13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Towards Adaptive WLAN Frequency Management Us<strong>in</strong>g Intelligent Agents 121ables will give <strong>in</strong>formation about the number of frames with errors (MIB:FCS), thenumber of frames delivered correctly (MIB:InUPkt), the number of associated stations(MIB:NAS) and the frequency channel (MIB:Channel), so that the agent canhave an <strong>in</strong>ternal representation of the environment. Secondly, the agent handles <strong>in</strong>com<strong>in</strong>gmessages issued from other agents. The message contents are exam<strong>in</strong>ed andprocessed accord<strong>in</strong>gly. The exchange of <strong>in</strong>formation between neighbor<strong>in</strong>g agentsimproves the channel assignment. The agent f<strong>in</strong>ally has to perform local computationto determ<strong>in</strong>e the most appropriate channel.The overall agent architecture and processes are depicted <strong>in</strong> Figure 1.Fig. 1. AWM Agent ArchitectureWe now briefly <strong>in</strong>troduce the general scenario <strong>in</strong>volv<strong>in</strong>g our AWM_agents and relatedaccess po<strong>in</strong>ts. The optimization algorithm we have implemented is currently be<strong>in</strong>gpatented and is therefore not detailed <strong>in</strong> this paper. It is however important to mentionthat the overall architecture perfectly suits a wide range of distributed optimizationalgorithms.The monitor<strong>in</strong>g task and the message process<strong>in</strong>g are implemented <strong>by</strong> means of twoJade cyclic behaviors. The monitor<strong>in</strong>g process is implemented <strong>in</strong>to the MonitorBehaviour,while message handl<strong>in</strong>g is implemented <strong>in</strong>to the MsgBehaviour.The AWM_agent queries the SNMP agent <strong>in</strong> order to retrieve the <strong>in</strong>formation fromthe access po<strong>in</strong>t, which is controlled <strong>by</strong> the agent (1). In case of <strong>in</strong>terference, theagent activates the optimization algorithm (2) and computes the new channel to beassigned to the access po<strong>in</strong>t. The new channel is set via a SNMP request (3). Theagent then sends the new channel to the neighbor<strong>in</strong>g agents (4). The receiv<strong>in</strong>g agentreads the message contents, makes sure that it fits the AWM ontology and <strong>in</strong> turnactivates the optimization algorithm if necessary (5) to compute the new channelbased upon the updated <strong>in</strong>formation. F<strong>in</strong>ally, the new channel is assigned <strong>by</strong> means ofa SNMP request (6).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!