Intersystem Communications between Virtualized Agents
|Published in:||Issue 2, (Vol. 9) / 2015|
|Abstract.||This paper presents an analysis of the main problems associated with data and command communications in virtualized environments. This aspect is very important in determining the performance and functionality of such systems. In this regard, an effective data communication brings obvious advantages for volume data transfer (images, backups, checkpointing information). If we are to refer to resource administration overhead, we can notice that direct connectivity - although important - is not the only factor which defines the performance of data transfers; resource administration, resource loading and load balancing are also extremely important. Furthermore, a command structure is very important to expand the capabilities of underlying software (platform). Even if a platform supports various functions, the system should have the capability to discover, asses, command, deploy and monitor various dynamic virtualized resources in order to correctly (and efficiently) use those resources, either via predefined protocols or via a set of mission-defined parameters that are transferred and intelligently parsed and processed|
|Keywords:||Virtualized Environments, Virtualized Agents, Intersystem Communications, Communication Protocol|
1. I. Foster, Y. Zhao, I. Raicu, S. Lu, "Cloud Computing and Grid Computing 360-Degree Compared", Grid Computing Environments Workshop, pp. 1-10, November 2008.
2. N.W. Paton, M.A.T. de Aragao, K. Lee, A.A.A. Fernandes, R. Sakellariou, "Optimizing Utility in Cloud Computing through Autonomic Workload Execution", Bulletin of the IEEE Technical Committee on Data Engineering, vol 32 (1), pp. 51-58, 2009.
3. I. Foster, J. Frey, S. Graham, et al., "Modeling Stateful Resources with Web Services, v1.1", on-line resource at http://www.ibm.com/developerworks/library/wsresource/ws-modelingresources.pdf, posted on May 2004, accessed on July 2015.
4. P. Palathingal, S. Chandra, "Agent Approach for Service Discovery and Utilisation", proceedings of the 37th Annual Hawaii International Conference on System Sciences, January 2004.
5. O. Gherman, S.G. Pentiuc, "Middleware Architecture for the Interconnection of Distributed and Parallel Systems", e-Informatica Software Engineering Journal, vol. 6, issue 1, pp. 39-45, 2012.
6. Z. Liu, X. Zhang, "A Novel Approach to Malicious Executables Detection and Containment Based on Distributed System Architecture", 4th International Conference on Natural Computation (ICNC ‘08), pp. 160-164, October 2008.
|Back to the journal content|
This article is licensed under a
Creative Commons Attribution-ShareAlike 4.0 International License.