首页 > 最新文献

2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)最新文献

英文 中文
Web Service Offerings Infrastructure (WSOI) - a management infrastructure for XML Web services Web服务产品基础设施(WSOI)——XML Web服务的管理基础设施
V. Tosic, Wei-wei Ma, B. Pagurek, B. Esfandiari
Our Web Service Offerings Language (WSOL) enables formal specification of important management information - classes of service (modeled as service offerings), various types of constraint (functional, QoS, access rights), and management statements (e.g., prices, penalties, and management responsibilities) - for XML (Extensible Markup Language) Web services. To demonstrate the usefulness of WSOL for the management of Web services and their compositions, we have developed a corresponding management infrastructure, the Web Service Offerings Infrastructure (WSOI). WSOI enables monitoring and accounting of WSOL service offerings and their dynamic manipulation. To support monitoring of WSOL service offerings, we have extended the Apache Axis open-source SOAP engine with WSOI-specific modules, data structures, and management ports. To support dynamic manipulation of WSOL service offerings, we have developed appropriate algorithms, protocols, and management port types and built into WSOI modules and data structures for their implementation. Apart from provisioning of WSOL-enabled Web services, we are using WSOI to perform experiments comparing dynamic manipulation of WSOL service offerings and alternatives.
我们的Web服务提供语言(WSOL)支持对XML(可扩展标记语言)Web服务的重要管理信息——服务类别(建模为服务提供)、各种类型的约束(功能、QoS、访问权限)和管理语句(例如,价格、处罚和管理责任)——进行正式规范。为了演示WSOL在管理Web服务及其组合方面的有用性,我们开发了一个相应的管理基础设施,即Web服务产品基础设施(WSOI)。WSOI支持监视和计算WSOL服务产品及其动态操作。为了支持对WSOL服务产品的监视,我们用特定于WSOL的模块、数据结构和管理端口扩展了Apache Axis开源SOAP引擎。为了支持对WSOL服务产品的动态操作,我们开发了适当的算法、协议和管理端口类型,并将其内置到WSOI模块和数据结构中以实现它们。除了提供支持WSOL的Web服务之外,我们还使用WSOI来执行比较WSOL服务产品和备选方案的动态操作的实验。
{"title":"Web Service Offerings Infrastructure (WSOI) - a management infrastructure for XML Web services","authors":"V. Tosic, Wei-wei Ma, B. Pagurek, B. Esfandiari","doi":"10.1109/NOMS.2004.1317770","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317770","url":null,"abstract":"Our Web Service Offerings Language (WSOL) enables formal specification of important management information - classes of service (modeled as service offerings), various types of constraint (functional, QoS, access rights), and management statements (e.g., prices, penalties, and management responsibilities) - for XML (Extensible Markup Language) Web services. To demonstrate the usefulness of WSOL for the management of Web services and their compositions, we have developed a corresponding management infrastructure, the Web Service Offerings Infrastructure (WSOI). WSOI enables monitoring and accounting of WSOL service offerings and their dynamic manipulation. To support monitoring of WSOL service offerings, we have extended the Apache Axis open-source SOAP engine with WSOI-specific modules, data structures, and management ports. To support dynamic manipulation of WSOL service offerings, we have developed appropriate algorithms, protocols, and management port types and built into WSOI modules and data structures for their implementation. Apart from provisioning of WSOL-enabled Web services, we are using WSOI to perform experiments comparing dynamic manipulation of WSOL service offerings and alternatives.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116044951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
Customer-centric network upgrade strategy: maximizing investment benefits for enhanced service quality 以客户为中心的网络升级策略:投资效益最大化,服务质量提升
Jin Xiao, R. Boutaba
With the ever increasing demand for network resources, network operators and Internet service providers are under constant pressure to accommodate more network bandwidth and offer better service quality via periodic network upgrades, Given a budget constraint, a sound network upgrade decision should maximize investment benefit which is contingent on the degree of customer satisfaction. This paper presents a customer-centric approach in making network upgrade decisions, where customer satisfaction is the key evaluation criterion. Network performance is related to customer's perceived service quality and component upgrades are assessed based on their profitability. As demonstrated using a case scenario, our approach results in effective upgrade decisions that enhance service quality, improve customer satisfaction, and maximize revenue.
随着对网络资源需求的不断增长,网络运营商和互联网服务提供商面临着不断的压力,需要通过定期的网络升级来容纳更多的网络带宽和提供更好的服务质量。在预算约束下,一个合理的网络升级决策应该使投资效益最大化,而投资效益最大化取决于用户满意度的程度。本文提出了一种以客户为中心的网络升级决策方法,其中客户满意度是关键的评估标准。网络性能与客户感知的服务质量有关,组件升级是根据其盈利能力来评估的。正如使用案例场景所演示的那样,我们的方法产生了有效的升级决策,从而提高了服务质量,提高了客户满意度,并使收入最大化。
{"title":"Customer-centric network upgrade strategy: maximizing investment benefits for enhanced service quality","authors":"Jin Xiao, R. Boutaba","doi":"10.1109/NOMS.2004.1317764","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317764","url":null,"abstract":"With the ever increasing demand for network resources, network operators and Internet service providers are under constant pressure to accommodate more network bandwidth and offer better service quality via periodic network upgrades, Given a budget constraint, a sound network upgrade decision should maximize investment benefit which is contingent on the degree of customer satisfaction. This paper presents a customer-centric approach in making network upgrade decisions, where customer satisfaction is the key evaluation criterion. Network performance is related to customer's perceived service quality and component upgrades are assessed based on their profitability. As demonstrated using a case scenario, our approach results in effective upgrade decisions that enhance service quality, improve customer satisfaction, and maximize revenue.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116402498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Managing firewall and network-edge security policies 管理防火墙和网络边缘安全策略
E. Al-Shaer
Summary form only given. Firewalls are core elements in network security. However, managing firewall rules, particularly in multi-firewall enterprise networks, has become a complex and error-prone task. Firewall filtering rules have to be written, ordered and distributed carefully in order to avoid firewall policy conflicts (or anomalies) and network vulnerability. Therefore, in order to produce anomaly-free firewall policies when adding or modifying rules in any firewall, a thorough intra- and inter-firewall analysis is required to determine the rule location (which firewall) and position (what order in the firewall policy) in the network. We comprehensibly identify all types of anomaly that could exist in single- or multi-firewall environments. We then present a set of techniques/tools that automatically discover and rectify policy anomalies in centralized and distributed legacy firewalls.
只提供摘要形式。防火墙是网络安全的核心要素。然而,管理防火墙规则,特别是在多防火墙企业网络中,已经成为一项复杂且容易出错的任务。为了避免防火墙策略冲突(或异常)和网络漏洞,必须仔细编写、排序和分发防火墙过滤规则。因此,为了在任何防火墙中添加或修改规则时生成无异常的防火墙策略,需要对防火墙内部和防火墙之间进行彻底的分析,以确定规则在网络中的位置(哪个防火墙)和位置(在防火墙策略中的顺序)。我们全面识别所有类型的异常,可能存在于单一或多防火墙环境。然后,我们介绍了一组技术/工具,可以自动发现和纠正集中式和分布式遗留防火墙中的策略异常。
{"title":"Managing firewall and network-edge security policies","authors":"E. Al-Shaer","doi":"10.1109/NOMS.2004.1317810","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317810","url":null,"abstract":"Summary form only given. Firewalls are core elements in network security. However, managing firewall rules, particularly in multi-firewall enterprise networks, has become a complex and error-prone task. Firewall filtering rules have to be written, ordered and distributed carefully in order to avoid firewall policy conflicts (or anomalies) and network vulnerability. Therefore, in order to produce anomaly-free firewall policies when adding or modifying rules in any firewall, a thorough intra- and inter-firewall analysis is required to determine the rule location (which firewall) and position (what order in the firewall policy) in the network. We comprehensibly identify all types of anomaly that could exist in single- or multi-firewall environments. We then present a set of techniques/tools that automatically discover and rectify policy anomalies in centralized and distributed legacy firewalls.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116495290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Managing mobile ad hoc networks 管理移动自组织网络
R. Chadha
Summary form only given. Tomorrow's mobile ad hoc networks emphasize adaptable and flexible networks that automatically adapt to the user's needs. Such adaptability and flexibility requires mobile networking capabilities significantly beyond what is possible with currently fielded technology. The tutorial discusses the management challenges and outlines solutions to problems that address the unique characteristics of mobile ad hoc networks. The tutorial covers the following topics: introduction to ad hoc networking; ad hoc network configuration; routing in ad hoc networks; management issues for ad hoc networks.
只提供摘要形式。未来的移动自组织网络强调自适应和灵活的网络,自动适应用户的需求。这种适应性和灵活性对移动网络能力的要求远远超出了现有技术的能力。本教程讨论了管理方面的挑战,并概述了针对移动自组织网络独特特征的问题的解决方案。本教程涵盖以下主题:ad hoc网络简介;AD hoc网络配置;AD hoc网络中的路由问题研究AD hoc网络的管理问题。
{"title":"Managing mobile ad hoc networks","authors":"R. Chadha","doi":"10.1109/NOMS.2004.1317806","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317806","url":null,"abstract":"Summary form only given. Tomorrow's mobile ad hoc networks emphasize adaptable and flexible networks that automatically adapt to the user's needs. Such adaptability and flexibility requires mobile networking capabilities significantly beyond what is possible with currently fielded technology. The tutorial discusses the management challenges and outlines solutions to problems that address the unique characteristics of mobile ad hoc networks. The tutorial covers the following topics: introduction to ad hoc networking; ad hoc network configuration; routing in ad hoc networks; management issues for ad hoc networks.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128257585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A dynamic configuration architecture 动态配置体系结构
F. A. Aagesen, Chutiporn Anutariya, M. Shiaa, B. Helvik, Paramai Supadulchai
Network-based services have, for more than a decade been, been an important research topic. A demand has arisen for a platform with functionalities beyond existing solutions. The paper develops a formal framework for dynamic configuration and reconfiguration of services in TAPAS - telematics architecture for plug-and-play systems (see http://tapas.item.ntnu.no). It provides representation, computation and reasoning mechanisms for semantic description and matching of required and offered capabilities and status which are required by a particular service system. It employs CIM and recently developed languages for the semantic Web in order to provide a mechanism for human-readable and machine-comprehensible descriptions of status, capabilities, system (re)configuration plans as well as exchanging messages. It also exploits XML declarative description (XDD) theory to unify such various languages seamlessly into a single uniform formalism. It permits formal definitions of application-specific configuration requirements and constraints as well as reconfiguration policies. Reasoning about these definitions and the available capabilities/status of nodes in the system yields appropriate (re)configuration plans for the composition of new services and for adaptation of current services.
十多年来,基于网络的服务一直是一个重要的研究课题。对具有超越现有解决方案功能的平台的需求已经出现。本文开发了一个正式框架,用于即插即用系统的TAPAS -远程信息处理体系结构中的动态配置和服务重新配置(参见http://tapas.item.ntnu.no)。它为特定服务系统所需和提供的功能和状态的语义描述和匹配提供了表示、计算和推理机制。它为语义Web使用CIM和最近开发的语言,以便为状态、功能、系统(重新)配置计划以及交换消息的人类可读和机器可理解的描述提供一种机制。它还利用XML声明性描述(XDD)理论将这些不同的语言无缝地统一到一个统一的形式体系中。它允许对特定于应用程序的配置需求和约束以及重新配置策略进行正式定义。对这些定义和系统中节点的可用功能/状态进行推理,可以为新服务的组合和当前服务的适应生成适当的(重新)配置计划。
{"title":"A dynamic configuration architecture","authors":"F. A. Aagesen, Chutiporn Anutariya, M. Shiaa, B. Helvik, Paramai Supadulchai","doi":"10.1109/NOMS.2004.1317786","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317786","url":null,"abstract":"Network-based services have, for more than a decade been, been an important research topic. A demand has arisen for a platform with functionalities beyond existing solutions. The paper develops a formal framework for dynamic configuration and reconfiguration of services in TAPAS - telematics architecture for plug-and-play systems (see http://tapas.item.ntnu.no). It provides representation, computation and reasoning mechanisms for semantic description and matching of required and offered capabilities and status which are required by a particular service system. It employs CIM and recently developed languages for the semantic Web in order to provide a mechanism for human-readable and machine-comprehensible descriptions of status, capabilities, system (re)configuration plans as well as exchanging messages. It also exploits XML declarative description (XDD) theory to unify such various languages seamlessly into a single uniform formalism. It permits formal definitions of application-specific configuration requirements and constraints as well as reconfiguration policies. Reasoning about these definitions and the available capabilities/status of nodes in the system yields appropriate (re)configuration plans for the composition of new services and for adaptation of current services.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133001730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
In-line service measurements: an IPv6-based framework for traffic evaluation and network operations 在线业务度量:基于ipv6的流量评估和网络运营框架
D. Pezaros, D. Hutchison, J. Sventek, Francisco J. García, R. Gardner
The ability to measure, monitor and control the service quality experienced by network traffic is becoming increasingly important as multiple traffic types are aggregated onto IP networks. Assessing the real-time performance of the application flows is an essential requirement for network operations and service management, as well as for identifying how the different traffic types and transports interact and behave, when they are carried over the end-to-end Internet infrastructure. This paper introduces a novel measurement technique for assessing the performance of IPv6 network flows. By exploiting IPv6 extension headers, measurement triggers and the instantaneous measurement indications are carried in the same packets as the payload data itself. providing a high level of probability that the behaviour of the real user traffic flows is being observed. The measurement mechanism is applied at the network layer and provides for a generic technique able to measure any type of traffic without depending on particular transports or on specific measurement architectures. A prototype implementation of this technique is also described and evaluated by measuring performance properties of application flows over different-capacity IPv6 environments. End-to-end delay and jitter of video streams have been measured, as well as the goodput for services operating on top of reliable transport. This measurement technique can be the basis for low-overhead, scalable, transparent and reliable measurement of individual and aggregate network flows, and can be dynamically deployed where and when required in a multi-service IP environment.
随着多种流量类型聚合到IP网络上,测量、监控和控制网络流量所经历的服务质量的能力变得越来越重要。评估应用程序流的实时性能是网络操作和服务管理的基本要求,也是确定不同的流量类型和传输在端到端Internet基础设施上传输时如何交互和行为的基本要求。本文介绍了一种评估IPv6网络流量性能的新型测量技术。通过利用IPv6扩展报头,测量触发器和瞬时测量指示在与有效载荷数据本身相同的数据包中携带。提供一个高水平的概率,真实用户流量的行为被观察到。测量机制应用于网络层,并提供了一种通用技术,能够测量任何类型的流量,而不依赖于特定的传输或特定的测量体系结构。还描述了该技术的原型实现,并通过测量不同容量IPv6环境上应用程序流的性能属性来评估该技术。对视频流的端到端延迟和抖动进行了测量,以及在可靠传输的基础上运行的服务的好处。这种测量技术可以作为低开销、可扩展、透明和可靠地测量单个和聚合网络流的基础,并且可以在需要时在多服务IP环境中动态部署。
{"title":"In-line service measurements: an IPv6-based framework for traffic evaluation and network operations","authors":"D. Pezaros, D. Hutchison, J. Sventek, Francisco J. García, R. Gardner","doi":"10.1109/NOMS.2004.1317736","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317736","url":null,"abstract":"The ability to measure, monitor and control the service quality experienced by network traffic is becoming increasingly important as multiple traffic types are aggregated onto IP networks. Assessing the real-time performance of the application flows is an essential requirement for network operations and service management, as well as for identifying how the different traffic types and transports interact and behave, when they are carried over the end-to-end Internet infrastructure. This paper introduces a novel measurement technique for assessing the performance of IPv6 network flows. By exploiting IPv6 extension headers, measurement triggers and the instantaneous measurement indications are carried in the same packets as the payload data itself. providing a high level of probability that the behaviour of the real user traffic flows is being observed. The measurement mechanism is applied at the network layer and provides for a generic technique able to measure any type of traffic without depending on particular transports or on specific measurement architectures. A prototype implementation of this technique is also described and evaluated by measuring performance properties of application flows over different-capacity IPv6 environments. End-to-end delay and jitter of video streams have been measured, as well as the goodput for services operating on top of reliable transport. This measurement technique can be the basis for low-overhead, scalable, transparent and reliable measurement of individual and aggregate network flows, and can be dynamically deployed where and when required in a multi-service IP environment.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127951668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Rethinking manageability - advances and emerging paradigm shifts in managing intelligent IP networks 重新思考可管理性——管理智能IP网络的进步和新兴范式转变
A. Clemm, G. Lin
Summary form only given. This tutorial presents a view of the IP network management problem from the perspective of the network itself. It focuses on how to address enhanced manageability requirements in the network infrastructure. This includes what can and should be instrumented inside a network element, and what can and should be instrumented with a scope that goes beyond the individual network element to result in more general "manageability services" provided by the network. We discuss the relevance of manageability as a business driver and provide an in-depth analysis of the various factors that contribute to manageability. After this, techniques are presented that can be applied to enhance manageability, also in light of increased focus on applications such as on-demand services, managed services, and plug-n-play networking. We also discuss the role of certain technologies such as XML and Netflow in the emergence of a new generation of management interfaces. Finally, scenarios are used to illustrate how the resulting advances in manageability facilitate not only the development of management applications, but ultimately result in networks that are more autonomous and "self managing", and less complex and costly to operate than the norm today.
只提供摘要形式。本教程从网络本身的角度介绍了IP网络管理问题。它侧重于如何解决网络基础设施中增强的可管理性需求。这包括可以和应该在网络元素中检测哪些内容,以及可以和应该在超出单个网络元素的范围内检测哪些内容,从而产生由网络提供的更通用的“可管理性服务”。我们将讨论可管理性作为业务驱动程序的相关性,并对有助于可管理性的各种因素进行深入分析。在此之后,介绍了可用于增强可管理性的技术,也考虑到对按需服务、托管服务和即插即用网络等应用程序的日益关注。我们还讨论了某些技术(如XML和Netflow)在新一代管理接口出现中的作用。最后,使用场景来说明可管理性方面的进步如何不仅促进了管理应用程序的开发,而且最终导致了更加自治和“自我管理”的网络,并且比目前的规范更不复杂,操作成本更低。
{"title":"Rethinking manageability - advances and emerging paradigm shifts in managing intelligent IP networks","authors":"A. Clemm, G. Lin","doi":"10.1109/NOMS.2004.1317814","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317814","url":null,"abstract":"Summary form only given. This tutorial presents a view of the IP network management problem from the perspective of the network itself. It focuses on how to address enhanced manageability requirements in the network infrastructure. This includes what can and should be instrumented inside a network element, and what can and should be instrumented with a scope that goes beyond the individual network element to result in more general \"manageability services\" provided by the network. We discuss the relevance of manageability as a business driver and provide an in-depth analysis of the various factors that contribute to manageability. After this, techniques are presented that can be applied to enhance manageability, also in light of increased focus on applications such as on-demand services, managed services, and plug-n-play networking. We also discuss the role of certain technologies such as XML and Netflow in the emergence of a new generation of management interfaces. Finally, scenarios are used to illustrate how the resulting advances in manageability facilitate not only the development of management applications, but ultimately result in networks that are more autonomous and \"self managing\", and less complex and costly to operate than the norm today.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114191640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On building the minimum number of tunnels: an ordered-split approach to manage IPSec/VPN policies 关于建立最小数量的隧道:一种管理IPSec/VPN策略的有序分割方法
Yanyan Yang, C. Martel, S. F. Wu
Most of the current work in policy management for IPSec/VPN focuses on how to configure a single IPSec box or a pair of IPSec boxes. However, it has been shown (Fu et al. (2001)) that the local correctness of IPSec policies in every box individually does not necessarily guarantee global correctness. Therefore, it is critical to have a systematic way to analyze the security requirements globally and to generate, automatically and correctly, a set of IPSec policies to ensure the security for all the end-to-end connections. Previously (Fu et al. (2001)), two different algorithms (i.e. bundle and direct) were introduced to solve the policy generation problem in an "offline" fashion. While these two algorithms are efficient in producing globally correct policy rules, the number of output policy rules (i.e., the results themselves) is much greater than necessary. In other words, while the existing approaches can produce a solution quickly, the quality of the solution is far from optimal. In practice, this is undesirable for several reasons. For instance, "more IPSec policy rules" implies "more complicated virtual network topology". Therefore, in this paper, we focus on "how to produce a minimum set of IPSec/VPN tunnels". We formulate this problem as a special type of task-scheduling problem and develop a new method, the ordered-split approach, to produce a provably minimum set of globally correct policy rules. We have also compared the new approach with existing methods in simulation, and our results clearly demonstrate that the ordered-split approach performs significantly better.
目前,IPSec/VPN的策略管理工作主要集中在如何配置单个或一对IPSec盒子上。然而,研究表明(Fu et al.(2001)),每个盒子中IPSec策略的本地正确性并不一定保证全局正确性。因此,有一种系统的方法来全局分析安全需求,并自动正确地生成一套IPSec策略,以确保所有端到端连接的安全性是至关重要的。以前(Fu et al.(2001)),引入了两种不同的算法(即bundle和direct)以“离线”方式解决策略生成问题。虽然这两种算法在生成全局正确的策略规则方面是有效的,但输出策略规则的数量(即结果本身)远远大于所需的数量。换句话说,虽然现有的方法可以快速生成解决方案,但解决方案的质量远非最佳。在实践中,出于几个原因,这是不可取的。例如,“IPSec策略规则越多”意味着“虚拟网络拓扑结构越复杂”。因此,本文的重点是“如何生成一个最小的IPSec/VPN隧道集”。本文将此问题表述为一类特殊的任务调度问题,并提出了一种新的方法——有序分割法,来生成全局正确策略规则的可证明最小集。我们还将新方法与现有方法进行了仿真比较,结果清楚地表明,有序分割方法的性能明显更好。
{"title":"On building the minimum number of tunnels: an ordered-split approach to manage IPSec/VPN policies","authors":"Yanyan Yang, C. Martel, S. F. Wu","doi":"10.1109/NOMS.2004.1317665","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317665","url":null,"abstract":"Most of the current work in policy management for IPSec/VPN focuses on how to configure a single IPSec box or a pair of IPSec boxes. However, it has been shown (Fu et al. (2001)) that the local correctness of IPSec policies in every box individually does not necessarily guarantee global correctness. Therefore, it is critical to have a systematic way to analyze the security requirements globally and to generate, automatically and correctly, a set of IPSec policies to ensure the security for all the end-to-end connections. Previously (Fu et al. (2001)), two different algorithms (i.e. bundle and direct) were introduced to solve the policy generation problem in an \"offline\" fashion. While these two algorithms are efficient in producing globally correct policy rules, the number of output policy rules (i.e., the results themselves) is much greater than necessary. In other words, while the existing approaches can produce a solution quickly, the quality of the solution is far from optimal. In practice, this is undesirable for several reasons. For instance, \"more IPSec policy rules\" implies \"more complicated virtual network topology\". Therefore, in this paper, we focus on \"how to produce a minimum set of IPSec/VPN tunnels\". We formulate this problem as a special type of task-scheduling problem and develop a new method, the ordered-split approach, to produce a provably minimum set of globally correct policy rules. We have also compared the new approach with existing methods in simulation, and our results clearly demonstrate that the ordered-split approach performs significantly better.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120943758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Operating mobile networks through effective network inventory management 通过有效的网络库存管理来运营移动网络
E. Grosso, R. Alfano
The paper presents a technical solution for the automation of network inventory management (NIM) processes for mobile operators. The deployment of operations support systems (OSS), according to the design of an overall target systems architecture, and the reengineering of management processes supporting NIM are the core issues of the proposed solution. Common information and data models are key enabling factors for NIM processes and systems. Information modelling is also the core of standardization efforts for network and service management. Within the operating environments of telecommunication companies (telcos), running either wireline or wireless networks, NIM and the centrality of data have appeared to be key factors for enabling automation of network and service management and deploying effective OSS solutions. The theories and the results discussed have been demonstrated practically and successfully in the operating companies of the Telecom Italia Group. Software solutions for the automation of NIM processes have been deployed since the early 1980s, using early software technologies for database management and building bespoke systems, until some more recent implementations that exploit best-in-class commercial products and successful Web technologies. A practical case study is presented of a successful implementation of an OSS solution for NIM in a mobile company of the Telecom Italia Group.
本文提出了移动运营商网络库存管理(NIM)流程自动化的技术解决方案。根据总体目标系统架构的设计部署操作支持系统(OSS),以及支持NIM的管理流程的再工程是所建议的解决方案的核心问题。公共信息和数据模型是NIM流程和系统的关键启用因素。信息建模也是网络和服务管理标准化工作的核心。在运行有线或无线网络的电信公司(telcos)的运营环境中,NIM和数据中心似乎是实现网络和服务管理自动化以及部署有效OSS解决方案的关键因素。所讨论的理论和结果已经在意大利电信集团的运营公司中得到了实践和成功的验证。NIM过程自动化的软件解决方案从20世纪80年代早期就开始部署,使用早期的软件技术进行数据库管理和构建定制系统,直到最近一些利用一流商业产品和成功的Web技术的实现。本文介绍了在意大利电信集团的一家移动公司中成功实现面向NIM的OSS解决方案的实际案例研究。
{"title":"Operating mobile networks through effective network inventory management","authors":"E. Grosso, R. Alfano","doi":"10.1109/NOMS.2004.1317832","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317832","url":null,"abstract":"The paper presents a technical solution for the automation of network inventory management (NIM) processes for mobile operators. The deployment of operations support systems (OSS), according to the design of an overall target systems architecture, and the reengineering of management processes supporting NIM are the core issues of the proposed solution. Common information and data models are key enabling factors for NIM processes and systems. Information modelling is also the core of standardization efforts for network and service management. Within the operating environments of telecommunication companies (telcos), running either wireline or wireless networks, NIM and the centrality of data have appeared to be key factors for enabling automation of network and service management and deploying effective OSS solutions. The theories and the results discussed have been demonstrated practically and successfully in the operating companies of the Telecom Italia Group. Software solutions for the automation of NIM processes have been deployed since the early 1980s, using early software technologies for database management and building bespoke systems, until some more recent implementations that exploit best-in-class commercial products and successful Web technologies. A practical case study is presented of a successful implementation of an OSS solution for NIM in a mobile company of the Telecom Italia Group.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124943878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pervasive computing and management 普适计算与管理
Nikos Anerousis
Summary form only given. The vision of pervasive and ubiquitous computing was set forth in the early 90s, calling for a world of people and environments augmented with computational resources that provide access to information and services anytime, anywhere. Since then, part of this vision has been realized. The first part of this tutorial presents a comprehensive overview of pervasive computing and its evolution in the last 10 years. Particular attention is given to three areas where most research and development work has focused: natural interfaces (displays, speech, input devices), context awareness, and automated capture and access of live experiences. In addition, we explore a number of systems issues common in the development of pervasive applications, such as networking techniques for creating a pervasive communications infrastructure (especially in the presence of intermittent connectivity), middleware and operating system support, security and privacy. The second part provides an overview of the still nascent field of management of pervasive environments. We outline the challenges and present the latest work in the area: problem domains, architectures and implementations.
只提供摘要形式。普及和无处不在计算的愿景是在20世纪90年代初提出的,它要求一个由计算资源增强的人和环境的世界,提供随时随地访问信息和服务的能力。从那时起,这一愿景部分实现了。本教程的第一部分全面概述了普适计算及其在过去十年中的演变。特别关注的是大多数研究和开发工作集中的三个领域:自然界面(显示、语音、输入设备)、上下文感知以及实时体验的自动捕获和访问。此外,我们还探讨了普适应用程序开发中常见的一些系统问题,例如用于创建普适通信基础设施的网络技术(特别是在存在间歇性连接的情况下)、中间件和操作系统支持、安全性和隐私性。第二部分概述了仍然处于萌芽阶段的普适环境管理领域。我们概述了挑战并介绍了该领域的最新工作:问题域、体系结构和实现。
{"title":"Pervasive computing and management","authors":"Nikos Anerousis","doi":"10.1109/NOMS.2004.1317805","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317805","url":null,"abstract":"Summary form only given. The vision of pervasive and ubiquitous computing was set forth in the early 90s, calling for a world of people and environments augmented with computational resources that provide access to information and services anytime, anywhere. Since then, part of this vision has been realized. The first part of this tutorial presents a comprehensive overview of pervasive computing and its evolution in the last 10 years. Particular attention is given to three areas where most research and development work has focused: natural interfaces (displays, speech, input devices), context awareness, and automated capture and access of live experiences. In addition, we explore a number of systems issues common in the development of pervasive applications, such as networking techniques for creating a pervasive communications infrastructure (especially in the presence of intermittent connectivity), middleware and operating system support, security and privacy. The second part provides an overview of the still nascent field of management of pervasive environments. We outline the challenges and present the latest work in the area: problem domains, architectures and implementations.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122483611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1