of its bandwidth. That is: c(k , l ) = k ∗ ( + 1 BSk ,S1 1 BS1 ,S2 + ... + 1 BS n , S l ) (3-2) where S1, S2, … SN are the subnets physically located ‘between’ subnets Sk and Sl (traffic between Sk and Sl is routed through them), BS1 ,S 2 denotes the bandwidth of the link connecting S1 and S2 and k is a normalisation factor. A Manager A Manager D Subnet A D Subnet A Router Router C B C B Bridge Bridge Subnet B Subnet B H H E Router E Router Remote LAN F G Remote LAN F G (b) (a) Figure 5. Applying an OIP heuristic to propose (a) two, or (b) three near-optimal itineraries. Using as case study the simple network topology illustrated inFigure 2, the employment of the OIP algorithm prioritises the inclusion of the hosts located on the remote LAN into a separate management domain, for both the cases that two or three optimal MA itineraries were requested (see Figure 5). In the extreme case that only one itinerary is requested, the application of the OIP algorithm ensures that the remote LAN hosts are visited successively, namely the WAN link is being traversed only twice. Therefore, the algorithm described above not only provides optimal clustering of the managed network in management domains, but also optimal solutions regarding the order in which individual MA objects should visit their assigned NEs. P8 / 5 4. ALGORITHM RESULTS IMPLEMENTATION DETAILS AND PERFORMANCE EVALUATION The configuration of the OIP algorithm parameters is a task undertaken by the human administrator, through the GUI pictured in Figure 6. First, the criterion according to which the managed network will be partitioned into separate managed domains is chosen. Should the administrator chooses to grant the management framework the authority to automate the partitioning phase and construct optimal itineraries for the MAs involved in the monitoring process (execution of the OIP algorithm), two additional options are given: (a) Let the OIP algorithm decide on the optimal number of itineraries as well as the number of devices included in each managed domain; (b) Define an upper limit on the number of devices that may be included in each domain (that will certainly affect the final number of managed domains). If the latter option is chosen, the administrator defines the maximum number n of devices; the OIP function will then be invoked, setting the parameter wmax = n. If the former option is chosen, the parameter will be set equal to the total number of devices: wmax = N. Figure 6. Configuration of OIP algorithm parameters The results of several algorithm tests (for varying network topologies) revealed that OIP algorithm favors the ‘connection’ of NEs local to the manager subnet directly to the manager host (i.e. single-hop agent itineraries). Such solutions are clearly inefficient though as they result in the transmission of large numbers of MAs affecting the overall scalability. That is because the algorithm lacks a mechanism that would make the ‘connection’ of these NEs directly to the manager host less appealing than choosing to ‘inter-connecting’ them and forming a subtree. In order to exclude such results from the set of valid solutions, we have chosen to slightly modify the cost matrix of equation (3-1), introducing a small cost penalty for ‘connections’ between the manager host and devices residing on its local subnet. An alternative way around this problem would be to introduce an additional constraint wmin, which would prevent the construction of single-hop itineraries (by setting wmin ≥ 2 ). However, this idea has been disqualified as in several topology scenarios, it failed to provide valid problem solutions. Thus, the output of OIP algorithm for the test network of Figure 2 is depicted in Figure 7a, which demonstrates the optimal clustering of the managed network in two separate ‘subtrees’, each assigned to an itinerant agent. Yet, there still remains an open issue to be addressed. There are three ways for an MA to traverse its domain (i.e. its subtree): ƒ ƒ ƒ Pre-order traversal (visit the root, then the left subtree, then the right subtree); In-order traversal (visit left subtree, then the root, then the right subtree); Post-order traversal (visit left subtree, then the right subtree, then the root). Post-order traversal is the most efficient though, as it leaves the devices local to the manager site to be visited at the end of the MA’s itinerary. That ensures that when traversing the link interconnecting two subnets, the MA has not yet collected any data, hence, it will have the minimum possible impact on network P8 / 6 resources. For instance, in Figure 2, the MA assigned to the domain including subnets A and B, first visits host H residing in subnet B and then returns to visit hosts D, C, B, A, which are local to the manager site. Manager Host 6 Manager Host 5 1 4 4 A 5 1 G 3 4 A 4 4 G C J 1 3 3 B 1 1 3 D 2 F E 2 B C 3 H D F 2 E I H 2 (a) 2 (b) Figure 7. Output of the OIP algorithm: (a) For the test network of Figure 2, (b) After discovering two additional devices on Subnet B. To integrate OIP process into our hierarchical management framework prototype introduced in [5], we have implemented a software component termed the Itinerary Scheduler Module (ISM). ISM executes the OIP algorithm and informs the manager application on the number of MAs that need to be instantiated and their respective itineraries. It also ensures that each agent itinerary represents a post-order traversal of its assigned ‘subtree’. The manager application asks the ISM (through a callback function) to recalculate the optimal agent itineraries whenever a new managed device is ‘discovered’. This is depicted in Figure 7b, which shows the output of the OIP algorithm when two additional devices are discovered on Subnet B (see Figure 8a). In case that the number of managed devices on remote subnets becomes too large and given that specific criteria are met, the manager dynamically adapts to the new topology facts and deploys an MA (termed Mobile Distributed Manager [5]) to the remote subnet to act as a local manager thereby localising management traffic and reducing the associated cost (see Figure 8b). 1 1 Router 4 4 C B Manager D Subnet A 2 5 A Manager Router 1 5 A D Subnet A C B 2 4 MDM J J 3 3 Bridge 1 Bridge 1 3 Subnet B 3 Subnet B 4 H I E Router Router Remote LAN 2 2 F I 3 Remote LAN 1 2 F G H MDM E G 2 3 (b) (a) Figure 8. Discovery of new managed devices: (a) Reconfiguring optimal itinerary planning, (b) Applying an adaptive hierarchical MA-based management model 5. EXPERIMENTAL RESULTS OIP algorithm performance tests have taken place on the network illustrated on Figure 8 comprising ten different WinNT machines with Pentium III (450 MHz) processor and 128MB of memory. The cost matrix has been calculated through equations (3-1) and (3-2), where BS AS B =10Mbps, BS AS R =1Mbps and k = 107. The MA used in our experiments has code size of 1.95 Kbytes, initial state size of 447 bytes and accumulates 50 bytes of data from each visited host. The algorithm has been tested on managed networks of 10 and 20 P8 / 7 devices (in the latter case, two separate agent servers were simultaneously running to ‘simulate’ two managed devices on the same host). These managed networks have been segmented into 1, 2, 3 and 4 separate partitions. In the following table we present the average improvement measured when applying the OIP algorithm against another technique, where managed devices are equally distributed among a fixed number of domains; in the latter case, after determining the hosts comprising each management domain, the itineraries of the agents assigned to each domain are randomly constructed. It is noted that each table entry represents the average improvement measured over 100 runs: clearly, the OIP algorithm provides the same solution for specific sets of nodes and a given pair of (#devices, #partitions); the 100 runs refer to different, randomly generated itineraries. It can be noticed that the prevalence of the OIP algorithm is more evident when applying it to larger sets of nodes and smaller number of partitions (the optimal construction of agent itineraries then becomes a decisive factor). # managed devices # partitions (managed domains) 1 2 3 4 10 37% 34% 21% 4% 20 66% 52% 28% 6% Table 1: Decrease of management cost when applying OIP algorithm over randomly generated itineraries 6. RELATED WORK Iqbal et al. [6] developed a performance model that, given a specific communication pattern, allows agents to decide whether they should migrate to a site and communicate locally or the communication should be performed remotely. The decision is taken according to an Optimal Design Graph; in most cases, it has been indicated that the optimal performance of an agent is achieved by a critical sequence of mixed remote procedure calls and agent migrations. A work conceptually relevant to the research presented herein, has been presented in [11], where Qi and Wang propose the employment of MA paradigm for data fusion in wireless sensor networks. To optimize agents itinerary, they derived a Local Closest First (LCF) algorithm according to which each MA searches for the next destination with the shortest distance to its current location. However, their cost function formulation does not take into account potential clustering of visited hosts in multiple physical subnets, which would affect the calculation of the distance matrix. Also, LCF-like algorithms have been characterized as ‘nearsighted’, in the sense that their output highly depends on the MAs original location, while the nodes left to be visited last are associated with high migration cost [7]; the reason for this is that they search for the next destination among the nodes adjacent to the MA’s current location, instead of looking at the ‘global’ network distance matrix. Most importantly though, both the works presented in [6] and [11], deal with the problem of constructing near-optimal MA itineraries for given sets of network nodes, where a single MA visits the whole set. Yet, they do not address the fundamental problem of partitioning network nodes in optimal clusters. On the other hand, the algorithm presented in the preceding sections deals with the optimal clustering problem and subsequently uses the algorithm’s output to easily construct optimal agent itineraries (through the post-order tree traversal described above). 7. CONCLUSIONS & ONGOING RESEARCH Despite the popularity of MA-based management applications, methodologies for designing efficient MA itineraries have received little attention. In particular, the number of hops realised by a multi-hop agent is not the only metric to evaluate the communication overhead of MA-based operations. The order in which MAs visit their assigned NEs is also a crucial factor, as slight changes on the agents itineraries may result in dramatically variant management costs. This article introduces an algorithm that borrows ideas and concepts from the area of network design to address the issue of MA optimal itinerary planning. The algorithm has been designed having network monitoring applications in mind, although it would comfortably fit in other application areas, such as network discovery, service management, etc. The OIP algorithm not only suggests the appropriate number of P8 / 8 MAs that should be employed to minimise the overall management cost but also constructs optimal itineraries for each of them. Ongoing research includes exhaustive testing of the presented OIP algorithm in large-scale, simulated, multi-subnet network environments using a network simulator tool. We also plan to test the applicability of the OIP algorithm in several application fields, other than network monitoring. REFERENCES [1] C. Bohoris, A. Liotta, G. Pavlou, “Mobile Agent Based Performance Management for the Virtual Home Environment”, Journal of Network and System Management, 11(2), pp. 133-149, June 2003. [2] T. Du, E. Li, A.P. Chang, “Mobile Agents in Distributed Network Management”, Communications of the ACM, 46(7), July 2003. [3] A. Fuggeta, G.P. Picco, G. Vigna, “Understanding Code Mobility”, IEEE Transactions on Software Engineering 24(5), pp. 346–361, 1998. [4] D. Gavalas, “Mobile Software Agents for Network Monitoring and Performance Management”, PhD Thesis, University of Essex, UK, July 2001. [5] D. Gavalas, D. Greenwood, M. Ghanbari, M. O’Mahony, “Hierarchical Network Management: A Scalable and Dynamic Mobile Agent-Based Approach”, Computer Networks, 38(6), pp.693-711, April 2002. [6] A. Iqbal, J. Baumann, M. Straßer, “Efficient Algorithms to Find Optimal Agent Migration Strategies”, Universität Stuttgart, Fakultät Informatik, Bericht Nr. 1998/05, April 1998. [7] A.Kershenbaum, “Telecommunications Network Design Algorithms”, McGraw-Hill, 1993. [8] A. Liotta, G. Pavlou, G. Knight, “Exploiting Agent Mobility For Large Scale Network Monitoring”, IEEE Network, 16(3), pp. 7-15, May/June 2002. [9] P. Marques, P. Simões, L. Silva, F. Boavida, J. Gabriel, “Providing Applications with Mobile Agent Technology”, Proceedings of the 4th IEEE International Conference on Open Architectures and Network Programming (OpenArch’01), IEEE Computer Press, April 2001. [10] A. Puliafito, O. Tomarchio, “Using Mobile Agents to implement flexible Network Management strategies”, Computer Communications, 23(8), pp. 708-719, April 2000. [11] H. Qi, F. Wang, “Optimal itinerary analysis for mobile agents in ad hoc wireless sensor networks”, Proceedings of the 15th IEEE International Conference on Wireless Communications, pp.147-153, July 2001. [12] J. Schönwälder, A. Pras and J.P. Martin-Flatin, “On the Future of Internet Management Technologies”. IEEE Communications Magazine, Vol. 41, No. 10, pp. 90-97, October 2003 [13] W. Stallings, “SNMP, SNMPv2, SNMPv3 and RMON 1 and 2”, 3rd ed., Addison Wesley, 1999. P8 / 9