首页 > 最新文献

2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)最新文献

英文 中文
Design considerations for NGN softswitch-element management system NGN软交换元管理系统的设计考虑
Ki-Young Jung, Miyi Hong
A softswitch (SSW) is the core element of the NGN (next generation network) in the call control and signaling layer. The SSW-EMS (element management system) manages the SSW itself as its basic function, and serves as a mediation device between NMS (network management system) and one or more SSWs. Existing SSW-EMS products can be categorized by two models. One only cares about the SSW itself and the other takes a role of integrated EMS for SSW and gateways (GW). Other servers manage their own NGN-element product lines (namely, NGN-EMS) including AS (application server) and MS (media server). Many products belong to the latter category. Some kinds of EMS take functions from the NMS by their features, such as correlating the faults from different NGN elements. The article looks at the design of NGN softswitch-element management systems.
软交换(SSW)是下一代网络(NGN)呼叫控制和信令层的核心部件。SSW- ems (element management system)是对SSW本身进行管理的基本功能,是网管系统(NMS)与一个或多个SSW之间的中介设备。现有的SSW-EMS产品可分为两种型号。一个只关心SSW本身,另一个充当SSW和网关集成EMS (GW)的角色。其他服务器管理自己的ngn元素产品线(即NGN-EMS),包括AS(应用服务器)和MS(媒体服务器)。许多产品属于后一类。有些网管通过自身的特点来吸收网管的功能,例如将不同NGN元素的故障进行关联。介绍了NGN软交换元管理系统的设计。
{"title":"Design considerations for NGN softswitch-element management system","authors":"Ki-Young Jung, Miyi Hong","doi":"10.1109/NOMS.2004.1317794","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317794","url":null,"abstract":"A softswitch (SSW) is the core element of the NGN (next generation network) in the call control and signaling layer. The SSW-EMS (element management system) manages the SSW itself as its basic function, and serves as a mediation device between NMS (network management system) and one or more SSWs. Existing SSW-EMS products can be categorized by two models. One only cares about the SSW itself and the other takes a role of integrated EMS for SSW and gateways (GW). Other servers manage their own NGN-element product lines (namely, NGN-EMS) including AS (application server) and MS (media server). Many products belong to the latter category. Some kinds of EMS take functions from the NMS by their features, such as correlating the faults from different NGN elements. The article looks at the design of NGN softswitch-element management systems.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131620023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A flow-based method for abnormal network traffic detection 一种基于流的异常网络流量检测方法
Myung-Sup Kim, Hun-Jeong Kang, Seong-Cheol Hong, Seung-Hwa Chung, J. W. Hong
One recent trend in network security attacks is an increasing number of indirect attacks which influence network traffic negatively, instead of directly entering a system and damaging it. In future, damages from this type of attack are expected to become more serious. In addition, the bandwidth consumption by these attacks influences the entire network performance. This paper presents an abnormal network traffic detecting method and a system prototype. By aggregating packets that belong to the identical flow, we can reduce processing overhead in the system. We suggest a detecting algorithm using changes in traffic patterns that appear during attacks. This algorithm can detect even mutant attacks that use a new port number or changed payload, while signature-based systems are not capable of detecting these types of attacks. Furthermore, the proposed algorithm can identify attacks that cannot be detected by examining only single packet information.
最近网络安全攻击的一个趋势是越来越多的间接攻击,这种攻击对网络流量产生负面影响,而不是直接进入系统并破坏它。今后,这类攻击造成的损失预计会更加严重。此外,这些攻击所消耗的带宽会影响整个网络的性能。本文提出了一种异常网络流量检测方法和系统原型。通过聚合属于同一流的数据包,我们可以减少系统中的处理开销。我们建议使用攻击期间出现的流量模式变化的检测算法。该算法甚至可以检测到使用新端口号或更改有效负载的突变攻击,而基于签名的系统无法检测到这些类型的攻击。此外,该算法还可以识别仅通过检查单个数据包信息无法检测到的攻击。
{"title":"A flow-based method for abnormal network traffic detection","authors":"Myung-Sup Kim, Hun-Jeong Kang, Seong-Cheol Hong, Seung-Hwa Chung, J. W. Hong","doi":"10.1109/NOMS.2004.1317747","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317747","url":null,"abstract":"One recent trend in network security attacks is an increasing number of indirect attacks which influence network traffic negatively, instead of directly entering a system and damaging it. In future, damages from this type of attack are expected to become more serious. In addition, the bandwidth consumption by these attacks influences the entire network performance. This paper presents an abnormal network traffic detecting method and a system prototype. By aggregating packets that belong to the identical flow, we can reduce processing overhead in the system. We suggest a detecting algorithm using changes in traffic patterns that appear during attacks. This algorithm can detect even mutant attacks that use a new port number or changed payload, while signature-based systems are not capable of detecting these types of attacks. Furthermore, the proposed algorithm can identify attacks that cannot be detected by examining only single packet information.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123313841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 168
An architecture for automatic configuration of integrated networks 一种用于集成网络自动配置的体系结构
S. D'Antonio, M. D'Arienzo, A. Pescapé, G. Ventre
Configuration and management activities are frequently performed both in local area and campus networks due to the intrinsic variability characterizing such networks and the innovative services provided through them. Indeed, in order to benefit from services like voice over IP and multimedia content distribution, corporate users need to configure and manage their network appropriately. Suitable strategies have to be undertaken to fulfill stringent requirements imposed by such services on the underlying "integrated" transport infrastructure. These activities are both time and money consuming since they are usually under the responsibility of network administrators and managers. We present an architecture that allows the configuration of network devices in an automatic fashion in order to facilitate traffic management and prioritization in LANs. On one hand, traffic management is optimized through the segmentation of a corporate network into multiple virtual LANs via SNMP. On the other, traffic prioritization is carried out by grouping LAN packets into separate classes associated with different priority levels in compliance with 802.1p. The segmentation process is carried out in two steps: in the first, the network segmentation into "multimedia hosts" (i.e., IP phone and multimedia PC) and "data hosts" is accomplished (as well as traffic prioritization); in the second, the segmentation task is optimized in both VLANs thanks to the utilization of a "partitioning algorithm".
配置和管理活动经常在局域网和校园网中进行,因为这些网络具有内在的可变性以及通过它们提供的创新服务。实际上,为了从IP语音和多媒体内容分发等服务中获益,企业用户需要适当地配置和管理他们的网络。必须采取适当的策略,以满足这些服务对基础的“综合”运输基础设施所提出的严格要求。这些活动既耗费时间又耗费金钱,因为它们通常由网络管理员和管理人员负责。我们提出了一种架构,允许以自动方式配置网络设备,以促进局域网中的流量管理和优先级。一方面,通过SNMP将企业网络分割成多个虚拟局域网,优化流量管理。另一方面,流量优先级是根据802.1p将LAN数据包分组为不同优先级的单独类。分段过程分两步进行:首先,完成“多媒体主机”(即IP电话和多媒体PC)和“数据主机”的网络分段(以及流量优先级);在第二种算法中,利用“分区算法”在两个vlan中对分割任务进行了优化。
{"title":"An architecture for automatic configuration of integrated networks","authors":"S. D'Antonio, M. D'Arienzo, A. Pescapé, G. Ventre","doi":"10.1109/NOMS.2004.1317674","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317674","url":null,"abstract":"Configuration and management activities are frequently performed both in local area and campus networks due to the intrinsic variability characterizing such networks and the innovative services provided through them. Indeed, in order to benefit from services like voice over IP and multimedia content distribution, corporate users need to configure and manage their network appropriately. Suitable strategies have to be undertaken to fulfill stringent requirements imposed by such services on the underlying \"integrated\" transport infrastructure. These activities are both time and money consuming since they are usually under the responsibility of network administrators and managers. We present an architecture that allows the configuration of network devices in an automatic fashion in order to facilitate traffic management and prioritization in LANs. On one hand, traffic management is optimized through the segmentation of a corporate network into multiple virtual LANs via SNMP. On the other, traffic prioritization is carried out by grouping LAN packets into separate classes associated with different priority levels in compliance with 802.1p. The segmentation process is carried out in two steps: in the first, the network segmentation into \"multimedia hosts\" (i.e., IP phone and multimedia PC) and \"data hosts\" is accomplished (as well as traffic prioritization); in the second, the segmentation task is optimized in both VLANs thanks to the utilization of a \"partitioning algorithm\".","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124866410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
PONDER policy implementation and validation in a CIM and differentiated services framework 在CIM和差异化服务框架中考虑策略的实现和验证
L. Lymberopoulos, Emil C. Lupu, M. Sloman
Policies are often used to define management strategies for networks, storage services or applications. Validation determines whether the policy implementation is feasible for the specific environment to which it applies and requires checking that the policy is consistent with the functional or resource constraints within the target environment. For example, do the policies assume functionality or specific operations which do not exist in target routers, or bandwidth in excess of the capacity of data links? Where possible, static checking should be done prior to policy deployment in order to detect invalid policies at design time, but there are some policies, related to resource allocation, that depend on the current state of the system, and require policy constraints that must be checked dynamically at execution time. We show how PONDER policies can be implemented and validated for differentiated services (DiffServ) by using CIM (Common Information Model) as the modelling framework for network resources, as this is device independent. We describe a CIM DiffServ-metrics sub-model extension of the CIM Network sub-model which represents DiffServ traffic statistics and a Linux driver which translates CIM classes and variables to Linux traffic control classes and variables respectively.
策略通常用于定义网络、存储服务或应用程序的管理策略。验证确定策略实现对于其应用的特定环境是否可行,并需要检查策略是否与目标环境中的功能或资源约束一致。例如,策略是否承担目标路由器中不存在的功能或特定操作,或者是否承担超出数据链路容量的带宽?在可能的情况下,应该在策略部署之前进行静态检查,以便在设计时检测无效的策略,但是有一些与资源分配相关的策略依赖于系统的当前状态,并且需要在执行时动态检查策略约束。我们将展示如何通过使用CIM(公共信息模型)作为网络资源的建模框架,为差异化服务(DiffServ)实现和验证PONDER策略,因为这是独立于设备的。我们描述了CIM Network子模型的一个CIM DiffServ-metrics子模型扩展(表示DiffServ流量统计)和一个Linux驱动程序(将CIM类和变量分别转换为Linux流量控制类和变量)。
{"title":"PONDER policy implementation and validation in a CIM and differentiated services framework","authors":"L. Lymberopoulos, Emil C. Lupu, M. Sloman","doi":"10.1109/NOMS.2004.1317639","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317639","url":null,"abstract":"Policies are often used to define management strategies for networks, storage services or applications. Validation determines whether the policy implementation is feasible for the specific environment to which it applies and requires checking that the policy is consistent with the functional or resource constraints within the target environment. For example, do the policies assume functionality or specific operations which do not exist in target routers, or bandwidth in excess of the capacity of data links? Where possible, static checking should be done prior to policy deployment in order to detect invalid policies at design time, but there are some policies, related to resource allocation, that depend on the current state of the system, and require policy constraints that must be checked dynamically at execution time. We show how PONDER policies can be implemented and validated for differentiated services (DiffServ) by using CIM (Common Information Model) as the modelling framework for network resources, as this is device independent. We describe a CIM DiffServ-metrics sub-model extension of the CIM Network sub-model which represents DiffServ traffic statistics and a Linux driver which translates CIM classes and variables to Linux traffic control classes and variables respectively.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123878722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Security management of Web services Web服务的安全管理
M. Malek, F. Harmantzis
The Internet, while being increasingly used to provide services efficiently, poses a unique set of security issues due to its openness and ubiquity. We highlight the importance of security in Web services and describe how data mining techniques can offer help. The anatomy of two specific security attacks which could cripple Web services or compromise confidential information are described. We survey some security intrusion detection techniques based on data mining and point out their shortcomings. Then we provide some novel data mining techniques to detect such attacks, and describe some safeguard against these attacks.
互联网在被越来越多地用于提供高效服务的同时,由于其开放性和普遍性,也带来了一系列独特的安全问题。我们强调了Web服务中安全性的重要性,并描述了数据挖掘技术如何提供帮助。本文描述了两种可能导致Web服务瘫痪或危及机密信息的特定安全攻击。介绍了基于数据挖掘的安全入侵检测技术,指出了它们的不足。然后,我们提出了一些新的数据挖掘技术来检测这些攻击,并描述了一些防范这些攻击的措施。
{"title":"Security management of Web services","authors":"M. Malek, F. Harmantzis","doi":"10.1109/NOMS.2004.1317850","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317850","url":null,"abstract":"The Internet, while being increasingly used to provide services efficiently, poses a unique set of security issues due to its openness and ubiquity. We highlight the importance of security in Web services and describe how data mining techniques can offer help. The anatomy of two specific security attacks which could cripple Web services or compromise confidential information are described. We survey some security intrusion detection techniques based on data mining and point out their shortcomings. Then we provide some novel data mining techniques to detect such attacks, and describe some safeguard against these attacks.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121501378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Content-aware Internet application traffic measurement and analysis 内容感知的互联网应用流量测量和分析
T. Choi, Changhoon Kim, J. Yoon, Jeongsook Park, Byungjun Lee, Hyung-Lae Kim, Hyungseok Chung, T. Jeong
As the Internet is quickly evolving from best-effort networks to business quality networks, billing based on the precise traffic measurement becomes an important issue for Internet service providers (ISP). Billing settlement is necessary not only between ISP and customers but also between ISP. Currently, most ISP use a flat rate charging policy. Besides the degree of difficulty in deriving appropriate charging policies agreeable by a concerned party, there are substantial technical challenges to come up with a good usage-based accounting system. Usage-based accounting depending on IP packet header information only is not sufficient any more due to the highly dynamic nature of the development and the use of the Internet applications such as peer-to-peer and network games. They use port numbers dynamically and even several applications can use the same port number. Thus, more precise means of classifying them and accounting for their traffic usage are required. In this paper, we propose a high performance, adaptable, configurable, and scalable content-aware application traffic measurement and analysis system which can achieve very accurate usage-based accounting.
随着互联网从“最努力网络”向“业务质量网络”的快速发展,基于精确流量测量的计费成为互联网服务提供商(ISP)面临的一个重要问题。计费结算不仅是网络服务提供商与用户之间的问题,也是网络服务提供商与用户之间的问题。目前,大多数ISP使用统一费率收费政策。除了制定有关各方同意的适当收费政策的困难程度外,制定一个良好的基于使用的会计制度也存在重大的技术挑战。由于开发和使用Internet应用程序(如点对点和网络游戏)的高度动态性,仅依赖IP包头信息的基于使用的计费不再足够。它们动态地使用端口号,甚至多个应用程序可以使用相同的端口号。因此,需要更精确的方法对它们进行分类并计算它们的流量使用情况。在本文中,我们提出了一个高性能、适应性强、可配置、可扩展的内容感知应用流量测量和分析系统,该系统可以实现非常精确的基于使用的统计。
{"title":"Content-aware Internet application traffic measurement and analysis","authors":"T. Choi, Changhoon Kim, J. Yoon, Jeongsook Park, Byungjun Lee, Hyung-Lae Kim, Hyungseok Chung, T. Jeong","doi":"10.1109/NOMS.2004.1317737","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317737","url":null,"abstract":"As the Internet is quickly evolving from best-effort networks to business quality networks, billing based on the precise traffic measurement becomes an important issue for Internet service providers (ISP). Billing settlement is necessary not only between ISP and customers but also between ISP. Currently, most ISP use a flat rate charging policy. Besides the degree of difficulty in deriving appropriate charging policies agreeable by a concerned party, there are substantial technical challenges to come up with a good usage-based accounting system. Usage-based accounting depending on IP packet header information only is not sufficient any more due to the highly dynamic nature of the development and the use of the Internet applications such as peer-to-peer and network games. They use port numbers dynamically and even several applications can use the same port number. Thus, more precise means of classifying them and accounting for their traffic usage are required. In this paper, we propose a high performance, adaptable, configurable, and scalable content-aware application traffic measurement and analysis system which can achieve very accurate usage-based accounting.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125516563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
Internet router outage measurement: an embedded approach 互联网路由器中断测量:一种嵌入式方法
Sejun Song, Jim Huang
Outage measurement is an integral part of high-availability network operations to assess and report the availability of router components and, in turn, the availability of the network. The paper presents a novel approach to outage measurement, called component outage on-line (COOL) measurement. COOL provides an autonomous real-time outage measurement within the router. It automates the outage measurement process and makes it more accurate, reliable, scalable, and cost-effective. The paper describes COOL's measurement methodology with respect to outage model, measurement metrics, architectural framework, methods for measuring hardware and software outages and planned and unplanned outages, and outage MIB (management information base) design. COOL is being implemented in various network routers. Experiment results on COOL runtime performance are presented.
中断度量是高可用性网络操作的一个组成部分,用于评估和报告路由器组件的可用性,进而报告网络的可用性。本文提出了一种新的停机测量方法——部件停机在线测量。COOL在路由器内提供自主的实时停机测量。它使停机度量过程自动化,使其更加准确、可靠、可扩展和经济高效。本文描述了COOL的度量方法,包括中断模型、度量度量、体系结构框架、测量硬件和软件中断以及计划和非计划中断的方法,以及中断MIB(管理信息库)设计。COOL正在各种网络路由器中实现。给出了COOL运行时性能的实验结果。
{"title":"Internet router outage measurement: an embedded approach","authors":"Sejun Song, Jim Huang","doi":"10.1109/NOMS.2004.1317652","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317652","url":null,"abstract":"Outage measurement is an integral part of high-availability network operations to assess and report the availability of router components and, in turn, the availability of the network. The paper presents a novel approach to outage measurement, called component outage on-line (COOL) measurement. COOL provides an autonomous real-time outage measurement within the router. It automates the outage measurement process and makes it more accurate, reliable, scalable, and cost-effective. The paper describes COOL's measurement methodology with respect to outage model, measurement metrics, architectural framework, methods for measuring hardware and software outages and planned and unplanned outages, and outage MIB (management information base) design. COOL is being implemented in various network routers. Experiment results on COOL runtime performance are presented.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116210849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Broadband wireless access 宽带无线接入
R. Hafez
Summary form only given. This tutorial addresses recent developments in broadband wireless technologies and networking. The tutorial starts by providing a quick overview of the different classes of wireless systems and their respective applications and limitations, then it moves on to describe the most recent techniques that are opening the way for reliable and robust broadband wireless access. The presentation addresses the dominant standards such as IEEE 802.11a, b, and g, 3G/4G cellular and 802.16a wireless WAN. The tutorial also covers recent advances in ad-hoc and MESH wireless networking. The network models are presented as well as the expected applications and limitations.
只提供摘要形式。本教程介绍宽带无线技术和网络的最新发展。本教程首先快速概述了不同类别的无线系统及其各自的应用和限制,然后介绍了为可靠和健壮的宽带无线接入开辟道路的最新技术。该演讲涉及主要标准,如IEEE 802.11a, b和g, 3G/4G蜂窝和802.16a无线广域网。本教程还介绍了ad-hoc和MESH无线网络的最新进展。介绍了网络模型以及预期的应用和局限性。
{"title":"Broadband wireless access","authors":"R. Hafez","doi":"10.1109/NOMS.2004.1317809","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317809","url":null,"abstract":"Summary form only given. This tutorial addresses recent developments in broadband wireless technologies and networking. The tutorial starts by providing a quick overview of the different classes of wireless systems and their respective applications and limitations, then it moves on to describe the most recent techniques that are opening the way for reliable and robust broadband wireless access. The presentation addresses the dominant standards such as IEEE 802.11a, b, and g, 3G/4G cellular and 802.16a wireless WAN. The tutorial also covers recent advances in ad-hoc and MESH wireless networking. The network models are presented as well as the expected applications and limitations.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115396502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Ontology mapping for network management systems 面向网络管理系统的本体映射
A. K. K. Wong, A. Chen, N. Paramesh, P. Ray
The existence of various network equipment vendors, such as Cisco and Nortel, introduces an additional layer of complexity to the problem of integrating heterogeneous management information models that are applied in different network domains. The problem of using a mixture of different protocols, such as SNMP (simple network management protocol) and CMIP (common management information protocol), has already been attempted and solved by previous research, New interoperability issues can arise within a single domain when network specialists are required to manage network equipments using different sets of terminologies and via different interfaces. The objective of the paper is to address ontological issues that may arise in an integrated network management application. Ontology is applied first to model the semantics of vendor specific terms, and secondly, to aid in automating the mapping between the terms, in order to create a unified application information base such that management of various brands of network equipments can be performed through a single gateway.
各种网络设备供应商(如Cisco和Nortel)的存在,给集成应用于不同网络域的异构管理信息模型的问题增加了额外的复杂性。使用不同协议的混合问题,如SNMP(简单网络管理协议)和CMIP(公共管理信息协议),已经在以前的研究中进行了尝试和解决,当网络专家需要使用不同的术语集和通过不同的接口来管理网络设备时,新的互操作性问题可能会在单个域中出现。本文的目的是解决在集成网络管理应用程序中可能出现的本体论问题。本体首先用于对供应商特定术语的语义进行建模,其次用于帮助术语之间的自动映射,从而创建一个统一的应用信息库,从而可以通过单个网关对各种品牌的网络设备进行管理。
{"title":"Ontology mapping for network management systems","authors":"A. K. K. Wong, A. Chen, N. Paramesh, P. Ray","doi":"10.1109/NOMS.2004.1317781","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317781","url":null,"abstract":"The existence of various network equipment vendors, such as Cisco and Nortel, introduces an additional layer of complexity to the problem of integrating heterogeneous management information models that are applied in different network domains. The problem of using a mixture of different protocols, such as SNMP (simple network management protocol) and CMIP (common management information protocol), has already been attempted and solved by previous research, New interoperability issues can arise within a single domain when network specialists are required to manage network equipments using different sets of terminologies and via different interfaces. The objective of the paper is to address ontological issues that may arise in an integrated network management application. Ontology is applied first to model the semantics of vendor specific terms, and secondly, to aid in automating the mapping between the terms, in order to create a unified application information base such that management of various brands of network equipments can be performed through a single gateway.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129740709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A policy-based approach for user controlled lightpath provisioning 用于用户控制光路配置的基于策略的方法
T. Truong, O. Cherkaoui, H. Elbiaze, N. Rico, E. Aboulhamid
There is a growing need for e2e lightpaths for high volume data transferring applications such as GridFTP and SAN. They wish to dynamically deploy lightpaths over multiple management domains. Research, sponsored by Canarie Incorporated, is underway to enable "customer-empowered networks" and to experiment them with the Canadian research network CA*Net4. New signaling and control approaches using Web services have been proposed. One difficulty is that each domain must retain the control of their optical network infrastructure and ensure proper allocation of optical resources. Hence, it is important that the signaling takes into account the management constraints imposed by the different domains. This paper presents a policy-based approach for user-controlled lightpath provisioning. The work builds on the research around the new signaling approaches for realizing customer-empowered networks. We present an architecture based on Web Services allowing users or Grid applications to establish e2e lightpaths over multiple autonomous systems. To tackle the problem of admission control and to address the resource allocation issue, we developed policy restricted signaling which allows customers to reserve lightpaths over multiple domains while ensuring that management rules of each domain are enforced. The signaling has been implemented and the experiment on a small network composed of Cisco equipment proves the viability of our approach.
对于像GridFTP和SAN这样的大容量数据传输应用程序,对端到端光路的需求越来越大。他们希望在多个管理域中动态部署光路。由Canarie公司赞助的一项研究正在进行中,旨在实现“客户授权网络”,并在加拿大研究网络CA*Net4中进行试验。已经提出了使用Web服务的新的信令和控制方法。难点之一是每个域必须保持对其光网络基础设施的控制,并确保光资源的合理分配。因此,重要的是信令要考虑到由不同域施加的管理约束。本文提出了一种基于策略的用户控制光路配置方法。这项工作建立在围绕实现客户授权网络的新信令方法的研究之上。我们提出了一个基于Web服务的架构,允许用户或网格应用程序在多个自治系统上建立端到端光路。为了解决准入控制问题和解决资源分配问题,我们开发了策略限制信令,允许客户在多个域中保留光路,同时确保每个域的管理规则得到执行。该信令已经实现,并在Cisco设备组成的小型网络上进行了实验,证明了该方法的可行性。
{"title":"A policy-based approach for user controlled lightpath provisioning","authors":"T. Truong, O. Cherkaoui, H. Elbiaze, N. Rico, E. Aboulhamid","doi":"10.1109/NOMS.2004.1317773","DOIUrl":"https://doi.org/10.1109/NOMS.2004.1317773","url":null,"abstract":"There is a growing need for e2e lightpaths for high volume data transferring applications such as GridFTP and SAN. They wish to dynamically deploy lightpaths over multiple management domains. Research, sponsored by Canarie Incorporated, is underway to enable \"customer-empowered networks\" and to experiment them with the Canadian research network CA*Net4. New signaling and control approaches using Web services have been proposed. One difficulty is that each domain must retain the control of their optical network infrastructure and ensure proper allocation of optical resources. Hence, it is important that the signaling takes into account the management constraints imposed by the different domains. This paper presents a policy-based approach for user-controlled lightpath provisioning. The work builds on the research around the new signaling approaches for realizing customer-empowered networks. We present an architecture based on Web Services allowing users or Grid applications to establish e2e lightpaths over multiple autonomous systems. To tackle the problem of admission control and to address the resource allocation issue, we developed policy restricted signaling which allows customers to reserve lightpaths over multiple domains while ensuring that management rules of each domain are enforced. The signaling has been implemented and the experiment on a small network composed of Cisco equipment proves the viability of our approach.","PeriodicalId":260367,"journal":{"name":"2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127435543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
期刊
2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1