13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Towards Adaptive WLAN Frequency Management Us<strong>in</strong>g Intelligent Agents 121ables will give <strong>in</strong>formation about the number of frames with errors (MIB:FCS), thenumber of frames delivered correctly (MIB:InUPkt), the number of associated stations(MIB:NAS) and the frequency channel (MIB:Channel), so that the agent canhave an <strong>in</strong>ternal representation of the environment. Secondly, the agent handles <strong>in</strong>com<strong>in</strong>gmessages issued from other agents. The message contents are exam<strong>in</strong>ed andprocessed accord<strong>in</strong>gly. The exchange of <strong>in</strong>formation between neighbor<strong>in</strong>g agentsimproves the channel assignment. The agent f<strong>in</strong>ally has to perform local computationto determ<strong>in</strong>e the most appropriate channel.The overall agent architecture and processes are depicted <strong>in</strong> Figure 1.Fig. 1. AWM Agent ArchitectureWe now briefly <strong>in</strong>troduce the general scenario <strong>in</strong>volv<strong>in</strong>g our AWM_agents and relatedaccess po<strong>in</strong>ts. The optimization algorithm we have implemented is currently be<strong>in</strong>gpatented and is therefore not detailed <strong>in</strong> this paper. It is however important to mentionthat the overall architecture perfectly suits a wide range of distributed optimizationalgorithms.The monitor<strong>in</strong>g task and the message process<strong>in</strong>g are implemented <strong>by</strong> means of twoJade cyclic behaviors. The monitor<strong>in</strong>g process is implemented <strong>in</strong>to the MonitorBehaviour,while message handl<strong>in</strong>g is implemented <strong>in</strong>to the MsgBehaviour.The AWM_agent queries the SNMP agent <strong>in</strong> order to retrieve the <strong>in</strong>formation fromthe access po<strong>in</strong>t, which is controlled <strong>by</strong> the agent (1). In case of <strong>in</strong>terference, theagent activates the optimization algorithm (2) and computes the new channel to beassigned to the access po<strong>in</strong>t. The new channel is set via a SNMP request (3). Theagent then sends the new channel to the neighbor<strong>in</strong>g agents (4). The receiv<strong>in</strong>g agentreads the message contents, makes sure that it fits the AWM ontology and <strong>in</strong> turnactivates the optimization algorithm if necessary (5) to compute the new channelbased upon the updated <strong>in</strong>formation. F<strong>in</strong>ally, the new channel is assigned <strong>by</strong> means ofa SNMP request (6).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!