2012 IEEE Network Operations and Management Symposium最新文献

筛选
英文 中文
What's going on in Chinese IPv6 world 中国的IPv6世界发生了什么
2012 IEEE Network Operations and Management Symposium Pub Date : 2012-06-08 DOI: 10.1109/NOMS.2012.6211949
Lei Gao, Jiahai Yang, Hui Zhang, Donghong Qin, Bin Zhang
{"title":"What's going on in Chinese IPv6 world","authors":"Lei Gao, Jiahai Yang, Hui Zhang, Donghong Qin, Bin Zhang","doi":"10.1109/NOMS.2012.6211949","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211949","url":null,"abstract":"With IPv4 addresses quickly dwindling, the Internet is forcing an evolution of itself. During the long term transition from IPv4 to IPv6, what's going on in IPv6 world becomes unknown for network operators and researchers. In this paper, we propose a heuristic algorithm to identify p2p traffic accurately and implement traffic classification based on Netflow v9 exports to illustrate what applications Chinese IPv6 users are really running. Additionally, we present a detailed study of p2p traffic over IPv6 and advice ISPs to localize p2p traffic at the AS level for future IPv6 traffic management and network resources planning, leaving modeling traffic behavior and deeper classification of IPv6 traffic as our future work.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114063241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Designing pilot for operational innovation in IT service delivery 为IT服务交付的运营创新设计试点
2012 IEEE Network Operations and Management Symposium Pub Date : 2012-04-16 DOI: 10.1109/NOMS.2012.6212072
G. Grabarnik, Y. Michlin, L. Shwartz
{"title":"Designing pilot for operational innovation in IT service delivery","authors":"G. Grabarnik, Y. Michlin, L. Shwartz","doi":"10.1109/NOMS.2012.6212072","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6212072","url":null,"abstract":"Dramatic changes are taking place in the world of IT services: in who is competing with whom, in what determines competitive success, in the technologies of product and production, and in the very ways of business' approach to innovation. Operational Innovation has become a vital necessity for IT Service Providers. It affects what their employees do every day and how they do that. Because it impacts the very core of service delivery, there is an obvious risk associated with it. The benefits of operational changes are not always easy to assess and it often creates confusion. The confusion is real and the stakes for businesses are high. We argue that direct experimentation, or piloting, is both necessary and possible for introduction of operational innovations into Service Delivery. The novelty of this work is twofold: first, we propose to use design of experiments framework for IT service delivery, addressing the essential differences between delivery of IT services and manufacturing; second, we propose robust sequential design of experiments for service processes as part of the framework and demonstrate it on a sample process.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"133 25","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120816988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Modeling IT support organizations using multiple-priority queues 使用多优先级队列对IT支持组织进行建模
2012 IEEE Network Operations and Management Symposium Pub Date : 2012-04-16 DOI: 10.1109/NOMS.2012.6211921
C. Bartolini, C. Stefanelli, M. Tortonesi
{"title":"Modeling IT support organizations using multiple-priority queues","authors":"C. Bartolini, C. Stefanelli, M. Tortonesi","doi":"10.1109/NOMS.2012.6211921","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211921","url":null,"abstract":"As IT services grow more and more complicated, and their management becomes increasingly challenging, IT support organizations assume an essential role to ensure the delivery of Service Level Objectives. What-if scenario analysis represents a very effective tool for the performance optimization of IT support organizations, as it enables an iterative and customized performance optimization process. The problem of accurately modeling IT support organizations requires the development of sophisticated models as well as dedicated parameter inference techniques and tools. This paper presents a multiple-priority queuing model suited for the reenactment of IT support groups developed from the analysis of empirical evidence, as well as a powerful method to infer the model parameters. We applied our model to reenact the behavior of a real life IT support group with our Symian simulator. The results demonstrate that multiple-priority queuing models can reproduce real life IT support groups with a high degree of accuracy.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120963702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Scalable analysis of network measurements with Hadoop and Pig 使用Hadoop和Pig进行网络测量的可扩展分析
2012 IEEE Network Operations and Management Symposium Pub Date : 2012-04-16 DOI: 10.1109/NOMS.2012.6212060
T. Samak, D. Gunter, V. Hendrix
{"title":"Scalable analysis of network measurements with Hadoop and Pig","authors":"T. Samak, D. Gunter, V. Hendrix","doi":"10.1109/NOMS.2012.6212060","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6212060","url":null,"abstract":"The deployment of ubiquitous distributed monitoring infrastructure such as perfSONAR is greatly increasing the availability and quality of network performance data. Cross-cutting analyses are now possible that can detect anomalies and provide real-time automated alerts to network management services. However, scaling these analyses to the volumes of available data remains a difficult task. Although there is significant research into offline analysis techniques, most of these approaches do not address the systems and scalability issues. This work presents an analysis framework incorporating industry best-practices and tools to perform large-scale analyses. Our framework integrates the expressiveness of Pig, the scalability of Hadoop, and the analysis and visualization capabilities of R to achieve a significant increase in both speed and power of analysis. Evaluation of our framework on a large dataset of real measurements from perfSONAR demonstrate a large speedup and novel statistical capabilities.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"237 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123749794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
SeCoA: Autonomous semantic service composition algorithm in symbiotic networks 共生网络中的自治语义服务组合算法
2012 IEEE Network Operations and Management Symposium Pub Date : 2012-04-16 DOI: 10.1109/NOMS.2012.6211957
Tim De Pauw, B. Volckaert, Veerle Ongenae, F. Turck
{"title":"SeCoA: Autonomous semantic service composition algorithm in symbiotic networks","authors":"Tim De Pauw, B. Volckaert, Veerle Ongenae, F. Turck","doi":"10.1109/NOMS.2012.6211957","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211957","url":null,"abstract":"We propose symbiotic networks, a novel approach toward sharing of network resources in order to increase the scalability, dependability and energy efficiency of colocated networks. As symbiotic networks offer large amounts of software services, one challenge is to allow these services to operate “symbiotically” as well. By combining services from different parties, service compositions arise, which allow for a richer set of functionality. Creating such compositions, however, requires intricate knowledge about services and their interoperability. Using a semantic domain and service model, we describe SeCoA, a tunable best-first search algorithm for autonomously constructing symbiotic service compositions. A performance evaluation of SeCoA was conducted, showing that the algorithm offers acceptable performance for moderately sized compositions.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122671467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
VoIP Shield: A transparent protection of deployed VoIP systems from SIP-based exploits VoIP屏蔽:一个透明的保护部署VoIP系统从基于sip的漏洞
2012 IEEE Network Operations and Management Symposium Pub Date : 2012-04-16 DOI: 10.1109/NOMS.2012.6211937
Ryan J. Farley, Xinyuan Wang
{"title":"VoIP Shield: A transparent protection of deployed VoIP systems from SIP-based exploits","authors":"Ryan J. Farley, Xinyuan Wang","doi":"10.1109/NOMS.2012.6211937","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211937","url":null,"abstract":"In this paper, we present a lightweight defense mechanism against VoIP attacks, called VoIP Shield, that can detect counterfeit or MITM modified messages as well as replay attacks without ever changing the underlying VoIP protocol. We then empirically tested our design in conjunction with deployed Vonage VoIP services against a large body of attacks including billing, call redirection, voice pharming, and complex MITM exploits. The results demonstrate that advanced VoIP protection is practical, lightweight, and can be deployed even in systems where software upgrades are impossible.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122949599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Systemic risks/benefits of selfish network operations & management in dynamic environment 动态环境下自私网络运营管理的系统性风险/收益
2012 IEEE Network Operations and Management Symposium Pub Date : 2012-04-16 DOI: 10.1109/NOMS.2012.6211986
V. Marbukh
{"title":"Systemic risks/benefits of selfish network operations & management in dynamic environment","authors":"V. Marbukh","doi":"10.1109/NOMS.2012.6211986","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211986","url":null,"abstract":"Allowing selfish agents to acquire and exploit system information has both positive and negative effects on the overall performance of resource allocation systems. The positive effect results from reduction in the uncertainty inherently present in large-scale systems. The negative effect, which can be mitigated through congestion pricing, is due to agent selfishness. However, current research, concentrated around the notion of “Price of Anarchy”, is mostly concerned with the negative effect. This paper evaluates systemic risks/benefits of selfish agent ability to acquire and exploit dynamic system information in a specific case of selfish routing in a large-scale, random, loss network. Our analysis indicates that the beneficial effect of this ability dominates in a case of high system uncertainty - low load, while the negative effect dominates in a case of low system uncertainty - high load. In the intermediate cases while the beneficial effect still dominates in the “normal” operating mode, the negative effect manifests itself in a risk of cascading overload driving the system to an emergent metastable, i.e., persistent, congested mode. Future research should consider resource allocation models with elastic selfish users and evaluate effect of the congestion pricing.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114151489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A state-based availability model to shared mesh protection in MPLS-TP networks with preemption support 支持抢占的MPLS-TP网络中共享网格保护的状态可用性模型
2012 IEEE Network Operations and Management Symposium Pub Date : 2012-04-16 DOI: 10.1109/NOMS.2012.6212010
Edgard Jamhour, M. Penna
{"title":"A state-based availability model to shared mesh protection in MPLS-TP networks with preemption support","authors":"Edgard Jamhour, M. Penna","doi":"10.1109/NOMS.2012.6212010","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6212010","url":null,"abstract":"The emerging MPLS-TP standard defines new and important recovery requirements for networks deployed with the MPLS technology. MPLS provides several facilities to support protection, but many parameters such as holding and setup priorities as well as the amount of spare capacity must be configured in order to achieve the desired protection level. In this direction, this paper proposes a state-based availability model to help the design of shared-mesh protection schemes for packed-switched paths deployed using MPLS technology. The steady-state probabilities of failure-states in a network can be determined using the MTBF and MTTR of the physical links and other components. Based on this information, the state-based model determines the impact of each failure-state on the availability of all protected paths transported by the network. Using our model, we propose a backup resource planning algorithm that computes the minimum spare capacity required to achieve the desired availability of all protected paths, as well as the strategy for assigning priorities to the backup paths.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124610944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Test environment for QoS testing of VoIP over LTE VoIP over LTE的QoS测试环境
2012 IEEE Network Operations and Management Symposium Pub Date : 2012-04-16 DOI: 10.1109/NOMS.2012.6211994
A. Díaz, P. Merino, F. J. Rivas
{"title":"Test environment for QoS testing of VoIP over LTE","authors":"A. Díaz, P. Merino, F. J. Rivas","doi":"10.1109/NOMS.2012.6211994","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211994","url":null,"abstract":"This application track paper describes an experimental test setup composed to verify the communication performance of internet applications over LTE (Long Term Evolution) networks.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130507348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Content and host-centric information dissemination in delay-tolerant smartphone MANETs: An architecture and demonstration 容忍延迟智能手机manet中以内容和主机为中心的信息传播:架构和演示
2012 IEEE Network Operations and Management Symposium Pub Date : 2012-04-16 DOI: 10.1109/NOMS.2012.6211962
P. Sharma, Jason Biddle, Aaron Daubman, Evan Fiore, Timothy M. Gallagher, Maximilian Merfeld, Santiago Paredes, Daniel Souza, Heather Zwahlen, Jeffrey Gottschalk, D. Marquis
{"title":"Content and host-centric information dissemination in delay-tolerant smartphone MANETs: An architecture and demonstration","authors":"P. Sharma, Jason Biddle, Aaron Daubman, Evan Fiore, Timothy M. Gallagher, Maximilian Merfeld, Santiago Paredes, Daniel Souza, Heather Zwahlen, Jeffrey Gottschalk, D. Marquis","doi":"10.1109/NOMS.2012.6211962","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211962","url":null,"abstract":"Usage of mobile commercial communication devices is continually increasing. However, these devices require a fixed infrastructure and do not function in mobile ad-hoc networks (MANETs) characterized by large delays or disruptions. Furthermore, these devices do not support the emerging communications needed when the location of information publishers and consumers is unknown (e.g., content centric communication models). To provide these capabilities, the paper presents an architecture that overlays content-centric and host-centric delay tolerant algorithms over a MANET. For validating the architecture, we provide a proof-of-concept implementation on Android phones as the illustrative mobile device and WiFi as the illustrative protocol, and we test the architecture in two field demonstrations.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126693167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信