首页 > 最新文献

2009 IFIP/IEEE International Symposium on Integrated Network Management最新文献

英文 中文
A management scheme of SRLG-disjoint protection path 一种srsg -不相交保护路径的管理方案
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188861
A. Souza, Ana Luize de B. de P. Barros, A. S. S. Vieira, G. Campos, Jéssyca Alencar L. e Silva, J. Celestino, Joel Uchoa, L. Mendouga
With the emergence of new applications and requirements it became necessary to create new monitoring and reactive configuration mechanisms to try to meet the SLAs (Service Level Agreements). In WDM (Wavelength Division Multiplexing) optical networks, one way of trying to fulfill these agreements is by using pre-established protection paths. However, despite guaranteeing that traffic will be rapidly routed to its protection path in case of failure, there is no guarantee that the latter will be capable of meeting the contracted SLA in accordance with the bit error rate of its links. In this article we propose a scheme for monitoring and selecting the SRLG (Shared Risk Link Group) protection path disjointed from the main path using Genetic Algorithms, Fuzzy Logic in a PBM (Policy Based Management) platform denominated GAFUDI.
随着新应用程序和需求的出现,有必要创建新的监视和响应式配置机制,以尝试满足sla(服务水平协议)。在WDM(波分复用)光网络中,尝试实现这些协议的一种方法是使用预先建立的保护路径。然而,尽管保证在发生故障时将流量快速路由到其保护路径,但不能保证后者能够按照其链路的误码率满足合同SLA。在本文中,我们提出了一种在PBM (Policy Based Management)平台GAFUDI中使用遗传算法和模糊逻辑来监测和选择与主路径脱节的SRLG (Shared Risk Link Group)保护路径的方案。
{"title":"A management scheme of SRLG-disjoint protection path","authors":"A. Souza, Ana Luize de B. de P. Barros, A. S. S. Vieira, G. Campos, Jéssyca Alencar L. e Silva, J. Celestino, Joel Uchoa, L. Mendouga","doi":"10.1109/INM.2009.5188861","DOIUrl":"https://doi.org/10.1109/INM.2009.5188861","url":null,"abstract":"With the emergence of new applications and requirements it became necessary to create new monitoring and reactive configuration mechanisms to try to meet the SLAs (Service Level Agreements). In WDM (Wavelength Division Multiplexing) optical networks, one way of trying to fulfill these agreements is by using pre-established protection paths. However, despite guaranteeing that traffic will be rapidly routed to its protection path in case of failure, there is no guarantee that the latter will be capable of meeting the contracted SLA in accordance with the bit error rate of its links. In this article we propose a scheme for monitoring and selecting the SRLG (Shared Risk Link Group) protection path disjointed from the main path using Genetic Algorithms, Fuzzy Logic in a PBM (Policy Based Management) platform denominated GAFUDI.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122507906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance of network and service monitoring frameworks 网络和服务监控框架的性能
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188888
Abdelkader Lahmadi, Laurent Andrey, O. Festor
The efficiency and the performance of management systems is becoming a hot research topic within the networks and services management community. This concern is due to the new challenges of large scale managed systems, where the management plane is integrated within the functional plane and where management activities have to carry accurate and up-to-date information.
管理系统的效率和性能已成为网络和服务管理界的研究热点。这种关注是由于大规模管理系统的新挑战,其中管理平面集成在功能平面中,并且管理活动必须携带准确和最新的信息。
{"title":"Performance of network and service monitoring frameworks","authors":"Abdelkader Lahmadi, Laurent Andrey, O. Festor","doi":"10.1109/INM.2009.5188888","DOIUrl":"https://doi.org/10.1109/INM.2009.5188888","url":null,"abstract":"The efficiency and the performance of management systems is becoming a hot research topic within the networks and services management community. This concern is due to the new challenges of large scale managed systems, where the management plane is integrated within the functional plane and where management activities have to carry accurate and up-to-date information.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132552255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Using argumentation logic for firewall configuration management 使用论证逻辑进行防火墙配置管理
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188808
A. Bandara, A. Kakas, Emil C. Lupu, A. Russo
Firewalls remain the main perimeter security protection for corporate networks. However, network size and complexity make firewall configuration and maintenance notoriously difficult. Tools are needed to analyse firewall configurations for errors, to verify that they correctly implement security requirements and to generate configurations from higher-level requirements. In this paper we extend our previous work on the use of formal argumentation and preference reasoning for firewall policy analysis and develop means to automatically generate firewall policies from higher-level requirements. This permits both analysis and generation to be done within the same framework, thus accommodating a wide variety of scenarios for authoring and maintaining firewall configurations. We validate our approach by applying it to both examples from the literature and real firewall configurations of moderate size (≈ 150 rules).
防火墙仍然是企业网络的主要外围安全保护。然而,网络的规模和复杂性使得防火墙的配置和维护非常困难。需要工具来分析防火墙配置中的错误,验证它们是否正确地实现了安全需求,并从更高级别的需求生成配置。在本文中,我们扩展了之前在防火墙策略分析中使用形式论证和偏好推理的工作,并开发了从更高级别需求自动生成防火墙策略的方法。这允许在同一框架内进行分析和生成,从而适应创建和维护防火墙配置的各种场景。我们通过将其应用于文献中的示例和中等大小(≈150条规则)的实际防火墙配置来验证我们的方法。
{"title":"Using argumentation logic for firewall configuration management","authors":"A. Bandara, A. Kakas, Emil C. Lupu, A. Russo","doi":"10.1109/INM.2009.5188808","DOIUrl":"https://doi.org/10.1109/INM.2009.5188808","url":null,"abstract":"Firewalls remain the main perimeter security protection for corporate networks. However, network size and complexity make firewall configuration and maintenance notoriously difficult. Tools are needed to analyse firewall configurations for errors, to verify that they correctly implement security requirements and to generate configurations from higher-level requirements. In this paper we extend our previous work on the use of formal argumentation and preference reasoning for firewall policy analysis and develop means to automatically generate firewall policies from higher-level requirements. This permits both analysis and generation to be done within the same framework, thus accommodating a wide variety of scenarios for authoring and maintaining firewall configurations. We validate our approach by applying it to both examples from the literature and real firewall configurations of moderate size (≈ 150 rules).","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133195935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
Algorithms for SLA composition to provide inter-domain services SLA组合算法,提供域间服务
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188849
N. Djarallah, Hélia Pouyllau
Providing inter-domain QoS guaranteed services is a huge challenge for operators and will bring new revenues to them. But, establishing end-to-end services requires a level of resource management that does not exist yet, even locally to an operator. Due to confidentiality and independence reasons, operators are afraid to cooperate which can not be avoided in the inter-domain context. We consider the existence of an alliance framework wherein operators would agree to cooperate. In this article, we address the issues of negotiating inter-domain services and propose efficient algorithms to determine the end-to-end QoS contract that will satisfy the QoS demand for a service.
提供跨域QoS保证服务对运营商来说是一个巨大的挑战,并将为他们带来新的收入。但是,建立端到端服务需要某种程度的资源管理,而这种资源管理目前还不存在,甚至对运营商来说也是如此。由于保密性和独立性的原因,运营商不敢合作,这在跨域环境下是不可避免的。我们认为存在一个联盟框架,其中运营商将同意合作。在本文中,我们讨论了域间服务的协商问题,并提出了有效的算法来确定端到端QoS契约,以满足服务的QoS需求。
{"title":"Algorithms for SLA composition to provide inter-domain services","authors":"N. Djarallah, Hélia Pouyllau","doi":"10.1109/INM.2009.5188849","DOIUrl":"https://doi.org/10.1109/INM.2009.5188849","url":null,"abstract":"Providing inter-domain QoS guaranteed services is a huge challenge for operators and will bring new revenues to them. But, establishing end-to-end services requires a level of resource management that does not exist yet, even locally to an operator. Due to confidentiality and independence reasons, operators are afraid to cooperate which can not be avoided in the inter-domain context. We consider the existence of an alliance framework wherein operators would agree to cooperate. In this article, we address the issues of negotiating inter-domain services and propose efficient algorithms to determine the end-to-end QoS contract that will satisfy the QoS demand for a service.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134178987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
SecSip: A stateful firewall for SIP-based networks SecSip:基于sip的有状态防火墙
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188807
Abdelkader Lahmadi, O. Festor
SIP-based networks are becoming the de-facto standard for voice, video and instant messaging services. Being exposed to many threats while playing an major role in the operation of essential services, the need for dedicated security management approaches is rapidly increasing. In this paper we present an original security management approach based on a specific vulnerability aware SIP stateful firewall. Through known attack descriptions, we illustrate the power of the configuration language of the firewall which uses the capability to specify stateful objects that track data from multiple SIP elements within their lifetime. We demonstrate through measurements on a real implementation of the firewall its efficiency and performance.
基于sip的网络正在成为语音、视频和即时消息服务的事实上的标准。在基本服务的操作中扮演重要角色的同时,还面临许多威胁,因此对专用安全管理方法的需求正在迅速增加。本文提出了一种新颖的基于特定漏洞感知SIP状态防火墙的安全管理方法。通过已知的攻击描述,我们说明了防火墙配置语言的强大功能,它使用功能来指定有状态对象,这些对象在其生命周期内跟踪来自多个SIP元素的数据。我们通过对防火墙实际实现的测量来演示其效率和性能。
{"title":"SecSip: A stateful firewall for SIP-based networks","authors":"Abdelkader Lahmadi, O. Festor","doi":"10.1109/INM.2009.5188807","DOIUrl":"https://doi.org/10.1109/INM.2009.5188807","url":null,"abstract":"SIP-based networks are becoming the de-facto standard for voice, video and instant messaging services. Being exposed to many threats while playing an major role in the operation of essential services, the need for dedicated security management approaches is rapidly increasing. In this paper we present an original security management approach based on a specific vulnerability aware SIP stateful firewall. Through known attack descriptions, we illustrate the power of the configuration language of the firewall which uses the capability to specify stateful objects that track data from multiple SIP elements within their lifetime. We demonstrate through measurements on a real implementation of the firewall its efficiency and performance.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133369485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
MeshMan: A management framework for wireless mesh networks MeshMan:无线网状网络的管理框架
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188814
Vivek Aseeja, Rong L. Zheng
As wireless mesh networks become more popular, there exists a need to provide centralized management solutions, which facilitate network administrators to control, troubleshoot and collect statistics from their networks. Managing wireless mesh networks poses unique challenges due to limited bandwidth resources and dynamic channel quality. A robust management solution should function despite network layer failure. In this paper, we propose MeshMan, a network layer agnostic, low overhead solution to network management to cope with unreliable wireless channels, link and network level dynamics in wireless mesh networks. It combines the concepts of source routing with hierarchical addressing, and provides a native efficient query interface. A prototype of MeshMan has been implemented as a user space daemon on Linux and evaluated using a 12-node wireless mesh network testbed. Experimental studies demonstrate that MeshMan has comparable or better performance than the Simple Network Management Protocol (SNMP) in management overhead and response times when the network is stable while having much better performance in presence network dynamics.
随着无线网状网络的日益普及,需要提供集中的管理解决方案,以方便网络管理员对其网络进行控制、排除故障和收集统计数据。由于有限的带宽资源和动态信道质量,管理无线网状网络提出了独特的挑战。一个健壮的管理解决方案应该能够在网络层出现故障的情况下正常工作。本文提出一种网络层不可知、低开销的网络管理解决方案MeshMan,以应对无线网状网络中不可靠的无线信道、链路和网络级动态。它结合了源路由和分层寻址的概念,并提供了一个本地高效的查询接口。MeshMan的原型已在Linux上作为用户空间守护进程实现,并使用12节点无线网状网络测试平台进行了评估。实验研究表明,在网络稳定时,MeshMan在管理开销和响应时间上与简单网络管理协议(Simple Network Management Protocol, SNMP)相当或更好,而在存在网络动态时,MeshMan具有更好的性能。
{"title":"MeshMan: A management framework for wireless mesh networks","authors":"Vivek Aseeja, Rong L. Zheng","doi":"10.1109/INM.2009.5188814","DOIUrl":"https://doi.org/10.1109/INM.2009.5188814","url":null,"abstract":"As wireless mesh networks become more popular, there exists a need to provide centralized management solutions, which facilitate network administrators to control, troubleshoot and collect statistics from their networks. Managing wireless mesh networks poses unique challenges due to limited bandwidth resources and dynamic channel quality. A robust management solution should function despite network layer failure. In this paper, we propose MeshMan, a network layer agnostic, low overhead solution to network management to cope with unreliable wireless channels, link and network level dynamics in wireless mesh networks. It combines the concepts of source routing with hierarchical addressing, and provides a native efficient query interface. A prototype of MeshMan has been implemented as a user space daemon on Linux and evaluated using a 12-node wireless mesh network testbed. Experimental studies demonstrate that MeshMan has comparable or better performance than the Simple Network Management Protocol (SNMP) in management overhead and response times when the network is stable while having much better performance in presence network dynamics.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133831527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A model based approach to autonomic management of virtual networks 基于模型的虚拟网络自治管理方法
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188882
S. Davy, C. Fahy, Zohra Boudjemil, L. Griffin, J. Strassner
Enabling the automated deployment and maintenance of current and future services over the Internet is a difficult task and requires self-aware functions that can adapt the services offered by the network to changing customer demand, business goals, and/or environmental conditions using policies. This paper describes a process to realise static and dynamic service deployment, given an understanding of available resources that exist in a communications network to build services . This process contributes to the realisation of the AutoI autonomic management architecture for the Internet, which aims to develop a self-managing virtual resource overlay that can span across heterogeneous networks and supports service mobility, security, quality of service and reliability. The core of the process is to take advantage of the substantial DEN-ng information model that decouples the definition and design of services from the resources available in the network. In this way, the creation and modification of services within a network can be planned, deployed, and even dynamically composed to meet context-aware demands. Providing such a service-aware process is central to the architecture being defined in the AutoI project and information modelling is seen as a major facilitator to this task.
通过Internet实现当前和未来服务的自动化部署和维护是一项困难的任务,并且需要能够使用策略调整网络提供的服务以适应不断变化的客户需求、业务目标和/或环境条件的自我意识功能。本文描述了实现静态和动态服务部署的过程,给出了对通信网络中存在的可用资源的理解,以构建服务。这个过程有助于实现AutoI自主管理架构的互联网,其目的是开发一个自我管理的虚拟资源覆盖,可以跨越异构网络,并支持服务移动性,安全性,服务质量和可靠性。该过程的核心是利用实质性的DEN-ng信息模型,该模型将服务的定义和设计与网络中可用的资源解耦。通过这种方式,可以计划、部署甚至动态组合网络中服务的创建和修改,以满足上下文感知需求。提供这样一个感知服务的流程是AutoI项目中定义的体系结构的核心,信息建模被视为该任务的主要促进者。
{"title":"A model based approach to autonomic management of virtual networks","authors":"S. Davy, C. Fahy, Zohra Boudjemil, L. Griffin, J. Strassner","doi":"10.1109/INM.2009.5188882","DOIUrl":"https://doi.org/10.1109/INM.2009.5188882","url":null,"abstract":"Enabling the automated deployment and maintenance of current and future services over the Internet is a difficult task and requires self-aware functions that can adapt the services offered by the network to changing customer demand, business goals, and/or environmental conditions using policies. This paper describes a process to realise static and dynamic service deployment, given an understanding of available resources that exist in a communications network to build services . This process contributes to the realisation of the AutoI autonomic management architecture for the Internet, which aims to develop a self-managing virtual resource overlay that can span across heterogeneous networks and supports service mobility, security, quality of service and reliability. The core of the process is to take advantage of the substantial DEN-ng information model that decouples the definition and design of services from the resources available in the network. In this way, the creation and modification of services within a network can be planned, deployed, and even dynamically composed to meet context-aware demands. Providing such a service-aware process is central to the architecture being defined in the AutoI project and information modelling is seen as a major facilitator to this task.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133494208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Control information description model and processing mechanism in the trustworthy and controllable network 可信可控网络中的控制信息描述模型及处理机制
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188841
Peng Wang, Junzhou Luo, Wei Li, Yansheng Qu
Traditional networks are surprisingly fragile and difficult to manage. The problem can partly be attributed to the exposition of too many details of the controlled objects leading to the deluge of complexity in control plane, and the absence of network-wide views leading to the blindness of network management. With these problems, this paper decomposes the necessary network management information into three parts: the basic information, the cross-layer association, and global information. And a new controlled object description model is presented in the trustworthy and controllable network control architecture which separates the functionality of control and management of network form the data plane of IP network, and constructs the formal control and management plane of IP network. The new model identifies and abstracts the controlled objects with object-oriented approach. Based on this model, a cross-layer database is built to store the different layer control objects and to present cross-layer association view, a processing mechanism to process the original information is presented for global network state view, and a control plane is constructed to realize network control. The control information description model restricts the complexity of the controlled objects to their own implementation by abstraction, and alleviates the difficulty of network management. The cross-layer association view and the global network state view composes the network-wide views. The network-wide views realize the visibility and improve the manageability of network. Finally, we present 3 examples to indicate that the model alleviates the complexity of configuration management.
传统的网络非常脆弱,难以管理。造成这一问题的部分原因是由于对被控对象的详细描述过多,导致控制平面过于复杂,而缺乏全网视图导致网络管理的盲目性。针对这些问题,本文将必要的网管信息分解为基本信息、跨层关联信息和全局信息三部分。在可信可控的网络控制体系结构中,提出了一种新的被控对象描述模型,将网络的控制和管理功能从IP网络的数据平面中分离出来,构造了IP网络的形式控制和管理平面。该模型采用面向对象的方法对被控对象进行识别和抽象。在此模型的基础上,建立了跨层数据库存储各层控制对象并呈现跨层关联视图,提出了对全局网络状态视图原始信息进行处理的处理机制,构建了控制平面实现网络控制。控制信息描述模型通过抽象将被控对象的复杂性限制在自己的实现上,减轻了网络管理的难度。跨层关联视图和全局网络状态视图组成了网络范围视图。全网视图实现了网络的可见性,提高了网络的可管理性。最后,通过3个实例说明该模型减轻了配置管理的复杂性。
{"title":"Control information description model and processing mechanism in the trustworthy and controllable network","authors":"Peng Wang, Junzhou Luo, Wei Li, Yansheng Qu","doi":"10.1109/INM.2009.5188841","DOIUrl":"https://doi.org/10.1109/INM.2009.5188841","url":null,"abstract":"Traditional networks are surprisingly fragile and difficult to manage. The problem can partly be attributed to the exposition of too many details of the controlled objects leading to the deluge of complexity in control plane, and the absence of network-wide views leading to the blindness of network management. With these problems, this paper decomposes the necessary network management information into three parts: the basic information, the cross-layer association, and global information. And a new controlled object description model is presented in the trustworthy and controllable network control architecture which separates the functionality of control and management of network form the data plane of IP network, and constructs the formal control and management plane of IP network. The new model identifies and abstracts the controlled objects with object-oriented approach. Based on this model, a cross-layer database is built to store the different layer control objects and to present cross-layer association view, a processing mechanism to process the original information is presented for global network state view, and a control plane is constructed to realize network control. The control information description model restricts the complexity of the controlled objects to their own implementation by abstraction, and alleviates the difficulty of network management. The cross-layer association view and the global network state view composes the network-wide views. The network-wide views realize the visibility and improve the manageability of network. Finally, we present 3 examples to indicate that the model alleviates the complexity of configuration management.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116643855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Autonomic service hosting for large-scale distributed MOVE-services 用于大规模分布式move服务的自治服务托管
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188790
B. V. D. Bossche, F. Turck, B. Dhoedt, P. Demeester
Massively Online Virtual Environments (MOVEs) have been gaining popularity for several years. Today, these complex networked applications are serving thousands of clients simultaneously. However, these MOVEs are typically hosted on specialized server clusters and rely on internal knowledge of the services to optimize the load balancing. This makes running MOVEs an expensive undertaking as it cannot be outsourced to third party hosting providers. This paper details two Integer Linear Programming approaches to optimize the MOVE deployment through load balancing and minimizing the delay experienced by the end-users. Optimization includes assigning MOVE components to resources and replication of components to increase the scalability. One approach assuming full application knowledge of a dedicated MOVE and one with no internal knowledge and geared toward a generic MOVE hosting platform. For both cases an optimizing heuristic is evaluated and the obtained results are compared.
大规模在线虚拟环境(massive Online Virtual Environments, MOVEs)已经流行了好几年。如今,这些复杂的网络应用程序同时为数千个客户机提供服务。然而,这些move通常托管在专门的服务器集群上,并依赖于服务的内部知识来优化负载平衡。这使得运行MOVEs成为一项昂贵的工作,因为它不能外包给第三方托管提供商。本文详细介绍了两种整数线性规划方法,通过负载均衡和最小化最终用户所经历的延迟来优化MOVE部署。优化包括为资源分配MOVE组件和复制组件以提高可伸缩性。一种方法假定具有专用MOVE的全部应用程序知识,另一种方法不具备内部知识,并面向通用MOVE托管平台。对这两种情况进行了优化启发式评价,并对得到的结果进行了比较。
{"title":"Autonomic service hosting for large-scale distributed MOVE-services","authors":"B. V. D. Bossche, F. Turck, B. Dhoedt, P. Demeester","doi":"10.1109/INM.2009.5188790","DOIUrl":"https://doi.org/10.1109/INM.2009.5188790","url":null,"abstract":"Massively Online Virtual Environments (MOVEs) have been gaining popularity for several years. Today, these complex networked applications are serving thousands of clients simultaneously. However, these MOVEs are typically hosted on specialized server clusters and rely on internal knowledge of the services to optimize the load balancing. This makes running MOVEs an expensive undertaking as it cannot be outsourced to third party hosting providers. This paper details two Integer Linear Programming approaches to optimize the MOVE deployment through load balancing and minimizing the delay experienced by the end-users. Optimization includes assigning MOVE components to resources and replication of components to increase the scalability. One approach assuming full application knowledge of a dedicated MOVE and one with no internal knowledge and geared toward a generic MOVE hosting platform. For both cases an optimizing heuristic is evaluated and the obtained results are compared.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"17 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116061958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Queuing model based end-to-end performance evaluation for MPLS Virtual Private Networks 基于排队模型的MPLS虚拟专用网端到端性能评估
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188852
Yanfeng Zhu, Yibo Zhang, Chun Ying, W. Lu
Monitoring the end-to-end Quality-of-Service (QoS) is an important work for service providers' Operation Support System (OSS), because it is the fundamental requirement for QoS provisioning. However, it is in fact a challenging work, and there are few efficient approaches to address it. In this paper, for Multi-Protocol Label Switching (MPLS) Virtual Private Networks (VPNs), we propose a queuing model based end-to-end performance evaluation scheme for OSS to monitor the end-to-end delay, which is one of the important QoS metrics. By means of a queuing model, we deduce the relationship between the end-to-end delay and the information available in the Management Information Base (MIB) of routers, and then we present the evaluation scheme which avoids the costly per-packet measurement. The complexity of the proposed scheme is much lower than existing schemes. Extensive simulation results show that the proposed scheme can efficiently evaluate the end-to-end performance metrics (the estimation error is nearly 10%).
对端到端服务质量(QoS)的监控是服务提供商运营支持系统(OSS)的一项重要工作,因为它是提供QoS的基本要求。然而,这实际上是一项具有挑战性的工作,并且很少有有效的方法来解决它。本文针对多协议标签交换(MPLS)虚拟专用网(vpn),提出了一种基于排队模型的端到端OSS性能评估方案,以监控端到端延迟,这是重要的QoS指标之一。通过排队模型,推导出端到端时延与路由器管理信息库(MIB)中可用信息之间的关系,并给出了避免了昂贵的逐包测量的评估方案。建议方案的复杂程度远低于现有方案。大量的仿真结果表明,该方案能够有效地评估端到端性能指标(估计误差接近10%)。
{"title":"Queuing model based end-to-end performance evaluation for MPLS Virtual Private Networks","authors":"Yanfeng Zhu, Yibo Zhang, Chun Ying, W. Lu","doi":"10.1109/INM.2009.5188852","DOIUrl":"https://doi.org/10.1109/INM.2009.5188852","url":null,"abstract":"Monitoring the end-to-end Quality-of-Service (QoS) is an important work for service providers' Operation Support System (OSS), because it is the fundamental requirement for QoS provisioning. However, it is in fact a challenging work, and there are few efficient approaches to address it. In this paper, for Multi-Protocol Label Switching (MPLS) Virtual Private Networks (VPNs), we propose a queuing model based end-to-end performance evaluation scheme for OSS to monitor the end-to-end delay, which is one of the important QoS metrics. By means of a queuing model, we deduce the relationship between the end-to-end delay and the information available in the Management Information Base (MIB) of routers, and then we present the evaluation scheme which avoids the costly per-packet measurement. The complexity of the proposed scheme is much lower than existing schemes. Extensive simulation results show that the proposed scheme can efficiently evaluate the end-to-end performance metrics (the estimation error is nearly 10%).","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121237228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2009 IFIP/IEEE International Symposium on Integrated Network Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1