NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium最新文献

筛选
英文 中文
A new approach for clustering alarm sequences in mobile operators 移动运营商报警序列聚类的新方法
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502960
Selçuk Sözüer, Ç. Etemoglu, E. Zeydan
{"title":"A new approach for clustering alarm sequences in mobile operators","authors":"Selçuk Sözüer, Ç. Etemoglu, E. Zeydan","doi":"10.1109/NOMS.2016.7502960","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502960","url":null,"abstract":"Telecom Networks produce huge amount of daily alarm logs. These alarms usually arrive from different regions and network equipments of mobile operators at different times. In a typical network operator, Network Operations Centers (NOCs) constantly monitor those alarms in a central location and try to fix issues raised by intelligent warning systems by performing a trouble ticketing based management system. In order to automate rule findings, different sequential rule mining algorithms can be exploited. However, the number of sequential rules and alarm correlations that can be generated by using these algorithms can overwhelm the NOC administrators since some of those rules are neither utilized nor reduced appropriately by the non-customized sequential rule mining algorithms. Therefore, additional efficient and intelligent rule identification techniques need to be developed depending on the characteristic of the data. In this paper, two new metrics that is inspired from document classification approaches are proposed in order to increase the accuracy of the sequential alarm rules. This approach utilizes new definition of identifying transactions as alarm features and clustering the alarms by their occurrences in built transactions. Experimental evaluations demonstrate that up to 61% accuracy improvements can be achieved through utilizing the proposed appropriate metrics compared to a sequential rule mining algorithm.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127952134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Real-time analysis of NetFlow data for generating network traffic statistics using Apache Spark 使用Apache Spark实时分析NetFlow数据,生成网络流量统计数据
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502952
Milan Cermák, Tomás Jirsík, Martin Laštovička
{"title":"Real-time analysis of NetFlow data for generating network traffic statistics using Apache Spark","authors":"Milan Cermák, Tomás Jirsík, Martin Laštovička","doi":"10.1109/NOMS.2016.7502952","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502952","url":null,"abstract":"In this paper, we present a framework for the real-time generation of network traffic statistics on Apache Spark Streaming, a modern distributed stream processing system. Our previous results showed that stream processing systems provide enough throughput to process a large volume of NetFlow data and hence they are suitable for network traffic monitoring. This paper describes the integration of Apache Spark Streaming into a current network monitoring architecture. We prove that it is possible to implement the same basic methods for NetFlow data analysis in the stream processing framework as in the traditional ones. Moreover, our stream processing implementation discovers new information which is not available when using traditional network monitoring approaches.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121283971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Towards self-adaptive network management for a recursive network architecture 面向递归网络体系结构的自适应网络管理
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502977
J. Barron, Micheal Crotty, E. Elahi, R. Riggio, D. López, M. P. D. Leon
{"title":"Towards self-adaptive network management for a recursive network architecture","authors":"J. Barron, Micheal Crotty, E. Elahi, R. Riggio, D. López, M. P. D. Leon","doi":"10.1109/NOMS.2016.7502977","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502977","url":null,"abstract":"Traditionally, network management tasks manually performed by system administrators include monitoring alarms based on collected statistics across many heterogeneous systems, correlating these alarms to identify potential problems or changes to management policies and responding by performing system re-configurations to ensure optimal performance of network services. System administrators have a narrow focus of factors impacting network service provisioning and performance due to the heterogeneity and scale of generated underlying network events. However, self-adaption principles are conceptual approaches for autonomously managing such complex distributed systems. Network management systems that harness such principles can dynamically and autonomously optimise the operation of network services, responding quickly to changes in user requirements and underlying network conditions. In this paper, we present a novel self-adaptive network management framework that takes advantage of a recursive network architecture for a simpler and more comprehensive application of ontologies, semantic web rules and machine learning to automatically adjust network configuration parameters to provide more optimal QoS management of network services. We demonstrate the applicability of the approach using a content distribution network (CDN) operating over such a recursive network architecture.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121372529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Resource management of replicated service systems provisioned in the cloud 云提供的复制服务系统的资源管理
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502933
Mathias Björkqvist, R. Birke, Walter Binder
{"title":"Resource management of replicated service systems provisioned in the cloud","authors":"Mathias Björkqvist, R. Birke, Walter Binder","doi":"10.1109/NOMS.2016.7502933","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502933","url":null,"abstract":"Service providers seek scalable and cost-effective cloud solutions for hosting their applications. Despite significant advances facilitating cloud services deployment and management, a number of challenges still remain. Service providers are confronted with time-varying workloads, inter-dependencies between components, performance variability of the procured virtual resources, and cost structures that differ from conventional data centers. Moreover, fulfilling service level agreements (SLAs), such as the throughput and response time percentiles, becomes of paramount importance for ensuring business advantages. In this dissertation paper, we explore service provisioning in clouds from multiple points of view. The aim is to best provide service replicas in the form of VMs to various applications, such that their tail throughputs and tail response times, as well as resource utilization, meet the SLAs in the most cost effective manner. In particular, we develop models, algorithms and replication strategies that consider multi-tier services provisioned in the cloud, investigate how a service provider can opportunistically take advantage of observed cloud performance variability and provide means of guaranteeing tail throughput and response times in the face of the aforementioned performance variability. Overall, this dissertation paper provides not only a multi-faceted approach to exploring several crucial aspects of cloud-hosted services, i.e., cost, tail throughput, and tail response times, but our proposed management strategies are also rigorously validated via trace-driven simulations and extensive experiments.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129049158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Protecting virtual networks with DRONE 用DRONE保护虚拟网络
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502799
S. R. Chowdhury, Reaz Ahmed, Md Mashrur Alam Khan, Nashid Shahriar, R. Boutaba, J. Mitra, Feng Zeng
{"title":"Protecting virtual networks with DRONE","authors":"S. R. Chowdhury, Reaz Ahmed, Md Mashrur Alam Khan, Nashid Shahriar, R. Boutaba, J. Mitra, Feng Zeng","doi":"10.1109/NOMS.2016.7502799","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502799","url":null,"abstract":"Network virtualization is enabling infrastructure providers (InPs) to offer new services to higher level service providers (SPs). InPs are usually bound by Service Level Agreements (SLAs) to ensure various levels of resource availability for different SPs' virtual networks (VNs). They provision redundant backup resources while embedding an SP's VN request to conform to the SLAs during physical failures in the infrastructure. An extreme of this backup resource provisioning is to reserve a dedicated backup of each element in an SP's VN request. Such dedicated protection scheme can enable an InP to ensure fast VN recovery, thus, providing high uptime guarantee to the SPs. In this paper, we study the 1 + 1-Protected Virtual Network Embedding (1 + 1-ProViNE) problem. We propose Dedicated Protection for Virtual Network Embedding (DRONE), a suite of solutions to the 1 + 1-ProViNE. DRONE includes an Integer Linear Programming (ILP) formulation for optimal solution (OPT-DRONE) and a heuristic (FAST-DRONE) to tackle the computational complexity in computing the optimal solution. Trace driven simulations show that FAST-DRONE allocates only 14.3% extra backup resources on average compared to the optimal solution, while executing 200-12000x faster.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"417 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117316936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Towards an approximate graph entropy measure for identifying incidents in network event data 基于近似图熵的网络事件数据事件识别方法研究
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502959
P. Tee, G. Parisis, I. Wakeman
{"title":"Towards an approximate graph entropy measure for identifying incidents in network event data","authors":"P. Tee, G. Parisis, I. Wakeman","doi":"10.1109/NOMS.2016.7502959","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502959","url":null,"abstract":"A key objective of monitoring networks is to identify potential service threatening outages from events within the network before service is interrupted. Identifying causal events, Root Cause Analysis (RCA), is an active area of research, but current approaches are vulnerable to scaling issues with high event rates. Elimination of noisy events that are not causal is key to ensuring the scalability of RCA. In this paper, we introduce vertex-level measures inspired by Graph Entropy and propose their suitability as a categorization metric to identify nodes that are a priori of more interest as a source of events. We consider a class of measures based on Structural, Chromatic and Von Neumann Entropy. These measures require NP-Hard calculations over the whole graph, an approach which obviously does not scale for large dynamic graphs that characterise modern networks. In this work we identify and justify a local measure of vertex graph entropy, which behaves in a similar fashion to global measures of entropy when summed across the whole graph. We show that such measures are correlated with nodes that generate incidents across a network from a real data set.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114127427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Standalone eNode-B design with integrated virtual EPC in public safety networks 独立eNode-B设计,在公共安全网络中集成虚拟EPC
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502887
Can Altay, Nazli Zeynep Bozdemir, Erdogan Camcioglu
{"title":"Standalone eNode-B design with integrated virtual EPC in public safety networks","authors":"Can Altay, Nazli Zeynep Bozdemir, Erdogan Camcioglu","doi":"10.1109/NOMS.2016.7502887","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502887","url":null,"abstract":"LTE technology is considered as the next enabler of the public safety networks with regard of its performance and reliability. The mission critical communication in public safety network requires non-stop connectivity, especially in natural disaster scenarios. To provide further reliability, the eNode-Bs should ensure connectivity when the backhaul connection fails. This paper proposes a standalone eNode-B architecture, which deploys its own integrated virtual EPC to ensure service without backhaul connection. The proposed standalone eNode-Bs are also designed to establish backhaul connection with each other to extend the coverage without need for a central EPC structure. Standalone LTE solutions for PSNs that fall within the scope of this paper, aim to offer resiliency, robustness, dynamicity, and high quality service. The basic LTE functions and further design challenges, related to connected or non-connected standalone eNode-Bs, are discussed through the paper.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126799772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
SLA analytics for adaptive service provisioning in the cloud 用于云中的自适应服务供应的SLA分析
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502967
Obinna Anya, Heiko Ludwig, Mohamed Mohamed, S. Tata
{"title":"SLA analytics for adaptive service provisioning in the cloud","authors":"Obinna Anya, Heiko Ludwig, Mohamed Mohamed, S. Tata","doi":"10.1109/NOMS.2016.7502967","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502967","url":null,"abstract":"Service level agreements (SLAs) are considered not only a central tool for managing QoS compliance, but also a differentiating factor between service implementations. In today's application environments with fast instrumentation deployment cycles in hybrid Cloud platforms, managing QoS compliance poses tremendous challenges, including how to deliver solutions that live up to promised QoS properties and preemptively identify provisioning risks before they lead to violations. Current approaches are usually reactive, i.e. the application infrastructure reacts to changes in QoS metrics, with a huge focus on compliance enforcement after violations have occurred. Cloud service provisioning demands a proactive approach to QoS management, with support for robust predictive scaling of service capacity based on multiple metrics, including business goals as well as infrastructure-level and QoS metrics. This paper presents an approach for adaptive service provisioning in the Cloud based on QoS analytics. A major contribution of the approach is the development of an analytics engine for predictive elasticity management of Cloud service provisioning that integrates in-depth mining of SLA compliance history with knowledge of business context, e.g. workload variability, a customer's business goals, application performance, and service operational context. In this work-in-progress report, we describe the proposed framework and discuss possible implementation and deployment scenarios.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126214280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
User-centered security management of API-based data integration workflows 基于api的数据集成工作流的以用户为中心的安全管理
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502993
Bojan Suzic
{"title":"User-centered security management of API-based data integration workflows","authors":"Bojan Suzic","doi":"10.1109/NOMS.2016.7502993","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502993","url":null,"abstract":"One of the consequences of the present adoption of cloud-based services among organizations is the increasing rate of outsourcing of business and technical functions to third parties. The recent approaches such as cloud integration platforms (iPaaS) facilitate this trend even further. In this scenario, users' resources distributed across different cloud systems are accessed, shared and processed completely in the cloud, at third-party premises, effectively transferring the execution of entire business processes to the cloud. In this work, we approach security challenges and issues that arise from data and resource integrations of such scale. Our contribution aims at advancing privacy and confidentiality in collaboration flows of distributed, cross-domain systems. We focus on the perspective of resource owners, enabling automated, structured discovery and security orchestration of their resources hosted at various cloud premises. We furthermore consider the perspective of integration clients that access and process distributed resources on behalf of resource owners, providing the model for discovery, integration and fine-grained constraints of sharing requests. Our contribution is examined on a basis of the focused prototype that allows proxy-based integration with existing systems and web authorization protocols.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126414179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
OpenEdge: A dynamic and secure open service edge network OpenEdge:动态、安全的开放服务边缘网络
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502820
Josh Kunz, Christopher Becker, M. Jamshidy, S. Kasera, R. Ricci, J. Merwe
{"title":"OpenEdge: A dynamic and secure open service edge network","authors":"Josh Kunz, Christopher Becker, M. Jamshidy, S. Kasera, R. Ricci, J. Merwe","doi":"10.1109/NOMS.2016.7502820","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502820","url":null,"abstract":"High performance edge networks, such as fiber-to-the-premises (FTTP), are increasingly being deployed by municipalities and communities to support advanced services and applications. The complexity of operating these networks often means that their full potential is not being reached and they are relegated to being fast access pipes to the Internet. In this paper, we present our work on OpenEdge, a dynamic and secure open service edge network architecture. OpenEdge provides a control architecture that automates the configuration of the edge network in a cloud-like manner to simplify the introduction of new network services and applications.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126553931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信