In this work, the authors claimed the need of both
database audit and control checking (mechanisms
for detecting errors in the data flow of the client) to
guarantee a high detection coverage. In general, off-
the-shelf database systems are equipped with
utilities to perform data audits, such as described in
(Haugk et al, 1985), (Costa et al, 2000), (Bagchi et
al, 2001), (Oracle8 Server Utilities).
Our research objective, in this work, is to
investigate on such approach to derive optimal
maintenance policies of database supports in such
systems. It is noteworthy then to underline the
specific characteristics possessed by such
communication systems which have to be taken into
account in devising approaches for their
maintenance. The two main factors characterizing
wireless communication systems are: 1) Short-
persistence of most of the data stored in the database
(typically, of the same duration of the user call). 2)
The highly dynamic evolution of the environmental
conditions (e.g., varying number of active calls) and
the changes over time of the requirements and
services offered from these communication systems.
These two factors make maintenance difficult to
achieve by traditional methods, and consequently
approaches using learning and adaptation to replace
missing or incorrect environment knowledge by the
experimentation, observation, prediction, and
generalization, come out to be very attractive.
The methodology using DEpendability
Evaluation of Multiple phased systems (DEEM) tool
to model and analyze the dependability attributes of
different scheduled audit strategies is developed.
This methodology, essentially based on
Deterministic and Stochastic Petri Nets (DSPN) and
supported by DEEM tool, aims to derive appropriate
settings for the order and frequencies of database
audits to optimize selected performance indicators.
Afterwards, an intelligent software agent based on a
reinforcement Q-Learning approach is developed for
planning and learning to derive optimal maintenance
policies adaptively and Artificial Neural Networks
(ANN) for its implementation.
2 INTELLIGENT
MAINTENANCE SYSTEM
Wireless and mobile systems include a database
subsystem, storing system-related as well as clients-
related information, and providing basic services to
the application process, such as read, write and
search operations. Data concerning the status, the
access rights and features available to the users,
routing information for dispatch calls, are all
examples of data contained in such database,
organized in appropriate data structures usually
called tables (e.g., database tables A, B, and C). The
database is subject to corruption determined by a
variety of hardware and/or software faults, such as
internal bugs and transient hardware faults. The
occurrences of such faults have the potential of
yielding to service unavailability. Because of the
central role played by such database in ensuring a
correct service to clients, means to pursue the
integrity/correctness of data have to be carried out.
The synopsis, shown in Figure 1, of an intelligent
database maintenance system, built of a given audit
operation set, and an audit manager, is suggested in
order to allow to select, in each time period, the
optimal maintenance policy, the optimal audit
behavior. The part, in Figure 1, labelled "Relevant
Parameters" indicates those parameters of the
wireless communication systems which determine
the states space of these systems, mainly the time
(the nature of the application under study imposes
the time as relevant parameter), the mean number of
user calls N
call
, and the pointer failure rate λ
C
.
2.1 Audit Operation Set
In this work, we are not interested in defining or
analyzing audit operations from the point of view of
the detection and/or correction capabilities offered
by them. Instead, a given set of audit operations is
assumed to be provided (as shown in Figure 1 e.g.,
Audit1_AB, Audit1_BC, Audit2_AB, Audit2_BC
are audit operations dealing with database tables A,
B, and C) to cope with data corruption, where each
audit operation is characterized by a cost (in
execution time) and coverage (as a measure of its
ability to detect and/or correct wrong data).
2.2 Audit Manager (Decision-making)
The audit manager is responsible for applying a
maintenance strategy to cope with database
corruption and therefore preventing system
unavailability; it activates different audit operations
at different time intervals. To achieve this goal, it
has to select the part of the database to
check/recover, the detection/recovery scheme to
apply, and the frequency with which each
check/recovery operation has to be performed. It is
implemented by a decision-making subsystem which
integrates a methodology to model and analyze
maintenance strategies (where e.g., Table Pointers
are
structured in homogeneous sets A, B, and C as
WINSYS 2011 - International Conference on Wireless Information Networks and Systems
116