Academia.eduAcademia.edu

Autonomic Communication

description93 papers
group194 followers
lightbulbAbout this topic
Autonomic Communication is a paradigm in computer science and telecommunications that focuses on self-managing communication systems. It emphasizes the development of networks and services that can automatically adapt, optimize, and recover from failures without human intervention, thereby enhancing efficiency, reliability, and scalability in data transmission and processing.
lightbulbAbout this topic
Autonomic Communication is a paradigm in computer science and telecommunications that focuses on self-managing communication systems. It emphasizes the development of networks and services that can automatically adapt, optimize, and recover from failures without human intervention, thereby enhancing efficiency, reliability, and scalability in data transmission and processing.

Key research themes

1. How can self-management and self-awareness be operationalized in autonomic communication networks to optimize performance and security?

This research theme focuses on embedding self-management capabilities, including self-configuration, self-optimization, and secure operation, within communication networks. It addresses architectural designs and control loop frameworks that enable networks and network functions to self-observe, analyze, plan, and adapt autonomously in response to dynamic conditions, leveraging software-driven paradigms and machine learning techniques. Such autonomic communication systems aim to reduce human intervention, improve quality-of-service, and maintain robust, secure operations.

Key finding: The study defines the role of Autonomic Communications within Software-Defined Networking (SDN) and Network Function Virtualization (NFV) driven cloud networks, establishing that self-management mechanisms such as automatic... Read more
Key finding: This work characterizes Self-Aware Networks (SANs) as systems with distributed internal representations of their own state and environment that enable adaptive behavior through monitoring, analyzing, and proactive sensing. By... Read more
Key finding: This chapter formulates a precise and operational definition of 'self-aware computing' that integrates multidisciplinary perspectives. It specifies that self-aware computing systems must continuously learn models about... Read more
Key finding: By analyzing autonomic control loops based on IBM's architectural vision, this paper distills core principles such as monitoring, analysis, planning, and execution for autonomic network management. It highlights the... Read more
Key finding: This work applies autonomic communication concepts within pervasive multimodal multimedia systems, emphasizing the need for dynamic adaptation to user context by autonomous systems. Through machine learning and sensing,... Read more

2. What roles do machine consciousness, cognitive architectures, and ethical considerations play in the development of autonomous communication systems and human-machine interaction?

This theme explores the intersection of cognitive science, artificial intelligence, and ethical frameworks in the design and understanding of autonomous systems capable of communication with humans or other machines. It covers the implementation of autopoietic (self-producing) and cognitive behaviors in machines, outlines frameworks for machine consciousness, proposes operational definitions to assess system self-awareness, and investigates the ethical and normative dimensions emerging from human-machine communication, especially in contexts requiring accountability and interpretability.

Key finding: This paper advances a theoretical framework showing how digital machines can exhibit autopoietic properties—self-creation and maintenance—and cognitive behaviors such as sensing, modeling, and acting on internal and external... Read more
Key finding: The authors present an information-theoretic and control-theoretic perspective on machine consciousness, articulating how consciousness can be regarded as a simplified dynamic workspace facilitating awareness and control.... Read more
Key finding: This research proposes a method of 'analysis dialogs' to evaluate the self-awareness (machine consciousness) of question answering systems by examining their capability to explain their reasoning steps. By applying this... Read more
Key finding: This work surveys the emergence of ethical frameworks in the context of human-machine communication, revealing an evolving integration between technical development and applied ethics. It highlights how computational advances... Read more
Key finding: This paper operationally defines human-machine communication (HMC) as a multidimensional process involving bidirectional message exchange and social meaning-making between humans and machines, embedded in micro, meso, and... Read more

3. How do adaptive and self-configuring programming languages, agent-based models, and protocols facilitate dynamic formation and management in autonomic communication systems?

This theme focuses on programming abstractions, agent models, and dynamic protocols that enable autonomous reconfiguration, self-optimization, and scalable management of large, distributed, and heterogeneous communication systems. It examines languages designed for self-management, agent frameworks modeling intra- and inter-personal synchrony, and protocol-level cognitive configurations that adapt parameters dynamically, focusing on how these systems form ensembles or coalitions and autonomously detect changing conditions to optimize network and user interactions.

Key finding: This paper introduces SCEL, a kernel programming language explicitly designed for autonomic computing systems that enables specification and management of autonomic components (ACs) and their dynamic ensembles (ACEs). SCEL... Read more
Key finding: This study develops a multi-adaptive agent model incorporating built-in detectors for intrapersonal and interpersonal synchrony, linking temporal synchrony patterns to dynamic affiliation changes. Simulation experiments... Read more
Key finding: CogProt is a distributed cognitive framework enabling runtime adaptation and optimization of communication protocol parameters such as TCP congestion window settings. By locally tuning protocol behavior based on recent... Read more
Key finding: This paper extends the concept of Electronic Institutions (EIs) with autonomic self-configuration capabilities, enabling normative rule adaptation to regulate agent interactions dynamically in open systems. By integrating... Read more
Key finding: DANTE is presented as a self-adapting P2P system where nodes autonomously adjust their overlay links to form efficient topologies that optimize resource location via random walks. The decentralized adaptation enhances... Read more

All papers in Autonomic Communication

The VICOM (Virtual Immersive COMmunications) project is a three-year project funded by the Italian Ministry of Instruction University and Research aiming at investigating innovative communication paradigms. The project represents a wide... more
Voice over IP (VOIP) has strict Quality of Service (QoS) constraints and requires real-time packet delivery, which poses a major challenge to IP networks. The Cognitive Packet Network (CPN) has been designed as a QoS-driven protocol that... more
To address the needs for future network services, existing network architecture should evolve significantly to provide a higher level of flexibility, resilience and quality of service. This challenge was also the one of computing which... more
Autonomic communication in a computing system analyzes the individual system element as it is affected by and affects other elements. In the human-machine communication aspect, the autonomic system performs its services autonomously,... more
The deployment of pervasive computing systems inevitably raises security concerns. The ability of such systems to synthesise partial information and react to situations without explicit user interaction, confirmation or consent means that... more
Limitations are found in the recent Internet because a lot of functions and protocols are patched to the original suite of layered protocols without considering global optimization. This reveals that end-to-end argument in the original... more
In this paper we describe ConStruct, a distributed, contextaggregation based service infrastructure which supports the development of context-aware applications. ConStruct operates by automatically generating and maintaining directed... more
Wireless sensor networks have the capability to deliver the environmental data to the user. Among the significant data is the location of the node either in static or mobile. A number of network simulators were extensively reviewed... more
One of the internet’s new revolution is Internet of Things (IOT) due to this objects themselves can recognize one another, get intelligence, transfer information to each other about their own and their ability to access the information... more
The Internet of Things (IoT) is a vision for interconnecting all of the world's "things"-from vehicles to diet scales, smart homes and electrical grids-through a common set of networking technologies. Realizing this vision using a... more
They are susceptible to a variety of attacks, including node capture, physical tampering, and denial of service, while prompting a range of fundamental research challenges.
The events that took place on 11 September 2001 have brought to the forefront the unique challenges that occur during a crisis, which require effective sensing, communications and decision making with demanding time constraints in highly... more
The development and deployment of interconnected networks is being increasingly limited by their complexity and the concomitant cost of managing the operational network. Autonomic Communication aims to reduce this cost, by migrating... more
The Flooding Zone Initialization Protocol (FZIP) was proposed as a mechanism to provide power efficient flooding for real-time multimedia data over Wireless Sensor Networks (WSNs). FZIP can initialize different FZ sizes with different... more
The expected dramatic growth of connected things raises the issue of how to efficiently organize them, in order to monitor and manage functions and interactions. Information Centric Networking (ICN) is a communication paradigm that... more
The problem of efficient resource location is an important open issue in P2P systems. This paper introduces DANTE, a self-adapting P2P system that changes its peer links to form topologies where resources are located in an efficient... more
This paper presents some important directions in the use of ontologybased semantics in achieving the vision of Autonomic Communications. We examine the requirements of Autonomic Communication with a focus on the demanding needs of... more
Self-healing is one of the main challenges to growing autonomic pervasive computing. Fault detection and recovery are the main steps of self-healing. Due to the characteristics of pervasive computing the self-healing becomes difficult. In... more
They are susceptible to a variety of attacks, including node capture, physical tampering, and denial of service, while prompting a range of fundamental research challenges.
This paper presents some important directions in the use of ontologybased semantics in achieving the vision of Autonomic Communications. We examine the requirements of Autonomic Communication with a focus on the demanding needs of... more
Embedded Web servers are widely used today for IP-based element management. In this paper, we present a new management architecture that combines this technology with XML, DOM, and XPath to unify element management and network management.... more
The problem of efficient resource location is an important open issue in P2P systems. This paper introduces DANTE, a self-adapting P2P system that changes its peer links to form topologies where resources are located in an efficient... more
Machine-to-Machine (M2M) concept is one of the main features of Internet of Things (IoT). It promises to interconnect billions of devices in near future covering various domains. However, M2M suffers from a high vertical fragmentation of... more
This paper proposes an enumeration and a classification of the services or functionality needed in the autonomic middleware. This allows to propose a second time the foundation for a framework that will be able to generate different... more
The conceptual architecture of autonomic communications requires a knowledge layer to facilitate effective, transparent and high level selfmanagement capabilities. This pervasive knowledge plane can utilise the behaviour of autonomic... more
Autonomic communication in a computing system analyzes the individual system element as it is affected by and affects other elements. In the human-machine communication aspect, the autonomic system performs its services autonomously,... more
Distributed dataset synchronization, or Sync in short, plays the role of a transport service in the Named Data Networking (NDN) architecture. A number of NDN Sync protocols have been developed over the last decade. In this paper, we... more
Previous literatures articulated that the NDN architecture may possess unique advantages in supporting battlefield communications [1], and that NDN can provide superior performance over TCP/IP under various scenarios, in particular in... more
They are susceptible to a variety of attacks, including node capture, physical tampering, and denial of service, while prompting a range of fundamental research challenges.
This thesis is a work of partnership within the framework of cotutorship (cotutelle de thèse) between the "Laboratoire des Architectures du Traitement de l'Information et du Signal"
They are susceptible to a variety of attacks, including node capture, physical tampering, and denial of service, while prompting a range of fundamental research challenges.
A design methodology for multimodal-controlled application has been developed using Wizard-of-Oz simulations as the principal mechanism for evaluating and getting input for dialogue design. This methodology may enable multimodal... more
Autonomic communication in a computing system analyzes the individual system element as it is affected by and affects other elements. In the human-machine communication aspect, the autonomic system performs its services autonomously,... more
IP networks are now well established. However, control, management and optimization schemes are provided in a static and basic way. Network control and management schemes using an autonomy based technology offer a new way to master... more
dara rossman regaignon and pamela bromley pomona college in their introduction to the special issue of ATD: Across the Disciplines on "Writing Fellows as Agents of Change," Brad Hughes and Emily B. Hall point out that "[s]ince the early... more
Self-healing is one of the main challenges to growing autonomic pervasive computing. Fault detection and recovery are the main steps of self-healing. Due to the characteristics of pervasive computing the self-healing becomes difficult. In... more
Federated learning (FL) is gaining momentum as a prominent solution to perform training procedures without the need to move sensitive end-user data to a centralized third party server. In FL, models are locally trained at distributed... more
The rapid growth and development of the internet over last few decades have proven that it is difficult to integrate new functionality in order to fulfill the demands of new applications and the capabilities of new transport technologies;... more
In recent years, the use of wireless sensor network invade various areas (domotic/home automation fields, medical, industrial ...), which sets up several applications such as control of energy consumption in the habitat, home... more
The conceptual architecture of autonomic communications requires a knowledge layer to offer effective, transparent and high level selfmanagement capabilities. This knowledge plane can utilise the behaviour of autonomic communication... more
Previously when wireless networking did not exist yet, people were awaiting wireless technologies with eagerness. Now 802.11n technology makes it a reality. Before 802.11n intermediate technologies were devised and people have had a good... more
Computers support more and more daily activities for common users, and users increasingly take their activities to different locations. Rather than being bound to a specific device, users would like to take full advantage of the computer... more
Computers support more and more daily activities for common users, and users increasingly take their activities to different locations. Rather than being bound to a specific device, users would like to take full advantage of the computer... more
Semantic similarity measures usage is prevalent in pervasive computing with the following aims: 1) to compare the components of an application; 2) to recommend and rank services by degree of relevance; 3) to identify services by matching... more
They are susceptible to a variety of attacks, including node capture, physical tampering, and denial of service, while prompting a range of fundamental research challenges.
Nowadays, research initiatives to redesign the Internet are popping up around the world. Each of these projects has a particular focus and its own set of design requirements and key technologies. The panorama shows a wide diversity of... more
They are susceptible to a variety of attacks, including node capture, physical tampering, and denial of service, while prompting a range of fundamental research challenges.
Download research papers for free!