首页 > 最新文献

2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)最新文献

英文 中文
Performance prediction method for Web-access response time distribution using formula 基于公式的web访问响应时间分布性能预测方法
M. Miyagi, K. Ohkubo, Mikio Kataoka, S. Yoshizawa
Since there are many causes that can affect Web response time, it is difficult to predict. NetForecast Inc. has proposed a formula to calculate the response time of an application over the TCP/IP layer. This paper proposes a method to generate a probability function for the response time by using NetForecast's formula. This calculation method uses two input parameters: the file-size cumulative distribution function (CDF) and the delay probability density function (PDF). In the formula, the data sampled from the file-size CDF is input as the payload-length parameter, and the data sampled from the delay PDF is input as the round-trip delay parameter. Processing these parameters using the performance prediction method, we can generate the response-time CDF.
由于有许多原因会影响Web响应时间,因此很难预测。NetForecast公司提出了一个计算TCP/IP层上应用程序响应时间的公式。本文提出了一种利用NetForecast公式生成响应时间概率函数的方法。该计算方法使用两个输入参数:文件大小累积分布函数(CDF)和延迟概率密度函数(PDF)。在公式中,从文件大小的CDF中采样的数据作为有效载荷长度参数输入,从延迟PDF中采样的数据作为往返延迟参数输入。利用性能预测方法对这些参数进行处理,可以生成响应时间CDF。
{"title":"Performance prediction method for Web-access response time distribution using formula","authors":"M. Miyagi, K. Ohkubo, Mikio Kataoka, S. Yoshizawa","doi":"10.1109/NOMS.2004.1317792","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317792","url":null,"abstract":"Since there are many causes that can affect Web response time, it is difficult to predict. NetForecast Inc. has proposed a formula to calculate the response time of an application over the TCP/IP layer. This paper proposes a method to generate a probability function for the response time by using NetForecast's formula. This calculation method uses two input parameters: the file-size cumulative distribution function (CDF) and the delay probability density function (PDF). In the formula, the data sampled from the file-size CDF is input as the payload-length parameter, and the data sampled from the delay PDF is input as the round-trip delay parameter. Processing these parameters using the performance prediction method, we can generate the response-time CDF.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"608 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116465173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Policy management for network-based intrusion detection and prevention 基于网络的入侵检测和防御策略管理
Yao Chen, Yanyan Yang
Intrusion detection and prevention systems are becoming an essential part of network infrastructure. They provide the ability to detect intrusion signatures or discover abnormal behaviors, and thus trigger actions. The actions are performed to preempt ongoing attacks as well as to prevent future intrusions. In the past, intrusion detection technology is mainly deployed as sensors that passively monitor traffic to detect symptoms that indicate attacks or their prelude. However, recent Internet worms and distributed denial-of-service attacks have shown that such passive detection is not timely enough in coping with network-based attacks. Thus, the recent trend is to integrate detection and prevention technologies into security firewalls, and deploy the technologies as active components in the network infrastructure. This poses a new challenge for network operation and policy management. The objective of this paper is to provide a framework for managing related policies in an enterprise-networking environment. Specifically, we propose a framework called attack-response matrix (ARM), to integrate intrusion analysis with traffic enforcement for security purposes. ARM describes the mapping from intrusion types to traffic enforcement actions. It allows policies to dictate what actions to take on what types or stages of attacks. It is intuitive, and introduces a paradigm shift from flat detection rules to a structural representation that better describes an intrusion prevention system (IPS). It can be integrated with the framework of policy-based management, using policy decision points (i.e. PDP) and policy enforcement points (i.e. PEP), to configure, enforce, update and monitor intrusion prevention devices in the network. In the paper, we also point out related research issues, such as the chaining of prevention actions and the self-correction of traffic enforcement policies.
入侵检测和防御系统正在成为网络基础设施的重要组成部分。它们提供检测入侵签名或发现异常行为的能力,从而触发操作。执行这些操作是为了先发制人地阻止正在进行的攻击,并防止未来的入侵。过去,入侵检测技术主要以传感器的形式部署,被动监控流量,检测攻击的征兆或前奏。然而,最近的互联网蠕虫和分布式拒绝服务攻击表明,这种被动检测不足以及时应对基于网络的攻击。因此,将检测和预防技术集成到安全防火墙中,并作为活动组件部署在网络基础设施中是当前的趋势。这对网络运营和策略管理提出了新的挑战。本文的目的是为在企业网络环境中管理相关策略提供一个框架。具体来说,我们提出了一个称为攻击响应矩阵(ARM)的框架,将入侵分析与流量强制集成在一起,以达到安全目的。ARM描述了从入侵类型到流量强制操作的映射。它允许策略规定针对什么类型或阶段的攻击采取什么行动。它是直观的,并引入了从平面检测规则到更好地描述入侵防御系统(IPS)的结构表示的范式转换。它可以与基于策略的管理框架集成,使用策略决策点(即PDP)和策略实施点(即PEP)对网络中的入侵防御设备进行配置、实施、更新和监控。本文还指出了预防行为的连锁和交通执法政策的自我纠正等相关研究问题。
{"title":"Policy management for network-based intrusion detection and prevention","authors":"Yao Chen, Yanyan Yang","doi":"10.1109/NOMS.2004.1317855","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317855","url":null,"abstract":"Intrusion detection and prevention systems are becoming an essential part of network infrastructure. They provide the ability to detect intrusion signatures or discover abnormal behaviors, and thus trigger actions. The actions are performed to preempt ongoing attacks as well as to prevent future intrusions. In the past, intrusion detection technology is mainly deployed as sensors that passively monitor traffic to detect symptoms that indicate attacks or their prelude. However, recent Internet worms and distributed denial-of-service attacks have shown that such passive detection is not timely enough in coping with network-based attacks. Thus, the recent trend is to integrate detection and prevention technologies into security firewalls, and deploy the technologies as active components in the network infrastructure. This poses a new challenge for network operation and policy management. The objective of this paper is to provide a framework for managing related policies in an enterprise-networking environment. Specifically, we propose a framework called attack-response matrix (ARM), to integrate intrusion analysis with traffic enforcement for security purposes. ARM describes the mapping from intrusion types to traffic enforcement actions. It allows policies to dictate what actions to take on what types or stages of attacks. It is intuitive, and introduces a paradigm shift from flat detection rules to a structural representation that better describes an intrusion prevention system (IPS). It can be integrated with the framework of policy-based management, using policy decision points (i.e. PDP) and policy enforcement points (i.e. PEP), to configure, enforce, update and monitor intrusion prevention devices in the network. In the paper, we also point out related research issues, such as the chaining of prevention actions and the self-correction of traffic enforcement policies.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116641188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
A hierarchical restoration scheme with dynamic adjustment of restoration scope in an MPLS network 一种在MPLS网络中动态调整恢复范围的分层恢复方案
D. Hong, C. Hong, Dong-Sik Yun
The paper proposes a hierarchical restoration scheme that can be applied to the restoration of working label switched paths (LSPs) and pre-provisioned backup LSPs. Our hierarchical restoration scheme is composed of two subsequent algorithms, one to determine the reasonable restoration scope (RS) and the other to compute an optimal alternative path that avoids the fault location. The first algorithm for dynamic RS determination increases the restoration speed by minimizing the complexity of the network topology for restoration as soon as possible. By increasing the reusability of the existing path, we can minimize the length of the new alternative path. In addition, the newly proposed concept of the hierarchical RS extension minimizes the probability of restoration failure by dynamically widening the restoration scope until the RS is equal to the whole network topology. Through simulation, we evaluate the performance of our restoration scheme and existing protection schemes (Huang, C. et al., 2000; Haskin, D. and Krishnan, R., 2000) in terms of the restoration speed, packet loss, network resource utilization, and resource reusability of the existing working LSP.
本文提出了一种分层恢复方案,可用于恢复工作标签交换路径(lsp)和预发放的备份lsp。我们的分层恢复方案由两个后续算法组成,一个是确定合理的恢复范围(RS),另一个是计算避免故障定位的最优替代路径。第一种动态RS确定算法通过最小化网络拓扑的复杂性来提高恢复速度,以便尽快恢复。通过增加现有路径的可重用性,我们可以最小化新的备选路径的长度。此外,新提出的分层RS扩展概念通过动态扩大恢复范围,使恢复失败的概率最小化,直到RS等于整个网络拓扑。通过模拟,我们评估了我们的修复方案和现有保护方案的性能(Huang, C. et al., 2000;Haskin, D.和Krishnan, R., 2000)在恢复速度、丢包、网络资源利用率和现有工作LSP的资源可重用性方面进行了研究。
{"title":"A hierarchical restoration scheme with dynamic adjustment of restoration scope in an MPLS network","authors":"D. Hong, C. Hong, Dong-Sik Yun","doi":"10.1109/NOMS.2004.1317656","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317656","url":null,"abstract":"The paper proposes a hierarchical restoration scheme that can be applied to the restoration of working label switched paths (LSPs) and pre-provisioned backup LSPs. Our hierarchical restoration scheme is composed of two subsequent algorithms, one to determine the reasonable restoration scope (RS) and the other to compute an optimal alternative path that avoids the fault location. The first algorithm for dynamic RS determination increases the restoration speed by minimizing the complexity of the network topology for restoration as soon as possible. By increasing the reusability of the existing path, we can minimize the length of the new alternative path. In addition, the newly proposed concept of the hierarchical RS extension minimizes the probability of restoration failure by dynamically widening the restoration scope until the RS is equal to the whole network topology. Through simulation, we evaluate the performance of our restoration scheme and existing protection schemes (Huang, C. et al., 2000; Haskin, D. and Krishnan, R., 2000) in terms of the restoration speed, packet loss, network resource utilization, and resource reusability of the existing working LSP.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121181151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A service component-based accounting and charging architecture to support interim mechanisms across multiple domains 基于服务组件的计费和收费体系结构,支持跨多个域的临时机制
M. V. Le, B. Beijnum, G. Huitema
Today, telematics services are often compositions of different chargeable service components offered by different service providers. To enhance component-based accounting and charging, the service composition information is used to match with the corresponding charging structure of a service session. This enables the sharing of revenues among the service providers, and calculation of the total cost for the end-user. When multiple independent service providers are involved, it is a great challenge to apply interim accounting and charging during a service session in order to minimize financial risks between business partners. Another interesting development is the trend towards outsourcing accounting and charging processes to specialized business partners. This requires a decoupling between provisioning and accounting and charging processes. In this paper, we propose a comprehensive component-based accounting and charging architecture to support service session provisioning across multiple domains. The architecture, modeled in UML, incorporates an interim accounting and charging mechanism to enable the processing and exchange of accounting information needed to update intermediate charges for separate service components and the user's credit, even during the service provisioning phase.
今天,远程信息处理服务通常由不同的服务提供商提供的不同收费服务组成。为了增强基于组件的计费和收费,使用服务组合信息与服务会话的相应收费结构进行匹配。这样就可以在服务提供商之间分享收入,并计算最终用户的总成本。当涉及多个独立的服务提供商时,为了尽量减少业务伙伴之间的财务风险,在服务期间应用临时会计和收费是一个很大的挑战。另一个有趣的发展趋势是将会计和收费流程外包给专门的业务合作伙伴。这需要在供应、会计和收费流程之间进行解耦。在本文中,我们提出了一个全面的基于组件的计费和收费体系结构,以支持跨多个域的服务会话供应。在UML中建模的体系结构包含了一个临时会计和收费机制,以支持处理和交换会计信息,以便更新独立服务组件和用户信用的中间费用,甚至在服务供应阶段也是如此。
{"title":"A service component-based accounting and charging architecture to support interim mechanisms across multiple domains","authors":"M. V. Le, B. Beijnum, G. Huitema","doi":"10.1109/NOMS.2004.1317742","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317742","url":null,"abstract":"Today, telematics services are often compositions of different chargeable service components offered by different service providers. To enhance component-based accounting and charging, the service composition information is used to match with the corresponding charging structure of a service session. This enables the sharing of revenues among the service providers, and calculation of the total cost for the end-user. When multiple independent service providers are involved, it is a great challenge to apply interim accounting and charging during a service session in order to minimize financial risks between business partners. Another interesting development is the trend towards outsourcing accounting and charging processes to specialized business partners. This requires a decoupling between provisioning and accounting and charging processes. In this paper, we propose a comprehensive component-based accounting and charging architecture to support service session provisioning across multiple domains. The architecture, modeled in UML, incorporates an interim accounting and charging mechanism to enable the processing and exchange of accounting information needed to update intermediate charges for separate service components and the user's credit, even during the service provisioning phase.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"541 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129904291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Link-Rank: a graphical tool for capturing BGP routing dynamics Link-Rank:捕获BGP路由动态的图形工具
Mohit Lad, Lixia Zhang, D. Massey
Failures at the BGP level can have significant impact on the overall Internet. Understanding the behavior of BGP is thus both an important practical challenge and an interesting research problem. To understand the true dynamics, and help interpret the multiple gigabytes of BGP log data, we have developed the "Link-Rank" graphical toolset. Link-Rank weighs the links between autonomous systems by the number of routing prefixes going through each link. Tracing these graphs over time results in a directed graph that shows the weight changes of the logical inter-AS links. From this graph one can easily visualise the complex BGP path changes and also combine views from multiple vantage points, to get a better picture of global routing dynamics. We illustrate the usefulness of Link-Rank by using it to examine BGP routing dynamics in three example cases. These examples show Link-Rank is able to help BGP analysts estimate the scope of routing changes and to reveal important routing dynamics in the presence of superfluous BGP update messages.
BGP级别的故障会对整个Internet产生重大影响。因此,了解BGP的行为既是一个重要的实践挑战,也是一个有趣的研究问题。为了理解真正的动态,并帮助解释多个gb的BGP日志数据,我们开发了“Link-Rank”图形工具集。link - rank通过每条链路上路由前缀的数量对自治系统之间的链路进行加权。随着时间的推移跟踪这些图会得到一个有向图,该图显示了逻辑as间链路的权重变化。从这个图中可以很容易地看到复杂的BGP路径变化,也可以从多个有利位置组合视图,以更好地了解全局路由动态。我们通过使用Link-Rank在三个示例案例中检查BGP路由动态来说明Link-Rank的有用性。这些例子表明Link-Rank能够帮助BGP分析人员估计路由变化的范围,并在存在多余的BGP更新消息时揭示重要的路由动态。
{"title":"Link-Rank: a graphical tool for capturing BGP routing dynamics","authors":"Mohit Lad, Lixia Zhang, D. Massey","doi":"10.1109/NOMS.2004.1317749","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317749","url":null,"abstract":"Failures at the BGP level can have significant impact on the overall Internet. Understanding the behavior of BGP is thus both an important practical challenge and an interesting research problem. To understand the true dynamics, and help interpret the multiple gigabytes of BGP log data, we have developed the \"Link-Rank\" graphical toolset. Link-Rank weighs the links between autonomous systems by the number of routing prefixes going through each link. Tracing these graphs over time results in a directed graph that shows the weight changes of the logical inter-AS links. From this graph one can easily visualise the complex BGP path changes and also combine views from multiple vantage points, to get a better picture of global routing dynamics. We illustrate the usefulness of Link-Rank by using it to examine BGP routing dynamics in three example cases. These examples show Link-Rank is able to help BGP analysts estimate the scope of routing changes and to reveal important routing dynamics in the presence of superfluous BGP update messages.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133339959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
Packet lossless fast rerouting scheme with minimized buffer delay 具有最小缓冲延迟的无损快速重路由方案
Sang-Heon Shin, Hae-Joon Shin, Young-Tak Kim
We propose a packet lossless fast rerouting scheme at a link/node fault in an MPLS (multiprotocol label switching) network with a minimized buffer delay problem at the ingress node. The proposed scheme uses a predefined, alternative LSP (label switched path) in order to restore user traffic. We propose two restoration approaches: (i) an alternative LSP is initially allocated with more bandwidth than the protected working LSP, and, after failure recovery, the allocated bandwidth of the alternative LSP is readjusted to the bandwidth of the working LSP; (ii) the length of the protected working LSP is reduced by using segment-based restoration. In the proposed approaches, there is no buffer delay problem after failure recovery at the ingress node, and the required buffer size at the ingress node is smaller than the previous approach.
提出了一种在MPLS(多协议标签交换)网络中链路/节点故障时的无损快速重路由方案,该方案在入节点具有最小化缓冲延迟问题。该方案使用预定义的备用LSP(标签交换路径)来恢复用户流量。我们提出了两种恢复方法:(i)最初为备用LSP分配比受保护的工作LSP更多的带宽,在故障恢复后,将分配给备用LSP的带宽重新调整为工作LSP的带宽;(ii)采用基于段的恢复,减少受保护工作LSP的长度。该方法不存在入口节点故障恢复后的缓冲延迟问题,且所需的入口节点缓冲区大小小于前一种方法。
{"title":"Packet lossless fast rerouting scheme with minimized buffer delay","authors":"Sang-Heon Shin, Hae-Joon Shin, Young-Tak Kim","doi":"10.1109/NOMS.2004.1317658","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317658","url":null,"abstract":"We propose a packet lossless fast rerouting scheme at a link/node fault in an MPLS (multiprotocol label switching) network with a minimized buffer delay problem at the ingress node. The proposed scheme uses a predefined, alternative LSP (label switched path) in order to restore user traffic. We propose two restoration approaches: (i) an alternative LSP is initially allocated with more bandwidth than the protected working LSP, and, after failure recovery, the allocated bandwidth of the alternative LSP is readjusted to the bandwidth of the working LSP; (ii) the length of the protected working LSP is reduced by using segment-based restoration. In the proposed approaches, there is no buffer delay problem after failure recovery at the ingress node, and the required buffer size at the ingress node is smaller than the previous approach.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133439652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design considerations for NGN softswitch-element management system NGN软交换元管理系统的设计考虑
Ki-Young Jung, Miyi Hong
A softswitch (SSW) is the core element of the NGN (next generation network) in the call control and signaling layer. The SSW-EMS (element management system) manages the SSW itself as its basic function, and serves as a mediation device between NMS (network management system) and one or more SSWs. Existing SSW-EMS products can be categorized by two models. One only cares about the SSW itself and the other takes a role of integrated EMS for SSW and gateways (GW). Other servers manage their own NGN-element product lines (namely, NGN-EMS) including AS (application server) and MS (media server). Many products belong to the latter category. Some kinds of EMS take functions from the NMS by their features, such as correlating the faults from different NGN elements. The article looks at the design of NGN softswitch-element management systems.
软交换(SSW)是下一代网络(NGN)呼叫控制和信令层的核心部件。SSW- ems (element management system)是对SSW本身进行管理的基本功能,是网管系统(NMS)与一个或多个SSW之间的中介设备。现有的SSW-EMS产品可分为两种型号。一个只关心SSW本身,另一个充当SSW和网关集成EMS (GW)的角色。其他服务器管理自己的ngn元素产品线(即NGN-EMS),包括AS(应用服务器)和MS(媒体服务器)。许多产品属于后一类。有些网管通过自身的特点来吸收网管的功能,例如将不同NGN元素的故障进行关联。介绍了NGN软交换元管理系统的设计。
{"title":"Design considerations for NGN softswitch-element management system","authors":"Ki-Young Jung, Miyi Hong","doi":"10.1109/NOMS.2004.1317794","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317794","url":null,"abstract":"A softswitch (SSW) is the core element of the NGN (next generation network) in the call control and signaling layer. The SSW-EMS (element management system) manages the SSW itself as its basic function, and serves as a mediation device between NMS (network management system) and one or more SSWs. Existing SSW-EMS products can be categorized by two models. One only cares about the SSW itself and the other takes a role of integrated EMS for SSW and gateways (GW). Other servers manage their own NGN-element product lines (namely, NGN-EMS) including AS (application server) and MS (media server). Many products belong to the latter category. Some kinds of EMS take functions from the NMS by their features, such as correlating the faults from different NGN elements. The article looks at the design of NGN softswitch-element management systems.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131620023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards self-configuration of IPv6 networks 实现IPv6网络的自配置
Joaquin Jose Silva Tobella, M. Stiemerling, M. Brunner
Self-configuration of networks is the key to reducing operational costs and enhancing usability for inexperienced users. Various network technologies already perform self-configuration. For example, Ethernet is self-configuring. Since more and more networks are based on IP, and IP is used everywhere, IP routers must get to a state where they are plug-and-play as well. Naturally, this is not true for managed backbone or multi-service networks, but a high number of small to medium size businesses and home users do not want to deal with the hassle of configuring their networks and most of them are not able to. We propose a protocol for self-configuration of IPv6 networks.
网络的自配置是降低运营成本和增强无经验用户可用性的关键。各种网络技术已经实现了自配置。例如,以太网是自配置的。由于越来越多的网络基于IP, IP无处不在,IP路由器也必须达到即插即用的状态。当然,对于托管骨干网或多业务网络来说,情况并非如此,但大量中小型企业和家庭用户不想处理配置网络的麻烦,而且大多数人也无法做到这一点。提出了一种IPv6网络自配置协议。
{"title":"Towards self-configuration of IPv6 networks","authors":"Joaquin Jose Silva Tobella, M. Stiemerling, M. Brunner","doi":"10.1109/NOMS.2004.1317787","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317787","url":null,"abstract":"Self-configuration of networks is the key to reducing operational costs and enhancing usability for inexperienced users. Various network technologies already perform self-configuration. For example, Ethernet is self-configuring. Since more and more networks are based on IP, and IP is used everywhere, IP routers must get to a state where they are plug-and-play as well. Naturally, this is not true for managed backbone or multi-service networks, but a high number of small to medium size businesses and home users do not want to deal with the hassle of configuring their networks and most of them are not able to. We propose a protocol for self-configuration of IPv6 networks.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"90 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132486287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
How can the eTOM framework help service providers in today's marketplace? eTOM框架如何帮助当今市场中的服务提供商?
D. Milham, E. Ronco
One of the most interesting and valuable initiatives of the TeleManagement Forum (http://www.tmforum.org) for Information and Communications Service Providers (ICSP), is the definition and development of the enhanced Telecom Operations Map® (eTOM) Business Process Framework [1], [2], [3]. In this paper we cover three main aspects: ○ Description of the eTOM, its background, & the recent B2B enhancements for Information and Communications Service Providers (ICSPs); ○ How the eTOM may be used, including case studies; ○ The future challenges for the eTOM Framework covering: enhancements to the eTOM to take account of the changing ICT (Information Communication and Technology) market; Impact of Next Generation Networking Technologies; and the move towards service based ICT business models. Moreover details will be provided on the changes that will be necessary as the model matures and evolves toward the use of second generation Business Process Modeling principles [4]. The eTOM was developed within TeleManagement Forum (TMF) in the Fall 2000 -Spring 2002 timeframe, and was approved by TMF in June 2002. The eTOM framework (v 3.6) was submitted to ITU-T in September 2003. This presentation has been prepared by two members of the TMF eTOM team, with the approval of the TeleManagement Forum. We would like to acknowledge that the work has been a team effort from some of the most relevant talents representing all geographic regions, service providers, system integrators, consultants, defense organizations, independent software vendors and network equipment vendors. Without such a broad range of knowledge and talent an endeavor of this complexity could not have be tackled successfully.
信息和通信服务提供商(ICSP)电信管理论坛(http://www.tmforum.org)最有趣和最有价值的举措之一是定义和开发增强型电信运营地图®(eTOM)业务流程框架[1],[2],[3]。在本文中,我们涵盖了三个主要方面:〇eTOM的描述,它的背景,以及最近对信息和通信服务提供商(icsp)的B2B增强;〇如何使用eTOM,包括个案研究;〇eTOM架构未来面临的挑战包括:加强eTOM,以适应不断变化的资讯通讯及科技市场;新一代网络技术的影响以及转向基于服务的ICT商业模式。此外,还将详细介绍随着模型的成熟和向使用第二代业务流程建模原则[4]的方向发展所必需的更改。eTOM于2000年秋季至2002年春季期间在电信管理论坛(TMF)内开发,并于2002年6月获得TMF批准。eTOM框架(v3.6)于2003年9月提交给ITU-T。本报告是由TMF eTOM小组的两名成员在电信管理论坛的批准下编写的。我们要承认,这项工作是由代表所有地理区域、服务提供商、系统集成商、顾问、国防组织、独立软件供应商和网络设备供应商的一些最相关人才的团队努力完成的。如果没有如此广泛的知识和才能,就不可能成功地解决如此复杂的问题。
{"title":"How can the eTOM framework help service providers in today's marketplace?","authors":"D. Milham, E. Ronco","doi":"10.1109/NOMS.2004.1317837","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317837","url":null,"abstract":"One of the most interesting and valuable initiatives of the TeleManagement Forum (http://www.tmforum.org) for Information and Communications Service Providers (ICSP), is the definition and development of the enhanced Telecom Operations Map® (eTOM) Business Process Framework [1], [2], [3]. In this paper we cover three main aspects: ○ Description of the eTOM, its background, & the recent B2B enhancements for Information and Communications Service Providers (ICSPs); ○ How the eTOM may be used, including case studies; ○ The future challenges for the eTOM Framework covering: enhancements to the eTOM to take account of the changing ICT (Information Communication and Technology) market; Impact of Next Generation Networking Technologies; and the move towards service based ICT business models. Moreover details will be provided on the changes that will be necessary as the model matures and evolves toward the use of second generation Business Process Modeling principles [4]. The eTOM was developed within TeleManagement Forum (TMF) in the Fall 2000 -Spring 2002 timeframe, and was approved by TMF in June 2002. The eTOM framework (v 3.6) was submitted to ITU-T in September 2003. This presentation has been prepared by two members of the TMF eTOM team, with the approval of the TeleManagement Forum. We would like to acknowledge that the work has been a team effort from some of the most relevant talents representing all geographic regions, service providers, system integrators, consultants, defense organizations, independent software vendors and network equipment vendors. Without such a broad range of knowledge and talent an endeavor of this complexity could not have be tackled successfully.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134181232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
DoumiMan for guaranteed QoS provisioning in next generation Internet DoumiMan为下一代互联网提供QoS保障
Young-Tak Kim
We propose an integrated traffic engineering and management system for DiffServ-over-MPLS services in the next generation Internet, called DoumiMan (DiffServ-over-universal-MPLS Internet Manager). Using the proposed DoumiMan for DiffServ-over-MPLS network, the Internet service provider (ISP) can easily configure Diffserv-over-MPLS traffic flows among the customer's distributed sites, and can provide guaranteed end-to-end QoS by controlling the virtual topology of MPLS tunnel LSP which are configured by MPLS traffic engineering. We explain the requirements and overall operations of the DiffServ-over-MPLS traffic engineering, the architecture of the MPLS network management system, and its detailed functions for network configuration, MPLS E-LSP establishment, performance management, fault management, and MPLS-based VPN. This paper also provides the experimental results and performance analysis of the proposed traffic engineering and management system that configured and managed a sample DiffServ-over-MPLS network with Cisco MPLS routers.
本文提出了一种针对下一代互联网中diffserver -over- mpls业务的综合流量工程与管理系统——DoumiMan (diffserver -over-universal- mpls Internet Manager)。利用本文提出的DiffServ-over-MPLS DoumiMan, ISP可以方便地在客户的分布式站点之间配置DiffServ-over-MPLS流量流,并通过控制MPLS流量工程配置的MPLS隧道LSP的虚拟拓扑,提供有保障的端到端QoS。介绍了diffserver -over-MPLS流量工程的要求和总体操作,介绍了MPLS网管系统的体系结构,以及该系统在网络配置、MPLS E-LSP建立、性能管理、故障管理和基于MPLS的VPN等方面的详细功能。本文还给出了该流量工程与管理系统的实验结果和性能分析,该系统配置和管理了一个带有Cisco MPLS路由器的DiffServ-over-MPLS网络样本。
{"title":"DoumiMan for guaranteed QoS provisioning in next generation Internet","authors":"Young-Tak Kim","doi":"10.1109/NOMS.2004.1317777","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317777","url":null,"abstract":"We propose an integrated traffic engineering and management system for DiffServ-over-MPLS services in the next generation Internet, called DoumiMan (DiffServ-over-universal-MPLS Internet Manager). Using the proposed DoumiMan for DiffServ-over-MPLS network, the Internet service provider (ISP) can easily configure Diffserv-over-MPLS traffic flows among the customer's distributed sites, and can provide guaranteed end-to-end QoS by controlling the virtual topology of MPLS tunnel LSP which are configured by MPLS traffic engineering. We explain the requirements and overall operations of the DiffServ-over-MPLS traffic engineering, the architecture of the MPLS network management system, and its detailed functions for network configuration, MPLS E-LSP establishment, performance management, fault management, and MPLS-based VPN. This paper also provides the experimental results and performance analysis of the proposed traffic engineering and management system that configured and managed a sample DiffServ-over-MPLS network with Cisco MPLS routers.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129842372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1