首页 > 最新文献

2009 IFIP/IEEE International Symposium on Integrated Network Management最新文献

英文 中文
Best practices for deploying a CMDB in large-scale environments 在大规模环境中部署CMDB的最佳实践
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188880
Alexander Keller, S. Subramanian
We describe best practices for deploying a Configuration Management Database (CMDB) that we have developed during several recent client engagements. Given the complexity and novelty of CMDB solutions that deal with discovering, storing and tracking actual Configuration Items (CIs), many enterprises rely on service delivery organizations - such as IBM Global Technology Services - to perform the configuration and roll-out of the system into production. This can be either done on the customer premises (within the scope of a so-called project-based service engagement), or by subscribing to a managed service, and thus leveraging the IT service management environment that the service provider has already set up.
我们描述了部署配置管理数据库(CMDB)的最佳实践,CMDB是我们在最近的几个客户项目中开发的。考虑到CMDB解决方案处理发现、存储和跟踪实际配置项(ci)的复杂性和新颖性,许多企业依赖于服务交付组织(如IBM Global Technology Services)来执行配置并将系统推出到生产中。这既可以在客户现场完成(在所谓的基于项目的服务约定的范围内),也可以通过订阅托管服务来完成,从而利用服务提供者已经设置的IT服务管理环境。
{"title":"Best practices for deploying a CMDB in large-scale environments","authors":"Alexander Keller, S. Subramanian","doi":"10.1109/INM.2009.5188880","DOIUrl":"https://doi.org/10.1109/INM.2009.5188880","url":null,"abstract":"We describe best practices for deploying a Configuration Management Database (CMDB) that we have developed during several recent client engagements. Given the complexity and novelty of CMDB solutions that deal with discovering, storing and tracking actual Configuration Items (CIs), many enterprises rely on service delivery organizations - such as IBM Global Technology Services - to perform the configuration and roll-out of the system into production. This can be either done on the customer premises (within the scope of a so-called project-based service engagement), or by subscribing to a managed service, and thus leveraging the IT service management environment that the service provider has already set up.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"24 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126118927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Framework to achieve multi-domain service management 框架实现多域服务管理
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188823
A. Bagchi, F. Caruso, A. Mayer, R. Roman, Prabha Kumar, S. Kowtha
An ongoing trend within the telecommunications industry has been toward providing end-to-end (E2E) IP based services. Accordingly, the associated management perspective has shifted from management of services within a single service provider domain towards a multi-domain paradigm supporting an E2E service view in which relationships among service providers, suppliers and customers and the related service level agreements (SLAs) take on major significance. In order to achieve multi-domain management, it is essential that a service management framework be put in place that supports planning, fulfilling, and assuring E2E services, including management of Service Requests, Service Assurance, and SLAs. The collecting and fusing of information from multiple sources, many external to the service provider's domain, to support the required E2E perspective has become an essential process.
电信行业的一个持续趋势是提供端到端(E2E)基于IP的服务。因此,相关的管理观点已经从单一服务提供者领域内的服务管理转向支持端到端服务视图的多领域范式,在这种视图中,服务提供者、供应商和客户之间的关系以及相关的服务水平协议(sla)具有重要意义。为了实现多域管理,必须设置一个服务管理框架,支持规划、实现和确保端到端服务,包括服务请求、服务保证和sla的管理。收集和融合来自多个来源(许多来自服务提供者领域的外部)的信息以支持所需的端到端视图已经成为一个必要的过程。
{"title":"Framework to achieve multi-domain service management","authors":"A. Bagchi, F. Caruso, A. Mayer, R. Roman, Prabha Kumar, S. Kowtha","doi":"10.1109/INM.2009.5188823","DOIUrl":"https://doi.org/10.1109/INM.2009.5188823","url":null,"abstract":"An ongoing trend within the telecommunications industry has been toward providing end-to-end (E2E) IP based services. Accordingly, the associated management perspective has shifted from management of services within a single service provider domain towards a multi-domain paradigm supporting an E2E service view in which relationships among service providers, suppliers and customers and the related service level agreements (SLAs) take on major significance. In order to achieve multi-domain management, it is essential that a service management framework be put in place that supports planning, fulfilling, and assuring E2E services, including management of Service Requests, Service Assurance, and SLAs. The collecting and fusing of information from multiple sources, many external to the service provider's domain, to support the required E2E perspective has become an essential process.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133119119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Auto-connectivity and security setup for access network elements 接入网络元素的自动连接和安全设置
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188877
H. Sanneck, L. Schmelz, E. Troch, L. D. Bie
In access networks, the roll-out of new network elements (NE) or changes to the NE HW and SW cause considerable overhead. The total number of NE is significant and is increasing for new radio access technologies like Long Term Evolution (LTE) due to the decreasing cell size. Furthermore for network scenarios like femto access points / home NEs conventional network deployment and management approaches where the network is fully planned and NEs are tightly managed cannot be followed any more. Furthermore the increased security requirements by operators for such network deployments have to be observed. An auto-connectivity scheme which incorporates the NE's security setup is proposed which tries to balance the trade-off between automation (avoiding any manual intervention) and security. This is achieved by shifting manufacturer and operator activities to a preparation (rather than the actual roll-out) phase and eliminating any interaction between them as much as possible. The NE is delivered only with an “off-theshelf” software & configuration installation. Only at the point in time when the NE is placed on site, the NE hardware-to-site mapping happening is executed. Together with mutual authentication between NE and the Operation, Administration and Maintenance (OAM) system it is possible to enable a very flexible and secure roll-out process.
在接入网中,新网元的推出或网元硬件和软件的变更会造成相当大的开销。由于小区尺寸的减小,网元的总数非常可观,而且对于长期演进(LTE)等新的无线接入技术,网元的总数还在增加。此外,对于femto接入点/家庭网元这样的网络场景,完全规划网络、严格管理网元的传统网络部署和管理方式已不再适用。此外,必须注意到运营商对这种网络部署增加的安全要求。提出了一种包含网元安全设置的自动连接方案,该方案试图在自动化(避免任何人工干预)和安全性之间取得平衡。这是通过将制造商和运营商的活动转移到准备阶段(而不是实际的推出),并尽可能消除它们之间的任何交互来实现的。网元发货时只附带“现成”的软件和配置安装。只有在网元放置到局点的时间点,才会执行发生的网元硬件到局点映射。再加上网元与运营、管理和维护(OAM)系统之间的相互认证,可以实现非常灵活和安全的推出过程。
{"title":"Auto-connectivity and security setup for access network elements","authors":"H. Sanneck, L. Schmelz, E. Troch, L. D. Bie","doi":"10.1109/INM.2009.5188877","DOIUrl":"https://doi.org/10.1109/INM.2009.5188877","url":null,"abstract":"In access networks, the roll-out of new network elements (NE) or changes to the NE HW and SW cause considerable overhead. The total number of NE is significant and is increasing for new radio access technologies like Long Term Evolution (LTE) due to the decreasing cell size. Furthermore for network scenarios like femto access points / home NEs conventional network deployment and management approaches where the network is fully planned and NEs are tightly managed cannot be followed any more. Furthermore the increased security requirements by operators for such network deployments have to be observed. An auto-connectivity scheme which incorporates the NE's security setup is proposed which tries to balance the trade-off between automation (avoiding any manual intervention) and security. This is achieved by shifting manufacturer and operator activities to a preparation (rather than the actual roll-out) phase and eliminating any interaction between them as much as possible. The NE is delivered only with an “off-theshelf” software & configuration installation. Only at the point in time when the NE is placed on site, the NE hardware-to-site mapping happening is executed. Together with mutual authentication between NE and the Operation, Administration and Maintenance (OAM) system it is possible to enable a very flexible and secure roll-out process.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131443858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
SURFmap: A network monitoring tool based on the Google Maps API SURFmap:基于Google Maps API的网络监控工具
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188876
Rick Hofstede, T. Fioreze
Network monitoring allows network managers to get a better insight in the network traffic transiting in a managed network. In order to make the tasks of a network manager easier, many network monitoring tools are made available for a wide range of purposes (e.g., traffic accounting, performance analysis, and so on) network managers may have. However, most of these tools lack to provide geographical information about network traffic. This paper presents a network monitoring tool prototype, called SURFmap, which provides network traffic information at a geographical dimension by using the Google Maps API. Through the use of the Google Maps API's features, SURFmap provides different zoom levels when showing network information, which results in the creation of different levels of abstraction in the network data visualization. SURFmap has revealed to be more intuitive when showing network traffic information, which makes the network monitoring activity from the network manager's perspective more interesting.
网络监控使网络管理人员能够更好地了解在被管理网络中传输的网络流量。为了使网络管理员的任务更容易,提供了许多网络监控工具,用于网络管理员可能具有的各种用途(例如,流量统计、性能分析等)。然而,大多数这些工具缺乏提供有关网络流量的地理信息。本文提出了一个网络监控工具原型SURFmap,它利用Google Maps API在地理维度上提供网络流量信息。通过使用Google Maps API的特性,SURFmap在显示网络信息时提供了不同的缩放级别,从而在网络数据可视化中创建了不同级别的抽象。SURFmap在显示网络流量信息时更加直观,这使得从网络管理员的角度来看网络监控活动更加有趣。
{"title":"SURFmap: A network monitoring tool based on the Google Maps API","authors":"Rick Hofstede, T. Fioreze","doi":"10.1109/INM.2009.5188876","DOIUrl":"https://doi.org/10.1109/INM.2009.5188876","url":null,"abstract":"Network monitoring allows network managers to get a better insight in the network traffic transiting in a managed network. In order to make the tasks of a network manager easier, many network monitoring tools are made available for a wide range of purposes (e.g., traffic accounting, performance analysis, and so on) network managers may have. However, most of these tools lack to provide geographical information about network traffic. This paper presents a network monitoring tool prototype, called SURFmap, which provides network traffic information at a geographical dimension by using the Google Maps API. Through the use of the Google Maps API's features, SURFmap provides different zoom levels when showing network information, which results in the creation of different levels of abstraction in the network data visualization. SURFmap has revealed to be more intuitive when showing network traffic information, which makes the network monitoring activity from the network manager's perspective more interesting.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128794588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Supporting communities in programmable grid networks: gTBN 支持可编程网格网络中的社区:gTBN
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188842
M. Cristea, R. Strijkers, D. Marchal, L. Gommans, C. D. Laat, R. Meijer
This paper presents the generalised Token Based Networking (gTBN) architecture, which enables dynamic binding of communities and their applications to specialised network services. gTBN uses protocol independent tokens to provide decoupling of authorisation from time of usage as well as identification of network traffic. The tokenised traffic allows specialised software components uploaded into network elements to execute services specific to communities. A reference implementation of gTBN over IPv4 is proposed as well as the presentation of our experiments. These experiments include validation tests of our test bed with common grid applications such as GridFTP, OpenMPI, and VLC. In addition, we present a firewalling use case based on gTBN.
本文提出了广义的基于令牌的网络(gTBN)架构,该架构能够将社区及其应用程序动态绑定到专门的网络服务。gTBN使用独立于协议的令牌来提供授权与使用时间的分离以及网络流量的识别。令牌化的流量允许将专门的软件组件上传到网络元素中,以执行特定于社区的服务。提出了基于IPv4的gTBN的参考实现,并介绍了我们的实验。这些实验包括使用GridFTP、OpenMPI和VLC等常见网格应用程序对我们的测试平台进行验证测试。此外,我们还提出了一个基于gTBN的防火墙用例。
{"title":"Supporting communities in programmable grid networks: gTBN","authors":"M. Cristea, R. Strijkers, D. Marchal, L. Gommans, C. D. Laat, R. Meijer","doi":"10.1109/INM.2009.5188842","DOIUrl":"https://doi.org/10.1109/INM.2009.5188842","url":null,"abstract":"This paper presents the generalised Token Based Networking (gTBN) architecture, which enables dynamic binding of communities and their applications to specialised network services. gTBN uses protocol independent tokens to provide decoupling of authorisation from time of usage as well as identification of network traffic. The tokenised traffic allows specialised software components uploaded into network elements to execute services specific to communities. A reference implementation of gTBN over IPv4 is proposed as well as the presentation of our experiments. These experiments include validation tests of our test bed with common grid applications such as GridFTP, OpenMPI, and VLC. In addition, we present a firewalling use case based on gTBN.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133492533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Collaborative content caching algorithms in mobile ad hoc networks environment 移动自组织网络环境下的协同内容缓存算法
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188829
Y. Abdelmalek, A. A. E. Al, T. Saadawi
In this paper, we address the problem of collaborative video caching in ad hoc mobile networks. We consider network portraying static video server with wired interface to gateway node that is equipped with wireless interfaces, other nodes are requiring access to the video streams that is stored at video server. In order to reduce the average access latency as well as enhance the video accessibility, efficient video caching placement and replacement strategies are crucial at some of the distributed intermediate nodes across the network. Virtual backbone caching nodes will be elected by executing caching placement algorithm after running the routing protocol phase. The simulation results indicate that the proposed collaborative aggregate cache mechanism can significantly improve the video QoS in terms of packet loss and average packet delay.
在本文中,我们解决了自组织移动网络中的协作视频缓存问题。我们考虑将具有有线接口的静态视频服务器描绘为具有无线接口的网关节点,其他节点需要访问存储在视频服务器上的视频流。为了降低平均访问延迟,提高视频可访问性,在网络中的一些分布式中间节点上,高效的视频缓存放置和替换策略至关重要。运行路由协议阶段后,通过执行缓存放置算法来选择虚拟骨干缓存节点。仿真结果表明,所提出的协同聚合缓存机制在丢包率和平均包延迟方面可以显著提高视频QoS。
{"title":"Collaborative content caching algorithms in mobile ad hoc networks environment","authors":"Y. Abdelmalek, A. A. E. Al, T. Saadawi","doi":"10.1109/INM.2009.5188829","DOIUrl":"https://doi.org/10.1109/INM.2009.5188829","url":null,"abstract":"In this paper, we address the problem of collaborative video caching in ad hoc mobile networks. We consider network portraying static video server with wired interface to gateway node that is equipped with wireless interfaces, other nodes are requiring access to the video streams that is stored at video server. In order to reduce the average access latency as well as enhance the video accessibility, efficient video caching placement and replacement strategies are crucial at some of the distributed intermediate nodes across the network. Virtual backbone caching nodes will be elected by executing caching placement algorithm after running the routing protocol phase. The simulation results indicate that the proposed collaborative aggregate cache mechanism can significantly improve the video QoS in terms of packet loss and average packet delay.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125106381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Fault detection in IP-based process control networks using data mining 基于ip的过程控制网络故障检测中的数据挖掘
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188812
Byungchul Park, Y. Won, Hwanjo Yu, J. W. Hong, Hong-Sun Noh, Jang Jin Lee
Industrial process control IP networks support communications between process control applications and devices. Communication faults in any stage of these control networks can cause delays or even shutdown of the entire manufacturing process. The current process of detecting and diagnosing communication faults is mostly manual, cumbersome, and inefficient. Detecting early symptoms of potential problems is very important but automated solutions do not yet exist. Our research goal is to automate the process of detecting and diagnosing the communication faults as well as to prevent problems by detecting early symptoms of potential problems. To achieve our goal, we have first investigated real-world fault cases and summarized control network failures. We have also defined network metrics and their alarm conditions to detect early symptoms for communication failures between process control servers and devices. In particular, we leverage data mining techniques to train the system to learn the rules of network faults in control networks and our testing results show that these rules are very effective. In our earlier work, we presented a design of a process control network monitoring and fault diagnosis system. In this paper, we focus on how the fault detection part of this system can be improved using data mining techniques.
工业过程控制IP网络支持过程控制应用程序和设备之间的通信。这些控制网络中任何阶段的通信故障都可能导致整个制造过程的延迟甚至停机。目前的通信故障检测和诊断过程大多是手工的、繁琐的、低效的。检测潜在问题的早期症状非常重要,但目前还不存在自动化解决方案。我们的研究目标是自动化检测和诊断通信故障的过程,并通过检测潜在问题的早期症状来预防问题。为了实现我们的目标,我们首先调查了现实世界的故障案例,并总结了控制网络的故障。我们还定义了网络指标及其警报条件,以检测过程控制服务器和设备之间通信故障的早期症状。特别地,我们利用数据挖掘技术训练系统学习控制网络中的网络故障规则,我们的测试结果表明这些规则是非常有效的。在前期工作中,我们设计了一个过程控制网络监测与故障诊断系统。在本文中,我们重点研究了如何使用数据挖掘技术来改进该系统的故障检测部分。
{"title":"Fault detection in IP-based process control networks using data mining","authors":"Byungchul Park, Y. Won, Hwanjo Yu, J. W. Hong, Hong-Sun Noh, Jang Jin Lee","doi":"10.1109/INM.2009.5188812","DOIUrl":"https://doi.org/10.1109/INM.2009.5188812","url":null,"abstract":"Industrial process control IP networks support communications between process control applications and devices. Communication faults in any stage of these control networks can cause delays or even shutdown of the entire manufacturing process. The current process of detecting and diagnosing communication faults is mostly manual, cumbersome, and inefficient. Detecting early symptoms of potential problems is very important but automated solutions do not yet exist. Our research goal is to automate the process of detecting and diagnosing the communication faults as well as to prevent problems by detecting early symptoms of potential problems. To achieve our goal, we have first investigated real-world fault cases and summarized control network failures. We have also defined network metrics and their alarm conditions to detect early symptoms for communication failures between process control servers and devices. In particular, we leverage data mining techniques to train the system to learn the rules of network faults in control networks and our testing results show that these rules are very effective. In our earlier work, we presented a design of a process control network monitoring and fault diagnosis system. In this paper, we focus on how the fault detection part of this system can be improved using data mining techniques.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134102358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Secure interworking & roaming of WiMAX with 3G and Wi-Fi WiMAX与3G和Wi-Fi的安全互通和漫游
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188800
V. Gondi, N. Agoulmine
The roaming between different WiMAX (Worldwide Interoperability for Microwave Access) networks as well as the interworking between WiMAX and other access technologies will be a key enabler for global WiMAX deployment. To provide secure and seamless roaming capability for mobile users across different access network domains, belonging to the same or different operators, we propose a roaming & interworking solution using intermediary entities, called Roaming Interworking Intermediary (RII). A generic RII-based interworking and roaming architecture between WiMAX, 3GPP (third Generation Partnership Project) and WLAN networks is presented. A test-bed has been setup, using real pre-WiMAX and Wi-Fi equipments and real operational cellular network, to demonstrate and evaluate the proposed solutions. The robustness, feasibility and efficiency of the proposed architecture are proven through different user scenarios.
不同WiMAX(全球微波接入互操作性)网络之间的漫游以及WiMAX与其他接入技术之间的互通将成为推动WiMAX全球部署的关键因素。为了给属于同一或不同运营商的不同接入网络域的移动用户提供安全无缝的漫游能力,我们提出了一种使用中间实体的漫游互联解决方案,称为漫游互联中介(RII)。在WiMAX、3GPP(第三代合作伙伴计划)和WLAN网络之间提出了一种通用的基于rii的互联和漫游架构。搭建了一个测试平台,使用真实的pre-WiMAX和Wi-Fi设备和真实的可操作蜂窝网络来演示和评估所提出的解决方案。通过不同的用户场景验证了该架构的鲁棒性、可行性和高效性。
{"title":"Secure interworking & roaming of WiMAX with 3G and Wi-Fi","authors":"V. Gondi, N. Agoulmine","doi":"10.1109/INM.2009.5188800","DOIUrl":"https://doi.org/10.1109/INM.2009.5188800","url":null,"abstract":"The roaming between different WiMAX (Worldwide Interoperability for Microwave Access) networks as well as the interworking between WiMAX and other access technologies will be a key enabler for global WiMAX deployment. To provide secure and seamless roaming capability for mobile users across different access network domains, belonging to the same or different operators, we propose a roaming & interworking solution using intermediary entities, called Roaming Interworking Intermediary (RII). A generic RII-based interworking and roaming architecture between WiMAX, 3GPP (third Generation Partnership Project) and WLAN networks is presented. A test-bed has been setup, using real pre-WiMAX and Wi-Fi equipments and real operational cellular network, to demonstrate and evaluate the proposed solutions. The robustness, feasibility and efficiency of the proposed architecture are proven through different user scenarios.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134117575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Towards an optimized model of incident ticket correlation 建立事件票证相关的优化模型
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188863
Patricia Marcu, G. Grabarnik, Laura Z. Luan, D. Rosu, L. Shwartz, Christopher Ward
In recent years, IT Service Management (ITSM) has become one of the most researched areas of IT. Incident and Problem Management are two of the Service Operation processes in the IT Infrastructure Library (ITIL). These two processes aim to recognize, log, isolate and correct errors which occur in the environment and disrupt the delivery of services. Incident Management and Problem Management form the basis of the tooling provided by an Incident Ticket Systems (ITS).
近年来,IT服务管理(ITSM)已成为IT领域研究的热点之一。事件管理和问题管理是IT基础设施库(ITIL)中的两个服务操作流程。这两个过程旨在识别、记录、隔离和纠正环境中发生的错误,并破坏服务的交付。事件管理和问题管理构成了事件票证系统(ITS)提供的工具的基础。
{"title":"Towards an optimized model of incident ticket correlation","authors":"Patricia Marcu, G. Grabarnik, Laura Z. Luan, D. Rosu, L. Shwartz, Christopher Ward","doi":"10.1109/INM.2009.5188863","DOIUrl":"https://doi.org/10.1109/INM.2009.5188863","url":null,"abstract":"In recent years, IT Service Management (ITSM) has become one of the most researched areas of IT. Incident and Problem Management are two of the Service Operation processes in the IT Infrastructure Library (ITIL). These two processes aim to recognize, log, isolate and correct errors which occur in the environment and disrupt the delivery of services. Incident Management and Problem Management form the basis of the tooling provided by an Incident Ticket Systems (ITS).","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134349315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Evaluating WS-security and XACML in web services-based network management 在基于web服务的网络管理中评估WS-security和XACML
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188809
Estêvão M. Z. Rohr, L. Granville, L. Tarouco
The use of Web services in network management has became a reality after recent researches and industry standardization effort. Although performance is a critical issue, as well as security support, no investigation so far has observed how secure Web services communications perform when employed for network management. In this paper we present a first investigation in this subject by evaluating the performance of WS-Security and XACML in a scenario where remote processes information is retrieved. Our evaluation shows that encryption and access control increase the response time more than other aspects like message signature or authentication. We also observe that messages carrying security information are 10 times larger than unsecure messages, which may prevent the retrieval of a large number of information and short periods of time.
在最近的研究和行业标准化工作之后,在网络管理中使用Web服务已经成为现实。尽管性能和安全支持都是一个关键问题,但到目前为止还没有任何调查观察到,当用于网络管理时,Web服务通信的安全性如何。在本文中,我们通过在检索远程进程信息的场景中评估WS-Security和XACML的性能,对这一主题进行了首次调查。我们的评估表明,加密和访问控制比消息签名或身份验证等其他方面增加的响应时间更多。我们还观察到,携带安全信息的消息比不安全消息大10倍,这可能会阻止大量信息和短时间的检索。
{"title":"Evaluating WS-security and XACML in web services-based network management","authors":"Estêvão M. Z. Rohr, L. Granville, L. Tarouco","doi":"10.1109/INM.2009.5188809","DOIUrl":"https://doi.org/10.1109/INM.2009.5188809","url":null,"abstract":"The use of Web services in network management has became a reality after recent researches and industry standardization effort. Although performance is a critical issue, as well as security support, no investigation so far has observed how secure Web services communications perform when employed for network management. In this paper we present a first investigation in this subject by evaluating the performance of WS-Security and XACML in a scenario where remote processes information is retrieved. Our evaluation shows that encryption and access control increase the response time more than other aspects like message signature or authentication. We also observe that messages carrying security information are 10 times larger than unsecure messages, which may prevent the retrieval of a large number of information and short periods of time.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133031043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2009 IFIP/IEEE International Symposium on Integrated Network Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1