NOMS 2008 - 2008 IEEE Network Operations and Management Symposium最新文献

筛选
英文 中文
Infrastructure sharing and shared operations for mobile network operators From a deployment and operations view 从部署和运营的角度来看,移动网络运营商的基础设施共享和共享运营
NOMS 2008 - 2008 IEEE Network Operations and Management Symposium Pub Date : 2008-05-19 DOI: 10.1109/ICC.2008.419
T. Frisanco, P. Tafertshofer, P. Lurin, R. Ang
{"title":"Infrastructure sharing and shared operations for mobile network operators From a deployment and operations view","authors":"T. Frisanco, P. Tafertshofer, P. Lurin, R. Ang","doi":"10.1109/ICC.2008.419","DOIUrl":"https://doi.org/10.1109/ICC.2008.419","url":null,"abstract":"The traditional and still prevailing mobile network operator (MNO) business model is based on the carrierpsilas full ownership of the physical network assets. However, rapid and complex technology migration, regulatory requirements, and increasing capital expenditures on one side and competitive environments, saturated markets, and pressure on margins on the other side advocate a new paradigm: the focus on ldquocritical success factorsrdquo and ldquokey assetsrdquo. Simultaneously, telecommunications equipment is commoditized. These trends are paving the way for the sharing of network infrastructure in the core and radio access networks among multiple operators. Challenges arise with regard to technical solutions to enable such business models in a multi-vendor landscape, but also in the context of the principal-agent-problem accompanying the re-allocation of assets and operational duties. This paper investigates the current technological, regulatory, and business landscape from the perspective of sharing network resources, and proposes several different approaches and technical solutions for network sharing. We introduce a model for estimating savings on capital and operating expenses, and present the results of our simulations for the various scenarios. Finally, we assess the benefits of ldquoManaged Servicesrdquo for the shared network case, a potentially highly attractive model to overcome some of the challenges posed by infrastructure sharing.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134150394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 62
SRDP-Sign: a reliable multicast protocol for signaling SRDP-Sign:可靠的组播信令协议
NOMS 2008 - 2008 IEEE Network Operations and Management Symposium Pub Date : 2008-04-07 DOI: 10.1109/NOMS.2008.4575212
F. Tommasi, S. Molendini, E. Scialpi
{"title":"SRDP-Sign: a reliable multicast protocol for signaling","authors":"F. Tommasi, S. Molendini, E. Scialpi","doi":"10.1109/NOMS.2008.4575212","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575212","url":null,"abstract":"In this paper we present SRDP-sign, a reliable multicast protocol designed to guarantee the reliable transmission of short messages via satellite as an extension of satellite reliable distribution protocol (SRDP). The uses of this protocol range from sending short text messages to transmitting information used for the improvement of networkspsila performances. The innovation of this protocol is that it has a high degree of scalability, reduced communication with receivers and fast delivery. In this paper we show the operations of the protocol, the underlying algorithms and analyse the protocolpsilas behavior.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115324549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
CyberPlanner: A comprehensive toolkit for network service providers CyberPlanner:网络服务提供商的综合工具包
NOMS 2008 - 2008 IEEE Network Operations and Management Symposium Pub Date : 2008-04-07 DOI: 10.1109/NOMS.2008.4575158
R. Boutaba, Jin Xiao, I. Aib
{"title":"CyberPlanner: A comprehensive toolkit for network service providers","authors":"R. Boutaba, Jin Xiao, I. Aib","doi":"10.1109/NOMS.2008.4575158","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575158","url":null,"abstract":"With the increased network size and diversity, and the proliferation in applications and services, the network service providers are faced with a flood of information from many levels of their network and service operations, often in uncorrelated forms. At the same time, the focus of network services is shifting from managing networks to managing services and customers. CyberPlanner is a comprehensive toolkit for the collection, correlation and filtering of metrics at all levels of a network service providerpsilas business. In this paper, we present its concept, modeling methodologies and implementation. Experience gained from CyberPlanner testing and operations in both academic and industrial settings demonstrates its effectiveness and potential in assisting many key provider operations such as customer-oriented trouble diagnostics, network dimensioning and upgrading, service planning and business revenue forecasting.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117163174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Enabling rollback support in IT change management systems 在IT变更管理系统中启用回滚支持
NOMS 2008 - 2008 IEEE Network Operations and Management Symposium Pub Date : 2008-04-07 DOI: 10.1109/NOMS.2008.4575154
Guilherme Sperb Machado, F. F. Daitx, Weverton Cordeiro, C. Both, L. Gaspary, L. Granville, C. Bartolini, Akhil Sahai, David Trastour, K. Saikoski
{"title":"Enabling rollback support in IT change management systems","authors":"Guilherme Sperb Machado, F. F. Daitx, Weverton Cordeiro, C. Both, L. Gaspary, L. Granville, C. Bartolini, Akhil Sahai, David Trastour, K. Saikoski","doi":"10.1109/NOMS.2008.4575154","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575154","url":null,"abstract":"The current research on IT change management has been exploring several aspects of this new discipline, but it usually assumes that changes expressed in requests for change (RFC) documents will be successfully executed over the managed IT infrastructure. This assumption, however, is not realistic in actual IT systems because failures during the execution of changes do happen and cannot be ignored. In order to address this issue, we propose a solution where tightly-related change activities are grouped together forming atomic groups of activities. These groups are atomic in the sense that if one activity fails, all other already executed activities of the same group must rollback to move the system backwards to the previous state. The automation of change rollback is especially convenient because it relieves the IT human operator of manually undoing the activities of a change group that has failed. To prove concept and technical feasibility, we have materialized our solution in a prototype system that, using elements of the business process execution language (BPEL), is able to control how atomic groups of activities must be handled in IT change management systems.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126053071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
On the complexity of determining autonomic policy constrained behaviour 论确定自主政策约束行为的复杂性
NOMS 2008 - 2008 IEEE Network Operations and Management Symposium Pub Date : 2008-04-07 DOI: 10.1109/NOMS.2008.4575147
M. Burgess, L. Kristiansen
{"title":"On the complexity of determining autonomic policy constrained behaviour","authors":"M. Burgess, L. Kristiansen","doi":"10.1109/NOMS.2008.4575147","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575147","url":null,"abstract":"Policy Based Management aims to constrain and even to determine the behaviour of computer systems that operate in dynamic environments, e.g. for the implementation of business goals. Autonomic computing supplements this with the aim to allow computer systems operate in a stable and predictable fashion with a minimum of human involvement. In this work we use a formulation of autonomic computing based on the cfengine model of convergent operations to discuss the computational cost of implementing autonomic regulation. By placing the autonomic properties of a system at a low level, but with a high degree of abstraction, we are able to make quite general statements about the computation cost of searching for autonomic policies.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125501806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrating business performance management with IT management through impact analysis and provisioning 通过影响分析和供应将业务绩效管理与IT管理集成
NOMS 2008 - 2008 IEEE Network Operations and Management Symposium Pub Date : 2008-04-07 DOI: 10.1109/NOMS.2008.4575174
A. Biazetti, G. Goldszmidt
{"title":"Integrating business performance management with IT management through impact analysis and provisioning","authors":"A. Biazetti, G. Goldszmidt","doi":"10.1109/NOMS.2008.4575174","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575174","url":null,"abstract":"Fulfilling the IT service management proposition of providing IT as a service aligned with the company business presents many interesting challenges. Among these we consider the challenge of integrating business performance management (BPM) of critical applications with the systems management and provisioning of the IT infrastructure that supports the organizationpsilas business processes.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126723772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Network domain entrypoint/path determination for DDoS attacks 针对DDoS攻击的网络域入口点/路径确定
NOMS 2008 - 2008 IEEE Network Operations and Management Symposium Pub Date : 2008-04-07 DOI: 10.1109/NOMS.2008.4575117
V. Thing, M. Sloman, Naranker Dulay
{"title":"Network domain entrypoint/path determination for DDoS attacks","authors":"V. Thing, M. Sloman, Naranker Dulay","doi":"10.1109/NOMS.2008.4575117","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575117","url":null,"abstract":"A method to determine entry points and paths of DDoS attack traffic flows into network domains is proposed. We determine valid source addresses seen by routers from sampled traffic under non-attack conditions. Under attack conditions, we detect route anomalies by determining which routers have been used for unknown source addresses to construct the attack paths. We show results from simulations to detect the routers carrying attack traffic in the victim's network domain. Our approach is non-intrusive, not requiring any changes to the Internet routers and data packets. Precise information regarding the attack is not required allowing a wide variety of DDoS attack detection techniques to be used. The victim is also relieved from the traceback task during an attack. Our algorithm is simple and efficient, allowing for a fast traceback and the method is scalable due to the distribution of processing workload.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122072469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An improved GPS scheduling discipline based on multifractal traffic characteristics 基于多重分形交通特性的改进GPS调度方法
NOMS 2008 - 2008 IEEE Network Operations and Management Symposium Pub Date : 2008-04-07 DOI: 10.1109/NOMS.2008.4575264
Flávio Henrique Vieira Teles, L. Ling, C. Jorge
{"title":"An improved GPS scheduling discipline based on multifractal traffic characteristics","authors":"Flávio Henrique Vieira Teles, L. Ling, C. Jorge","doi":"10.1109/NOMS.2008.4575264","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575264","url":null,"abstract":"In this work, we propose a new traffic flow scheduling scheme that makes use of the local singularity information of a given traffic process. First of all, we present an algorithm for pointwise Holder exponents estimation based on the decay trends of wavelet coefficients in time windows. The Holder exponents which measure the degree of local irregularities of the traffic processes are intended to provide performance improvement over existing data flow scheduling strategies. For this end, based on this traffic irregularity indicator, we develop a new scheduling scheme for Internet data streams under the GPS (generalized processor sharing) protocol environment. The novelty of this scheduling discipline consists of using the pointwise Holder exponents to determine the link capacity allocation priority for the involved data streams. More precisely, the main goal is to achieve a good sharing of the total link transmission rate by data streams, achieving lower data loss. The proposed data flow scheduling algorithm is extensively evaluated through simulations. The simulation results show that the proposed scheduling scheme provides lower data loss rate as well as higher link utilization than the conventional GPS scheme which is widely employed in many active communication networks.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117020030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Policy-based dynamic provisioning in data centers based on SLAs, business rules and business objectives 数据中心基于sla、业务规则和业务目标的基于策略的动态供应
NOMS 2008 - 2008 IEEE Network Operations and Management Symposium Pub Date : 2008-04-07 DOI: 10.1109/NOMS.2008.4575243
Angela McCloskey, B. Simmons, H. Lutfiyya
{"title":"Policy-based dynamic provisioning in data centers based on SLAs, business rules and business objectives","authors":"Angela McCloskey, B. Simmons, H. Lutfiyya","doi":"10.1109/NOMS.2008.4575243","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575243","url":null,"abstract":"A policy can be defined as any type of formal behavioural guide that is input to the system. Examples of policies that can be found in data center management systems include SLA, traditional event-triggered rules and business objectives. Specified policies are mapped to executable elements in the system. Usually each policy is mapped separately. This work shows how a set of policy can be considered as a whole in the context of the management of a data center.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117240683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An Internet traffic classification methodology based on statistical discriminators 基于统计判别器的互联网流量分类方法
NOMS 2008 - 2008 IEEE Network Operations and Management Symposium Pub Date : 2008-04-07 DOI: 10.1109/NOMS.2008.4575244
R. H. Filho, M. F. F. D. Carmo, J. Maia, G. P. Siqueira
{"title":"An Internet traffic classification methodology based on statistical discriminators","authors":"R. H. Filho, M. F. F. D. Carmo, J. Maia, G. P. Siqueira","doi":"10.1109/NOMS.2008.4575244","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575244","url":null,"abstract":"This work presents an Internet traffic classification methodology based on statistical discriminators and cluster analysis. An accuracy identification of Internet applications is an important research area, because it is directly related to solve many network problems such as: quality of service (QoS), traffic control, security, network management and operation. The main difference to previous approaches lies in the discriminators use; rather than using only one set of discriminators for all classes we use a set of different statistical discriminators for each traffic class. Using real traces into the training and classification phases, we validated the methodology for P2P traffic class.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129505986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信