{"title":"Chargeback model for resource pools in the cloud","authors":"D. Gmach, J. Rolia, L. Cherkasova","doi":"10.1109/INM.2011.5990586","DOIUrl":"https://doi.org/10.1109/INM.2011.5990586","url":null,"abstract":"This paper presents three methods for apportioning server costs among workloads in shared resource environments such as computing clouds. We consider a fine sharing of resources, the impact of time varying resource usage, large ratios for peak to mean workload demands, and the influence of random choices for the co-placement of workloads on shared servers. These features can affect the quantity of servers needed to support workloads as well as the robustness of the cost values assigned to each workload. We compare the three methods for apportioning costs and recommend the method that assigns costs in the most repeatable manner. A detailed study involving 312 workloads from an HP customer environment demonstrates the result.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115262335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bin Zhang, Jiahai Yang, Jianping Wu, Qi Li, Donghong Qin
{"title":"An efficient parallel TCAM scheme for the forwarding engine of the next-generation router","authors":"Bin Zhang, Jiahai Yang, Jianping Wu, Qi Li, Donghong Qin","doi":"10.1109/INM.2011.5990546","DOIUrl":"https://doi.org/10.1109/INM.2011.5990546","url":null,"abstract":"Ternary Content-Addressable Memory (TCAM) is a popular hardware device for fast IP address lookup. High link transmission speed of Internet backbone demands more powerful IP address lookup engine. Restricted by the memory access speed, the lookup engine for next-generation routers demands exploiting parallelism among multiple TCAM chips. However, most existing schemes improve lookup performance and reduce power consumption but ignore the update efficiency. In this paper, we propose a crossed address range division and shared caching scheme. We improve the update efficiency significantly by buddy update method while keep low power dissipation by decreasing the number of the triggered TCAMs access in each lookup operation. The lookup throughput is ultra high through adaptive load balance. Our simulation results show that the proposed scheme can achieve an average lookup speedup factor greater than 11 with 12 TCAM chips, on the cost of 10% more memory space and an additional cache chip.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131503836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mining unstructured log files for recurrent fault diagnosis","authors":"Thomas Reidemeister, Miao Jiang, Paul A. S. Ward","doi":"10.1109/INM.2011.5990536","DOIUrl":"https://doi.org/10.1109/INM.2011.5990536","url":null,"abstract":"Enterprise software systems are large and complex with limited support for automated root-cause analysis. Avoiding system downtime and loss of revenue dictates a fast and efficient root-cause analysis process. Operator practice and academic research have shown that about 80% of failures in such systems have recurrent causes; therefore, significant efficiency gains can be achieved by automating their identification. In this paper, we present a novel approach to modelling features of log files. This model offers a compact representation of log data that can be efficiently extracted from large amounts of monitoring data. We also use decision-tree classifiers to learn and classify symptoms of recurrent faults. This representation enables automated fault matching and, in addition, enables human investigators to understand manifestations of failure easily. Our model does not require any access to application source code, a specification of log messages, or deep application knowledge. We evaluate our proposal using fault-injection experiments against other proposals in the field. First, we show that the features needed for symptom definition can be extracted more efficiently than does related work. Second, we show that these features enable an accurate classification of recurrent faults using only standard machine learning techniques. This enables us to identify accurately up to 78% of the faults in our evaluation data set.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131276787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Victor Pasknel de Alencar Ribeiro, R. H. Filho, J. Maia
{"title":"Online traffic classification based on sub-flows","authors":"Victor Pasknel de Alencar Ribeiro, R. H. Filho, J. Maia","doi":"10.1109/INM.2011.5990541","DOIUrl":"https://doi.org/10.1109/INM.2011.5990541","url":null,"abstract":"Traffic classification by application class provides useful information for various tasks of network engineering and administration. However, offline classification of flows has limited its practical application to auditing tasks, long-term planning and other analytical issues. Therefore, research on traffic classification now moves towards the search for accurate and efficient methods of classification in order to meet online tasks such as traffic monitoring and shaping and other specific-application operations. In this work we apply the One-Against-All Approach (OAA) for two online classification strategies based on statistical features of TCP sub-flows. One uses the first N packets of the bi-directional TCP session and the other applies to sub-flows of the N packets starting at a random position in the flow. In our variant of the OAA approach, the problem of classifying an object in one of M classes is reduced to M binary classification problems with an associated decision rule, with each of them possibly using a different subset of features and sub-flow size. We investigated the effect of variation in the amount of N on the results of classification and the smaller set of variables in each of the above problems. This study used the Naïve Bayes classifier.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127320782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive and self-configurable honeypots","authors":"G. Wagener, R. State, T. Engel, A. Dulaunoy","doi":"10.1109/INM.2011.5990710","DOIUrl":"https://doi.org/10.1109/INM.2011.5990710","url":null,"abstract":"Honeypot evangelists propagate the message that honeypots are particularly useful for learning from attackers. However, by looking at current honeypots, most of them are statically configured and managed, which requires a priori knowledge about attackers. In this paper we propose a high-interaction honeypot capable of learning from attackers and capable of dynamically changing its behavior using a variant of reinforcement learning. It can strategically block the execution of programs, lure the attacker by substituting programs and insult attackers with the intent of revealing the attacker's nature and ethnic background. We also investigated the fact that attackers could learn to defeat the honeypot and discovered that attacker and honeypot interests sometimes diverge.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114651969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Cherkasova, R. Lau, Harald Burose, Subramaniam Kalambur, Bernhard Kappler, Kuttiraja Veeranan
{"title":"Run-time performance optimization and job management in a data protection solution","authors":"L. Cherkasova, R. Lau, Harald Burose, Subramaniam Kalambur, Bernhard Kappler, Kuttiraja Veeranan","doi":"10.1109/INM.2011.5990675","DOIUrl":"https://doi.org/10.1109/INM.2011.5990675","url":null,"abstract":"The amount of stored data in enterprise Data Centers quadruples every 18 months. This trend presents a serious challenge for backup management and sets new requirements for performance efficiency of traditional backup and archival tools. In this work, we discuss potential performance shortcomings of the existing backup solutions. During a backup session a predefined set of objects (client filesystems) should be backed up. Traditionally, no information on the expected duration and throughput requirements of different backup jobs is provided. This may lead to an inefficient job schedule and the increased backup session time. We analyze historic data on backup processing from eight backup servers in HP Labs, and introduce two additional metrics associated with each backup job, called job duration and job throughput. Our goal is to use this additional information for automated design of a backup schedule that minimizes the overall completion time for a given set of backup jobs. This problem can be formulated as a resource constrained scheduling problem which is known to be NP-complete. Instead, we propose an efficient heuristics for building an optimized job schedule, called FlexLBF. The new job schedule provides a significant reduction in the backup time (up to 50%) and reduced resource usage (up to 2–3 times). Moreover, we design a simulation-based tool that aims to automate parameter tuning for avoiding manual configuration by system administrators while helping them to achieve nearly optimal performance.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"27 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120822746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Keeney, Owen Conlan, V. Holub, Miao Wang, Laetitia Chapel, M. Serrano, S. Meer
{"title":"A semantic monitoring and management framework for end-to-end services","authors":"J. Keeney, Owen Conlan, V. Holub, Miao Wang, Laetitia Chapel, M. Serrano, S. Meer","doi":"10.1109/INM.2011.5990649","DOIUrl":"https://doi.org/10.1109/INM.2011.5990649","url":null,"abstract":"Modern distributed applications and communication services have become increasingly complex, composed of diverse heterogeneous sub-systems, and it is progressively more unrealistic that the users of these systems will be able to manage them in a holistic end-to-end manner. In particular, it is increasingly difficult to understand how such systems operate, the meaning of errors, and how they can be manipulated in a managed way, cognisant of the end-to-end nature of these systems. This paper describes an approach to semantically enrich monitoring information, events and faults, and management actions in such a way that they can be presented to a manager in manner that can be understood and leveraged. This work is based on one of the key scenarios FAME research project.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"74 21","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120823180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The node-centric formulation for network utility maximization of multihop wireless networks with elastic and inelastic traffic","authors":"P. L. Vo, M. Siddiqui, C. Hong","doi":"10.1109/INM.2011.5990517","DOIUrl":"https://doi.org/10.1109/INM.2011.5990517","url":null,"abstract":"We consider a network with two kinds of traffic: inelastic and elastic. The inelastic traffic requires fixed throughput and high priority, while the elastic traffic has the rate that can be controlled and low priority. Given the fixed rate of inelastic traffic, the problem of how to inject the elastic traffic into the network to achieve the maximum utility of elastic traffic is solved in this paper. The node-centric formulation in cross-layer design framework is applied. By using Lagrange duality method, the congestion control, back-pressure routing and Max-weight scheduling are integrated naturally when decomposing the Larangian. The Greedy Distributed scheduling is introduced to not only decentralize scheduling, but also decrease the complexity of the Max-weight scheduling. The Back-pressure routing has presented the poor performance at the light load, the packets take an unnecessary long route from the source node to the destination node. As the result, the delay is excessively large at light load. The enhancement algorithm is implemented to maximize the utility while minimizing the resource usage. An admission control scheme is also introduced to check if the new inelastic flow is admissible.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123892198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed inter-domain SLA negotiation using Reinforcement Learning","authors":"Tristan Groléat, Hélia Pouyllau","doi":"10.1109/INM.2011.5990671","DOIUrl":"https://doi.org/10.1109/INM.2011.5990671","url":null,"abstract":"1 Applications requiring network Quality of Service (QoS) (e.g. telepresence, cloud computing, etc.) are becoming mainstream. To support their deployment, network operators must automatically negotiate end-to-end QoS contracts (aka. Service Level Agreements, SLAs) and configure their networks accordingly. Other crucial needs must be considered: QoS should provide incentives to network operators, and confidentiality on topologies, resource states and committed SLAs must be respected. To meet these requirements, we propose two distributed learning algorithms that will allow network operators to negotiate end-to-end SLAs and optimize revenues for several demands while treating requests in real-time: one algorithm minimizes the cooperation between providers while the other demands to exchange more information. Experiment results exhibit that the second algorithm satisfies better customers and providers while having worse runtime performances.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122085983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An event management communication system for Wireless Sensor Networks","authors":"Björn Stelte","doi":"10.1109/INM.2011.5990588","DOIUrl":"https://doi.org/10.1109/INM.2011.5990588","url":null,"abstract":"In recent years, Wireless Sensor Networks (WSNs) have been developed for many application areas such as environmental monitoring of critical infrastructure, part of earthquake and tsunami warning systems, military battle field surveillance etc. WSN differ from traditional networks due to hard resource limitations and computational constraints. Network management techniques known to work in traditional network are often impractical for WSNs. Primary goals in traditional networks are minimizing response time and providing comprehensive information, however primary goals in WSNs are minimizing power consumption and communication overhead. Although sensor network management is important, there is no existing generalized solution for sensor networks today. We focus in this work on efficient event management communication. In contrast to available solutions our approach combines real-time features and communication decoupling by a blackboard-based publish/subscribe system.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115287056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}