首页 > 最新文献

2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)最新文献

英文 中文
Using application feedback in differentiated services and policies 在差异化的服务和策略中使用应用程序反馈
B. Simmons, H. Lutfiyya
Quality of service (QoS) requirements refer to non-functional, run-time requirements such as performance. Different applications have different QoS requirements and hence different resource needs. Differentiated services (DiffServ) from the IETF allows the network to treat IP packets differently based on a service class. The paper describes a policy-based QoS management system that allows for a change in the treatment of packets from a specific flow using DiffServ. The decision to change is based on a number of things, including the monitoring of the application's behavior (referred to as application feedback). Corrective actions include changing the service class and/or target bandwidth. The paper provides a description of the policy-based QoS management system used and experimental results.
服务质量(QoS)需求是指非功能性的运行时需求,例如性能。不同的应用程序有不同的QoS需求,因此需要不同的资源。来自IETF的差分服务(DiffServ)允许网络根据服务类别对IP数据包进行不同的处理。本文描述了一个基于策略的QoS管理系统,该系统允许使用DiffServ对来自特定流的数据包进行更改处理。更改的决定基于许多事情,包括对应用程序行为的监视(称为应用程序反馈)。纠正措施包括更改服务类别和/或目标带宽。本文给出了基于策略的QoS管理系统的使用描述和实验结果。
{"title":"Using application feedback in differentiated services and policies","authors":"B. Simmons, H. Lutfiyya","doi":"10.1109/NOMS.2004.1317640","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317640","url":null,"abstract":"Quality of service (QoS) requirements refer to non-functional, run-time requirements such as performance. Different applications have different QoS requirements and hence different resource needs. Differentiated services (DiffServ) from the IETF allows the network to treat IP packets differently based on a service class. The paper describes a policy-based QoS management system that allows for a change in the treatment of packets from a specific flow using DiffServ. The decision to change is based on a number of things, including the monitoring of the application's behavior (referred to as application feedback). Corrective actions include changing the service class and/or target bandwidth. The paper provides a description of the policy-based QoS management system used and experimental results.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114829673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Discovering IPv6-in-IPv4 tunnels in the Internet 发现Internet中的IPv6-in-IPv4隧道
L. Colitti, G. Battista, M. Patrignani
Tunnels are widely used to improve security and to expand networks without having to deploy native infrastructure, and play an important role in the migration to IPv6. In this paper we introduce a number of techniques to detect, and collect information about IPv6-in-IPv4 tunnels. We also show how a known tunnel can be used as a "vantage point" to launch third-party tunnel-discovery explorations, scaling up the discovery process. We describe our Tunneltrace tool, which implements the proposed techniques, and validate them by means of a wide experimentation on the 6bone tunneled network, on the GARR network, and through the test boxes deployed worldwide by the RIPE NCC as part of the Test Traffic Measurements Service. We assess to what extent 6bone registry information is coherent with the actual network topology, and we provide the first experimental results on the current distribution of IPv6-in-IPv4 tunnels in the Internet, showing that even "native" networks reach more than 60% of all IPv6 prefixes through tunnels.
隧道被广泛用于提高安全性和扩展网络而无需部署本地基础设施,在向IPv6迁移中发挥着重要作用。在本文中,我们介绍了一些检测和收集IPv6-in-IPv4隧道信息的技术。我们还展示了如何将已知隧道用作启动第三方隧道发现探索的“有利位置”,从而扩大发现过程。我们描述了我们的Tunneltrace工具,它实现了所提出的技术,并通过在6骨隧道网络、GARR网络上的广泛实验,以及通过RIPE NCC作为测试流量测量服务的一部分在全球部署的测试箱来验证它们。我们评估了6bone注册表信息在多大程度上与实际网络拓扑结构一致,并提供了互联网中IPv6-in- ipv4隧道当前分布的第一个实验结果,表明即使是“本地”网络也可以通过隧道到达所有IPv6前缀的60%以上。
{"title":"Discovering IPv6-in-IPv4 tunnels in the Internet","authors":"L. Colitti, G. Battista, M. Patrignani","doi":"10.1109/NOMS.2004.1317748","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317748","url":null,"abstract":"Tunnels are widely used to improve security and to expand networks without having to deploy native infrastructure, and play an important role in the migration to IPv6. In this paper we introduce a number of techniques to detect, and collect information about IPv6-in-IPv4 tunnels. We also show how a known tunnel can be used as a \"vantage point\" to launch third-party tunnel-discovery explorations, scaling up the discovery process. We describe our Tunneltrace tool, which implements the proposed techniques, and validate them by means of a wide experimentation on the 6bone tunneled network, on the GARR network, and through the test boxes deployed worldwide by the RIPE NCC as part of the Test Traffic Measurements Service. We assess to what extent 6bone registry information is coherent with the actual network topology, and we provide the first experimental results on the current distribution of IPv6-in-IPv4 tunnels in the Internet, showing that even \"native\" networks reach more than 60% of all IPv6 prefixes through tunnels.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114893242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Security performance analysis of SNMPv3 with respect to SNMPv2c SNMPv3相对于SNMPv2c的安全性能分析
A. Corrente, Luigi Tura
SNMPv3 has just become a full standard and more and more the scientific community and the market are looking for information on its performance and related new built-in authentication and privacy features. It is sure that SNMPv3 security services (authentication and privacy) require additional CPU usage, memory and message exchange which could cause consistent performance degradation. In order to understand if performance issue could be an obstacle for the wide deployment of SNMPv3 in the commercial world, a set of measurements have been done and presented in this paper. The research evaluates the impact experienced by the network appliance, due to the computational load added by the message authentication and encryption, and analyzes the variation of the protocol overhead at different security levels introduced by SNMPv3. This work shows the results of a set of performance measurements done both with SNMPv2c and SNMPv3 managers in order to acquire results with respect to processing time, number of transactions per minute, CPU usage and protocol overhead. We discovered that SNMPv3 introduces a progressive computational load as soon as it uses security function but this additional load seems still acceptable, but if the discovery process is not implemented carefully, then the extra load becomes prohibitive. This paper suggests a way to minimize the extra load introduced by the discovery process, thereby improving protocol performance.
SNMPv3刚刚成为一个完整的标准,越来越多的科学界和市场正在寻找有关它的性能和相关的新的内置认证和隐私特性的信息。可以肯定的是,SNMPv3安全服务(身份验证和隐私)需要额外的CPU使用、内存和消息交换,这可能会导致一致的性能下降。为了了解性能问题是否会成为SNMPv3在商业领域广泛部署的障碍,本文进行了一组测量。本研究评估了由于消息认证和加密所增加的计算负荷对网络设备的影响,并分析了SNMPv3引入的不同安全级别下协议开销的变化。这项工作展示了对SNMPv2c和SNMPv3管理器进行的一组性能测量的结果,以获得有关处理时间、每分钟事务数、CPU使用率和协议开销的结果。我们发现,SNMPv3一旦使用安全功能,就会引入渐进式计算负载,但这种额外的负载似乎仍然是可以接受的,但如果发现过程没有仔细实现,那么额外的负载就会变得令人望而却步。本文提出了一种最小化发现过程带来的额外负载的方法,从而提高了协议的性能。
{"title":"Security performance analysis of SNMPv3 with respect to SNMPv2c","authors":"A. Corrente, Luigi Tura","doi":"10.1109/NOMS.2004.1317760","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317760","url":null,"abstract":"SNMPv3 has just become a full standard and more and more the scientific community and the market are looking for information on its performance and related new built-in authentication and privacy features. It is sure that SNMPv3 security services (authentication and privacy) require additional CPU usage, memory and message exchange which could cause consistent performance degradation. In order to understand if performance issue could be an obstacle for the wide deployment of SNMPv3 in the commercial world, a set of measurements have been done and presented in this paper. The research evaluates the impact experienced by the network appliance, due to the computational load added by the message authentication and encryption, and analyzes the variation of the protocol overhead at different security levels introduced by SNMPv3. This work shows the results of a set of performance measurements done both with SNMPv2c and SNMPv3 managers in order to acquire results with respect to processing time, number of transactions per minute, CPU usage and protocol overhead. We discovered that SNMPv3 introduces a progressive computational load as soon as it uses security function but this additional load seems still acceptable, but if the discovery process is not implemented carefully, then the extra load becomes prohibitive. This paper suggests a way to minimize the extra load introduced by the discovery process, thereby improving protocol performance.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116684326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Peer-to-peer traffic in metro networks: analysis, modeling, and policies 城域网中的点对点流量:分析、建模和策略
T. Hamada, Kaoru Chujo, T. Chujo, Xiangying Yang
We report studies on peer-to-peer (P2P) traffic analysis, modeling, and evaluation of policies for the management P2P traffic in metropolitan networks. We conducted crawler-based measurement and analysis of P2P traffic using Gnutella. Based on the empirical parameters obtained through the measurement, known modeling techniques of P2P peers and contents, and GeoPoint, a geomapping technology, we built a P2P traffic simulator using J-Sim, a Java-based network simulation tool. The simulator is scenario-driven, allowing its user to customize network settings and service environment to examine the behavior of P2P traffic. With the P2P simulator, we were able to recreate a spatio-temporal traffic pattern characteristic to P2P services observed in August 2002. We then evaluated three different P2P traffic management policies, showing that traffic localization using a peer selection policy at super peers is possible, containing P2P traffic to the local metropolitan network as much as 40%.
本文报道了城域网络中P2P流量分析、建模和管理策略评估的相关研究。我们使用Gnutella对P2P流量进行了基于爬虫的测量和分析。基于实测得到的经验参数、已知的P2P节点和内容建模技术以及地理测绘技术geopopoint,利用基于java的网络仿真工具J-Sim构建了P2P流量模拟器。模拟器是场景驱动的,允许其用户自定义网络设置和服务环境,以检查P2P流量的行为。利用P2P模拟器,我们得以重现2002年8月观测到的P2P服务的时空流量特征。然后,我们评估了三种不同的P2P流量管理策略,表明在超级节点上使用对等选择策略的流量本地化是可能的,包含到本地城域网的P2P流量高达40%。
{"title":"Peer-to-peer traffic in metro networks: analysis, modeling, and policies","authors":"T. Hamada, Kaoru Chujo, T. Chujo, Xiangying Yang","doi":"10.1109/NOMS.2004.1317683","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317683","url":null,"abstract":"We report studies on peer-to-peer (P2P) traffic analysis, modeling, and evaluation of policies for the management P2P traffic in metropolitan networks. We conducted crawler-based measurement and analysis of P2P traffic using Gnutella. Based on the empirical parameters obtained through the measurement, known modeling techniques of P2P peers and contents, and GeoPoint, a geomapping technology, we built a P2P traffic simulator using J-Sim, a Java-based network simulation tool. The simulator is scenario-driven, allowing its user to customize network settings and service environment to examine the behavior of P2P traffic. With the P2P simulator, we were able to recreate a spatio-temporal traffic pattern characteristic to P2P services observed in August 2002. We then evaluated three different P2P traffic management policies, showing that traffic localization using a peer selection policy at super peers is possible, containing P2P traffic to the local metropolitan network as much as 40%.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123873969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Buttercup: on network-based detection of polymorphic buffer overflow vulnerabilities Buttercup:基于网络的多态缓冲区溢出漏洞检测
Archana Pasupulati, Jason Coit, K. Levitt, S. F. Wu, S. Li, J. Kuo, K. Fan
Attack polymorphism is a powerful tool for the attackers in the Internet to evade signature-based intrusion detection/prevention systems. In addition, new and faster Internet worms can be coded and launched easily by even high school students anytime against our critical infrastructures, such as DNS or update servers. We believe that polymorphic Internet worms will be developed in the future such that many of our current solutions might have a very small chance to survive. In this paper, we propose a simple solution called "Buttercup" to counter against attacks based on buffer-overflow exploits (such as CodeRed, Nimda, Slammer, and Blaster). We have implemented our idea in SNORT, and included 19 return address ranges of buffer-overflow exploits. With a suite of tests against 55 TCPdump traces, the false positive rate for our best algorithm is as low as 0.01%. This indicates that, potentially, Buttercup can drop 100% worm attack packets on the wire while only 0.01% of the good packets will be sacrificed.
攻击多态性是攻击者规避基于签名的入侵检测/防御系统的有力工具。此外,即使是高中生也可以随时对我们的关键基础设施(如DNS或更新服务器)进行编码和发射新的更快的互联网蠕虫。我们相信,未来将会开发出多态互联网蠕虫,这样我们当前的许多解决方案可能会有很小的生存机会。在本文中,我们提出了一个简单的解决方案,称为“Buttercup”,以对抗基于缓冲区溢出漏洞的攻击(如CodeRed, Nimda, Slammer和Blaster)。我们已经在SNORT中实现了我们的想法,并包含了19个缓冲区溢出漏洞的返回地址范围。通过一组针对55个TCPdump跟踪的测试,我们的最佳算法的误报率低至0.01%。这表明,Buttercup可能会在网络上丢弃100%的蠕虫攻击数据包,而只有0.01%的良好数据包会被牺牲。
{"title":"Buttercup: on network-based detection of polymorphic buffer overflow vulnerabilities","authors":"Archana Pasupulati, Jason Coit, K. Levitt, S. F. Wu, S. Li, J. Kuo, K. Fan","doi":"10.1109/NOMS.2004.1317662","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317662","url":null,"abstract":"Attack polymorphism is a powerful tool for the attackers in the Internet to evade signature-based intrusion detection/prevention systems. In addition, new and faster Internet worms can be coded and launched easily by even high school students anytime against our critical infrastructures, such as DNS or update servers. We believe that polymorphic Internet worms will be developed in the future such that many of our current solutions might have a very small chance to survive. In this paper, we propose a simple solution called \"Buttercup\" to counter against attacks based on buffer-overflow exploits (such as CodeRed, Nimda, Slammer, and Blaster). We have implemented our idea in SNORT, and included 19 return address ranges of buffer-overflow exploits. With a suite of tests against 55 TCPdump traces, the false positive rate for our best algorithm is as low as 0.01%. This indicates that, potentially, Buttercup can drop 100% worm attack packets on the wire while only 0.01% of the good packets will be sacrificed.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117198636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 69
Transaction management for sender/receiver-payment schemes in charging and accounting systems for interconnected networks 互连网络收费和会计系统中发送方/接收方支付方案的交易管理
Junseok Hwang, J. Altmann, I. T. Okumus, Praveen Aravamudham
In this paper, we present an Internet transaction management system for sender/receiver payment schemes. This system allows an arbitrary split of transaction charges between two communication partners. Using this kind of system, new business models can be implemented on the Internet. The new system provides more flexibility than existing charging schemes. Under these new business models, service providers can pick up a share of the cost for the transaction with any of their customers; offer collect-call type of services; or provide services such as the 900 services on the telephone network. This paper describes in detail the transaction management protocol (TMP), its implementation, and the transaction management service platform (TMS). The TMP specifies the protocol state diagram as well as the process of how the costs for resource usage can be allocated to communicating end-users. The TMS platform defines the architecture and the modules, simplifying the implementation of the TMP on the Internet. The TMS provides a module-based transaction management environment, carrying transaction signals such as message schema, accounting policy information, communication reference information, and end-user agreement information. In addition to this, an application of the TMS within the framework of bandwidth broker interconnection networks and a short evaluation of the proposed transaction management system are given.
在本文中,我们提出了一个针对发送方/接收方支付方案的互联网交易管理系统。该系统允许在两个通信伙伴之间任意分割交易费用。利用这种系统,可以在Internet上实现新的商业模式。新系统提供了比现有收费方案更大的灵活性。在这些新的商业模式下,服务提供商可以为与任何客户的交易收取一定的费用;提供对方付费电话类型的服务;或者提供电话网络上的900服务等服务。本文详细介绍了事务管理协议(TMP)及其实现,以及事务管理服务平台(TMS)。TMP指定了协议状态图,以及如何将资源使用成本分配给通信终端用户的过程。TMS平台定义了体系结构和模块,简化了TMP在Internet上的实现。TMS提供了一个基于模块的事务管理环境,该环境携带诸如消息模式、会计策略信息、通信引用信息和最终用户协议信息等事务信号。此外,给出了TMS在带宽代理互连网络框架中的应用,并对所提出的事务管理系统进行了简要评价。
{"title":"Transaction management for sender/receiver-payment schemes in charging and accounting systems for interconnected networks","authors":"Junseok Hwang, J. Altmann, I. T. Okumus, Praveen Aravamudham","doi":"10.1109/NOMS.2004.1317743","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317743","url":null,"abstract":"In this paper, we present an Internet transaction management system for sender/receiver payment schemes. This system allows an arbitrary split of transaction charges between two communication partners. Using this kind of system, new business models can be implemented on the Internet. The new system provides more flexibility than existing charging schemes. Under these new business models, service providers can pick up a share of the cost for the transaction with any of their customers; offer collect-call type of services; or provide services such as the 900 services on the telephone network. This paper describes in detail the transaction management protocol (TMP), its implementation, and the transaction management service platform (TMS). The TMP specifies the protocol state diagram as well as the process of how the costs for resource usage can be allocated to communicating end-users. The TMS platform defines the architecture and the modules, simplifying the implementation of the TMP on the Internet. The TMS provides a module-based transaction management environment, carrying transaction signals such as message schema, accounting policy information, communication reference information, and end-user agreement information. In addition to this, an application of the TMS within the framework of bandwidth broker interconnection networks and a short evaluation of the proposed transaction management system are given.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130742221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Implementation and bandwidth consumption evaluation of SNMP to Web services gateways SNMP到Web服务网关的实现和带宽消耗评估
R. Neisse, R. Vianna, L. Granville, M. Almeida, L. Tarouco
Web services gateways are needed to include SNMP devices into a Web services based management architecture. We propose in this paper two approaches for such gateways and evaluate these approaches in order to verify the feasibility of using Web services closer to the network devices interface. We primarily tested the bandwidth consumed by these gateways when using SOAP with HTTP, HTTPS, and a compression process. The evaluation shows that Web services gateways are especially interesting when the number of SNMP object instances retrieved is high.
需要Web服务网关将SNMP设备包含到基于Web服务的管理体系结构中。我们在本文中为这种网关提出了两种方法,并对这些方法进行了评估,以验证在更靠近网络设备接口的地方使用Web服务的可行性。我们主要测试了在使用带有HTTP、HTTPS和压缩过程的SOAP时这些网关所消耗的带宽。评估表明,当检索到的SNMP对象实例数量很高时,Web服务网关特别有趣。
{"title":"Implementation and bandwidth consumption evaluation of SNMP to Web services gateways","authors":"R. Neisse, R. Vianna, L. Granville, M. Almeida, L. Tarouco","doi":"10.1109/NOMS.2004.1317759","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317759","url":null,"abstract":"Web services gateways are needed to include SNMP devices into a Web services based management architecture. We propose in this paper two approaches for such gateways and evaluate these approaches in order to verify the feasibility of using Web services closer to the network devices interface. We primarily tested the bandwidth consumed by these gateways when using SOAP with HTTP, HTTPS, and a compression process. The evaluation shows that Web services gateways are especially interesting when the number of SNMP object instances retrieved is high.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131756376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
A management concept for automatic switched transport networks (ASTNs) 自动交换传输网络(astn)的管理概念
G. Lehr, U. Degenhardt, R. Geerdsen, G. Ricucci, U. Pauluhn, P. Cortes, J. Maierhofer
Automatic switched transport networks provide innovative functionality such as configuration of connections via signaling and routing functionality implemented in a control plane. This paper describes a management concept that has been tailored to the specific needs of this novel network technology which brings together transport network and IP-based paradigms. The concept proposed comprises a network and a network element level information model where the latter is subdivided into two representations of this model. The first representation communicates with the agent implementation and uses the concepts and terminology derived from IP/MPLS. The second representation communicates with the network level management system and talks the language of M.3100 that is the guiding principle for transport networks. This approach allows to combine the best of both paradigms and reuse existing specifications thus fostering the interoperability of future management systems for ASTN.
自动交换传输网络提供了创新的功能,例如通过在控制平面中实现的信令和路由功能来配置连接。本文描述了一种管理概念,该概念是针对这种将传输网络和基于ip的范例结合在一起的新型网络技术的特定需求量身定制的。提出的概念包括网络和网络元素级信息模型,其中后者被细分为该模型的两种表示形式。第一种表示与代理实现通信,并使用源自IP/MPLS的概念和术语。第二种表示与网络级管理系统通信,使用作为传输网络指导原则的M.3100语言。这种方法可以结合两种模式的优点,并重用现有的规范,从而促进未来ASTN管理系统的互操作性。
{"title":"A management concept for automatic switched transport networks (ASTNs)","authors":"G. Lehr, U. Degenhardt, R. Geerdsen, G. Ricucci, U. Pauluhn, P. Cortes, J. Maierhofer","doi":"10.1109/NOMS.2004.1317755","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317755","url":null,"abstract":"Automatic switched transport networks provide innovative functionality such as configuration of connections via signaling and routing functionality implemented in a control plane. This paper describes a management concept that has been tailored to the specific needs of this novel network technology which brings together transport network and IP-based paradigms. The concept proposed comprises a network and a network element level information model where the latter is subdivided into two representations of this model. The first representation communicates with the agent implementation and uses the concepts and terminology derived from IP/MPLS. The second representation communicates with the network level management system and talks the language of M.3100 that is the guiding principle for transport networks. This approach allows to combine the best of both paradigms and reuse existing specifications thus fostering the interoperability of future management systems for ASTN.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131215026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Policy transition mechanism: a new approach to multi-mode management 政策转换机制:多模式管理的新途径
T. Tonouchi, T. Igakura, Naoto Maeda, Y. Kiriha
A policy management technology is one of promising technologies for the management of networking systems, which are getting complex and difficult to manage. Conventional policy languages provide a flat policy mechanism, under which all policy rules are always active. We argue that not all policy rules should be active in all situations. Some are defined for a certain situation and others for a different situation. For example, the set of active policy rules at office hours are different from those at off-time. We propose a policy transition mechanism, which modifies active policy groups, depending on a situation. As a result, we can achieve management depending on a change in the situation while the flat policy mechanism cannot.
策略管理技术是网络系统管理的一个很有前途的技术之一,网络系统的管理变得越来越复杂和困难。传统策略语言提供了一种扁平的策略机制,在这种机制下,所有策略规则始终处于活动状态。我们认为,并非所有的政策规则都应该在所有情况下都是有效的。有些是针对特定情况定义的,有些是针对不同情况定义的。例如,办公时间的活动策略规则集与非工作时间的活动策略规则集不同。我们提出了一种策略转换机制,它可以根据情况修改活动的策略组。因此,我们可以根据情况的变化来实现管理,而扁平化的策略机制则不能。
{"title":"Policy transition mechanism: a new approach to multi-mode management","authors":"T. Tonouchi, T. Igakura, Naoto Maeda, Y. Kiriha","doi":"10.1109/NOMS.2004.1317852","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317852","url":null,"abstract":"A policy management technology is one of promising technologies for the management of networking systems, which are getting complex and difficult to manage. Conventional policy languages provide a flat policy mechanism, under which all policy rules are always active. We argue that not all policy rules should be active in all situations. Some are defined for a certain situation and others for a different situation. For example, the set of active policy rules at office hours are different from those at off-time. We propose a policy transition mechanism, which modifies active policy groups, depending on a situation. As a result, we can achieve management depending on a change in the situation while the flat policy mechanism cannot.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123465504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Approaches to building self healing systems using dependency analysis 使用依赖分析构建自我修复系统的方法
Jie Gao, G. Kar, P. Kermani
Typical distributed transaction environments are a heterogeneous collection of hardware and software resources. An example of such an environment is an electronic store front where users can launch a number of different transactions to complete one or more interactions with the system. One of the challenges in managing such an environment is to figure out the root cause of a performance or throughput problem that manifests itself at a user access point, and to take appropriate action, preferably in an automated way. Our paper addresses this problem by analyzing the dependency relationship among various software components. We also provide a theoretical insight into how a set of transactions can be generated to pinpoint the root cause of a performance problem that is manifested at the user access point.
典型的分布式事务环境是硬件和软件资源的异构集合。这种环境的一个例子是电子商店前台,用户可以启动许多不同的事务来完成与系统的一个或多个交互。管理这种环境的挑战之一是找出在用户访问点出现的性能或吞吐量问题的根本原因,并采取适当的措施,最好是采用自动化的方式。本文通过分析不同软件组件之间的依赖关系来解决这个问题。我们还提供了关于如何生成一组事务以查明在用户访问点出现的性能问题的根本原因的理论见解。
{"title":"Approaches to building self healing systems using dependency analysis","authors":"Jie Gao, G. Kar, P. Kermani","doi":"10.1109/NOMS.2004.1317649","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317649","url":null,"abstract":"Typical distributed transaction environments are a heterogeneous collection of hardware and software resources. An example of such an environment is an electronic store front where users can launch a number of different transactions to complete one or more interactions with the system. One of the challenges in managing such an environment is to figure out the root cause of a performance or throughput problem that manifests itself at a user access point, and to take appropriate action, preferably in an automated way. Our paper addresses this problem by analyzing the dependency relationship among various software components. We also provide a theoretical insight into how a set of transactions can be generated to pinpoint the root cause of a performance problem that is manifested at the user access point.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128696192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
期刊
2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1