{"title":"Infrastructure sharing and shared operations for mobile network operators From a deployment and operations view","authors":"T. Frisanco, P. Tafertshofer, P. Lurin, R. Ang","doi":"10.1109/ICC.2008.419","DOIUrl":"https://doi.org/10.1109/ICC.2008.419","url":null,"abstract":"The traditional and still prevailing mobile network operator (MNO) business model is based on the carrierpsilas full ownership of the physical network assets. However, rapid and complex technology migration, regulatory requirements, and increasing capital expenditures on one side and competitive environments, saturated markets, and pressure on margins on the other side advocate a new paradigm: the focus on ldquocritical success factorsrdquo and ldquokey assetsrdquo. Simultaneously, telecommunications equipment is commoditized. These trends are paving the way for the sharing of network infrastructure in the core and radio access networks among multiple operators. Challenges arise with regard to technical solutions to enable such business models in a multi-vendor landscape, but also in the context of the principal-agent-problem accompanying the re-allocation of assets and operational duties. This paper investigates the current technological, regulatory, and business landscape from the perspective of sharing network resources, and proposes several different approaches and technical solutions for network sharing. We introduce a model for estimating savings on capital and operating expenses, and present the results of our simulations for the various scenarios. Finally, we assess the benefits of ldquoManaged Servicesrdquo for the shared network case, a potentially highly attractive model to overcome some of the challenges posed by infrastructure sharing.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134150394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SRDP-Sign: a reliable multicast protocol for signaling","authors":"F. Tommasi, S. Molendini, E. Scialpi","doi":"10.1109/NOMS.2008.4575212","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575212","url":null,"abstract":"In this paper we present SRDP-sign, a reliable multicast protocol designed to guarantee the reliable transmission of short messages via satellite as an extension of satellite reliable distribution protocol (SRDP). The uses of this protocol range from sending short text messages to transmitting information used for the improvement of networkspsila performances. The innovation of this protocol is that it has a high degree of scalability, reduced communication with receivers and fast delivery. In this paper we show the operations of the protocol, the underlying algorithms and analyse the protocolpsilas behavior.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115324549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CyberPlanner: A comprehensive toolkit for network service providers","authors":"R. Boutaba, Jin Xiao, I. Aib","doi":"10.1109/NOMS.2008.4575158","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575158","url":null,"abstract":"With the increased network size and diversity, and the proliferation in applications and services, the network service providers are faced with a flood of information from many levels of their network and service operations, often in uncorrelated forms. At the same time, the focus of network services is shifting from managing networks to managing services and customers. CyberPlanner is a comprehensive toolkit for the collection, correlation and filtering of metrics at all levels of a network service providerpsilas business. In this paper, we present its concept, modeling methodologies and implementation. Experience gained from CyberPlanner testing and operations in both academic and industrial settings demonstrates its effectiveness and potential in assisting many key provider operations such as customer-oriented trouble diagnostics, network dimensioning and upgrading, service planning and business revenue forecasting.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117163174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Guilherme Sperb Machado, F. F. Daitx, Weverton Cordeiro, C. Both, L. Gaspary, L. Granville, C. Bartolini, Akhil Sahai, David Trastour, K. Saikoski
{"title":"Enabling rollback support in IT change management systems","authors":"Guilherme Sperb Machado, F. F. Daitx, Weverton Cordeiro, C. Both, L. Gaspary, L. Granville, C. Bartolini, Akhil Sahai, David Trastour, K. Saikoski","doi":"10.1109/NOMS.2008.4575154","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575154","url":null,"abstract":"The current research on IT change management has been exploring several aspects of this new discipline, but it usually assumes that changes expressed in requests for change (RFC) documents will be successfully executed over the managed IT infrastructure. This assumption, however, is not realistic in actual IT systems because failures during the execution of changes do happen and cannot be ignored. In order to address this issue, we propose a solution where tightly-related change activities are grouped together forming atomic groups of activities. These groups are atomic in the sense that if one activity fails, all other already executed activities of the same group must rollback to move the system backwards to the previous state. The automation of change rollback is especially convenient because it relieves the IT human operator of manually undoing the activities of a change group that has failed. To prove concept and technical feasibility, we have materialized our solution in a prototype system that, using elements of the business process execution language (BPEL), is able to control how atomic groups of activities must be handled in IT change management systems.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126053071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the complexity of determining autonomic policy constrained behaviour","authors":"M. Burgess, L. Kristiansen","doi":"10.1109/NOMS.2008.4575147","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575147","url":null,"abstract":"Policy Based Management aims to constrain and even to determine the behaviour of computer systems that operate in dynamic environments, e.g. for the implementation of business goals. Autonomic computing supplements this with the aim to allow computer systems operate in a stable and predictable fashion with a minimum of human involvement. In this work we use a formulation of autonomic computing based on the cfengine model of convergent operations to discuss the computational cost of implementing autonomic regulation. By placing the autonomic properties of a system at a low level, but with a high degree of abstraction, we are able to make quite general statements about the computation cost of searching for autonomic policies.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125501806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrating business performance management with IT management through impact analysis and provisioning","authors":"A. Biazetti, G. Goldszmidt","doi":"10.1109/NOMS.2008.4575174","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575174","url":null,"abstract":"Fulfilling the IT service management proposition of providing IT as a service aligned with the company business presents many interesting challenges. Among these we consider the challenge of integrating business performance management (BPM) of critical applications with the systems management and provisioning of the IT infrastructure that supports the organizationpsilas business processes.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126723772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network domain entrypoint/path determination for DDoS attacks","authors":"V. Thing, M. Sloman, Naranker Dulay","doi":"10.1109/NOMS.2008.4575117","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575117","url":null,"abstract":"A method to determine entry points and paths of DDoS attack traffic flows into network domains is proposed. We determine valid source addresses seen by routers from sampled traffic under non-attack conditions. Under attack conditions, we detect route anomalies by determining which routers have been used for unknown source addresses to construct the attack paths. We show results from simulations to detect the routers carrying attack traffic in the victim's network domain. Our approach is non-intrusive, not requiring any changes to the Internet routers and data packets. Precise information regarding the attack is not required allowing a wide variety of DDoS attack detection techniques to be used. The victim is also relieved from the traceback task during an attack. Our algorithm is simple and efficient, allowing for a fast traceback and the method is scalable due to the distribution of processing workload.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122072469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improved GPS scheduling discipline based on multifractal traffic characteristics","authors":"Flávio Henrique Vieira Teles, L. Ling, C. Jorge","doi":"10.1109/NOMS.2008.4575264","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575264","url":null,"abstract":"In this work, we propose a new traffic flow scheduling scheme that makes use of the local singularity information of a given traffic process. First of all, we present an algorithm for pointwise Holder exponents estimation based on the decay trends of wavelet coefficients in time windows. The Holder exponents which measure the degree of local irregularities of the traffic processes are intended to provide performance improvement over existing data flow scheduling strategies. For this end, based on this traffic irregularity indicator, we develop a new scheduling scheme for Internet data streams under the GPS (generalized processor sharing) protocol environment. The novelty of this scheduling discipline consists of using the pointwise Holder exponents to determine the link capacity allocation priority for the involved data streams. More precisely, the main goal is to achieve a good sharing of the total link transmission rate by data streams, achieving lower data loss. The proposed data flow scheduling algorithm is extensively evaluated through simulations. The simulation results show that the proposed scheduling scheme provides lower data loss rate as well as higher link utilization than the conventional GPS scheme which is widely employed in many active communication networks.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117020030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Policy-based dynamic provisioning in data centers based on SLAs, business rules and business objectives","authors":"Angela McCloskey, B. Simmons, H. Lutfiyya","doi":"10.1109/NOMS.2008.4575243","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575243","url":null,"abstract":"A policy can be defined as any type of formal behavioural guide that is input to the system. Examples of policies that can be found in data center management systems include SLA, traditional event-triggered rules and business objectives. Specified policies are mapped to executable elements in the system. Usually each policy is mapped separately. This work shows how a set of policy can be considered as a whole in the context of the management of a data center.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117240683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. H. Filho, M. F. F. D. Carmo, J. Maia, G. P. Siqueira
{"title":"An Internet traffic classification methodology based on statistical discriminators","authors":"R. H. Filho, M. F. F. D. Carmo, J. Maia, G. P. Siqueira","doi":"10.1109/NOMS.2008.4575244","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575244","url":null,"abstract":"This work presents an Internet traffic classification methodology based on statistical discriminators and cluster analysis. An accuracy identification of Internet applications is an important research area, because it is directly related to solve many network problems such as: quality of service (QoS), traffic control, security, network management and operation. The main difference to previous approaches lies in the discriminators use; rather than using only one set of discriminators for all classes we use a set of different statistical discriminators for each traffic class. Using real traces into the training and classification phases, we validated the methodology for P2P traffic class.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129505986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}