Automation, Control and Intelligent Systems

| Peer-Reviewed |

Performance Models Preventing Multi-Agent Systems from Overloading Computational Resources

Received: 12 November 2014    Accepted: 27 November 2014    Published: 05 December 2014
Views:       Downloads:

Share This Article

Abstract

Multi-Agent Systems (MASs) suffer from low immunity against burst of arrival requests which can result in a permanent outage of such systems. This factor limits the suitability of MASs for control of real-world manufacturing systems with strict requirements on performance and reliability. This manuscript explains the origins of the performance degradation of MASs based on Contract-Net Protocol and proposes a method that protects the systems against the destructive effect of temporal overloads. The proposed method continuously observes the communication among agents and analyzes it in order to identify possible saturation of a system resource. If triggering a new action saturates a system resource, the carrying out of the action will be postponed. The impacts of the method are demonstrated on a test-bed consisted of six mini-computers Raspberry Pi. It shows that the proposed method avoids overloading of the system and thus guarantees a specific system throughput effectively and efficiently.

DOI 10.11648/j.acis.20140206.12
Published in Automation, Control and Intelligent Systems (Volume 2, Issue 6, December 2014)
Page(s) 105-111
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

Holonic Systems, Multi-Agent Systems, Robustness, Reconfigurable Systems, Software Agents

References
[1] M. Pěchouček, S. Thompson, J. Baxter, G. Horn, K. Kok, C. Warmer, R. Kamphuis, V. Mařík, P. Vrba, K. Hall, F. Maturana, K. Dorer, M. Calisti, Agents in industry: the best from the AAMAS 2005 industry track, IEEE Transactions on Intelligent Systems, 21(2), 86 (2006). DOI 10.1109/MIS.2006.19J.
[2] P. Vrba, V. Mařík, P. Siano, P. Leitao, G. Zhabelova, V. Vyatkin, T. Strasser, A Review of Agent and Service-oriented Concepts applied to Intelligent Energy Systems, IEEE Transactions on Industrial Informatics (99), 1 (2014). DOI 10.1109/TII.2014.2326411
[3] O. Yildirim, G. Kardas, A multi-agent system for minimizing energy costs in cement production, Computers in Industry 65(7), 1076 (2014). DOI 10.1016/j.compind.2014.05.002
[4] P. Kadera, P. Tichý, Chilled water system control, simulation, and visualization using Java multi-agent systém, Information Control Problems in Manufacturing, vol. 13 (2009), vol. 13, pp. 1808-1813
[5] R.G. Smith, The Contract Net Protocol: High-Level Communication and Control in a Distributed Problem Solver, IEEE Transactions on Computers (12), 1104 (1980)
[6] P. Kadera, P. Tichy, Plan, commit, execute protocol in multi-agent systems, Holonic and multi-agent systems for manufacturing (Springer, 2009), pp. 155 – 164
[7] H.V. Brussel, J. Wyns, P. Valckenaers, L. Bongaerts, P. Peeters, Reference architecture for holonic manufacturing systems: PROSA, Computers in Industry 37(3), 255 (1998). DOI 10.1016/S0166-3615(98)00102-X
[8] P. Leitao, F. Restivo, ADACOR: A holonic architecture for agile and adaptive manufacturing control, Computers in Industry 57(2), 121 (2006). DOI 10.1016/j.compind.2005.05.005
[9] A. Giret, V. Botti, Engineering Holonic Manufacturing Systems, Computers in Industry 60(6), 428 (2009). DOI 10.1016/j.compind.2009.02.007
[10] M. Wooldridge, M. Fisher, M.P. Huget, S. Parsons, Model checking multi-agent systems with MABLE, in Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 2 (ACM, 2002), pp. 952-959
[11] S. Schliecker, J. Rox, M. Negrean, K. Richter, M. Jersak, R. Ernst, System Level Performance Analysis for Real-Time Automotive Multicore and Network Architectures, IEEE Transactions on Computer-Aided Design of integrated Circuits and Systems, 28(7), 979 (2009)
[12] K. Richter, M. Jersak, R. Ernst, A formal approach to MpSoC performance verification, Computer 36(4), 60 (2003)
[13] R. L. Cruz, A calculus for network delay, IEEE Transactions on Information Theory, 37(1), 114 (1991)
[14] L. Thiele, S. Chakraborty, M. Naedele, Real-time calculus for scheduling hard real-time systems, in Proceedings of IEEE International Symposium on Circuits and Systems, vol. 4 (2000), pp. 101-104
[15] P. Leitao, N. Rodrigues, Modelling and validating the multi-agent system behaviour for a washing machine production line, in Proceedings of IEEE International Symposium on Industrial Electronics (ISIE) (2012), pp. 1203-1208. DOI 10.1109/ISIE.2012.6237260
[16] J. Kubalík, P. Tichý, R. Šindelář, R.J. Staron, Clustering Methods for Agent Distribution Optimization, IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 40(1), 78 (2010)
[17] FIPA. Fipa ACL message structure specification (2002)
[18] P.J. Denning, J.P. Buzen, The operational analysis of queueing network models, ACM Computing Surveys (CSUR) 10(3), 225 (1978)
[19] V. Cortellesa, A. D. Marco, P. Inverardi, Model-based software performance analysis, Springer, 2011
[20] G. Casale, G. Serazzi, Bottlenecks identification in multiclass queueing networks using convex polytopes, in Proceedings of The IEEE Computer Society's 12th Annual International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, 2004. pp. 223-230.
Author Information
  • Czech Institute of Informatics, Robotics and Cybernetics, Czech Technical University in Prague, CZ-169 00, Prague, Czech Republic

  • Czech Institute of Informatics, Robotics and Cybernetics, Czech Technical University in Prague, CZ-169 00, Prague, Czech Republic; Christian Doppler Laboratory for Software Engineering Integration for Flexible Automation Systems, Vienna University of Technology, A-1040, Vienna, Austria

  • Czech Institute of Informatics, Robotics and Cybernetics, Czech Technical University in Prague, CZ-169 00, Prague, Czech Republic; Rockwell Automation Research and Development Center, CZ-150 00, Prague, Czech Republic

  • Czech Institute of Informatics, Robotics and Cybernetics, Czech Technical University in Prague, CZ-169 00, Prague, Czech Republic

Cite This Article
  • APA Style

    Petr Kadera, Petr Novak, Vaclav Jirkovsky, Pavel Vrba. (2014). Performance Models Preventing Multi-Agent Systems from Overloading Computational Resources. Automation, Control and Intelligent Systems, 2(6), 105-111. https://doi.org/10.11648/j.acis.20140206.12

    Copy | Download

    ACS Style

    Petr Kadera; Petr Novak; Vaclav Jirkovsky; Pavel Vrba. Performance Models Preventing Multi-Agent Systems from Overloading Computational Resources. Autom. Control Intell. Syst. 2014, 2(6), 105-111. doi: 10.11648/j.acis.20140206.12

    Copy | Download

    AMA Style

    Petr Kadera, Petr Novak, Vaclav Jirkovsky, Pavel Vrba. Performance Models Preventing Multi-Agent Systems from Overloading Computational Resources. Autom Control Intell Syst. 2014;2(6):105-111. doi: 10.11648/j.acis.20140206.12

    Copy | Download

  • @article{10.11648/j.acis.20140206.12,
      author = {Petr Kadera and Petr Novak and Vaclav Jirkovsky and Pavel Vrba},
      title = {Performance Models Preventing Multi-Agent Systems from Overloading Computational Resources},
      journal = {Automation, Control and Intelligent Systems},
      volume = {2},
      number = {6},
      pages = {105-111},
      doi = {10.11648/j.acis.20140206.12},
      url = {https://doi.org/10.11648/j.acis.20140206.12},
      eprint = {https://download.sciencepg.com/pdf/10.11648.j.acis.20140206.12},
      abstract = {Multi-Agent Systems (MASs) suffer from low immunity against burst of arrival requests which can result in a permanent outage of such systems. This factor limits the suitability of MASs for control of real-world manufacturing systems with strict requirements on performance and reliability. This manuscript explains the origins of the performance degradation of MASs based on Contract-Net Protocol and proposes a method that protects the systems against the destructive effect of temporal overloads. The proposed method continuously observes the communication among agents and analyzes it in order to identify possible saturation of a system resource. If triggering a new action saturates a system resource, the carrying out of the action will be postponed. The impacts of the method are demonstrated on a test-bed consisted of six mini-computers Raspberry Pi. It shows that the proposed method avoids overloading of the system and thus guarantees a specific system throughput effectively and efficiently.},
     year = {2014}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Performance Models Preventing Multi-Agent Systems from Overloading Computational Resources
    AU  - Petr Kadera
    AU  - Petr Novak
    AU  - Vaclav Jirkovsky
    AU  - Pavel Vrba
    Y1  - 2014/12/05
    PY  - 2014
    N1  - https://doi.org/10.11648/j.acis.20140206.12
    DO  - 10.11648/j.acis.20140206.12
    T2  - Automation, Control and Intelligent Systems
    JF  - Automation, Control and Intelligent Systems
    JO  - Automation, Control and Intelligent Systems
    SP  - 105
    EP  - 111
    PB  - Science Publishing Group
    SN  - 2328-5591
    UR  - https://doi.org/10.11648/j.acis.20140206.12
    AB  - Multi-Agent Systems (MASs) suffer from low immunity against burst of arrival requests which can result in a permanent outage of such systems. This factor limits the suitability of MASs for control of real-world manufacturing systems with strict requirements on performance and reliability. This manuscript explains the origins of the performance degradation of MASs based on Contract-Net Protocol and proposes a method that protects the systems against the destructive effect of temporal overloads. The proposed method continuously observes the communication among agents and analyzes it in order to identify possible saturation of a system resource. If triggering a new action saturates a system resource, the carrying out of the action will be postponed. The impacts of the method are demonstrated on a test-bed consisted of six mini-computers Raspberry Pi. It shows that the proposed method avoids overloading of the system and thus guarantees a specific system throughput effectively and efficiently.
    VL  - 2
    IS  - 6
    ER  - 

    Copy | Download

  • Sections