{"title":"SPIRIT: Service for providing infrastructure recommendations for IT","authors":"Ashwin Lall, A. Sailer, Mark Brodie","doi":"10.1109/NOMS.2008.4575236","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575236","url":null,"abstract":"We present SPIRIT, a Service for Providing Infrastructure Recommendations for Information Technology. SPIRIT allows maintenance support providers for small-to-medium businesses (SMBs) to recommend solutions which are standardized (SMBs usually cannot afford customized IT solutions), flexible (accommodating as much as possible the customer's existing IT environment), and cost-effective (minimizing the cost of upgrading the customer's environment). SPIRIT works by first aligning the customer's IT infrastructure with a \"template\" describing the best practices recommended by the maintenance support provider. Then, the aligned environment can be upgraded by choosing from a standard set of well understood, highly automated (and therefore economical) options. In this paper we present the framework of our solution.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116318487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Fioreze, Mattijs Oude Wolbers, R. V. D. Meent, A. Pras
{"title":"Characterization of IP flows eligible for lambda-connections in optical networks","authors":"T. Fioreze, Mattijs Oude Wolbers, R. V. D. Meent, A. Pras","doi":"10.1109/NOMS.2008.4575142","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575142","url":null,"abstract":"The advance on data transmission in optical networks has allowed data forwarding decisions to be taken at multiple levels in the protocol stack (e.g., at network and optical levels). With such capability, big IP flows can be moved from the network level and switched completely at the optical level over lambda-connections, where they get better quality of service (QoS). Meanwhile, the regular IP routing level is offloaded and can serve smaller flows better. With the continuous growing of traffic on the Internet, the selection of big IP flows can become difficult to be done by using current management approaches (conventional management and generalized multiprotocol label switching (GMPLS) signaling). The University of Twente (UT) is researching the use of self-management as an alternative to overcome this issue. In order to properly identify IP flows eligible to be moved to the optical level, the characteristics of these flows must be known, though. In this context, this paper analyses some of the characteristics of IP flows eligible to the optical level by observing their size, duration, throughput, and recurrence. In this analysis, we observe those characteristics while using various definitions for an IP flow as well as using different time intervals. The main contribution of this paper is to show the behavior of IP flows eligible for lambda-connections. Not in the least, we also show how this knowledge can be used in our self-management of optical networks approach.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116328328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure route optimization for Mobile Network Node using secure address proxying","authors":"M. Jo, H. Inamura","doi":"10.1109/NOMS.2008.4575127","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575127","url":null,"abstract":"We propose a secure route optimization mechanism for network mobility management. We also solve three problems to achieve the route optimization: Mobile Router's security association, need of Correspondent Node's Mobile IPv6-awareness, and location privacy. In order to solve the problems, we make a Mobile Router a secure proxy of a mobile network node so that the mobile router can send a proxy binding update to a home agent of the mobile network node in a secure way. We also use multi-key cryptographically generated addresses (MCGA). By using MCGA, a mobile network node can securely authorize a Mobile Router to use the same address. At the same time, a home agent of a mobile network node can also verify that the binding update is from either an actual address owner or an authorized proxy. Having performed an analysis of our secure route optimization over rather realistic environment, we show we can save propagation path length between the home agent of the mobile network node and the mobile router.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123476433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Simone Ferraresi, Emanuele Francocci, Alessio Quaglini, A. Baiocchi
{"title":"Algorithm to automatically solve security policy conflicts among IP devices configurations","authors":"Simone Ferraresi, Emanuele Francocci, Alessio Quaglini, A. Baiocchi","doi":"10.1109/NOMS.2008.4575248","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575248","url":null,"abstract":"One of the most critical aspects of security problems is the impossibility of accurately checking a system real weaknesses. In a complex and distributed environment this problem is greatly accentuated. During the process of configuration and implementation of the network security policies errors can occur, resulting in holes in security and, consequently, compromising the entire system functionality. These errors are often very hard to detect by performing a manual or visual inspection. For this reason, automatic management of this phase is required. Here we propose an algorithm to automatically tune up the configurations of the network devices in order to avoid unexpected and unwanted network behaviours. This algorithm will be described in all its phases and some results of the software implementation will be shown.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117212260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Self-tuning network support for MANETs","authors":"Yangcheng Huang, S. Bhatti, S. Sørensen","doi":"10.1109/NOMS.2008.4575275","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575275","url":null,"abstract":"Rapid and unpredictable topology changes and resource constraints make delivering packets in a MANET (mobile ad hoc network) a challenging task. Routing information has to be updated to reflect the topology changes and maintain the correctness of route selection. On the other hand, the dissemination of control messages has to be optimised for efficient resource usage and to alleviate channel contention problems. To solve this problem, this dissertation focuses on how to automatically tune routing performance for MANETs in terms of packet delivery ratio and control overhead. The impacts of soft state signalling, especially the refresh intervals, are studied under various scenarios. A variety of topology advertisement strategies are presented. Two self-tuning neighbour detection schemes are proposed, the dynamic timer algorithm and the fast neighbour handshake algorithm, in order to enhance routing performance.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"77 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129771966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of adaptive probing for fault diagnosis in computer networks","authors":"M. Natu, A. Sethi","doi":"10.1109/NOMS.2008.4575278","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575278","url":null,"abstract":"This dissertation presents an adaptive probing based tool for fault diagnosis in computer networks by addressing the problems of probe station selection and probe selection. We first present algorithms to place probe stations to monitor the network in the presence of various failures in the network. We then present algorithms for probe selection in an adaptive manner to perform fault diagnosis. We present algorithms considering both deterministic as well as non-deterministic environments. We present evaluation of the proposed algorithms through comprehensive simulation studies. The dissertation is available at http://www.cis.udel.edu/~natu/papers/dissertation.pdf.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132390895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An attribute aggregation architecture with trust-based evaluation for access control","authors":"Jaewon Lee, Heeyoul Kim, Joon Sung Hong","doi":"10.1109/NOMS.2008.4575270","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575270","url":null,"abstract":"Access control to the unfamiliar users is a key challenge in the distributed and pervasive computing environment. Attribute-based access control model is suitable where a service provider doesnpsilat know every peer, since it authorizes the access request by their attributes which are more available than the identities or their roles. In this work, we present an attribute aggregation architecture for the attribute-based access control model.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130934685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Thomas Barr, Chris Byron, Ziyad Duron, R. Keller, Ben Lickly, C. Nygaard, Kyle Roberts, M. AuYeung, J. Betser, John Coggi, Brooks Davis, Craig A. Lee, D. Stodden, M. Thomas
{"title":"Grid-enabling orbital analysis and computationally intensive applications for a growing set of diversified users","authors":"Thomas Barr, Chris Byron, Ziyad Duron, R. Keller, Ben Lickly, C. Nygaard, Kyle Roberts, M. AuYeung, J. Betser, John Coggi, Brooks Davis, Craig A. Lee, D. Stodden, M. Thomas","doi":"10.1109/NOMS.2008.4575182","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575182","url":null,"abstract":"The advent of affordable high performance computing (HPC) resources, such as computing clusters and grids, has transformed the computational capabilities of many organizations. However, the lack of convenient interfaces to such valuable resources limits their effectiveness, restricting their user base to a small set of highly skilled programmers and computer scientists. Without such an interface, domain specialists lacking exceptional knowledge of HPC systems are challenged in their ability to utilize these computing grids. This paper describes the design and implementation of a Web-based user interface aimed at increasing the usability and transparency of a 341-node computing cluster to multiple applications and user communities, by developing a streamlined Web interface. In discussion of the design, we address several common concerns including security, extensibility, and maintainability. We also outline two distinct solutions to this problem: our earliest approach using open-source grid computing tools such as the Globus Toolkit and Gridportlets, and our most current implementation, which uses a prototype Python-based Web application developed as a part of this paper. We then assess our experience with both approaches and conceptually evaluate them based on the common concerns mentioned above. Finally, we argue that, despite the flexibility afforded by the industrial-strength grid tools, a simpler, home-grown approach similar to our Python-based prototype is most effective in terms of time and maintainability for enterprises seeking to develop similar Web-based front ends for their computing resources. We conclude that our approach provides better value to a set of users as it increases in both number and diversity.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130402386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Template based rapid service creation environment for service delivery platform","authors":"Ping Pan, Ling Jin, Chun Ying, Jin Hua Liu","doi":"10.1109/NOMS.2008.4575176","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575176","url":null,"abstract":"With the boom of telecom value-added services, operators and service providers have to face the challenge how to reduce the development cost and time to market of creating new services. Such reduction is expected to be 1 or 2 orders of magnitude from months or weeks to days, even hours. In traditional service creation environment, a full lifecycle of requirements analyzing, design, development, testing and deployment always has to be undergone. It is inevitable that mass resources including specialists and time are involved. Some technologies have been developed to speed up single steps, for example BPEL based orchestration technique and tools are already used to reduce the cost in design and development stages while the creation procedure is still rely on IT specialist. In this paper, we present an idea to shorten and simplify the whole service creation lifecycle to reach the reduction target by building a template based service creation environment. A model which separate process definition and service parameter are used to achieve rapid development and automatic deployment.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123178552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Greg W. Cox, Walter L. Johnson, J. Strassner, David Raymer
{"title":"Bootstrapping device state in managed systems","authors":"Greg W. Cox, Walter L. Johnson, J. Strassner, David Raymer","doi":"10.1109/NOMS.2008.4575209","DOIUrl":"https://doi.org/10.1109/NOMS.2008.4575209","url":null,"abstract":"Autonomic and other system management technologies must ascertain the current state of a managed system comprising interconnected but at times independent and diverse managed entities. When an autonomic manager is introduced into a running system, state bootstrapping is required. One challenge involved in state bootstrapping is balancing the need to have current and detailed state information against the need to minimize loading on the managed system and the element management systems that provide the state information to the autonomic manager. This paper describes an approach providing a trade-off between the rate of state information acquisition and the load being placed on the managed system. The approach enables priority to be given to the acquisition of state information for managed entities that are more likely to require intervention in the managed system.","PeriodicalId":368139,"journal":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126452081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}