NOMS 2008 - 2008 IEEE Network Operations and Management Symposium最新文献

筛选
英文 中文
Efficient method of collecting routing tables based on OSPF/iBGP monitoring 基于OSPF/iBGP监控的有效路由表采集方法
NOMS 2008 - 2008 IEEE Network Operations and Management Symposium Pub Date : 2008-04-07 DOI: 10.1109/NOMS.2008.4575167
Y. Hei, T. Ogishi, S. Ano
{"title":"Efficient method of collecting routing tables based on OSPF/iBGP monitoring","authors":"Y. Hei, T. Ogishi, S. Ano","doi":"10.1109/NOMS.2008.4575167","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575167","url":null,"abstract":"If a problem with IP communication occurs, IP network operators refer to the routing tables of the affected routers to check the routes to the destinations. There are a number of methods currently used for referring to routing tables. However, operators cannot refer to past routing tables using existing methods. The past routing tables are useful for IP network operation. For example, operators can find out how the influence of a network problem on routes spreads to the network by checking fluctuations in each routerpsilas routing table. In this paper, we propose a method of collecting every routerpsilas routing table within a domain based on the monitoring of routing protocols. In our method, we collect routing protocol messages and calculate all routerspsila routing tables within a domain in a concentrated manner using the same way where each router within a domain calculates its routing table. Routing tables are calculated whenever route status in IP networks changes, and calculated routing tables are stored so that operators can refer to them at any time in the future.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127911633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Harmonizing service and network provisioning for federative access in a mobile environment 为移动环境中的联合访问协调服务和网络供应
NOMS 2008 - 2008 IEEE Network Operations and Management Symposium Pub Date : 2008-04-07 DOI: 10.1109/NOMS.2008.4575228
D. Lutz, P. Mandic, Sascha Neinert, Ruth del Campo, J. Jähnert
{"title":"Harmonizing service and network provisioning for federative access in a mobile environment","authors":"D. Lutz, P. Mandic, Sascha Neinert, Ruth del Campo, J. Jähnert","doi":"10.1109/NOMS.2008.4575228","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575228","url":null,"abstract":"In this paper we propose an integrated platform to power the symbiosis between networks and services whilst supporting mobility of users. This platform is based on methods for authentication, authorization and payment of services in a roaming environment. Existing technologies are combined and enhanced to provide a blueprint for a platform to leverage the interaction of services with the underlying network. Traditionally, such functions as discovery, authentication and authorization exist in parallel for networks and for services, without any association between the systems. This rigid layered approach is abandoned in favour of one that is more integrated and allows these functions to be reused rather than duplicated. Payment is treated as an essential and inherent part of the architecture, in order to facilitate its commercialization and adoption.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117143441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Policy-based self-healing for radio access networks 基于策略的无线接入网络自修复
NOMS 2008 - 2008 IEEE Network Operations and Management Symposium Pub Date : 2008-04-07 DOI: 10.1109/NOMS.2008.4575269
J. Baliosian, Katarína Matusíková, K. Quinn, R. Stadler
{"title":"Policy-based self-healing for radio access networks","authors":"J. Baliosian, Katarína Matusíková, K. Quinn, R. Stadler","doi":"10.1109/NOMS.2008.4575269","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575269","url":null,"abstract":"Various centralized, distributed or cooperative management systems have been proposed to address the demands of wireless telecommunication networks. However, considering the size, complexity and heterogeneity that those networks will have in the future, current solutions either do not scale properly, or have no support for automation, or lack of the flexibility and simple control that operators will need for managing future networks in a cost-effective way. To address this problem, we designed Omega, a distributed and policy-based network management system that uses rich knowledge-modeling techniques to develop self-configuration capabilities. Omega also implements a novel conflict-resolution method that uses high-level goals and machine learning techniques to optimize its policy-based decisions. Using simulations, in this paper we show how omega reduces the impact of a node crash on the overall availability of a radio access network by optimizing the lists of neighboring cells of the nodes in the vicinity.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122804047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
DYSWIS: An architecture for automated diagnosis of networks DYSWIS:用于网络自动诊断的体系结构
NOMS 2008 - 2008 IEEE Network Operations and Management Symposium Pub Date : 2008-04-07 DOI: 10.1109/NOMS.2008.4575230
V. Singh, H. Schulzrinne, Kai X. Miao
{"title":"DYSWIS: An architecture for automated diagnosis of networks","authors":"V. Singh, H. Schulzrinne, Kai X. Miao","doi":"10.1109/NOMS.2008.4575230","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575230","url":null,"abstract":"As the complexity of networked systems increases, we need mechanisms to automatically detect failures in the network and diagnose the cause of such failures. To realize true self-healing networks, we also need mechanisms to fix these failures and ensure service availability by providing alternatives when a failure is detected. In this paper, we address the detection and diagnosis of network failures. We introduce DYSWIS (\"Do you see what I see \") which observes the system from multiple points in the network. Our system consists of detection nodes and diagnosis nodes. Detection nodes detect failures by passive traffic monitoring and active probing. Diagnosis nodes determine the cause of failures using historical information about similar failures and by performing active tests. They are based on a rule engine and represent network dependency relationship encoded as rules. We present our prototype system which considers network components present in a VoIP network and show the feasibility of our solution.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115563238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Feasibility validation of management capability for an Ethernet based access network using Ethernet OAM functionality 使用以太网OAM功能的基于以太网的接入网管理能力的可行性验证
NOMS 2008 - 2008 IEEE Network Operations and Management Symposium Pub Date : 2008-04-07 DOI: 10.1109/NOMS.2008.4575185
M. Tsurusawa, Y. Horiuchi
{"title":"Feasibility validation of management capability for an Ethernet based access network using Ethernet OAM functionality","authors":"M. Tsurusawa, Y. Horiuchi","doi":"10.1109/NOMS.2008.4575185","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575185","url":null,"abstract":"Ethernet has become a prominent candidate for the infrastructure of an IP-based packet centric network infrastructure, providing not only for enterprise services that are virtual private networks but also for residential services that are FTTx and xDSL for triple play. To construct a service providerpsilas network by using layer two (L2) switches in the wide area network (WAN) certainly represents an economical solution for providing Ethernet connectivity to end users. However, management of Ethernet networks with carrier-class reliability is generally a difficult issue for operators and service providers since there is almost no operation, administration and maintenance (OAM) capability in the network. This paper proposes an OAM architecture for an Ethernet network using a standard-based Ethernet OAM functionality, which is defined by IEEE, ITU-T and MEF. A framework of maintenance level that is an important concept of hierarchical Ethernet management is applied to the wide area Ethernet service configuration. According to the concept, we have successfully demonstrated standard-based Ethernet OAM functionalities, namely loop back, delay measurement and link trace, with several scenarios that may occur during actual operation.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115366247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unsupervised learning algorithms for intrusion detection 入侵检测的无监督学习算法
NOMS 2008 - 2008 IEEE Network Operations and Management Symposium Pub Date : 2008-04-07 DOI: 10.1109/NOMS.2008.4575276
S. Zanero, G. Serazzi
{"title":"Unsupervised learning algorithms for intrusion detection","authors":"S. Zanero, G. Serazzi","doi":"10.1109/NOMS.2008.4575276","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575276","url":null,"abstract":"This work summarizes our research on the topic of the application of unsupervised learning algorithms to the problem of intrusion detection, and in particular our main research results in network intrusion detection. We proposed a novel, two tier architecture for network intrusion detection, capable of clustering packet payloads and correlating anomalies in the packet stream. We show the experiments we conducted on such architecture, we give performance results, and we compare our achievements with other comparable existing systems.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115382517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Towards automated application signature generation for traffic identification 实现自动生成应用签名用于流量识别
NOMS 2008 - 2008 IEEE Network Operations and Management Symposium Pub Date : 2008-04-07 DOI: 10.1109/NOMS.2008.4575130
Byungchul Park, Y. Won, Myung-Sup Kim, J. W. Hong
{"title":"Towards automated application signature generation for traffic identification","authors":"Byungchul Park, Y. Won, Myung-Sup Kim, J. W. Hong","doi":"10.1109/NOMS.2008.4575130","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575130","url":null,"abstract":"Traditionally, Internet applications have been identified by using predefined well-known ports with questionable accuracy. An alternative approach, application-layer signature mapping, involves the exhaustive search of reliable signatures but with more promising accuracy. With a prior protocol knowledge, the signature generation can guarantee a high accuracy. As more applications use proprietary protocols, it becomes increasingly difficult to obtain an accurate signature while avoiding time-consuming and manual signature generation process. This paper proposes an automated approach for generating application-level signature, the LASER algorithm, that does not need to be preceded by an analysis of application protocols. We show that our approach is as accurate and efficient as the approach that uses preceding application protocol analysis.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131478065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 152
Information integration techniques to automate incident management 自动化事件管理的信息集成技术
NOMS 2008 - 2008 IEEE Network Operations and Management Symposium Pub Date : 2008-04-07 DOI: 10.1109/NOMS.2008.4575262
R. Gupta, K. Hima Prasad, M. Mohania
{"title":"Information integration techniques to automate incident management","authors":"R. Gupta, K. Hima Prasad, M. Mohania","doi":"10.1109/NOMS.2008.4575262","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575262","url":null,"abstract":"Service desks are used by customers to report IT issues in enterprise systems. Most of these service requests are resolved by level-1 persons (service desk attendants) by providing information/quick-fix solutions to customers. For each service request, level-1 personnel uses keyword search to see if the incoming incident is duplicate of any of historic incidents; otherwise, she creates an incident ticket and, with other related information, forwards it to incidentpsilas subject matter expert (SME). Incident management, responsible for managing the life cycle of all incidents, is the key to ensure availability of enterprise systems. Timely resolution of incoming incident is required to attain availability objectives. Currently, the incident management process is largely manual, error prone and time consuming. In this paper, we present a technique to correlate the incoming incident with configuration items (CIs) stored in configuration management database (CMDB). Such a correlation can be used for correctly routing the incident to service personnel, incident investigation and root cause analysis.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130986091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Peer-to-Peer networking: State of the art and research challenges 点对点网络:技术现状和研究挑战
NOMS 2008 - 2008 IEEE Network Operations and Management Symposium Pub Date : 2008-04-07 DOI: 10.1109/NOMS.2008.4575107
R. Boutaba
{"title":"Peer-to-Peer networking: State of the art and research challenges","authors":"R. Boutaba","doi":"10.1109/NOMS.2008.4575107","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575107","url":null,"abstract":"The past few years have witnessed the emergence of Peer-to-Peer (P2P) systems as a means to further facilitate the formation of communities of interest over the Internet in all areas of human life including technical/research, cultural, political, social, entertainment, etc. P2P technologies involve data storage, discovery and retrieval, overlay networks and application-level routing, security and reputation, measurements and management. This tutorial will give an appreciation of the issues and state of the art in Peer-to-Peer Networking. It will introduce the underlying concepts, present existing architectures, highlight the design requirements, discuss the research issues, compare existing approaches, and illustrate the concepts through case studies. The ultimate objective is to provide the tutorial attendees with an in-depth understanding of the issues inherent to the design, deployment and operation of large-scale P2P systems.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128465886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Kalinahia: Considering quality of service to design and execute distributed multimedia applications Kalinahia:考虑服务质量来设计和执行分布式多媒体应用程序
NOMS 2008 - 2008 IEEE Network Operations and Management Symposium Pub Date : 2008-04-07 DOI: 10.1109/NOMS.2008.4575255
Sophie Laplace, Marc Dalmau, P. Roose
{"title":"Kalinahia: Considering quality of service to design and execute distributed multimedia applications","authors":"Sophie Laplace, Marc Dalmau, P. Roose","doi":"10.1109/NOMS.2008.4575255","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575255","url":null,"abstract":"One of the current challenges of Information Systems is to ensure semi-structured data transmission, such as multimedia data, in a distributed and pervasive environment. Information Sytems must then guarantee users a quality of service ensuring data accessibility whatever the hardware and network conditions may be. They must also guarantee information coherence and particularly intelligibility that imposes a personalization of the service. Within this framework, we propose a design method based on original models of multimedia applications and quality of service. We also define a supervision platform Kalinahia using a user centered heuristic allowing us to define at any moment which configuration of software components constitutes the best answers to users' wishes in terms of service.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122897865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信