Pub Date : 2004-04-23DOI: 10.1109/NOMS.2004.1317831
J. Nogueira, A. Loureiro
The management of huge, heterogeneous and highly distributed networks is a very complex task due to their low degree of integration. Such a network is that of Telemar, the largest telecommunications company of Brazil. The plant is composed of a large variety of switching equipments and transmission systems, differing not only by their vendors but also by their technology, age and way of monitoring and control. In order to solve that management problem, a distributed management platform called SIS (system for integration of supervision) was developed. This platform is fully operational and implemented in a real telecommunications plant. SIS has been evolving since the mid 1990s, when it was initially deployed. The platform was conceived to allow the management of new systems and showed to be a key factor for the company as its business focus also evolves (e.g., the management of data communication networks of other companies such as a bank, an airline company, and a large retailer). We discuss the development and use of the SIS platform, its design and main modules.
庞大、异构、高度分布的网络由于集成度低,管理起来非常复杂。巴西最大的电信公司Telemar就是这样一个网络。电厂由各种各样的交换设备和传输系统组成,不仅供应商不同,而且技术、使用年限和监控方式也不同。为了解决这一管理难题,开发了分布式管理平台SIS (system for integrated of supervision)。该平台是完全可操作的,并在一个真实的电信工厂实施。自20世纪90年代中期首次部署以来,SIS一直在发展。该平台的设想是允许管理新系统,并显示为公司的关键因素,因为其业务重点也在发展(例如,管理其他公司的数据通信网络,如银行、航空公司和大型零售商)。讨论了SIS平台的开发与使用、设计和主要模块。
{"title":"On the development and use of a distributed management platform for telecom plants","authors":"J. Nogueira, A. Loureiro","doi":"10.1109/NOMS.2004.1317831","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317831","url":null,"abstract":"The management of huge, heterogeneous and highly distributed networks is a very complex task due to their low degree of integration. Such a network is that of Telemar, the largest telecommunications company of Brazil. The plant is composed of a large variety of switching equipments and transmission systems, differing not only by their vendors but also by their technology, age and way of monitoring and control. In order to solve that management problem, a distributed management platform called SIS (system for integration of supervision) was developed. This platform is fully operational and implemented in a real telecommunications plant. SIS has been evolving since the mid 1990s, when it was initially deployed. The platform was conceived to allow the management of new systems and showed to be a key factor for the company as its business focus also evolves (e.g., the management of data communication networks of other companies such as a bank, an airline company, and a large retailer). We discuss the development and use of the SIS platform, its design and main modules.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129970451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-04-23DOI: 10.1109/NOMS.2004.1317737
T. Choi, Changhoon Kim, J. Yoon, Jeongsook Park, Byungjun Lee, Hyung-Lae Kim, Hyungseok Chung, T. Jeong
As the Internet is quickly evolving from best-effort networks to business quality networks, billing based on the precise traffic measurement becomes an important issue for Internet service providers (ISP). Billing settlement is necessary not only between ISP and customers but also between ISP. Currently, most ISP use a flat rate charging policy. Besides the degree of difficulty in deriving appropriate charging policies agreeable by a concerned party, there are substantial technical challenges to come up with a good usage-based accounting system. Usage-based accounting depending on IP packet header information only is not sufficient any more due to the highly dynamic nature of the development and the use of the Internet applications such as peer-to-peer and network games. They use port numbers dynamically and even several applications can use the same port number. Thus, more precise means of classifying them and accounting for their traffic usage are required. In this paper, we propose a high performance, adaptable, configurable, and scalable content-aware application traffic measurement and analysis system which can achieve very accurate usage-based accounting.
{"title":"Content-aware Internet application traffic measurement and analysis","authors":"T. Choi, Changhoon Kim, J. Yoon, Jeongsook Park, Byungjun Lee, Hyung-Lae Kim, Hyungseok Chung, T. Jeong","doi":"10.1109/NOMS.2004.1317737","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317737","url":null,"abstract":"As the Internet is quickly evolving from best-effort networks to business quality networks, billing based on the precise traffic measurement becomes an important issue for Internet service providers (ISP). Billing settlement is necessary not only between ISP and customers but also between ISP. Currently, most ISP use a flat rate charging policy. Besides the degree of difficulty in deriving appropriate charging policies agreeable by a concerned party, there are substantial technical challenges to come up with a good usage-based accounting system. Usage-based accounting depending on IP packet header information only is not sufficient any more due to the highly dynamic nature of the development and the use of the Internet applications such as peer-to-peer and network games. They use port numbers dynamically and even several applications can use the same port number. Thus, more precise means of classifying them and accounting for their traffic usage are required. In this paper, we propose a high performance, adaptable, configurable, and scalable content-aware application traffic measurement and analysis system which can achieve very accurate usage-based accounting.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125516563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-04-23DOI: 10.1109/NOMS.2004.1317674
S. D'Antonio, M. D'Arienzo, A. Pescapé, G. Ventre
Configuration and management activities are frequently performed both in local area and campus networks due to the intrinsic variability characterizing such networks and the innovative services provided through them. Indeed, in order to benefit from services like voice over IP and multimedia content distribution, corporate users need to configure and manage their network appropriately. Suitable strategies have to be undertaken to fulfill stringent requirements imposed by such services on the underlying "integrated" transport infrastructure. These activities are both time and money consuming since they are usually under the responsibility of network administrators and managers. We present an architecture that allows the configuration of network devices in an automatic fashion in order to facilitate traffic management and prioritization in LANs. On one hand, traffic management is optimized through the segmentation of a corporate network into multiple virtual LANs via SNMP. On the other, traffic prioritization is carried out by grouping LAN packets into separate classes associated with different priority levels in compliance with 802.1p. The segmentation process is carried out in two steps: in the first, the network segmentation into "multimedia hosts" (i.e., IP phone and multimedia PC) and "data hosts" is accomplished (as well as traffic prioritization); in the second, the segmentation task is optimized in both VLANs thanks to the utilization of a "partitioning algorithm".
{"title":"An architecture for automatic configuration of integrated networks","authors":"S. D'Antonio, M. D'Arienzo, A. Pescapé, G. Ventre","doi":"10.1109/NOMS.2004.1317674","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317674","url":null,"abstract":"Configuration and management activities are frequently performed both in local area and campus networks due to the intrinsic variability characterizing such networks and the innovative services provided through them. Indeed, in order to benefit from services like voice over IP and multimedia content distribution, corporate users need to configure and manage their network appropriately. Suitable strategies have to be undertaken to fulfill stringent requirements imposed by such services on the underlying \"integrated\" transport infrastructure. These activities are both time and money consuming since they are usually under the responsibility of network administrators and managers. We present an architecture that allows the configuration of network devices in an automatic fashion in order to facilitate traffic management and prioritization in LANs. On one hand, traffic management is optimized through the segmentation of a corporate network into multiple virtual LANs via SNMP. On the other, traffic prioritization is carried out by grouping LAN packets into separate classes associated with different priority levels in compliance with 802.1p. The segmentation process is carried out in two steps: in the first, the network segmentation into \"multimedia hosts\" (i.e., IP phone and multimedia PC) and \"data hosts\" is accomplished (as well as traffic prioritization); in the second, the segmentation task is optimized in both VLANs thanks to the utilization of a \"partitioning algorithm\".","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124866410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-04-23DOI: 10.1109/NOMS.2004.1317781
A. K. K. Wong, A. Chen, N. Paramesh, P. Ray
The existence of various network equipment vendors, such as Cisco and Nortel, introduces an additional layer of complexity to the problem of integrating heterogeneous management information models that are applied in different network domains. The problem of using a mixture of different protocols, such as SNMP (simple network management protocol) and CMIP (common management information protocol), has already been attempted and solved by previous research, New interoperability issues can arise within a single domain when network specialists are required to manage network equipments using different sets of terminologies and via different interfaces. The objective of the paper is to address ontological issues that may arise in an integrated network management application. Ontology is applied first to model the semantics of vendor specific terms, and secondly, to aid in automating the mapping between the terms, in order to create a unified application information base such that management of various brands of network equipments can be performed through a single gateway.
{"title":"Ontology mapping for network management systems","authors":"A. K. K. Wong, A. Chen, N. Paramesh, P. Ray","doi":"10.1109/NOMS.2004.1317781","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317781","url":null,"abstract":"The existence of various network equipment vendors, such as Cisco and Nortel, introduces an additional layer of complexity to the problem of integrating heterogeneous management information models that are applied in different network domains. The problem of using a mixture of different protocols, such as SNMP (simple network management protocol) and CMIP (common management information protocol), has already been attempted and solved by previous research, New interoperability issues can arise within a single domain when network specialists are required to manage network equipments using different sets of terminologies and via different interfaces. The objective of the paper is to address ontological issues that may arise in an integrated network management application. Ontology is applied first to model the semantics of vendor specific terms, and secondly, to aid in automating the mapping between the terms, in order to create a unified application information base such that management of various brands of network equipments can be performed through a single gateway.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129740709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-04-23DOI: 10.1109/NOMS.2004.1317765
I. Yamasaki, R. Kawamura
Future IP networks will be multi-service-class networks that provide multiple levels of quality of services (QoS). The network service provider (NSP) must manage network resources and multiple protocol label switching can be used to control logical path allocation. This paper proposes a scheme that maximizes NSP profit by controlling the service-list and path-allocation under the constraint of available network resources. We introduce a model in which the users' class choice from among the multiple classes is influenced not by the price and QoS of one class, but the prices and QoS levels of all classes, the service-list. To model the users' class choice, we adopt discrete choice analysis. We propose a functional framework that consists of user choice model function, original demand forecast function, and service-list and path-allocation determination function. We evaluate the effectiveness of the proposed method using a multiple service-class example.
{"title":"Service-list and path-allocation control for maximizing network profit in multiple service-classes networks","authors":"I. Yamasaki, R. Kawamura","doi":"10.1109/NOMS.2004.1317765","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317765","url":null,"abstract":"Future IP networks will be multi-service-class networks that provide multiple levels of quality of services (QoS). The network service provider (NSP) must manage network resources and multiple protocol label switching can be used to control logical path allocation. This paper proposes a scheme that maximizes NSP profit by controlling the service-list and path-allocation under the constraint of available network resources. We introduce a model in which the users' class choice from among the multiple classes is influenced not by the price and QoS of one class, but the prices and QoS levels of all classes, the service-list. To model the users' class choice, we adopt discrete choice analysis. We propose a functional framework that consists of user choice model function, original demand forecast function, and service-list and path-allocation determination function. We evaluate the effectiveness of the proposed method using a multiple service-class example.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129827190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-04-23DOI: 10.1109/NOMS.2004.1317747
Myung-Sup Kim, Hun-Jeong Kang, Seong-Cheol Hong, Seung-Hwa Chung, J. W. Hong
One recent trend in network security attacks is an increasing number of indirect attacks which influence network traffic negatively, instead of directly entering a system and damaging it. In future, damages from this type of attack are expected to become more serious. In addition, the bandwidth consumption by these attacks influences the entire network performance. This paper presents an abnormal network traffic detecting method and a system prototype. By aggregating packets that belong to the identical flow, we can reduce processing overhead in the system. We suggest a detecting algorithm using changes in traffic patterns that appear during attacks. This algorithm can detect even mutant attacks that use a new port number or changed payload, while signature-based systems are not capable of detecting these types of attacks. Furthermore, the proposed algorithm can identify attacks that cannot be detected by examining only single packet information.
{"title":"A flow-based method for abnormal network traffic detection","authors":"Myung-Sup Kim, Hun-Jeong Kang, Seong-Cheol Hong, Seung-Hwa Chung, J. W. Hong","doi":"10.1109/NOMS.2004.1317747","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317747","url":null,"abstract":"One recent trend in network security attacks is an increasing number of indirect attacks which influence network traffic negatively, instead of directly entering a system and damaging it. In future, damages from this type of attack are expected to become more serious. In addition, the bandwidth consumption by these attacks influences the entire network performance. This paper presents an abnormal network traffic detecting method and a system prototype. By aggregating packets that belong to the identical flow, we can reduce processing overhead in the system. We suggest a detecting algorithm using changes in traffic patterns that appear during attacks. This algorithm can detect even mutant attacks that use a new port number or changed payload, while signature-based systems are not capable of detecting these types of attacks. Furthermore, the proposed algorithm can identify attacks that cannot be detected by examining only single packet information.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123313841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-04-23DOI: 10.1109/NOMS.2004.1317646
Ruibing Hao, David Lee, Juntao Ma, Jiahai Yang
For network fault management, we present a new technique that is based on on-line monitoring of networks with link state routing protocols, such as OSPF (open shortest path first) and integrated IS-IS. Our approach employs an agent that monitors the on-line information of the network link state database, analyzes the events generated by network faults for event correlation, and detects and localizes the faults. We apply our method to a real network topology with various types of network faults. Experimental results show that our approach can detect and localize the faults in a timely manner, yet without disrupting normal network operations.
{"title":"Fault management for networks with link state routing protocols","authors":"Ruibing Hao, David Lee, Juntao Ma, Jiahai Yang","doi":"10.1109/NOMS.2004.1317646","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317646","url":null,"abstract":"For network fault management, we present a new technique that is based on on-line monitoring of networks with link state routing protocols, such as OSPF (open shortest path first) and integrated IS-IS. Our approach employs an agent that monitors the on-line information of the network link state database, analyzes the events generated by network faults for event correlation, and detects and localizes the faults. We apply our method to a real network topology with various types of network faults. Experimental results show that our approach can detect and localize the faults in a timely manner, yet without disrupting normal network operations.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126454638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-04-23DOI: 10.1109/NOMS.2004.1317639
L. Lymberopoulos, Emil C. Lupu, M. Sloman
Policies are often used to define management strategies for networks, storage services or applications. Validation determines whether the policy implementation is feasible for the specific environment to which it applies and requires checking that the policy is consistent with the functional or resource constraints within the target environment. For example, do the policies assume functionality or specific operations which do not exist in target routers, or bandwidth in excess of the capacity of data links? Where possible, static checking should be done prior to policy deployment in order to detect invalid policies at design time, but there are some policies, related to resource allocation, that depend on the current state of the system, and require policy constraints that must be checked dynamically at execution time. We show how PONDER policies can be implemented and validated for differentiated services (DiffServ) by using CIM (Common Information Model) as the modelling framework for network resources, as this is device independent. We describe a CIM DiffServ-metrics sub-model extension of the CIM Network sub-model which represents DiffServ traffic statistics and a Linux driver which translates CIM classes and variables to Linux traffic control classes and variables respectively.
{"title":"PONDER policy implementation and validation in a CIM and differentiated services framework","authors":"L. Lymberopoulos, Emil C. Lupu, M. Sloman","doi":"10.1109/NOMS.2004.1317639","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317639","url":null,"abstract":"Policies are often used to define management strategies for networks, storage services or applications. Validation determines whether the policy implementation is feasible for the specific environment to which it applies and requires checking that the policy is consistent with the functional or resource constraints within the target environment. For example, do the policies assume functionality or specific operations which do not exist in target routers, or bandwidth in excess of the capacity of data links? Where possible, static checking should be done prior to policy deployment in order to detect invalid policies at design time, but there are some policies, related to resource allocation, that depend on the current state of the system, and require policy constraints that must be checked dynamically at execution time. We show how PONDER policies can be implemented and validated for differentiated services (DiffServ) by using CIM (Common Information Model) as the modelling framework for network resources, as this is device independent. We describe a CIM DiffServ-metrics sub-model extension of the CIM Network sub-model which represents DiffServ traffic statistics and a Linux driver which translates CIM classes and variables to Linux traffic control classes and variables respectively.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123878722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-04-23DOI: 10.1109/NOMS.2004.1317773
T. Truong, O. Cherkaoui, H. Elbiaze, N. Rico, E. Aboulhamid
There is a growing need for e2e lightpaths for high volume data transferring applications such as GridFTP and SAN. They wish to dynamically deploy lightpaths over multiple management domains. Research, sponsored by Canarie Incorporated, is underway to enable "customer-empowered networks" and to experiment them with the Canadian research network CA*Net4. New signaling and control approaches using Web services have been proposed. One difficulty is that each domain must retain the control of their optical network infrastructure and ensure proper allocation of optical resources. Hence, it is important that the signaling takes into account the management constraints imposed by the different domains. This paper presents a policy-based approach for user-controlled lightpath provisioning. The work builds on the research around the new signaling approaches for realizing customer-empowered networks. We present an architecture based on Web Services allowing users or Grid applications to establish e2e lightpaths over multiple autonomous systems. To tackle the problem of admission control and to address the resource allocation issue, we developed policy restricted signaling which allows customers to reserve lightpaths over multiple domains while ensuring that management rules of each domain are enforced. The signaling has been implemented and the experiment on a small network composed of Cisco equipment proves the viability of our approach.
{"title":"A policy-based approach for user controlled lightpath provisioning","authors":"T. Truong, O. Cherkaoui, H. Elbiaze, N. Rico, E. Aboulhamid","doi":"10.1109/NOMS.2004.1317773","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317773","url":null,"abstract":"There is a growing need for e2e lightpaths for high volume data transferring applications such as GridFTP and SAN. They wish to dynamically deploy lightpaths over multiple management domains. Research, sponsored by Canarie Incorporated, is underway to enable \"customer-empowered networks\" and to experiment them with the Canadian research network CA*Net4. New signaling and control approaches using Web services have been proposed. One difficulty is that each domain must retain the control of their optical network infrastructure and ensure proper allocation of optical resources. Hence, it is important that the signaling takes into account the management constraints imposed by the different domains. This paper presents a policy-based approach for user-controlled lightpath provisioning. The work builds on the research around the new signaling approaches for realizing customer-empowered networks. We present an architecture based on Web Services allowing users or Grid applications to establish e2e lightpaths over multiple autonomous systems. To tackle the problem of admission control and to address the resource allocation issue, we developed policy restricted signaling which allows customers to reserve lightpaths over multiple domains while ensuring that management rules of each domain are enforced. The signaling has been implemented and the experiment on a small network composed of Cisco equipment proves the viability of our approach.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127435543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-04-23DOI: 10.1109/NOMS.2004.1317766
M. Salle, C. Bartolini
Companies are increasingly seeking to manage their IT infrastructure in light of their business objectives. To address this need, we introduce management by contract (MbC) as a new paradigm for IT management. We propose a way of formalizing and analyzing contractual relationships in order to better inform IT-related decisions. In this paper, we present the information model that underpins MbC and describe our contract-based analysis algorithm.
{"title":"Management by contract","authors":"M. Salle, C. Bartolini","doi":"10.1109/NOMS.2004.1317766","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317766","url":null,"abstract":"Companies are increasingly seeking to manage their IT infrastructure in light of their business objectives. To address this need, we introduce management by contract (MbC) as a new paradigm for IT management. We propose a way of formalizing and analyzing contractual relationships in order to better inform IT-related decisions. In this paper, we present the information model that underpins MbC and describe our contract-based analysis algorithm.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127528937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}