A Monitoring Model for Hierarchical Architecture of Distributed Systems
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2015, Vol 6, Issue 1
Abstract
Distributed systems are complex systems and there are a lot of the potential risks in the system, so system administrators need to have some effective support tools for network management. The architecture information of distributed systems is an essential part of distributed system monitoring solutions, because it provides general information about monitored objects in the system for administrators, as well as supports administrator in quickly detecting change of topology, error status or potential risks that arise during operation of distributed systems. The modeling approaches have an important role in developing monitoring solutions, in which they are background to develop algorithms for monitoring problems in distributed systems. This paper proposes an approach in order to model for hierarchical architecture of objects in distributed systems, in which consists of architecture of monitored objects, networks, domains and global distributed systems. Based on this model, a basic monitoring solution for hierarchical architecture of distributed systems is developed and this solution is able to provide administrators more important architecture information such as the topology of hardware components, processes, status of monitored objects, etc.
Authors and Affiliations
Phuc Hong, Son Van
Experimental Analysis of the Fault Tolerance of the PIM-SM IP Multicast Routing Protocol under GNS3
PIM-SM is the most commonly used IP multicast routing protocol in IPTV systems. Its fault tolerance is examined by experimenting on a mesh topology multicast test network built up by Cisco routers under GNS3. Different f...
Software Security Requirements Gathering Instrument
Security breaches are largely caused by the vulnerable software. Since individuals and organizations mostly depend on softwares, it is important to produce in secured manner. The first step towards producing secured soft...
Probabilistic: A Fuzzy Logic-Based Distance Broadcasting Scheme For Mobile Ad Hoc Networks
An on-demand route discovery method in mobile ad hoc networks (MANET) uses simple flooding method, whereas a mobile node blindly rebroadcasts received route request (RREQ) packets until a route to a particular destinatio...
Automatic Detection Of Electrocardiogram ST Segment: Application In Ischemic Disease Diagnosis
The analysis of electrocardiograph (ECG) signal provides important clinical information for heart disease diagnosis. The ECG signal consists of the P, QRS complex, and T-wave. These waves correspond to the fields induced...
Impact of Cloud Computing on ERP implementations in Higher Education
Penetration of Higher Education in all regions is increasing all over the globe at a very fast pace. With the increase in the number of institutions offering higher education, ERP implementations has become one of the ke...