首页 > 最新文献

2009 IFIP/IEEE International Symposium on Integrated Network Management最新文献

英文 中文
A new approach for multi-sink environments in WSNs 无线传感器网络中多汇聚环境的一种新方法
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188794
Ricardo M. Silva, J. Silva, Milan Simek, F. Boavida
Wireless Sensor Networks are low cost networks constituted by modest devices with limited resources, whose main function is monitoring. Based on the low price of these devices, it will be cheap to deploy a large amount of nodes to monitor a large area. However, to provide an efficient ad hoc network using these limited devices, new and optimized algorithms should be proposed. Most of the current work about WSNs are based on simulation studies and do not take in consideration engineering processes. This paper presents a Multi-Sink Node alternative to multi-hop solutions. The proposed solution also provides a new system for the discovery of devices and services over IPv6, allowing nodes to be automatically incorporated in the nearest WSN. This paper also presents a paradigm to efficiently provide mobility, granting a fast handover of nodes between different WSNs, without loosing the connection.
无线传感器网络是由有限的设备和有限的资源组成的低成本网络,其主要功能是监测。基于这些设备的低价格,部署大量的节点来监控大面积的区域将是便宜的。然而,为了利用这些有限的设备提供高效的自组织网络,必须提出新的和优化的算法。目前关于无线传感器网络的研究大多是基于仿真研究,没有考虑工程过程。本文提出了一种多汇聚节点替代多跳解决方案。提出的解决方案还提供了一个通过IPv6发现设备和服务的新系统,允许节点自动合并到最近的WSN中。本文还提出了一种有效提供移动性的范例,在不丢失连接的情况下,在不同的wsn之间实现节点的快速切换。
{"title":"A new approach for multi-sink environments in WSNs","authors":"Ricardo M. Silva, J. Silva, Milan Simek, F. Boavida","doi":"10.1109/INM.2009.5188794","DOIUrl":"https://doi.org/10.1109/INM.2009.5188794","url":null,"abstract":"Wireless Sensor Networks are low cost networks constituted by modest devices with limited resources, whose main function is monitoring. Based on the low price of these devices, it will be cheap to deploy a large amount of nodes to monitor a large area. However, to provide an efficient ad hoc network using these limited devices, new and optimized algorithms should be proposed. Most of the current work about WSNs are based on simulation studies and do not take in consideration engineering processes. This paper presents a Multi-Sink Node alternative to multi-hop solutions. The proposed solution also provides a new system for the discovery of devices and services over IPv6, allowing nodes to be automatically incorporated in the nearest WSN. This paper also presents a paradigm to efficiently provide mobility, granting a fast handover of nodes between different WSNs, without loosing the connection.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127159309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Probabilistic fault diagnosis for IT services in noisy and dynamic environments 动态噪声环境下IT服务的概率故障诊断
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188804
Lu Cheng, Xue-song Qiu, Luoming Meng, Yan Qiao, Zhiqing Li
The modern society has come to rely heavily on IT services. To improve the quality of IT services it is important to quickly and accurately detect and diagnose their faults which are usually detected as disruption of a set of dependent logical services affected by the failed IT resources. The task, depending on observed symptoms and knowledge about IT services, is always disturbed by noises and dynamic changing in the managed environments. We present a tool for analysis of IT services faults which, given a set of failed end-to-end services, discovers the underlying resources of faulty state. We demonstrate empirically that it applies in noisy and dynamic changing environments with bounded errors and high efficiency. We compare our algorithm with two prior approaches, Shrink and Maxcoverage, in two well-known types of network topologies. Experimental results show that our algorithm improves the overall performance.
现代社会已经开始严重依赖信息技术服务。为了提高IT服务的质量,快速准确地检测和诊断它们的故障非常重要,这些故障通常被检测为受故障IT资源影响的一组依赖逻辑服务的中断。根据观察到的症状和有关IT服务的知识,该任务总是受到受管理环境中的噪声和动态变化的干扰。本文提出了一种用于分析IT服务故障的工具,该工具在给定一组失败的端到端服务的情况下,发现故障状态的底层资源。我们的经验证明,它适用于噪声和动态变化的环境,具有有限的误差和高效率。我们将我们的算法与两种已知的网络拓扑类型中的收缩和最大覆盖两种先前的方法进行比较。实验结果表明,该算法提高了整体性能。
{"title":"Probabilistic fault diagnosis for IT services in noisy and dynamic environments","authors":"Lu Cheng, Xue-song Qiu, Luoming Meng, Yan Qiao, Zhiqing Li","doi":"10.1109/INM.2009.5188804","DOIUrl":"https://doi.org/10.1109/INM.2009.5188804","url":null,"abstract":"The modern society has come to rely heavily on IT services. To improve the quality of IT services it is important to quickly and accurately detect and diagnose their faults which are usually detected as disruption of a set of dependent logical services affected by the failed IT resources. The task, depending on observed symptoms and knowledge about IT services, is always disturbed by noises and dynamic changing in the managed environments. We present a tool for analysis of IT services faults which, given a set of failed end-to-end services, discovers the underlying resources of faulty state. We demonstrate empirically that it applies in noisy and dynamic changing environments with bounded errors and high efficiency. We compare our algorithm with two prior approaches, Shrink and Maxcoverage, in two well-known types of network topologies. Experimental results show that our algorithm improves the overall performance.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125804092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Heteroscedastic models to track relationships between management metrics 用于跟踪管理度量之间关系的异方差模型
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188838
Miao Jiang, M. A. Munawar, Thomas Reidemeister, Paul A. S. Ward
Modern software systems expose management metrics to help track their health. Recently, it was demonstrated that correlations among these metrics allow faults to be detected and their causes localized. In particular, linear regression models have been used to capture metric correlations. We show that for many pairs of correlated metrics in software systems, such as those based on Java Enterprise Edition (JavaEE), the variance of the predicted variable is not constant. This behaviour violates the assumptions of linear regression, and we show that these models may produce inaccurate results. In this paper, leveraging insight from the system behaviour, we employ an efficient variant of linear regression to capture the non-constant variance. We show that this variant captures metric correlations, while taking the changing residual variance into consideration. We explore potential causes underlying this behaviour, and we construct and validate our models using a realistic multi-tier enterprise application. Using a set of 50 fault-injection experiments, we show that we can detect all faults without any false alarm.
现代软件系统公开了管理指标,以帮助跟踪他们的健康状况。最近,证明了这些度量之间的相关性允许检测故障并将其原因定位。特别是,线性回归模型已被用于捕获度量相关性。我们表明,对于软件系统中的许多相关度量对,例如基于Java Enterprise Edition (JavaEE)的度量对,预测变量的方差不是恒定的。这种行为违反了线性回归的假设,我们表明这些模型可能产生不准确的结果。在本文中,利用系统行为的洞察力,我们采用线性回归的有效变体来捕获非恒定方差。我们表明,这种变体捕获度量相关性,同时考虑到变化的残差方差。我们探索这种行为背后的潜在原因,并使用实际的多层企业应用程序构建和验证我们的模型。通过一组50个故障注入实验,我们证明了我们可以检测到所有的故障而没有任何虚警。
{"title":"Heteroscedastic models to track relationships between management metrics","authors":"Miao Jiang, M. A. Munawar, Thomas Reidemeister, Paul A. S. Ward","doi":"10.1109/INM.2009.5188838","DOIUrl":"https://doi.org/10.1109/INM.2009.5188838","url":null,"abstract":"Modern software systems expose management metrics to help track their health. Recently, it was demonstrated that correlations among these metrics allow faults to be detected and their causes localized. In particular, linear regression models have been used to capture metric correlations. We show that for many pairs of correlated metrics in software systems, such as those based on Java Enterprise Edition (JavaEE), the variance of the predicted variable is not constant. This behaviour violates the assumptions of linear regression, and we show that these models may produce inaccurate results. In this paper, leveraging insight from the system behaviour, we employ an efficient variant of linear regression to capture the non-constant variance. We show that this variant captures metric correlations, while taking the changing residual variance into consideration. We explore potential causes underlying this behaviour, and we construct and validate our models using a realistic multi-tier enterprise application. Using a set of 50 fault-injection experiments, we show that we can detect all faults without any false alarm.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124066836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A systematic and practical approach to generating policies from service level objectives 从服务水平目标生成策略的系统和实用方法
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188791
Yuan Chen, Subu Iyer, D. Milojicic, Akhil Sahai
In order to manage a service to meet the agreed upon SLA, it is important to design a service of the required capacity and to monitor the service thereafter for violations at runtime. This objective can be achieved by translating SLOs specified in the SLA into lower-level policies that can then be used for design and enforcement purposes. Such design and operational policies are often constraints on thresholds of lower level metrics. In this paper, we propose a systematic and practical approach that combines fine-grained performance modeling with regression analysis to translate service level objectives into design and operational policies for multi-tier applications. We demonstrate that our approach can handle both request-based and session-based workloads and deal with workload changes in terms of both request volume and transaction mix. We validate our approach using both the RUBiS e-commerce benchmark and a trace-driven simulation of a business-critical enterprise application. These results show the effectiveness of our approach.
为了管理服务以满足商定的SLA,重要的是设计具有所需容量的服务,并在运行时监视服务的违规行为。通过将SLA中指定的slo转换为可用于设计和实施目的的较低级策略,可以实现这一目标。这样的设计和操作策略通常是对较低级别度量的阈值的约束。在本文中,我们提出了一种系统和实用的方法,将细粒度性能建模与回归分析相结合,将服务水平目标转化为多层应用程序的设计和操作策略。我们演示了我们的方法可以处理基于请求和基于会话的工作负载,并在请求量和事务组合方面处理工作负载变化。我们使用RUBiS电子商务基准测试和业务关键型企业应用程序的跟踪驱动模拟来验证我们的方法。这些结果表明了我们的方法的有效性。
{"title":"A systematic and practical approach to generating policies from service level objectives","authors":"Yuan Chen, Subu Iyer, D. Milojicic, Akhil Sahai","doi":"10.1109/INM.2009.5188791","DOIUrl":"https://doi.org/10.1109/INM.2009.5188791","url":null,"abstract":"In order to manage a service to meet the agreed upon SLA, it is important to design a service of the required capacity and to monitor the service thereafter for violations at runtime. This objective can be achieved by translating SLOs specified in the SLA into lower-level policies that can then be used for design and enforcement purposes. Such design and operational policies are often constraints on thresholds of lower level metrics. In this paper, we propose a systematic and practical approach that combines fine-grained performance modeling with regression analysis to translate service level objectives into design and operational policies for multi-tier applications. We demonstrate that our approach can handle both request-based and session-based workloads and deal with workload changes in terms of both request volume and transaction mix. We validate our approach using both the RUBiS e-commerce benchmark and a trace-driven simulation of a business-critical enterprise application. These results show the effectiveness of our approach.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126484866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Control information description model and processing mechanism in the trustworthy and controllable network 可信可控网络中的控制信息描述模型及处理机制
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188841
Peng Wang, Junzhou Luo, Wei Li, Yansheng Qu
Traditional networks are surprisingly fragile and difficult to manage. The problem can partly be attributed to the exposition of too many details of the controlled objects leading to the deluge of complexity in control plane, and the absence of network-wide views leading to the blindness of network management. With these problems, this paper decomposes the necessary network management information into three parts: the basic information, the cross-layer association, and global information. And a new controlled object description model is presented in the trustworthy and controllable network control architecture which separates the functionality of control and management of network form the data plane of IP network, and constructs the formal control and management plane of IP network. The new model identifies and abstracts the controlled objects with object-oriented approach. Based on this model, a cross-layer database is built to store the different layer control objects and to present cross-layer association view, a processing mechanism to process the original information is presented for global network state view, and a control plane is constructed to realize network control. The control information description model restricts the complexity of the controlled objects to their own implementation by abstraction, and alleviates the difficulty of network management. The cross-layer association view and the global network state view composes the network-wide views. The network-wide views realize the visibility and improve the manageability of network. Finally, we present 3 examples to indicate that the model alleviates the complexity of configuration management.
传统的网络非常脆弱,难以管理。造成这一问题的部分原因是由于对被控对象的详细描述过多,导致控制平面过于复杂,而缺乏全网视图导致网络管理的盲目性。针对这些问题,本文将必要的网管信息分解为基本信息、跨层关联信息和全局信息三部分。在可信可控的网络控制体系结构中,提出了一种新的被控对象描述模型,将网络的控制和管理功能从IP网络的数据平面中分离出来,构造了IP网络的形式控制和管理平面。该模型采用面向对象的方法对被控对象进行识别和抽象。在此模型的基础上,建立了跨层数据库存储各层控制对象并呈现跨层关联视图,提出了对全局网络状态视图原始信息进行处理的处理机制,构建了控制平面实现网络控制。控制信息描述模型通过抽象将被控对象的复杂性限制在自己的实现上,减轻了网络管理的难度。跨层关联视图和全局网络状态视图组成了网络范围视图。全网视图实现了网络的可见性,提高了网络的可管理性。最后,通过3个实例说明该模型减轻了配置管理的复杂性。
{"title":"Control information description model and processing mechanism in the trustworthy and controllable network","authors":"Peng Wang, Junzhou Luo, Wei Li, Yansheng Qu","doi":"10.1109/INM.2009.5188841","DOIUrl":"https://doi.org/10.1109/INM.2009.5188841","url":null,"abstract":"Traditional networks are surprisingly fragile and difficult to manage. The problem can partly be attributed to the exposition of too many details of the controlled objects leading to the deluge of complexity in control plane, and the absence of network-wide views leading to the blindness of network management. With these problems, this paper decomposes the necessary network management information into three parts: the basic information, the cross-layer association, and global information. And a new controlled object description model is presented in the trustworthy and controllable network control architecture which separates the functionality of control and management of network form the data plane of IP network, and constructs the formal control and management plane of IP network. The new model identifies and abstracts the controlled objects with object-oriented approach. Based on this model, a cross-layer database is built to store the different layer control objects and to present cross-layer association view, a processing mechanism to process the original information is presented for global network state view, and a control plane is constructed to realize network control. The control information description model restricts the complexity of the controlled objects to their own implementation by abstraction, and alleviates the difficulty of network management. The cross-layer association view and the global network state view composes the network-wide views. The network-wide views realize the visibility and improve the manageability of network. Finally, we present 3 examples to indicate that the model alleviates the complexity of configuration management.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116643855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A model based approach to autonomic management of virtual networks 基于模型的虚拟网络自治管理方法
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188882
S. Davy, C. Fahy, Zohra Boudjemil, L. Griffin, J. Strassner
Enabling the automated deployment and maintenance of current and future services over the Internet is a difficult task and requires self-aware functions that can adapt the services offered by the network to changing customer demand, business goals, and/or environmental conditions using policies. This paper describes a process to realise static and dynamic service deployment, given an understanding of available resources that exist in a communications network to build services . This process contributes to the realisation of the AutoI autonomic management architecture for the Internet, which aims to develop a self-managing virtual resource overlay that can span across heterogeneous networks and supports service mobility, security, quality of service and reliability. The core of the process is to take advantage of the substantial DEN-ng information model that decouples the definition and design of services from the resources available in the network. In this way, the creation and modification of services within a network can be planned, deployed, and even dynamically composed to meet context-aware demands. Providing such a service-aware process is central to the architecture being defined in the AutoI project and information modelling is seen as a major facilitator to this task.
通过Internet实现当前和未来服务的自动化部署和维护是一项困难的任务,并且需要能够使用策略调整网络提供的服务以适应不断变化的客户需求、业务目标和/或环境条件的自我意识功能。本文描述了实现静态和动态服务部署的过程,给出了对通信网络中存在的可用资源的理解,以构建服务。这个过程有助于实现AutoI自主管理架构的互联网,其目的是开发一个自我管理的虚拟资源覆盖,可以跨越异构网络,并支持服务移动性,安全性,服务质量和可靠性。该过程的核心是利用实质性的DEN-ng信息模型,该模型将服务的定义和设计与网络中可用的资源解耦。通过这种方式,可以计划、部署甚至动态组合网络中服务的创建和修改,以满足上下文感知需求。提供这样一个感知服务的流程是AutoI项目中定义的体系结构的核心,信息建模被视为该任务的主要促进者。
{"title":"A model based approach to autonomic management of virtual networks","authors":"S. Davy, C. Fahy, Zohra Boudjemil, L. Griffin, J. Strassner","doi":"10.1109/INM.2009.5188882","DOIUrl":"https://doi.org/10.1109/INM.2009.5188882","url":null,"abstract":"Enabling the automated deployment and maintenance of current and future services over the Internet is a difficult task and requires self-aware functions that can adapt the services offered by the network to changing customer demand, business goals, and/or environmental conditions using policies. This paper describes a process to realise static and dynamic service deployment, given an understanding of available resources that exist in a communications network to build services . This process contributes to the realisation of the AutoI autonomic management architecture for the Internet, which aims to develop a self-managing virtual resource overlay that can span across heterogeneous networks and supports service mobility, security, quality of service and reliability. The core of the process is to take advantage of the substantial DEN-ng information model that decouples the definition and design of services from the resources available in the network. In this way, the creation and modification of services within a network can be planned, deployed, and even dynamically composed to meet context-aware demands. Providing such a service-aware process is central to the architecture being defined in the AutoI project and information modelling is seen as a major facilitator to this task.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133494208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
iMark: An identity management framework for network virtualization environment iMark:网络虚拟化环境下的身份管理框架
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188833
Mosharaf Chowdhury, Fida-E. Zaheer, R. Boutaba
In recent years, network virtualization has been propounded as an open and flexible future internetworking paradigm that allows multiple virtual networks (VNs) to co-exist on a shared physical substrate. Each VN in a network virtualization environment (NVE) is free to implement its own naming, addressing, routing, and transport mechanisms. While such flexibility allows fast and easy deployment of diversified applications and services, ensuring end-to-end communication and universal connectivity poses a daunting challenge. This paper advocates that effective and efficient management of heterogeneous identifier spaces is the key to solving the problem of end-to-end connectivity in an NVE. We propose iMark, an identity management framework based on a global identity space, which enables end hosts to communicate with each other within and outside of their own networks through a set of controllers, adapters, and well-placed mappings without sacrificing the autonomy of the concerned VNs. We describe the procedures that manipulate these mappings between different identifier spaces and provide performance evaluation of the proposed framework.
近年来,网络虚拟化被认为是一种开放和灵活的未来互连范例,它允许多个虚拟网络(VNs)在共享的物理基板上共存。网络虚拟化环境(NVE)中的每个VN都可以自由地实现自己的命名、寻址、路由和传输机制。虽然这种灵活性允许快速和轻松地部署各种应用程序和服务,但确保端到端通信和通用连接是一项艰巨的挑战。本文认为对异构标识符空间进行有效和高效的管理是解决NVE端到端连接问题的关键。我们提出了iMark,这是一个基于全局身份空间的身份管理框架,它使终端主机能够通过一组控制器、适配器和位置良好的映射在自己的网络内外相互通信,而不会牺牲相关vpn的自主权。我们描述了操作不同标识符空间之间的这些映射的过程,并提供了所建议框架的性能评估。
{"title":"iMark: An identity management framework for network virtualization environment","authors":"Mosharaf Chowdhury, Fida-E. Zaheer, R. Boutaba","doi":"10.1109/INM.2009.5188833","DOIUrl":"https://doi.org/10.1109/INM.2009.5188833","url":null,"abstract":"In recent years, network virtualization has been propounded as an open and flexible future internetworking paradigm that allows multiple virtual networks (VNs) to co-exist on a shared physical substrate. Each VN in a network virtualization environment (NVE) is free to implement its own naming, addressing, routing, and transport mechanisms. While such flexibility allows fast and easy deployment of diversified applications and services, ensuring end-to-end communication and universal connectivity poses a daunting challenge. This paper advocates that effective and efficient management of heterogeneous identifier spaces is the key to solving the problem of end-to-end connectivity in an NVE. We propose iMark, an identity management framework based on a global identity space, which enables end hosts to communicate with each other within and outside of their own networks through a set of controllers, adapters, and well-placed mappings without sacrificing the autonomy of the concerned VNs. We describe the procedures that manipulate these mappings between different identifier spaces and provide performance evaluation of the proposed framework.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"281 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121263968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Security and mobility architecture for isolated wireless networks using WIMAX as an infrastructure 使用WIMAX作为基础设施的隔离无线网络的安全性和移动性架构
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188821
V. Gondi, N. Agoulmine
The main aim of the paper is to define a security and mobility architecture for users to roam along isolated wireless networks. Due to the mobility of the users as well as the networks some of the key issues like security and mobility management are not addressed properly due to non availability of infrastructure to handle authentications, mobility management in the access networks. To provide services in a isolated areas, and to cover large areas the ideal solution is provided by the cellular networks, but the bandwidth, cost of communication and the availability for different services are limited by the cellular networks. For this purpose we propose to integrate WIMAX (IEEE 802.16) based networks working in a mesh configuration with WLAN (IEEE 802.11) as a solution to provide different services. By this method a centralized system is proposed to process authentication and mobility management in the network for the users as well as access networks. In the proposed architecture, a master node acts as a gateway for mesh and slave nodes. The gateway has an AAA server which acts as an authentication and accounting server for the mesh nodes. WLAN are interconnected to mesh nodes and slave nodes and the users use WLAN as an access network. The user authenticates to the network using EAP or a onetime password method to access the services in the network. We also proposed mobility management in the architecture where users roams along different access networks in an efficient manner. We evaluated the architecture using a testbed, we calculated the time of authentications and re-authentications during roaming, delay at the user level while networks are in mobile mode.
本文的主要目的是为用户在孤立的无线网络上漫游定义一个安全和移动性架构。由于用户和网络的移动性,一些关键问题,如安全性和移动性管理,由于不可用的基础设施来处理身份验证,移动性管理在接入网络中没有得到适当的解决。为了在偏远地区提供服务,并覆盖大面积,蜂窝网络提供了理想的解决方案,但带宽、通信成本和不同服务的可用性受到蜂窝网络的限制。为此,我们建议将基于WIMAX (IEEE 802.16)的网状网络与WLAN (IEEE 802.11)集成在一起,作为提供不同服务的解决方案。通过这种方法,提出了一个集中的系统来处理用户和接入网在网络中的认证和移动管理。在提出的体系结构中,主节点充当网格和从节点的网关。网关有一个AAA服务器,作为mesh节点的认证和记帐服务器。无线局域网与mesh节点和slave节点互联,用户使用无线局域网作为接入网。用户通过EAP或一次性密码方式对网络进行认证,从而访问网络中的业务。我们还提出了架构中的移动性管理,用户可以在不同的接入网道上高效地漫游。我们使用测试平台评估了架构,我们计算了漫游期间认证和重新认证的时间,网络处于移动模式时用户级的延迟。
{"title":"Security and mobility architecture for isolated wireless networks using WIMAX as an infrastructure","authors":"V. Gondi, N. Agoulmine","doi":"10.1109/INM.2009.5188821","DOIUrl":"https://doi.org/10.1109/INM.2009.5188821","url":null,"abstract":"The main aim of the paper is to define a security and mobility architecture for users to roam along isolated wireless networks. Due to the mobility of the users as well as the networks some of the key issues like security and mobility management are not addressed properly due to non availability of infrastructure to handle authentications, mobility management in the access networks. To provide services in a isolated areas, and to cover large areas the ideal solution is provided by the cellular networks, but the bandwidth, cost of communication and the availability for different services are limited by the cellular networks. For this purpose we propose to integrate WIMAX (IEEE 802.16) based networks working in a mesh configuration with WLAN (IEEE 802.11) as a solution to provide different services. By this method a centralized system is proposed to process authentication and mobility management in the network for the users as well as access networks. In the proposed architecture, a master node acts as a gateway for mesh and slave nodes. The gateway has an AAA server which acts as an authentication and accounting server for the mesh nodes. WLAN are interconnected to mesh nodes and slave nodes and the users use WLAN as an access network. The user authenticates to the network using EAP or a onetime password method to access the services in the network. We also proposed mobility management in the architecture where users roams along different access networks in an efficient manner. We evaluated the architecture using a testbed, we calculated the time of authentications and re-authentications during roaming, delay at the user level while networks are in mobile mode.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116418780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Towards an information model for ITIL and ISO/IEC 20000 processes 建立ITIL和ISO/IEC 20000流程的信息模型
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188795
M. Brenner, T. Schaaf, Alexander Scherer
As IT service providers are adopting more comprehensive approaches towards IT Service Management (ITSM), they increasingly need to rely on ITSM software solutions in their day-to-day operations. However, when wishing to integrate ITSM software from one vendor with that of another, the lack of underlying standards becomes woefully apparent. Without any standardized information model for ITSM processes, efficient and integrated ITSM will remain a vision.
随着资讯科技服务供应商采用更全面的资讯科技服务管理(ITSM)方法,他们在日常运作中越来越需要依靠ITSM软件解决方案。然而,当希望将来自一个供应商的ITSM软件与另一个供应商的ITSM软件集成在一起时,底层标准的缺乏变得非常明显。如果没有针对ITSM过程的任何标准化信息模型,那么高效和集成的ITSM将仍然是一种愿景。
{"title":"Towards an information model for ITIL and ISO/IEC 20000 processes","authors":"M. Brenner, T. Schaaf, Alexander Scherer","doi":"10.1109/INM.2009.5188795","DOIUrl":"https://doi.org/10.1109/INM.2009.5188795","url":null,"abstract":"As IT service providers are adopting more comprehensive approaches towards IT Service Management (ITSM), they increasingly need to rely on ITSM software solutions in their day-to-day operations. However, when wishing to integrate ITSM software from one vendor with that of another, the lack of underlying standards becomes woefully apparent. Without any standardized information model for ITSM processes, efficient and integrated ITSM will remain a vision.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127213452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Adaptable misbehavior detection and isolation in wireless ad hoc networks using policies 使用策略的无线自组织网络中的自适应错误行为检测和隔离
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188816
O. Gonzalez, A. Hadjiantonis, G. Pavlou, M. Howarth
Wireless ad hoc networks provide the communications platform for new technologies and applications, such as vehicular ad hoc networks or wireless mesh networks. However, their multihop wireless nature makes them inherently unreliable and vulnerable, since their overall performance depends on the cooperative packet forwarding behavior of each individual node. In this paper we present a role-based approach that uses a distributed management overlay and gathers information about the packet forwarding activities of each node in the network. Using policies to control an adaptive algorithmic method that monitors the individual behavior of each node, we show that it is possible to detect, accuse and punish misbehaving nodes with a high degree of confidence. Our evaluation results demonstrate that after the successful detection of misbehaving nodes, their punishment through network isolation can significantly improve network performance in terms of packet delivery and throughput.
无线自组织网络为车载自组织网络或无线网状网络等新技术和新应用提供了通信平台。然而,它们的多跳无线特性使它们本质上不可靠且易受攻击,因为它们的整体性能取决于每个单独节点的协作数据包转发行为。在本文中,我们提出了一种基于角色的方法,该方法使用分布式管理覆盖层并收集有关网络中每个节点的数据包转发活动的信息。使用策略来控制一种自适应算法方法来监控每个节点的个体行为,我们证明了有可能以高度的置信度检测、指控和惩罚行为不端的节点。我们的评估结果表明,在成功检测到行为不端的节点后,通过网络隔离对其进行惩罚可以显著提高网络在数据包传输和吞吐量方面的性能。
{"title":"Adaptable misbehavior detection and isolation in wireless ad hoc networks using policies","authors":"O. Gonzalez, A. Hadjiantonis, G. Pavlou, M. Howarth","doi":"10.1109/INM.2009.5188816","DOIUrl":"https://doi.org/10.1109/INM.2009.5188816","url":null,"abstract":"Wireless ad hoc networks provide the communications platform for new technologies and applications, such as vehicular ad hoc networks or wireless mesh networks. However, their multihop wireless nature makes them inherently unreliable and vulnerable, since their overall performance depends on the cooperative packet forwarding behavior of each individual node. In this paper we present a role-based approach that uses a distributed management overlay and gathers information about the packet forwarding activities of each node in the network. Using policies to control an adaptive algorithmic method that monitors the individual behavior of each node, we show that it is possible to detect, accuse and punish misbehaving nodes with a high degree of confidence. Our evaluation results demonstrate that after the successful detection of misbehaving nodes, their punishment through network isolation can significantly improve network performance in terms of packet delivery and throughput.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126175474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
2009 IFIP/IEEE International Symposium on Integrated Network Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1