Pub Date : 2004-04-23DOI: 10.1109/NOMS.2004.1317770
V. Tosic, Wei-wei Ma, B. Pagurek, B. Esfandiari
Our Web Service Offerings Language (WSOL) enables formal specification of important management information - classes of service (modeled as service offerings), various types of constraint (functional, QoS, access rights), and management statements (e.g., prices, penalties, and management responsibilities) - for XML (Extensible Markup Language) Web services. To demonstrate the usefulness of WSOL for the management of Web services and their compositions, we have developed a corresponding management infrastructure, the Web Service Offerings Infrastructure (WSOI). WSOI enables monitoring and accounting of WSOL service offerings and their dynamic manipulation. To support monitoring of WSOL service offerings, we have extended the Apache Axis open-source SOAP engine with WSOI-specific modules, data structures, and management ports. To support dynamic manipulation of WSOL service offerings, we have developed appropriate algorithms, protocols, and management port types and built into WSOI modules and data structures for their implementation. Apart from provisioning of WSOL-enabled Web services, we are using WSOI to perform experiments comparing dynamic manipulation of WSOL service offerings and alternatives.
{"title":"Web Service Offerings Infrastructure (WSOI) - a management infrastructure for XML Web services","authors":"V. Tosic, Wei-wei Ma, B. Pagurek, B. Esfandiari","doi":"10.1109/NOMS.2004.1317770","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317770","url":null,"abstract":"Our Web Service Offerings Language (WSOL) enables formal specification of important management information - classes of service (modeled as service offerings), various types of constraint (functional, QoS, access rights), and management statements (e.g., prices, penalties, and management responsibilities) - for XML (Extensible Markup Language) Web services. To demonstrate the usefulness of WSOL for the management of Web services and their compositions, we have developed a corresponding management infrastructure, the Web Service Offerings Infrastructure (WSOI). WSOI enables monitoring and accounting of WSOL service offerings and their dynamic manipulation. To support monitoring of WSOL service offerings, we have extended the Apache Axis open-source SOAP engine with WSOI-specific modules, data structures, and management ports. To support dynamic manipulation of WSOL service offerings, we have developed appropriate algorithms, protocols, and management port types and built into WSOI modules and data structures for their implementation. Apart from provisioning of WSOL-enabled Web services, we are using WSOI to perform experiments comparing dynamic manipulation of WSOL service offerings and alternatives.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116044951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-04-23DOI: 10.1109/NOMS.2004.1317764
Jin Xiao, R. Boutaba
With the ever increasing demand for network resources, network operators and Internet service providers are under constant pressure to accommodate more network bandwidth and offer better service quality via periodic network upgrades, Given a budget constraint, a sound network upgrade decision should maximize investment benefit which is contingent on the degree of customer satisfaction. This paper presents a customer-centric approach in making network upgrade decisions, where customer satisfaction is the key evaluation criterion. Network performance is related to customer's perceived service quality and component upgrades are assessed based on their profitability. As demonstrated using a case scenario, our approach results in effective upgrade decisions that enhance service quality, improve customer satisfaction, and maximize revenue.
{"title":"Customer-centric network upgrade strategy: maximizing investment benefits for enhanced service quality","authors":"Jin Xiao, R. Boutaba","doi":"10.1109/NOMS.2004.1317764","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317764","url":null,"abstract":"With the ever increasing demand for network resources, network operators and Internet service providers are under constant pressure to accommodate more network bandwidth and offer better service quality via periodic network upgrades, Given a budget constraint, a sound network upgrade decision should maximize investment benefit which is contingent on the degree of customer satisfaction. This paper presents a customer-centric approach in making network upgrade decisions, where customer satisfaction is the key evaluation criterion. Network performance is related to customer's perceived service quality and component upgrades are assessed based on their profitability. As demonstrated using a case scenario, our approach results in effective upgrade decisions that enhance service quality, improve customer satisfaction, and maximize revenue.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116402498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-04-23DOI: 10.1109/NOMS.2004.1317810
E. Al-Shaer
Summary form only given. Firewalls are core elements in network security. However, managing firewall rules, particularly in multi-firewall enterprise networks, has become a complex and error-prone task. Firewall filtering rules have to be written, ordered and distributed carefully in order to avoid firewall policy conflicts (or anomalies) and network vulnerability. Therefore, in order to produce anomaly-free firewall policies when adding or modifying rules in any firewall, a thorough intra- and inter-firewall analysis is required to determine the rule location (which firewall) and position (what order in the firewall policy) in the network. We comprehensibly identify all types of anomaly that could exist in single- or multi-firewall environments. We then present a set of techniques/tools that automatically discover and rectify policy anomalies in centralized and distributed legacy firewalls.
{"title":"Managing firewall and network-edge security policies","authors":"E. Al-Shaer","doi":"10.1109/NOMS.2004.1317810","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317810","url":null,"abstract":"Summary form only given. Firewalls are core elements in network security. However, managing firewall rules, particularly in multi-firewall enterprise networks, has become a complex and error-prone task. Firewall filtering rules have to be written, ordered and distributed carefully in order to avoid firewall policy conflicts (or anomalies) and network vulnerability. Therefore, in order to produce anomaly-free firewall policies when adding or modifying rules in any firewall, a thorough intra- and inter-firewall analysis is required to determine the rule location (which firewall) and position (what order in the firewall policy) in the network. We comprehensibly identify all types of anomaly that could exist in single- or multi-firewall environments. We then present a set of techniques/tools that automatically discover and rectify policy anomalies in centralized and distributed legacy firewalls.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116495290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-04-23DOI: 10.1109/NOMS.2004.1317806
R. Chadha
Summary form only given. Tomorrow's mobile ad hoc networks emphasize adaptable and flexible networks that automatically adapt to the user's needs. Such adaptability and flexibility requires mobile networking capabilities significantly beyond what is possible with currently fielded technology. The tutorial discusses the management challenges and outlines solutions to problems that address the unique characteristics of mobile ad hoc networks. The tutorial covers the following topics: introduction to ad hoc networking; ad hoc network configuration; routing in ad hoc networks; management issues for ad hoc networks.
{"title":"Managing mobile ad hoc networks","authors":"R. Chadha","doi":"10.1109/NOMS.2004.1317806","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317806","url":null,"abstract":"Summary form only given. Tomorrow's mobile ad hoc networks emphasize adaptable and flexible networks that automatically adapt to the user's needs. Such adaptability and flexibility requires mobile networking capabilities significantly beyond what is possible with currently fielded technology. The tutorial discusses the management challenges and outlines solutions to problems that address the unique characteristics of mobile ad hoc networks. The tutorial covers the following topics: introduction to ad hoc networking; ad hoc network configuration; routing in ad hoc networks; management issues for ad hoc networks.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128257585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-04-23DOI: 10.1109/NOMS.2004.1317786
F. A. Aagesen, Chutiporn Anutariya, M. Shiaa, B. Helvik, Paramai Supadulchai
Network-based services have, for more than a decade been, been an important research topic. A demand has arisen for a platform with functionalities beyond existing solutions. The paper develops a formal framework for dynamic configuration and reconfiguration of services in TAPAS - telematics architecture for plug-and-play systems (see http://tapas.item.ntnu.no). It provides representation, computation and reasoning mechanisms for semantic description and matching of required and offered capabilities and status which are required by a particular service system. It employs CIM and recently developed languages for the semantic Web in order to provide a mechanism for human-readable and machine-comprehensible descriptions of status, capabilities, system (re)configuration plans as well as exchanging messages. It also exploits XML declarative description (XDD) theory to unify such various languages seamlessly into a single uniform formalism. It permits formal definitions of application-specific configuration requirements and constraints as well as reconfiguration policies. Reasoning about these definitions and the available capabilities/status of nodes in the system yields appropriate (re)configuration plans for the composition of new services and for adaptation of current services.
{"title":"A dynamic configuration architecture","authors":"F. A. Aagesen, Chutiporn Anutariya, M. Shiaa, B. Helvik, Paramai Supadulchai","doi":"10.1109/NOMS.2004.1317786","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317786","url":null,"abstract":"Network-based services have, for more than a decade been, been an important research topic. A demand has arisen for a platform with functionalities beyond existing solutions. The paper develops a formal framework for dynamic configuration and reconfiguration of services in TAPAS - telematics architecture for plug-and-play systems (see http://tapas.item.ntnu.no). It provides representation, computation and reasoning mechanisms for semantic description and matching of required and offered capabilities and status which are required by a particular service system. It employs CIM and recently developed languages for the semantic Web in order to provide a mechanism for human-readable and machine-comprehensible descriptions of status, capabilities, system (re)configuration plans as well as exchanging messages. It also exploits XML declarative description (XDD) theory to unify such various languages seamlessly into a single uniform formalism. It permits formal definitions of application-specific configuration requirements and constraints as well as reconfiguration policies. Reasoning about these definitions and the available capabilities/status of nodes in the system yields appropriate (re)configuration plans for the composition of new services and for adaptation of current services.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133001730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-04-23DOI: 10.1109/NOMS.2004.1317736
D. Pezaros, D. Hutchison, J. Sventek, Francisco J. García, R. Gardner
The ability to measure, monitor and control the service quality experienced by network traffic is becoming increasingly important as multiple traffic types are aggregated onto IP networks. Assessing the real-time performance of the application flows is an essential requirement for network operations and service management, as well as for identifying how the different traffic types and transports interact and behave, when they are carried over the end-to-end Internet infrastructure. This paper introduces a novel measurement technique for assessing the performance of IPv6 network flows. By exploiting IPv6 extension headers, measurement triggers and the instantaneous measurement indications are carried in the same packets as the payload data itself. providing a high level of probability that the behaviour of the real user traffic flows is being observed. The measurement mechanism is applied at the network layer and provides for a generic technique able to measure any type of traffic without depending on particular transports or on specific measurement architectures. A prototype implementation of this technique is also described and evaluated by measuring performance properties of application flows over different-capacity IPv6 environments. End-to-end delay and jitter of video streams have been measured, as well as the goodput for services operating on top of reliable transport. This measurement technique can be the basis for low-overhead, scalable, transparent and reliable measurement of individual and aggregate network flows, and can be dynamically deployed where and when required in a multi-service IP environment.
{"title":"In-line service measurements: an IPv6-based framework for traffic evaluation and network operations","authors":"D. Pezaros, D. Hutchison, J. Sventek, Francisco J. García, R. Gardner","doi":"10.1109/NOMS.2004.1317736","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317736","url":null,"abstract":"The ability to measure, monitor and control the service quality experienced by network traffic is becoming increasingly important as multiple traffic types are aggregated onto IP networks. Assessing the real-time performance of the application flows is an essential requirement for network operations and service management, as well as for identifying how the different traffic types and transports interact and behave, when they are carried over the end-to-end Internet infrastructure. This paper introduces a novel measurement technique for assessing the performance of IPv6 network flows. By exploiting IPv6 extension headers, measurement triggers and the instantaneous measurement indications are carried in the same packets as the payload data itself. providing a high level of probability that the behaviour of the real user traffic flows is being observed. The measurement mechanism is applied at the network layer and provides for a generic technique able to measure any type of traffic without depending on particular transports or on specific measurement architectures. A prototype implementation of this technique is also described and evaluated by measuring performance properties of application flows over different-capacity IPv6 environments. End-to-end delay and jitter of video streams have been measured, as well as the goodput for services operating on top of reliable transport. This measurement technique can be the basis for low-overhead, scalable, transparent and reliable measurement of individual and aggregate network flows, and can be dynamically deployed where and when required in a multi-service IP environment.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127951668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-04-23DOI: 10.1109/NOMS.2004.1317814
A. Clemm, G. Lin
Summary form only given. This tutorial presents a view of the IP network management problem from the perspective of the network itself. It focuses on how to address enhanced manageability requirements in the network infrastructure. This includes what can and should be instrumented inside a network element, and what can and should be instrumented with a scope that goes beyond the individual network element to result in more general "manageability services" provided by the network. We discuss the relevance of manageability as a business driver and provide an in-depth analysis of the various factors that contribute to manageability. After this, techniques are presented that can be applied to enhance manageability, also in light of increased focus on applications such as on-demand services, managed services, and plug-n-play networking. We also discuss the role of certain technologies such as XML and Netflow in the emergence of a new generation of management interfaces. Finally, scenarios are used to illustrate how the resulting advances in manageability facilitate not only the development of management applications, but ultimately result in networks that are more autonomous and "self managing", and less complex and costly to operate than the norm today.
{"title":"Rethinking manageability - advances and emerging paradigm shifts in managing intelligent IP networks","authors":"A. Clemm, G. Lin","doi":"10.1109/NOMS.2004.1317814","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317814","url":null,"abstract":"Summary form only given. This tutorial presents a view of the IP network management problem from the perspective of the network itself. It focuses on how to address enhanced manageability requirements in the network infrastructure. This includes what can and should be instrumented inside a network element, and what can and should be instrumented with a scope that goes beyond the individual network element to result in more general \"manageability services\" provided by the network. We discuss the relevance of manageability as a business driver and provide an in-depth analysis of the various factors that contribute to manageability. After this, techniques are presented that can be applied to enhance manageability, also in light of increased focus on applications such as on-demand services, managed services, and plug-n-play networking. We also discuss the role of certain technologies such as XML and Netflow in the emergence of a new generation of management interfaces. Finally, scenarios are used to illustrate how the resulting advances in manageability facilitate not only the development of management applications, but ultimately result in networks that are more autonomous and \"self managing\", and less complex and costly to operate than the norm today.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114191640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-04-23DOI: 10.1109/NOMS.2004.1317665
Yanyan Yang, C. Martel, S. F. Wu
Most of the current work in policy management for IPSec/VPN focuses on how to configure a single IPSec box or a pair of IPSec boxes. However, it has been shown (Fu et al. (2001)) that the local correctness of IPSec policies in every box individually does not necessarily guarantee global correctness. Therefore, it is critical to have a systematic way to analyze the security requirements globally and to generate, automatically and correctly, a set of IPSec policies to ensure the security for all the end-to-end connections. Previously (Fu et al. (2001)), two different algorithms (i.e. bundle and direct) were introduced to solve the policy generation problem in an "offline" fashion. While these two algorithms are efficient in producing globally correct policy rules, the number of output policy rules (i.e., the results themselves) is much greater than necessary. In other words, while the existing approaches can produce a solution quickly, the quality of the solution is far from optimal. In practice, this is undesirable for several reasons. For instance, "more IPSec policy rules" implies "more complicated virtual network topology". Therefore, in this paper, we focus on "how to produce a minimum set of IPSec/VPN tunnels". We formulate this problem as a special type of task-scheduling problem and develop a new method, the ordered-split approach, to produce a provably minimum set of globally correct policy rules. We have also compared the new approach with existing methods in simulation, and our results clearly demonstrate that the ordered-split approach performs significantly better.
目前,IPSec/VPN的策略管理工作主要集中在如何配置单个或一对IPSec盒子上。然而,研究表明(Fu et al.(2001)),每个盒子中IPSec策略的本地正确性并不一定保证全局正确性。因此,有一种系统的方法来全局分析安全需求,并自动正确地生成一套IPSec策略,以确保所有端到端连接的安全性是至关重要的。以前(Fu et al.(2001)),引入了两种不同的算法(即bundle和direct)以“离线”方式解决策略生成问题。虽然这两种算法在生成全局正确的策略规则方面是有效的,但输出策略规则的数量(即结果本身)远远大于所需的数量。换句话说,虽然现有的方法可以快速生成解决方案,但解决方案的质量远非最佳。在实践中,出于几个原因,这是不可取的。例如,“IPSec策略规则越多”意味着“虚拟网络拓扑结构越复杂”。因此,本文的重点是“如何生成一个最小的IPSec/VPN隧道集”。本文将此问题表述为一类特殊的任务调度问题,并提出了一种新的方法——有序分割法,来生成全局正确策略规则的可证明最小集。我们还将新方法与现有方法进行了仿真比较,结果清楚地表明,有序分割方法的性能明显更好。
{"title":"On building the minimum number of tunnels: an ordered-split approach to manage IPSec/VPN policies","authors":"Yanyan Yang, C. Martel, S. F. Wu","doi":"10.1109/NOMS.2004.1317665","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317665","url":null,"abstract":"Most of the current work in policy management for IPSec/VPN focuses on how to configure a single IPSec box or a pair of IPSec boxes. However, it has been shown (Fu et al. (2001)) that the local correctness of IPSec policies in every box individually does not necessarily guarantee global correctness. Therefore, it is critical to have a systematic way to analyze the security requirements globally and to generate, automatically and correctly, a set of IPSec policies to ensure the security for all the end-to-end connections. Previously (Fu et al. (2001)), two different algorithms (i.e. bundle and direct) were introduced to solve the policy generation problem in an \"offline\" fashion. While these two algorithms are efficient in producing globally correct policy rules, the number of output policy rules (i.e., the results themselves) is much greater than necessary. In other words, while the existing approaches can produce a solution quickly, the quality of the solution is far from optimal. In practice, this is undesirable for several reasons. For instance, \"more IPSec policy rules\" implies \"more complicated virtual network topology\". Therefore, in this paper, we focus on \"how to produce a minimum set of IPSec/VPN tunnels\". We formulate this problem as a special type of task-scheduling problem and develop a new method, the ordered-split approach, to produce a provably minimum set of globally correct policy rules. We have also compared the new approach with existing methods in simulation, and our results clearly demonstrate that the ordered-split approach performs significantly better.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120943758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-04-23DOI: 10.1109/NOMS.2004.1317832
E. Grosso, R. Alfano
The paper presents a technical solution for the automation of network inventory management (NIM) processes for mobile operators. The deployment of operations support systems (OSS), according to the design of an overall target systems architecture, and the reengineering of management processes supporting NIM are the core issues of the proposed solution. Common information and data models are key enabling factors for NIM processes and systems. Information modelling is also the core of standardization efforts for network and service management. Within the operating environments of telecommunication companies (telcos), running either wireline or wireless networks, NIM and the centrality of data have appeared to be key factors for enabling automation of network and service management and deploying effective OSS solutions. The theories and the results discussed have been demonstrated practically and successfully in the operating companies of the Telecom Italia Group. Software solutions for the automation of NIM processes have been deployed since the early 1980s, using early software technologies for database management and building bespoke systems, until some more recent implementations that exploit best-in-class commercial products and successful Web technologies. A practical case study is presented of a successful implementation of an OSS solution for NIM in a mobile company of the Telecom Italia Group.
{"title":"Operating mobile networks through effective network inventory management","authors":"E. Grosso, R. Alfano","doi":"10.1109/NOMS.2004.1317832","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317832","url":null,"abstract":"The paper presents a technical solution for the automation of network inventory management (NIM) processes for mobile operators. The deployment of operations support systems (OSS), according to the design of an overall target systems architecture, and the reengineering of management processes supporting NIM are the core issues of the proposed solution. Common information and data models are key enabling factors for NIM processes and systems. Information modelling is also the core of standardization efforts for network and service management. Within the operating environments of telecommunication companies (telcos), running either wireline or wireless networks, NIM and the centrality of data have appeared to be key factors for enabling automation of network and service management and deploying effective OSS solutions. The theories and the results discussed have been demonstrated practically and successfully in the operating companies of the Telecom Italia Group. Software solutions for the automation of NIM processes have been deployed since the early 1980s, using early software technologies for database management and building bespoke systems, until some more recent implementations that exploit best-in-class commercial products and successful Web technologies. A practical case study is presented of a successful implementation of an OSS solution for NIM in a mobile company of the Telecom Italia Group.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124943878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-04-23DOI: 10.1109/NOMS.2004.1317805
Nikos Anerousis
Summary form only given. The vision of pervasive and ubiquitous computing was set forth in the early 90s, calling for a world of people and environments augmented with computational resources that provide access to information and services anytime, anywhere. Since then, part of this vision has been realized. The first part of this tutorial presents a comprehensive overview of pervasive computing and its evolution in the last 10 years. Particular attention is given to three areas where most research and development work has focused: natural interfaces (displays, speech, input devices), context awareness, and automated capture and access of live experiences. In addition, we explore a number of systems issues common in the development of pervasive applications, such as networking techniques for creating a pervasive communications infrastructure (especially in the presence of intermittent connectivity), middleware and operating system support, security and privacy. The second part provides an overview of the still nascent field of management of pervasive environments. We outline the challenges and present the latest work in the area: problem domains, architectures and implementations.
{"title":"Pervasive computing and management","authors":"Nikos Anerousis","doi":"10.1109/NOMS.2004.1317805","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317805","url":null,"abstract":"Summary form only given. The vision of pervasive and ubiquitous computing was set forth in the early 90s, calling for a world of people and environments augmented with computational resources that provide access to information and services anytime, anywhere. Since then, part of this vision has been realized. The first part of this tutorial presents a comprehensive overview of pervasive computing and its evolution in the last 10 years. Particular attention is given to three areas where most research and development work has focused: natural interfaces (displays, speech, input devices), context awareness, and automated capture and access of live experiences. In addition, we explore a number of systems issues common in the development of pervasive applications, such as networking techniques for creating a pervasive communications infrastructure (especially in the presence of intermittent connectivity), middleware and operating system support, security and privacy. The second part provides an overview of the still nascent field of management of pervasive environments. We outline the challenges and present the latest work in the area: problem domains, architectures and implementations.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122483611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}