NOMS 2008 - 2008 IEEE Network Operations and Management Symposium最新文献

筛选
英文 中文
SPIRIT: Service for providing infrastructure recommendations for IT SPIRIT:为IT提供基础设施建议的服务
NOMS 2008 - 2008 IEEE Network Operations and Management Symposium Pub Date : 2008-04-07 DOI: 10.1109/NOMS.2008.4575236
Ashwin Lall, A. Sailer, Mark Brodie
{"title":"SPIRIT: Service for providing infrastructure recommendations for IT","authors":"Ashwin Lall, A. Sailer, Mark Brodie","doi":"10.1109/NOMS.2008.4575236","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575236","url":null,"abstract":"We present SPIRIT, a Service for Providing Infrastructure Recommendations for Information Technology. SPIRIT allows maintenance support providers for small-to-medium businesses (SMBs) to recommend solutions which are standardized (SMBs usually cannot afford customized IT solutions), flexible (accommodating as much as possible the customer's existing IT environment), and cost-effective (minimizing the cost of upgrading the customer's environment). SPIRIT works by first aligning the customer's IT infrastructure with a \"template\" describing the best practices recommended by the maintenance support provider. Then, the aligned environment can be upgraded by choosing from a standard set of well understood, highly automated (and therefore economical) options. In this paper we present the framework of our solution.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116318487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Characterization of IP flows eligible for lambda-connections in optical networks 光网络中适合lambda连接的IP流特性
NOMS 2008 - 2008 IEEE Network Operations and Management Symposium Pub Date : 2008-04-07 DOI: 10.1109/NOMS.2008.4575142
T. Fioreze, Mattijs Oude Wolbers, R. V. D. Meent, A. Pras
{"title":"Characterization of IP flows eligible for lambda-connections in optical networks","authors":"T. Fioreze, Mattijs Oude Wolbers, R. V. D. Meent, A. Pras","doi":"10.1109/NOMS.2008.4575142","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575142","url":null,"abstract":"The advance on data transmission in optical networks has allowed data forwarding decisions to be taken at multiple levels in the protocol stack (e.g., at network and optical levels). With such capability, big IP flows can be moved from the network level and switched completely at the optical level over lambda-connections, where they get better quality of service (QoS). Meanwhile, the regular IP routing level is offloaded and can serve smaller flows better. With the continuous growing of traffic on the Internet, the selection of big IP flows can become difficult to be done by using current management approaches (conventional management and generalized multiprotocol label switching (GMPLS) signaling). The University of Twente (UT) is researching the use of self-management as an alternative to overcome this issue. In order to properly identify IP flows eligible to be moved to the optical level, the characteristics of these flows must be known, though. In this context, this paper analyses some of the characteristics of IP flows eligible to the optical level by observing their size, duration, throughput, and recurrence. In this analysis, we observe those characteristics while using various definitions for an IP flow as well as using different time intervals. The main contribution of this paper is to show the behavior of IP flows eligible for lambda-connections. Not in the least, we also show how this knowledge can be used in our self-management of optical networks approach.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116328328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Secure route optimization for Mobile Network Node using secure address proxying 基于安全地址代理的移动网络节点安全路由优化
NOMS 2008 - 2008 IEEE Network Operations and Management Symposium Pub Date : 2008-04-07 DOI: 10.1109/NOMS.2008.4575127
M. Jo, H. Inamura
{"title":"Secure route optimization for Mobile Network Node using secure address proxying","authors":"M. Jo, H. Inamura","doi":"10.1109/NOMS.2008.4575127","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575127","url":null,"abstract":"We propose a secure route optimization mechanism for network mobility management. We also solve three problems to achieve the route optimization: Mobile Router's security association, need of Correspondent Node's Mobile IPv6-awareness, and location privacy. In order to solve the problems, we make a Mobile Router a secure proxy of a mobile network node so that the mobile router can send a proxy binding update to a home agent of the mobile network node in a secure way. We also use multi-key cryptographically generated addresses (MCGA). By using MCGA, a mobile network node can securely authorize a Mobile Router to use the same address. At the same time, a home agent of a mobile network node can also verify that the binding update is from either an actual address owner or an authorized proxy. Having performed an analysis of our secure route optimization over rather realistic environment, we show we can save propagation path length between the home agent of the mobile network node and the mobile router.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123476433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Algorithm to automatically solve security policy conflicts among IP devices configurations 自动解决IP设备间安全策略冲突的配置算法
NOMS 2008 - 2008 IEEE Network Operations and Management Symposium Pub Date : 2008-04-07 DOI: 10.1109/NOMS.2008.4575248
Simone Ferraresi, Emanuele Francocci, Alessio Quaglini, A. Baiocchi
{"title":"Algorithm to automatically solve security policy conflicts among IP devices configurations","authors":"Simone Ferraresi, Emanuele Francocci, Alessio Quaglini, A. Baiocchi","doi":"10.1109/NOMS.2008.4575248","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575248","url":null,"abstract":"One of the most critical aspects of security problems is the impossibility of accurately checking a system real weaknesses. In a complex and distributed environment this problem is greatly accentuated. During the process of configuration and implementation of the network security policies errors can occur, resulting in holes in security and, consequently, compromising the entire system functionality. These errors are often very hard to detect by performing a manual or visual inspection. For this reason, automatic management of this phase is required. Here we propose an algorithm to automatically tune up the configurations of the network devices in order to avoid unexpected and unwanted network behaviours. This algorithm will be described in all its phases and some results of the software implementation will be shown.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117212260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Self-tuning network support for MANETs 自调优网络支持manet
NOMS 2008 - 2008 IEEE Network Operations and Management Symposium Pub Date : 2008-04-07 DOI: 10.1109/NOMS.2008.4575275
Yangcheng Huang, S. Bhatti, S. Sørensen
{"title":"Self-tuning network support for MANETs","authors":"Yangcheng Huang, S. Bhatti, S. Sørensen","doi":"10.1109/NOMS.2008.4575275","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575275","url":null,"abstract":"Rapid and unpredictable topology changes and resource constraints make delivering packets in a MANET (mobile ad hoc network) a challenging task. Routing information has to be updated to reflect the topology changes and maintain the correctness of route selection. On the other hand, the dissemination of control messages has to be optimised for efficient resource usage and to alleviate channel contention problems. To solve this problem, this dissertation focuses on how to automatically tune routing performance for MANETs in terms of packet delivery ratio and control overhead. The impacts of soft state signalling, especially the refresh intervals, are studied under various scenarios. A variety of topology advertisement strategies are presented. Two self-tuning neighbour detection schemes are proposed, the dynamic timer algorithm and the fast neighbour handshake algorithm, in order to enhance routing performance.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"77 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129771966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Application of adaptive probing for fault diagnosis in computer networks 自适应探测在计算机网络故障诊断中的应用
NOMS 2008 - 2008 IEEE Network Operations and Management Symposium Pub Date : 2008-04-07 DOI: 10.1109/NOMS.2008.4575278
M. Natu, A. Sethi
{"title":"Application of adaptive probing for fault diagnosis in computer networks","authors":"M. Natu, A. Sethi","doi":"10.1109/NOMS.2008.4575278","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575278","url":null,"abstract":"This dissertation presents an adaptive probing based tool for fault diagnosis in computer networks by addressing the problems of probe station selection and probe selection. We first present algorithms to place probe stations to monitor the network in the presence of various failures in the network. We then present algorithms for probe selection in an adaptive manner to perform fault diagnosis. We present algorithms considering both deterministic as well as non-deterministic environments. We present evaluation of the proposed algorithms through comprehensive simulation studies. The dissertation is available at http://www.cis.udel.edu/~natu/papers/dissertation.pdf.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132390895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
An attribute aggregation architecture with trust-based evaluation for access control 具有基于信任的访问控制评估的属性聚合体系结构
NOMS 2008 - 2008 IEEE Network Operations and Management Symposium Pub Date : 2008-04-07 DOI: 10.1109/NOMS.2008.4575270
Jaewon Lee, Heeyoul Kim, Joon Sung Hong
{"title":"An attribute aggregation architecture with trust-based evaluation for access control","authors":"Jaewon Lee, Heeyoul Kim, Joon Sung Hong","doi":"10.1109/NOMS.2008.4575270","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575270","url":null,"abstract":"Access control to the unfamiliar users is a key challenge in the distributed and pervasive computing environment. Attribute-based access control model is suitable where a service provider doesnpsilat know every peer, since it authorizes the access request by their attributes which are more available than the identities or their roles. In this work, we present an attribute aggregation architecture for the attribute-based access control model.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130934685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Grid-enabling orbital analysis and computationally intensive applications for a growing set of diversified users 为越来越多的多样化用户提供网格轨道分析和计算密集型应用
NOMS 2008 - 2008 IEEE Network Operations and Management Symposium Pub Date : 2008-04-07 DOI: 10.1109/NOMS.2008.4575182
Thomas Barr, Chris Byron, Ziyad Duron, R. Keller, Ben Lickly, C. Nygaard, Kyle Roberts, M. AuYeung, J. Betser, John Coggi, Brooks Davis, Craig A. Lee, D. Stodden, M. Thomas
{"title":"Grid-enabling orbital analysis and computationally intensive applications for a growing set of diversified users","authors":"Thomas Barr, Chris Byron, Ziyad Duron, R. Keller, Ben Lickly, C. Nygaard, Kyle Roberts, M. AuYeung, J. Betser, John Coggi, Brooks Davis, Craig A. Lee, D. Stodden, M. Thomas","doi":"10.1109/NOMS.2008.4575182","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575182","url":null,"abstract":"The advent of affordable high performance computing (HPC) resources, such as computing clusters and grids, has transformed the computational capabilities of many organizations. However, the lack of convenient interfaces to such valuable resources limits their effectiveness, restricting their user base to a small set of highly skilled programmers and computer scientists. Without such an interface, domain specialists lacking exceptional knowledge of HPC systems are challenged in their ability to utilize these computing grids. This paper describes the design and implementation of a Web-based user interface aimed at increasing the usability and transparency of a 341-node computing cluster to multiple applications and user communities, by developing a streamlined Web interface. In discussion of the design, we address several common concerns including security, extensibility, and maintainability. We also outline two distinct solutions to this problem: our earliest approach using open-source grid computing tools such as the Globus Toolkit and Gridportlets, and our most current implementation, which uses a prototype Python-based Web application developed as a part of this paper. We then assess our experience with both approaches and conceptually evaluate them based on the common concerns mentioned above. Finally, we argue that, despite the flexibility afforded by the industrial-strength grid tools, a simpler, home-grown approach similar to our Python-based prototype is most effective in terms of time and maintainability for enterprises seeking to develop similar Web-based front ends for their computing resources. We conclude that our approach provides better value to a set of users as it increases in both number and diversity.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130402386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Template based rapid service creation environment for service delivery platform 基于模板的服务交付平台快速服务创建环境
NOMS 2008 - 2008 IEEE Network Operations and Management Symposium Pub Date : 2008-04-07 DOI: 10.1109/NOMS.2008.4575176
Ping Pan, Ling Jin, Chun Ying, Jin Hua Liu
{"title":"Template based rapid service creation environment for service delivery platform","authors":"Ping Pan, Ling Jin, Chun Ying, Jin Hua Liu","doi":"10.1109/NOMS.2008.4575176","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575176","url":null,"abstract":"With the boom of telecom value-added services, operators and service providers have to face the challenge how to reduce the development cost and time to market of creating new services. Such reduction is expected to be 1 or 2 orders of magnitude from months or weeks to days, even hours. In traditional service creation environment, a full lifecycle of requirements analyzing, design, development, testing and deployment always has to be undergone. It is inevitable that mass resources including specialists and time are involved. Some technologies have been developed to speed up single steps, for example BPEL based orchestration technique and tools are already used to reduce the cost in design and development stages while the creation procedure is still rely on IT specialist. In this paper, we present an idea to shorten and simplify the whole service creation lifecycle to reach the reduction target by building a template based service creation environment. A model which separate process definition and service parameter are used to achieve rapid development and automatic deployment.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123178552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Bootstrapping device state in managed systems 在被管理系统中引导设备状态
NOMS 2008 - 2008 IEEE Network Operations and Management Symposium Pub Date : 2008-04-07 DOI: 10.1109/NOMS.2008.4575209
Greg W. Cox, Walter L. Johnson, J. Strassner, David Raymer
{"title":"Bootstrapping device state in managed systems","authors":"Greg W. Cox, Walter L. Johnson, J. Strassner, David Raymer","doi":"10.1109/NOMS.2008.4575209","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575209","url":null,"abstract":"Autonomic and other system management technologies must ascertain the current state of a managed system comprising interconnected but at times independent and diverse managed entities. When an autonomic manager is introduced into a running system, state bootstrapping is required. One challenge involved in state bootstrapping is balancing the need to have current and detailed state information against the need to minimize loading on the managed system and the element management systems that provide the state information to the autonomic manager. This paper describes an approach providing a trade-off between the rate of state information acquisition and the load being placed on the managed system. The approach enables priority to be given to the acquisition of state information for managed entities that are more likely to require intervention in the managed system.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126452081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信