Pub Date : 2004-04-23DOI: 10.1109/NOMS.2004.1317670
Junseok Hwang, S. Chapin, H. A. Mantar, I. T. Okumus
In this paper, we assess the scalability and efficiency of a scalable bandwidth management point (BMP) for guaranteed quality-of-service in DiffServ networks. Our BMP uses centralized network state maintenance and pipe-based intra-domain resource management schemes that significantly reduce the admission control time and minimize the scalability problems present in prior research. We have designed, developed and implemented an enhanced Simple Inter-Domain Bandwidth Broker Signaling (SIBBS) protocol for inter-domain communication. The BMP uses dynamic inter-domain pipes to handle inter-domain provisioning and dynamic provisioning schemes to increase signaling scalability. To assess our BMP implementation in terms of signaling scalability and effective resource utilization, we conducted experiments on a test-bed demonstrating how a BMP substantially increases resource utilization and scalability while requiring minimum changes in the underlying infrastructure.
{"title":"An implementation study of a dynamic inter-domain bandwidth management platform in DiffServ networks","authors":"Junseok Hwang, S. Chapin, H. A. Mantar, I. T. Okumus","doi":"10.1109/NOMS.2004.1317670","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317670","url":null,"abstract":"In this paper, we assess the scalability and efficiency of a scalable bandwidth management point (BMP) for guaranteed quality-of-service in DiffServ networks. Our BMP uses centralized network state maintenance and pipe-based intra-domain resource management schemes that significantly reduce the admission control time and minimize the scalability problems present in prior research. We have designed, developed and implemented an enhanced Simple Inter-Domain Bandwidth Broker Signaling (SIBBS) protocol for inter-domain communication. The BMP uses dynamic inter-domain pipes to handle inter-domain provisioning and dynamic provisioning schemes to increase signaling scalability. To assess our BMP implementation in terms of signaling scalability and effective resource utilization, we conducted experiments on a test-bed demonstrating how a BMP substantially increases resource utilization and scalability while requiring minimum changes in the underlying infrastructure.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131870537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-04-23DOI: 10.1109/NOMS.2004.1317650
I. Rish, Mark Brodie, N. Odintsova, Sheng Ma, G. Grabarnik
We describe algorithms and an architecture for a real-time problem determination system that uses online selection of most-informative measurements - the approach called herein active probing. Probes are end-to-end test transactions which gather information about system components. Active probing allows probes to be selected and sent on-demand, in response to one's belief about the state of the system. At each step the most informative next probe is computed and sent. As probe results are received, belief about the system state is updated using probabilistic inference. This process continues until the problem is diagnosed. We demonstrate through both analysis and simulation that the active probing scheme greatly reduces both the number of probes and the time needed for localizing the problem when compared with non-active probing schemes.
{"title":"Real-time problem determination in distributed systems using active probing","authors":"I. Rish, Mark Brodie, N. Odintsova, Sheng Ma, G. Grabarnik","doi":"10.1109/NOMS.2004.1317650","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317650","url":null,"abstract":"We describe algorithms and an architecture for a real-time problem determination system that uses online selection of most-informative measurements - the approach called herein active probing. Probes are end-to-end test transactions which gather information about system components. Active probing allows probes to be selected and sent on-demand, in response to one's belief about the state of the system. At each step the most informative next probe is computed and sent. As probe results are received, belief about the system state is updated using probabilistic inference. This process continues until the problem is diagnosed. We demonstrate through both analysis and simulation that the active probing scheme greatly reduces both the number of probes and the time needed for localizing the problem when compared with non-active probing schemes.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132047973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-04-23DOI: 10.1109/NOMS.2004.1317767
Markus Debusmann, R. Kröger, K. Geihs
Service level management (SLM) has gained more and more importance in the past few years. One of the biggest challenges is the integration of emerging new technologies such as Web services. A large number of different SLM approaches has been proposed which complicates an efficient SLM. This paper describes an SLM approach that is based on the model driven architecture (MDA). The first step is to specify abstract reusable SLA patterns which are bound later to a concrete management platform and are finally physically deployed into the managed environment. This approach benefits from the advantages of the MDA and provides a mechanism for transforming SLA patterns for different SLA management platforms. Our approach has been prototypically implemented for the Web services level agreement (WSLA) environment.
{"title":"Unifying service level management using an MDA-based approach","authors":"Markus Debusmann, R. Kröger, K. Geihs","doi":"10.1109/NOMS.2004.1317767","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317767","url":null,"abstract":"Service level management (SLM) has gained more and more importance in the past few years. One of the biggest challenges is the integration of emerging new technologies such as Web services. A large number of different SLM approaches has been proposed which complicates an efficient SLM. This paper describes an SLM approach that is based on the model driven architecture (MDA). The first step is to specify abstract reusable SLA patterns which are bound later to a concrete management platform and are finally physically deployed into the managed environment. This approach benefits from the advantages of the MDA and provides a mechanism for transforming SLA patterns for different SLA management platforms. Our approach has been prototypically implemented for the Web services level agreement (WSLA) environment.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130289094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-04-23DOI: 10.1109/NOMS.2004.1317684
C. E. T. Oliveira, Renato Fiche Junior
The quest for service quality in enterprise applications is driving companies to profile their online performance. Application management tools come in handy to deliver the required diagnosis. However, distributed applications are hard to manage due to their complexity and geographical dispersion. To cope with this problem, this paper presents a Java based management solution for CORBA distributed applications. The solution combines XML, SNMP and portable interceptors to provide a nonintrusive performance management service. Components can be attached to client and server sides to monitor messages and gather data into a centralized database. A detailed analysis can then be performed to expose behavioral problems in specific parts of the application. Performance reports and charts are supplied through a Web console. A prototypical implementation was tested against two available ORB to assess functionality and interposed overhead.
{"title":"A transparent and centralized performance management service for CORBA based applications","authors":"C. E. T. Oliveira, Renato Fiche Junior","doi":"10.1109/NOMS.2004.1317684","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317684","url":null,"abstract":"The quest for service quality in enterprise applications is driving companies to profile their online performance. Application management tools come in handy to deliver the required diagnosis. However, distributed applications are hard to manage due to their complexity and geographical dispersion. To cope with this problem, this paper presents a Java based management solution for CORBA distributed applications. The solution combines XML, SNMP and portable interceptors to provide a nonintrusive performance management service. Components can be attached to client and server sides to monitor messages and gather data into a centralized database. A detailed analysis can then be performed to expose behavioral problems in specific parts of the application. Performance reports and charts are supplied through a Web console. A prototypical implementation was tested against two available ORB to assess functionality and interposed overhead.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128788952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-04-23DOI: 10.1109/NOMS.2004.1317793
R. Chadha
The problem with current network management systems is that they lack the ability to state long-term, network-wide configuration objectives, and have them automatically realized in the network. Our vision for policy-based management completes the feedback loop between network monitoring and network re-configuration. The management system must be able to automatically react to network events by performing actions described in predetermined policies. These policies are created ahead of time by the network operator; once they are created and stored as part of the management system, the latter can automatically enforce these policies. This takes the human out of the loop and allows nearly fully automated network management. The system described in this paper has been implemented and used to experiment with MPLS traffic engineering in our laboratories. The results of this experimentation have shown a significant decrease in the amount of manual intervention required to manage an MPLS network as a result of using policy-based management.
{"title":"Applications of policy-based network management","authors":"R. Chadha","doi":"10.1109/NOMS.2004.1317793","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317793","url":null,"abstract":"The problem with current network management systems is that they lack the ability to state long-term, network-wide configuration objectives, and have them automatically realized in the network. Our vision for policy-based management completes the feedback loop between network monitoring and network re-configuration. The management system must be able to automatically react to network events by performing actions described in predetermined policies. These policies are created ahead of time by the network operator; once they are created and stored as part of the management system, the latter can automatically enforce these policies. This takes the human out of the loop and allows nearly fully automated network management. The system described in this paper has been implemented and used to experiment with MPLS traffic engineering in our laboratories. The results of this experimentation have shown a significant decrease in the amount of manual intervention required to manage an MPLS network as a result of using policy-based management.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125279280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-04-23DOI: 10.1109/NOMS.2004.1317644
G. Porter, Minwen Ji
Large enterprises connect their locations together by building a corporate network out of private communication channels, such as leased lines, frame relay and ATM links, called physical private networks or PPNs. PPNs provide good quality of service, but they are expensive. On the other hand, Internet-based virtual private networks (VPNs) can provide speedy deployment of multisite corporate networks at a small fraction of the cost of private lines. However, Internet-based VPNs do not offer the same accountability and predictability as PPNs do, since the Internet is not administrated by a single provider. In order to build a hybrid network that is both reliable and affordable, we have developed the delta routing protocol, which allows nodes on a corporate network to communicate with each other using both PPN and Internet-based VPN. The delta routing protocol works with the existing routing protocol on the PPN and allows each node to determine the best routes on the hybrid network using local information only. We have simulated and compared the delta routing protocol and the alternatives using the ns-2 simulator. The results show that the delta routing protocol outperforms the alternatives in a variety of scenarios.
{"title":"Delta routing: improving the price-performance of hybrid private networks","authors":"G. Porter, Minwen Ji","doi":"10.1109/NOMS.2004.1317644","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317644","url":null,"abstract":"Large enterprises connect their locations together by building a corporate network out of private communication channels, such as leased lines, frame relay and ATM links, called physical private networks or PPNs. PPNs provide good quality of service, but they are expensive. On the other hand, Internet-based virtual private networks (VPNs) can provide speedy deployment of multisite corporate networks at a small fraction of the cost of private lines. However, Internet-based VPNs do not offer the same accountability and predictability as PPNs do, since the Internet is not administrated by a single provider. In order to build a hybrid network that is both reliable and affordable, we have developed the delta routing protocol, which allows nodes on a corporate network to communicate with each other using both PPN and Internet-based VPN. The delta routing protocol works with the existing routing protocol on the PPN and allows each node to determine the best routes on the hybrid network using local information only. We have simulated and compared the delta routing protocol and the alternatives using the ns-2 simulator. The results show that the delta routing protocol outperforms the alternatives in a variety of scenarios.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129924312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-04-19DOI: 10.1109/NOMS.2004.1317816
B. Stiller
Summary form only given. Due to the commercialization of the Internet its traffic as well as content being transmitted requires suitable mechanisms, which enable a service provider to charge for the traffic or content. This tutorial provides an overview of the key aspects, technology, and related work being essential for an effective and efficient approach to account for respective data, which may be used for the charging process. This includes on the technology side a discussion of accounting systems as well as on the economic side an overview of applicable pricing schemes. The problem of single- and multi-provider scenarios is addressed and an outlook on future areas of research and interest given.
{"title":"Charging and accounting in the Internet","authors":"B. Stiller","doi":"10.1109/NOMS.2004.1317816","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317816","url":null,"abstract":"Summary form only given. Due to the commercialization of the Internet its traffic as well as content being transmitted requires suitable mechanisms, which enable a service provider to charge for the traffic or content. This tutorial provides an overview of the key aspects, technology, and related work being essential for an effective and efficient approach to account for respective data, which may be used for the charging process. This includes on the technology side a discussion of accounting systems as well as on the economic side an overview of applicable pricing schemes. The problem of single- and multi-provider scenarios is addressed and an outlook on future areas of research and interest given.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123257435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-04-19DOI: 10.1109/NOMS.2004.1317833
J. Park, Jaehyuk Ryu, Deok-Han Kim, Keun-Tae Lee
Due to the rapid change in the mobile business environment and a variety of services, KTF has several network management systems. Each network management system has been specialized for each network such as NetCommander for 2G/3G (cdma2000) core, access and some supplementary networks, NexPlorer for 2G/3G IP network and iManager for 3G (W-CDMA) networks. However, market situations push operators to reduce capital expenditure (CAPEX) and operational expenditure (OPEX). With these several network management systems, we think that we can not meet the time-to-market and reduce the operational expenditure (OPEX) due to a variety of interfaces to handle and a variety of vendor products to manage. In this presentation, the author talks about the plans for the integration of KTF's legacy network management systems. We plan to reassign the roles of our network management systems and unify the interfaces between network management system and EMS/agent. With these plans, we are going to implement a unified network management system and cut the operational costs.
{"title":"Plans for integration of KTF's legacy network management systems","authors":"J. Park, Jaehyuk Ryu, Deok-Han Kim, Keun-Tae Lee","doi":"10.1109/NOMS.2004.1317833","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317833","url":null,"abstract":"Due to the rapid change in the mobile business environment and a variety of services, KTF has several network management systems. Each network management system has been specialized for each network such as NetCommander for 2G/3G (cdma2000) core, access and some supplementary networks, NexPlorer for 2G/3G IP network and iManager for 3G (W-CDMA) networks. However, market situations push operators to reduce capital expenditure (CAPEX) and operational expenditure (OPEX). With these several network management systems, we think that we can not meet the time-to-market and reduce the operational expenditure (OPEX) due to a variety of interfaces to handle and a variety of vendor products to manage. In this presentation, the author talks about the plans for the integration of KTF's legacy network management systems. We plan to reassign the roles of our network management systems and unify the interfaces between network management system and EMS/agent. With these plans, we are going to implement a unified network management system and cut the operational costs.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122309163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-04-19DOI: 10.1109/NOMS.2004.1317813
M. Molina
Summary form only given. Traffic measurement in the Internet, particularly traffic flow measurement, is an area of rapid growth in recent years, although the issue is not new at all. But many tools have been developed and methodology and technologies have been improved significantly. This tutorial gives an overview of methods, technologies and existing tools for traffic measurements. It starts with basic requirements, constraints, and problems of metering IP packets related to the Internet protocol and to common transport protocols. Then capturing I P packets at link layer level and at network level is discussed. For traffic metering, there exist several IETF standards and other de-facto standards. The tutorial gives an overview of these as well as of common low-level metering tools. On higher levels of IP traffic measurement, a large variety of tools, frameworks, and systems can be found supporting graphical display of measured flow data, integration and correlation of measurements from different locations, and integration with applications such as traffic engineering and accounting. For the tutorial, a representative subset of these was selected and is presented. Finally, an outlook is given including recent developments, current activities and challenges ahead.
{"title":"Traffic measurement in IP networks","authors":"M. Molina","doi":"10.1109/NOMS.2004.1317813","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317813","url":null,"abstract":"Summary form only given. Traffic measurement in the Internet, particularly traffic flow measurement, is an area of rapid growth in recent years, although the issue is not new at all. But many tools have been developed and methodology and technologies have been improved significantly. This tutorial gives an overview of methods, technologies and existing tools for traffic measurements. It starts with basic requirements, constraints, and problems of metering IP packets related to the Internet protocol and to common transport protocols. Then capturing I P packets at link layer level and at network level is discussed. For traffic metering, there exist several IETF standards and other de-facto standards. The tutorial gives an overview of these as well as of common low-level metering tools. On higher levels of IP traffic measurement, a large variety of tools, frameworks, and systems can be found supporting graphical display of measured flow data, integration and correlation of measurements from different locations, and integration with applications such as traffic engineering and accounting. For the tutorial, a representative subset of these was selected and is presented. Finally, an outlook is given including recent developments, current activities and challenges ahead.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114786977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-11-20DOI: 10.1109/NOMS.2004.1317788
Kazuyoshi Akiyama, Toshiya Watanabe, Kazuhide Takahashi, N. Tanigawa
This paper proposes a distributed data driven architecture (D3A), devised for application to an operations support system (OSS). By applying this architecture to an OSS, it is possible to reduce OSS hardware and middleware costs, and to change OSS application programs rapidly and flexibly. To assure alarm reception processing performance at low cost, D3A is comprised of a lot of IA servers. With D3A, OSS application programs are divided into a lot of elements similar to UNIX processes. These elements are called processing elements (PEs). A PE is mounted on each IA server. Data that represents the execution sequence and execution condition of PEs is called processing configuration data (PCD). The PCD moves about among IA servers comprising an OSS. The PCD driver (PCDD) is a function to analyze the PCD, and determines the PE to be executed next and controls the route of the PCD. A commercial OSS is being developed by using D3A and will start running in June 2004.
{"title":"A distributed data driven architecture for operations support systems","authors":"Kazuyoshi Akiyama, Toshiya Watanabe, Kazuhide Takahashi, N. Tanigawa","doi":"10.1109/NOMS.2004.1317788","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317788","url":null,"abstract":"This paper proposes a distributed data driven architecture (D3A), devised for application to an operations support system (OSS). By applying this architecture to an OSS, it is possible to reduce OSS hardware and middleware costs, and to change OSS application programs rapidly and flexibly. To assure alarm reception processing performance at low cost, D3A is comprised of a lot of IA servers. With D3A, OSS application programs are divided into a lot of elements similar to UNIX processes. These elements are called processing elements (PEs). A PE is mounted on each IA server. Data that represents the execution sequence and execution condition of PEs is called processing configuration data (PCD). The PCD moves about among IA servers comprising an OSS. The PCD driver (PCDD) is a function to analyze the PCD, and determines the PE to be executed next and controls the route of the PCD. A commercial OSS is being developed by using D3A and will start running in June 2004.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130199446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}