2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)最新文献

筛选
英文 中文
Design considerations for NGN softswitch-element management system NGN软交换元管理系统的设计考虑
Ki-Young Jung, Miyi Hong
{"title":"Design considerations for NGN softswitch-element management system","authors":"Ki-Young Jung, Miyi Hong","doi":"10.1109/NOMS.2004.1317794","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317794","url":null,"abstract":"A softswitch (SSW) is the core element of the NGN (next generation network) in the call control and signaling layer. The SSW-EMS (element management system) manages the SSW itself as its basic function, and serves as a mediation device between NMS (network management system) and one or more SSWs. Existing SSW-EMS products can be categorized by two models. One only cares about the SSW itself and the other takes a role of integrated EMS for SSW and gateways (GW). Other servers manage their own NGN-element product lines (namely, NGN-EMS) including AS (application server) and MS (media server). Many products belong to the latter category. Some kinds of EMS take functions from the NMS by their features, such as correlating the faults from different NGN elements. The article looks at the design of NGN softswitch-element management systems.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131620023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A flow-based method for abnormal network traffic detection 一种基于流的异常网络流量检测方法
Myung-Sup Kim, Hun-Jeong Kang, Seong-Cheol Hong, Seung-Hwa Chung, J. W. Hong
{"title":"A flow-based method for abnormal network traffic detection","authors":"Myung-Sup Kim, Hun-Jeong Kang, Seong-Cheol Hong, Seung-Hwa Chung, J. W. Hong","doi":"10.1109/NOMS.2004.1317747","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317747","url":null,"abstract":"One recent trend in network security attacks is an increasing number of indirect attacks which influence network traffic negatively, instead of directly entering a system and damaging it. In future, damages from this type of attack are expected to become more serious. In addition, the bandwidth consumption by these attacks influences the entire network performance. This paper presents an abnormal network traffic detecting method and a system prototype. By aggregating packets that belong to the identical flow, we can reduce processing overhead in the system. We suggest a detecting algorithm using changes in traffic patterns that appear during attacks. This algorithm can detect even mutant attacks that use a new port number or changed payload, while signature-based systems are not capable of detecting these types of attacks. Furthermore, the proposed algorithm can identify attacks that cannot be detected by examining only single packet information.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123313841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 168
An architecture for automatic configuration of integrated networks 一种用于集成网络自动配置的体系结构
S. D'Antonio, M. D'Arienzo, A. Pescapé, G. Ventre
{"title":"An architecture for automatic configuration of integrated networks","authors":"S. D'Antonio, M. D'Arienzo, A. Pescapé, G. Ventre","doi":"10.1109/NOMS.2004.1317674","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317674","url":null,"abstract":"Configuration and management activities are frequently performed both in local area and campus networks due to the intrinsic variability characterizing such networks and the innovative services provided through them. Indeed, in order to benefit from services like voice over IP and multimedia content distribution, corporate users need to configure and manage their network appropriately. Suitable strategies have to be undertaken to fulfill stringent requirements imposed by such services on the underlying \"integrated\" transport infrastructure. These activities are both time and money consuming since they are usually under the responsibility of network administrators and managers. We present an architecture that allows the configuration of network devices in an automatic fashion in order to facilitate traffic management and prioritization in LANs. On one hand, traffic management is optimized through the segmentation of a corporate network into multiple virtual LANs via SNMP. On the other, traffic prioritization is carried out by grouping LAN packets into separate classes associated with different priority levels in compliance with 802.1p. The segmentation process is carried out in two steps: in the first, the network segmentation into \"multimedia hosts\" (i.e., IP phone and multimedia PC) and \"data hosts\" is accomplished (as well as traffic prioritization); in the second, the segmentation task is optimized in both VLANs thanks to the utilization of a \"partitioning algorithm\".","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124866410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
PONDER policy implementation and validation in a CIM and differentiated services framework 在CIM和差异化服务框架中考虑策略的实现和验证
L. Lymberopoulos, Emil C. Lupu, M. Sloman
{"title":"PONDER policy implementation and validation in a CIM and differentiated services framework","authors":"L. Lymberopoulos, Emil C. Lupu, M. Sloman","doi":"10.1109/NOMS.2004.1317639","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317639","url":null,"abstract":"Policies are often used to define management strategies for networks, storage services or applications. Validation determines whether the policy implementation is feasible for the specific environment to which it applies and requires checking that the policy is consistent with the functional or resource constraints within the target environment. For example, do the policies assume functionality or specific operations which do not exist in target routers, or bandwidth in excess of the capacity of data links? Where possible, static checking should be done prior to policy deployment in order to detect invalid policies at design time, but there are some policies, related to resource allocation, that depend on the current state of the system, and require policy constraints that must be checked dynamically at execution time. We show how PONDER policies can be implemented and validated for differentiated services (DiffServ) by using CIM (Common Information Model) as the modelling framework for network resources, as this is device independent. We describe a CIM DiffServ-metrics sub-model extension of the CIM Network sub-model which represents DiffServ traffic statistics and a Linux driver which translates CIM classes and variables to Linux traffic control classes and variables respectively.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123878722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Security management of Web services Web服务的安全管理
M. Malek, F. Harmantzis
{"title":"Security management of Web services","authors":"M. Malek, F. Harmantzis","doi":"10.1109/NOMS.2004.1317850","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317850","url":null,"abstract":"The Internet, while being increasingly used to provide services efficiently, poses a unique set of security issues due to its openness and ubiquity. We highlight the importance of security in Web services and describe how data mining techniques can offer help. The anatomy of two specific security attacks which could cripple Web services or compromise confidential information are described. We survey some security intrusion detection techniques based on data mining and point out their shortcomings. Then we provide some novel data mining techniques to detect such attacks, and describe some safeguard against these attacks.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121501378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Content-aware Internet application traffic measurement and analysis 内容感知的互联网应用流量测量和分析
T. Choi, Changhoon Kim, J. Yoon, Jeongsook Park, Byungjun Lee, Hyung-Lae Kim, Hyungseok Chung, T. Jeong
{"title":"Content-aware Internet application traffic measurement and analysis","authors":"T. Choi, Changhoon Kim, J. Yoon, Jeongsook Park, Byungjun Lee, Hyung-Lae Kim, Hyungseok Chung, T. Jeong","doi":"10.1109/NOMS.2004.1317737","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317737","url":null,"abstract":"As the Internet is quickly evolving from best-effort networks to business quality networks, billing based on the precise traffic measurement becomes an important issue for Internet service providers (ISP). Billing settlement is necessary not only between ISP and customers but also between ISP. Currently, most ISP use a flat rate charging policy. Besides the degree of difficulty in deriving appropriate charging policies agreeable by a concerned party, there are substantial technical challenges to come up with a good usage-based accounting system. Usage-based accounting depending on IP packet header information only is not sufficient any more due to the highly dynamic nature of the development and the use of the Internet applications such as peer-to-peer and network games. They use port numbers dynamically and even several applications can use the same port number. Thus, more precise means of classifying them and accounting for their traffic usage are required. In this paper, we propose a high performance, adaptable, configurable, and scalable content-aware application traffic measurement and analysis system which can achieve very accurate usage-based accounting.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125516563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
Internet router outage measurement: an embedded approach 互联网路由器中断测量:一种嵌入式方法
Sejun Song, Jim Huang
{"title":"Internet router outage measurement: an embedded approach","authors":"Sejun Song, Jim Huang","doi":"10.1109/NOMS.2004.1317652","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317652","url":null,"abstract":"Outage measurement is an integral part of high-availability network operations to assess and report the availability of router components and, in turn, the availability of the network. The paper presents a novel approach to outage measurement, called component outage on-line (COOL) measurement. COOL provides an autonomous real-time outage measurement within the router. It automates the outage measurement process and makes it more accurate, reliable, scalable, and cost-effective. The paper describes COOL's measurement methodology with respect to outage model, measurement metrics, architectural framework, methods for measuring hardware and software outages and planned and unplanned outages, and outage MIB (management information base) design. COOL is being implemented in various network routers. Experiment results on COOL runtime performance are presented.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116210849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Broadband wireless access 宽带无线接入
R. Hafez
{"title":"Broadband wireless access","authors":"R. Hafez","doi":"10.1109/NOMS.2004.1317809","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317809","url":null,"abstract":"Summary form only given. This tutorial addresses recent developments in broadband wireless technologies and networking. The tutorial starts by providing a quick overview of the different classes of wireless systems and their respective applications and limitations, then it moves on to describe the most recent techniques that are opening the way for reliable and robust broadband wireless access. The presentation addresses the dominant standards such as IEEE 802.11a, b, and g, 3G/4G cellular and 802.16a wireless WAN. The tutorial also covers recent advances in ad-hoc and MESH wireless networking. The network models are presented as well as the expected applications and limitations.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115396502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Ontology mapping for network management systems 面向网络管理系统的本体映射
A. K. K. Wong, A. Chen, N. Paramesh, P. Ray
{"title":"Ontology mapping for network management systems","authors":"A. K. K. Wong, A. Chen, N. Paramesh, P. Ray","doi":"10.1109/NOMS.2004.1317781","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317781","url":null,"abstract":"The existence of various network equipment vendors, such as Cisco and Nortel, introduces an additional layer of complexity to the problem of integrating heterogeneous management information models that are applied in different network domains. The problem of using a mixture of different protocols, such as SNMP (simple network management protocol) and CMIP (common management information protocol), has already been attempted and solved by previous research, New interoperability issues can arise within a single domain when network specialists are required to manage network equipments using different sets of terminologies and via different interfaces. The objective of the paper is to address ontological issues that may arise in an integrated network management application. Ontology is applied first to model the semantics of vendor specific terms, and secondly, to aid in automating the mapping between the terms, in order to create a unified application information base such that management of various brands of network equipments can be performed through a single gateway.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129740709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A policy-based approach for user controlled lightpath provisioning 用于用户控制光路配置的基于策略的方法
T. Truong, O. Cherkaoui, H. Elbiaze, N. Rico, E. Aboulhamid
{"title":"A policy-based approach for user controlled lightpath provisioning","authors":"T. Truong, O. Cherkaoui, H. Elbiaze, N. Rico, E. Aboulhamid","doi":"10.1109/NOMS.2004.1317773","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317773","url":null,"abstract":"There is a growing need for e2e lightpaths for high volume data transferring applications such as GridFTP and SAN. They wish to dynamically deploy lightpaths over multiple management domains. Research, sponsored by Canarie Incorporated, is underway to enable \"customer-empowered networks\" and to experiment them with the Canadian research network CA*Net4. New signaling and control approaches using Web services have been proposed. One difficulty is that each domain must retain the control of their optical network infrastructure and ensure proper allocation of optical resources. Hence, it is important that the signaling takes into account the management constraints imposed by the different domains. This paper presents a policy-based approach for user-controlled lightpath provisioning. The work builds on the research around the new signaling approaches for realizing customer-empowered networks. We present an architecture based on Web Services allowing users or Grid applications to establish e2e lightpaths over multiple autonomous systems. To tackle the problem of admission control and to address the resource allocation issue, we developed policy restricted signaling which allows customers to reserve lightpaths over multiple domains while ensuring that management rules of each domain are enforced. The signaling has been implemented and the experiment on a small network composed of Cisco equipment proves the viability of our approach.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127435543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信