2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)最新文献

筛选
英文 中文
Web Service Offerings Infrastructure (WSOI) - a management infrastructure for XML Web services Web服务产品基础设施(WSOI)——XML Web服务的管理基础设施
V. Tosic, Wei-wei Ma, B. Pagurek, B. Esfandiari
{"title":"Web Service Offerings Infrastructure (WSOI) - a management infrastructure for XML Web services","authors":"V. Tosic, Wei-wei Ma, B. Pagurek, B. Esfandiari","doi":"10.1109/NOMS.2004.1317770","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317770","url":null,"abstract":"Our Web Service Offerings Language (WSOL) enables formal specification of important management information - classes of service (modeled as service offerings), various types of constraint (functional, QoS, access rights), and management statements (e.g., prices, penalties, and management responsibilities) - for XML (Extensible Markup Language) Web services. To demonstrate the usefulness of WSOL for the management of Web services and their compositions, we have developed a corresponding management infrastructure, the Web Service Offerings Infrastructure (WSOI). WSOI enables monitoring and accounting of WSOL service offerings and their dynamic manipulation. To support monitoring of WSOL service offerings, we have extended the Apache Axis open-source SOAP engine with WSOI-specific modules, data structures, and management ports. To support dynamic manipulation of WSOL service offerings, we have developed appropriate algorithms, protocols, and management port types and built into WSOI modules and data structures for their implementation. Apart from provisioning of WSOL-enabled Web services, we are using WSOI to perform experiments comparing dynamic manipulation of WSOL service offerings and alternatives.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116044951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
Customer-centric network upgrade strategy: maximizing investment benefits for enhanced service quality 以客户为中心的网络升级策略:投资效益最大化,服务质量提升
Jin Xiao, R. Boutaba
{"title":"Customer-centric network upgrade strategy: maximizing investment benefits for enhanced service quality","authors":"Jin Xiao, R. Boutaba","doi":"10.1109/NOMS.2004.1317764","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317764","url":null,"abstract":"With the ever increasing demand for network resources, network operators and Internet service providers are under constant pressure to accommodate more network bandwidth and offer better service quality via periodic network upgrades, Given a budget constraint, a sound network upgrade decision should maximize investment benefit which is contingent on the degree of customer satisfaction. This paper presents a customer-centric approach in making network upgrade decisions, where customer satisfaction is the key evaluation criterion. Network performance is related to customer's perceived service quality and component upgrades are assessed based on their profitability. As demonstrated using a case scenario, our approach results in effective upgrade decisions that enhance service quality, improve customer satisfaction, and maximize revenue.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116402498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Managing firewall and network-edge security policies 管理防火墙和网络边缘安全策略
E. Al-Shaer
{"title":"Managing firewall and network-edge security policies","authors":"E. Al-Shaer","doi":"10.1109/NOMS.2004.1317810","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317810","url":null,"abstract":"Summary form only given. Firewalls are core elements in network security. However, managing firewall rules, particularly in multi-firewall enterprise networks, has become a complex and error-prone task. Firewall filtering rules have to be written, ordered and distributed carefully in order to avoid firewall policy conflicts (or anomalies) and network vulnerability. Therefore, in order to produce anomaly-free firewall policies when adding or modifying rules in any firewall, a thorough intra- and inter-firewall analysis is required to determine the rule location (which firewall) and position (what order in the firewall policy) in the network. We comprehensibly identify all types of anomaly that could exist in single- or multi-firewall environments. We then present a set of techniques/tools that automatically discover and rectify policy anomalies in centralized and distributed legacy firewalls.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116495290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Managing mobile ad hoc networks 管理移动自组织网络
R. Chadha
{"title":"Managing mobile ad hoc networks","authors":"R. Chadha","doi":"10.1109/NOMS.2004.1317806","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317806","url":null,"abstract":"Summary form only given. Tomorrow's mobile ad hoc networks emphasize adaptable and flexible networks that automatically adapt to the user's needs. Such adaptability and flexibility requires mobile networking capabilities significantly beyond what is possible with currently fielded technology. The tutorial discusses the management challenges and outlines solutions to problems that address the unique characteristics of mobile ad hoc networks. The tutorial covers the following topics: introduction to ad hoc networking; ad hoc network configuration; routing in ad hoc networks; management issues for ad hoc networks.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128257585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A dynamic configuration architecture 动态配置体系结构
F. A. Aagesen, Chutiporn Anutariya, M. Shiaa, B. Helvik, Paramai Supadulchai
{"title":"A dynamic configuration architecture","authors":"F. A. Aagesen, Chutiporn Anutariya, M. Shiaa, B. Helvik, Paramai Supadulchai","doi":"10.1109/NOMS.2004.1317786","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317786","url":null,"abstract":"Network-based services have, for more than a decade been, been an important research topic. A demand has arisen for a platform with functionalities beyond existing solutions. The paper develops a formal framework for dynamic configuration and reconfiguration of services in TAPAS - telematics architecture for plug-and-play systems (see http://tapas.item.ntnu.no). It provides representation, computation and reasoning mechanisms for semantic description and matching of required and offered capabilities and status which are required by a particular service system. It employs CIM and recently developed languages for the semantic Web in order to provide a mechanism for human-readable and machine-comprehensible descriptions of status, capabilities, system (re)configuration plans as well as exchanging messages. It also exploits XML declarative description (XDD) theory to unify such various languages seamlessly into a single uniform formalism. It permits formal definitions of application-specific configuration requirements and constraints as well as reconfiguration policies. Reasoning about these definitions and the available capabilities/status of nodes in the system yields appropriate (re)configuration plans for the composition of new services and for adaptation of current services.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133001730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
In-line service measurements: an IPv6-based framework for traffic evaluation and network operations 在线业务度量:基于ipv6的流量评估和网络运营框架
D. Pezaros, D. Hutchison, J. Sventek, Francisco J. García, R. Gardner
{"title":"In-line service measurements: an IPv6-based framework for traffic evaluation and network operations","authors":"D. Pezaros, D. Hutchison, J. Sventek, Francisco J. García, R. Gardner","doi":"10.1109/NOMS.2004.1317736","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317736","url":null,"abstract":"The ability to measure, monitor and control the service quality experienced by network traffic is becoming increasingly important as multiple traffic types are aggregated onto IP networks. Assessing the real-time performance of the application flows is an essential requirement for network operations and service management, as well as for identifying how the different traffic types and transports interact and behave, when they are carried over the end-to-end Internet infrastructure. This paper introduces a novel measurement technique for assessing the performance of IPv6 network flows. By exploiting IPv6 extension headers, measurement triggers and the instantaneous measurement indications are carried in the same packets as the payload data itself. providing a high level of probability that the behaviour of the real user traffic flows is being observed. The measurement mechanism is applied at the network layer and provides for a generic technique able to measure any type of traffic without depending on particular transports or on specific measurement architectures. A prototype implementation of this technique is also described and evaluated by measuring performance properties of application flows over different-capacity IPv6 environments. End-to-end delay and jitter of video streams have been measured, as well as the goodput for services operating on top of reliable transport. This measurement technique can be the basis for low-overhead, scalable, transparent and reliable measurement of individual and aggregate network flows, and can be dynamically deployed where and when required in a multi-service IP environment.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127951668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Rethinking manageability - advances and emerging paradigm shifts in managing intelligent IP networks 重新思考可管理性——管理智能IP网络的进步和新兴范式转变
A. Clemm, G. Lin
{"title":"Rethinking manageability - advances and emerging paradigm shifts in managing intelligent IP networks","authors":"A. Clemm, G. Lin","doi":"10.1109/NOMS.2004.1317814","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317814","url":null,"abstract":"Summary form only given. This tutorial presents a view of the IP network management problem from the perspective of the network itself. It focuses on how to address enhanced manageability requirements in the network infrastructure. This includes what can and should be instrumented inside a network element, and what can and should be instrumented with a scope that goes beyond the individual network element to result in more general \"manageability services\" provided by the network. We discuss the relevance of manageability as a business driver and provide an in-depth analysis of the various factors that contribute to manageability. After this, techniques are presented that can be applied to enhance manageability, also in light of increased focus on applications such as on-demand services, managed services, and plug-n-play networking. We also discuss the role of certain technologies such as XML and Netflow in the emergence of a new generation of management interfaces. Finally, scenarios are used to illustrate how the resulting advances in manageability facilitate not only the development of management applications, but ultimately result in networks that are more autonomous and \"self managing\", and less complex and costly to operate than the norm today.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114191640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On building the minimum number of tunnels: an ordered-split approach to manage IPSec/VPN policies 关于建立最小数量的隧道:一种管理IPSec/VPN策略的有序分割方法
Yanyan Yang, C. Martel, S. F. Wu
{"title":"On building the minimum number of tunnels: an ordered-split approach to manage IPSec/VPN policies","authors":"Yanyan Yang, C. Martel, S. F. Wu","doi":"10.1109/NOMS.2004.1317665","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317665","url":null,"abstract":"Most of the current work in policy management for IPSec/VPN focuses on how to configure a single IPSec box or a pair of IPSec boxes. However, it has been shown (Fu et al. (2001)) that the local correctness of IPSec policies in every box individually does not necessarily guarantee global correctness. Therefore, it is critical to have a systematic way to analyze the security requirements globally and to generate, automatically and correctly, a set of IPSec policies to ensure the security for all the end-to-end connections. Previously (Fu et al. (2001)), two different algorithms (i.e. bundle and direct) were introduced to solve the policy generation problem in an \"offline\" fashion. While these two algorithms are efficient in producing globally correct policy rules, the number of output policy rules (i.e., the results themselves) is much greater than necessary. In other words, while the existing approaches can produce a solution quickly, the quality of the solution is far from optimal. In practice, this is undesirable for several reasons. For instance, \"more IPSec policy rules\" implies \"more complicated virtual network topology\". Therefore, in this paper, we focus on \"how to produce a minimum set of IPSec/VPN tunnels\". We formulate this problem as a special type of task-scheduling problem and develop a new method, the ordered-split approach, to produce a provably minimum set of globally correct policy rules. We have also compared the new approach with existing methods in simulation, and our results clearly demonstrate that the ordered-split approach performs significantly better.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120943758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Operating mobile networks through effective network inventory management 通过有效的网络库存管理来运营移动网络
E. Grosso, R. Alfano
{"title":"Operating mobile networks through effective network inventory management","authors":"E. Grosso, R. Alfano","doi":"10.1109/NOMS.2004.1317832","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317832","url":null,"abstract":"The paper presents a technical solution for the automation of network inventory management (NIM) processes for mobile operators. The deployment of operations support systems (OSS), according to the design of an overall target systems architecture, and the reengineering of management processes supporting NIM are the core issues of the proposed solution. Common information and data models are key enabling factors for NIM processes and systems. Information modelling is also the core of standardization efforts for network and service management. Within the operating environments of telecommunication companies (telcos), running either wireline or wireless networks, NIM and the centrality of data have appeared to be key factors for enabling automation of network and service management and deploying effective OSS solutions. The theories and the results discussed have been demonstrated practically and successfully in the operating companies of the Telecom Italia Group. Software solutions for the automation of NIM processes have been deployed since the early 1980s, using early software technologies for database management and building bespoke systems, until some more recent implementations that exploit best-in-class commercial products and successful Web technologies. A practical case study is presented of a successful implementation of an OSS solution for NIM in a mobile company of the Telecom Italia Group.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124943878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pervasive computing and management 普适计算与管理
Nikos Anerousis
{"title":"Pervasive computing and management","authors":"Nikos Anerousis","doi":"10.1109/NOMS.2004.1317805","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317805","url":null,"abstract":"Summary form only given. The vision of pervasive and ubiquitous computing was set forth in the early 90s, calling for a world of people and environments augmented with computational resources that provide access to information and services anytime, anywhere. Since then, part of this vision has been realized. The first part of this tutorial presents a comprehensive overview of pervasive computing and its evolution in the last 10 years. Particular attention is given to three areas where most research and development work has focused: natural interfaces (displays, speech, input devices), context awareness, and automated capture and access of live experiences. In addition, we explore a number of systems issues common in the development of pervasive applications, such as networking techniques for creating a pervasive communications infrastructure (especially in the presence of intermittent connectivity), middleware and operating system support, security and privacy. The second part provides an overview of the still nascent field of management of pervasive environments. We outline the challenges and present the latest work in the area: problem domains, architectures and implementations.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122483611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信