首页 > 最新文献

2009 IFIP/IEEE International Symposium on Integrated Network Management最新文献

英文 中文
Heteroscedastic models to track relationships between management metrics 用于跟踪管理度量之间关系的异方差模型
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188838
Miao Jiang, M. A. Munawar, Thomas Reidemeister, Paul A. S. Ward
Modern software systems expose management metrics to help track their health. Recently, it was demonstrated that correlations among these metrics allow faults to be detected and their causes localized. In particular, linear regression models have been used to capture metric correlations. We show that for many pairs of correlated metrics in software systems, such as those based on Java Enterprise Edition (JavaEE), the variance of the predicted variable is not constant. This behaviour violates the assumptions of linear regression, and we show that these models may produce inaccurate results. In this paper, leveraging insight from the system behaviour, we employ an efficient variant of linear regression to capture the non-constant variance. We show that this variant captures metric correlations, while taking the changing residual variance into consideration. We explore potential causes underlying this behaviour, and we construct and validate our models using a realistic multi-tier enterprise application. Using a set of 50 fault-injection experiments, we show that we can detect all faults without any false alarm.
现代软件系统公开了管理指标,以帮助跟踪他们的健康状况。最近,证明了这些度量之间的相关性允许检测故障并将其原因定位。特别是,线性回归模型已被用于捕获度量相关性。我们表明,对于软件系统中的许多相关度量对,例如基于Java Enterprise Edition (JavaEE)的度量对,预测变量的方差不是恒定的。这种行为违反了线性回归的假设,我们表明这些模型可能产生不准确的结果。在本文中,利用系统行为的洞察力,我们采用线性回归的有效变体来捕获非恒定方差。我们表明,这种变体捕获度量相关性,同时考虑到变化的残差方差。我们探索这种行为背后的潜在原因,并使用实际的多层企业应用程序构建和验证我们的模型。通过一组50个故障注入实验,我们证明了我们可以检测到所有的故障而没有任何虚警。
{"title":"Heteroscedastic models to track relationships between management metrics","authors":"Miao Jiang, M. A. Munawar, Thomas Reidemeister, Paul A. S. Ward","doi":"10.1109/INM.2009.5188838","DOIUrl":"https://doi.org/10.1109/INM.2009.5188838","url":null,"abstract":"Modern software systems expose management metrics to help track their health. Recently, it was demonstrated that correlations among these metrics allow faults to be detected and their causes localized. In particular, linear regression models have been used to capture metric correlations. We show that for many pairs of correlated metrics in software systems, such as those based on Java Enterprise Edition (JavaEE), the variance of the predicted variable is not constant. This behaviour violates the assumptions of linear regression, and we show that these models may produce inaccurate results. In this paper, leveraging insight from the system behaviour, we employ an efficient variant of linear regression to capture the non-constant variance. We show that this variant captures metric correlations, while taking the changing residual variance into consideration. We explore potential causes underlying this behaviour, and we construct and validate our models using a realistic multi-tier enterprise application. Using a set of 50 fault-injection experiments, we show that we can detect all faults without any false alarm.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124066836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Probabilistic fault diagnosis for IT services in noisy and dynamic environments 动态噪声环境下IT服务的概率故障诊断
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188804
Lu Cheng, Xue-song Qiu, Luoming Meng, Yan Qiao, Zhiqing Li
The modern society has come to rely heavily on IT services. To improve the quality of IT services it is important to quickly and accurately detect and diagnose their faults which are usually detected as disruption of a set of dependent logical services affected by the failed IT resources. The task, depending on observed symptoms and knowledge about IT services, is always disturbed by noises and dynamic changing in the managed environments. We present a tool for analysis of IT services faults which, given a set of failed end-to-end services, discovers the underlying resources of faulty state. We demonstrate empirically that it applies in noisy and dynamic changing environments with bounded errors and high efficiency. We compare our algorithm with two prior approaches, Shrink and Maxcoverage, in two well-known types of network topologies. Experimental results show that our algorithm improves the overall performance.
现代社会已经开始严重依赖信息技术服务。为了提高IT服务的质量,快速准确地检测和诊断它们的故障非常重要,这些故障通常被检测为受故障IT资源影响的一组依赖逻辑服务的中断。根据观察到的症状和有关IT服务的知识,该任务总是受到受管理环境中的噪声和动态变化的干扰。本文提出了一种用于分析IT服务故障的工具,该工具在给定一组失败的端到端服务的情况下,发现故障状态的底层资源。我们的经验证明,它适用于噪声和动态变化的环境,具有有限的误差和高效率。我们将我们的算法与两种已知的网络拓扑类型中的收缩和最大覆盖两种先前的方法进行比较。实验结果表明,该算法提高了整体性能。
{"title":"Probabilistic fault diagnosis for IT services in noisy and dynamic environments","authors":"Lu Cheng, Xue-song Qiu, Luoming Meng, Yan Qiao, Zhiqing Li","doi":"10.1109/INM.2009.5188804","DOIUrl":"https://doi.org/10.1109/INM.2009.5188804","url":null,"abstract":"The modern society has come to rely heavily on IT services. To improve the quality of IT services it is important to quickly and accurately detect and diagnose their faults which are usually detected as disruption of a set of dependent logical services affected by the failed IT resources. The task, depending on observed symptoms and knowledge about IT services, is always disturbed by noises and dynamic changing in the managed environments. We present a tool for analysis of IT services faults which, given a set of failed end-to-end services, discovers the underlying resources of faulty state. We demonstrate empirically that it applies in noisy and dynamic changing environments with bounded errors and high efficiency. We compare our algorithm with two prior approaches, Shrink and Maxcoverage, in two well-known types of network topologies. Experimental results show that our algorithm improves the overall performance.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125804092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Optimizing correlation structure of event services considering time and capacity constraints 考虑时间和容量约束的事件服务关联结构优化
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188811
Bin Zhang, E. Al-Shaer
Constructing optimal event correlation architecture is crucial to large-scale event services. It plays an instrumental role in detecting composite events requested by different subscribers in scalable and timely manner. However, events generated from different sources might have different time and priority requirements. In addition, the network links and correlation servers might have different bandwidth and processing constraints respectively. In this work, we address the problem of optimizing distributed event correlation to maximize the correlation profit (benefit minus shipping and processing cost) of detecting composite events, while at the same time satisfying the network bandwidth, node capacity, and correlation tasks time constrains. We show that this problem is NP-hard and provide a heuristic approximation algorithm. We evaluate our heuristic approach with different network sizes, topologies under different event delivery and detection requirements. Our simulation study shows that the results obtained by our heuristic are close to the upper bound.
构建最优的事件关联体系结构是大规模事件服务的关键。它在以可扩展和及时的方式检测不同订阅者请求的组合事件方面发挥了重要作用。但是,从不同来源生成的事件可能具有不同的时间和优先级要求。此外,网络链路和相关服务器可能分别具有不同的带宽和处理约束。在这项工作中,我们解决了优化分布式事件相关性的问题,以最大限度地提高检测复合事件的相关利润(减去运输和处理成本),同时满足网络带宽,节点容量和相关任务时间限制。我们证明了这个问题是np困难的,并提供了一个启发式近似算法。我们在不同的网络大小、拓扑结构和不同的事件传递和检测要求下评估了我们的启发式方法。仿真研究表明,启发式算法得到的结果接近上界。
{"title":"Optimizing correlation structure of event services considering time and capacity constraints","authors":"Bin Zhang, E. Al-Shaer","doi":"10.1109/INM.2009.5188811","DOIUrl":"https://doi.org/10.1109/INM.2009.5188811","url":null,"abstract":"Constructing optimal event correlation architecture is crucial to large-scale event services. It plays an instrumental role in detecting composite events requested by different subscribers in scalable and timely manner. However, events generated from different sources might have different time and priority requirements. In addition, the network links and correlation servers might have different bandwidth and processing constraints respectively. In this work, we address the problem of optimizing distributed event correlation to maximize the correlation profit (benefit minus shipping and processing cost) of detecting composite events, while at the same time satisfying the network bandwidth, node capacity, and correlation tasks time constrains. We show that this problem is NP-hard and provide a heuristic approximation algorithm. We evaluate our heuristic approach with different network sizes, topologies under different event delivery and detection requirements. Our simulation study shows that the results obtained by our heuristic are close to the upper bound.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126172202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A solution to support risk analysis on IT Change Management 支持IT变更管理风险分析的解决方案
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188847
Juliano Araujo Wickboldt, Guilherme Sperb Machado, Weverton Cordeiro, R. C. Lunardi, A. O. D. Santos, F. Andreis, C. Both, L. Granville, L. Gaspary, C. Bartolini, David Trastour
The growing necessity of organizations in using technologies to support to their operations implies that managing IT resources became a mission-critical issue for the health of the primary companies' businesses. Thus, in order to minimize problems in the IT infrastructure, possibly affecting the daily business operations, risks intrinsic to the change process have to be analyzed and assessed. Risk Management is a widely discussed subject in several areas, although for IT Change Management it is quite a new discipline. The Information Technology Infrastructure Library (ITIL) introduces a set of best practices to conduct the management of IT infrastructures. According to ITIL, risks should be investigated, measured, and mitigated before any change is approved. Even with these guidelines, there is no default automatic method for risk assessment in IT Change Management. In this paper we introduce a risk analysis method based on the execution history of past changes. In addition, we propose a failure representation model to capture the feedback of the execution of changes over IT infrastructures.
组织越来越需要使用技术来支持其运营,这意味着管理IT资源已成为主要公司业务健康的关键任务问题。因此,为了最小化IT基础设施中的问题(可能影响日常业务操作),必须分析和评估变更过程固有的风险。风险管理是一个在许多领域被广泛讨论的主题,尽管对于IT变更管理来说它是一个相当新的学科。信息技术基础设施库(ITIL)介绍了一组管理IT基础设施的最佳实践。根据ITIL,在批准任何变更之前,应该调查、度量和减轻风险。即使有了这些指导方针,在IT变更管理中也没有默认的风险评估自动方法。本文介绍了一种基于变更执行历史的风险分析方法。此外,我们提出了一个故障表示模型来捕获IT基础设施上执行变更的反馈。
{"title":"A solution to support risk analysis on IT Change Management","authors":"Juliano Araujo Wickboldt, Guilherme Sperb Machado, Weverton Cordeiro, R. C. Lunardi, A. O. D. Santos, F. Andreis, C. Both, L. Granville, L. Gaspary, C. Bartolini, David Trastour","doi":"10.1109/INM.2009.5188847","DOIUrl":"https://doi.org/10.1109/INM.2009.5188847","url":null,"abstract":"The growing necessity of organizations in using technologies to support to their operations implies that managing IT resources became a mission-critical issue for the health of the primary companies' businesses. Thus, in order to minimize problems in the IT infrastructure, possibly affecting the daily business operations, risks intrinsic to the change process have to be analyzed and assessed. Risk Management is a widely discussed subject in several areas, although for IT Change Management it is quite a new discipline. The Information Technology Infrastructure Library (ITIL) introduces a set of best practices to conduct the management of IT infrastructures. According to ITIL, risks should be investigated, measured, and mitigated before any change is approved. Even with these guidelines, there is no default automatic method for risk assessment in IT Change Management. In this paper we introduce a risk analysis method based on the execution history of past changes. In addition, we propose a failure representation model to capture the feedback of the execution of changes over IT infrastructures.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126045000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A new approach for multi-sink environments in WSNs 无线传感器网络中多汇聚环境的一种新方法
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188794
Ricardo M. Silva, J. Silva, Milan Simek, F. Boavida
Wireless Sensor Networks are low cost networks constituted by modest devices with limited resources, whose main function is monitoring. Based on the low price of these devices, it will be cheap to deploy a large amount of nodes to monitor a large area. However, to provide an efficient ad hoc network using these limited devices, new and optimized algorithms should be proposed. Most of the current work about WSNs are based on simulation studies and do not take in consideration engineering processes. This paper presents a Multi-Sink Node alternative to multi-hop solutions. The proposed solution also provides a new system for the discovery of devices and services over IPv6, allowing nodes to be automatically incorporated in the nearest WSN. This paper also presents a paradigm to efficiently provide mobility, granting a fast handover of nodes between different WSNs, without loosing the connection.
无线传感器网络是由有限的设备和有限的资源组成的低成本网络,其主要功能是监测。基于这些设备的低价格,部署大量的节点来监控大面积的区域将是便宜的。然而,为了利用这些有限的设备提供高效的自组织网络,必须提出新的和优化的算法。目前关于无线传感器网络的研究大多是基于仿真研究,没有考虑工程过程。本文提出了一种多汇聚节点替代多跳解决方案。提出的解决方案还提供了一个通过IPv6发现设备和服务的新系统,允许节点自动合并到最近的WSN中。本文还提出了一种有效提供移动性的范例,在不丢失连接的情况下,在不同的wsn之间实现节点的快速切换。
{"title":"A new approach for multi-sink environments in WSNs","authors":"Ricardo M. Silva, J. Silva, Milan Simek, F. Boavida","doi":"10.1109/INM.2009.5188794","DOIUrl":"https://doi.org/10.1109/INM.2009.5188794","url":null,"abstract":"Wireless Sensor Networks are low cost networks constituted by modest devices with limited resources, whose main function is monitoring. Based on the low price of these devices, it will be cheap to deploy a large amount of nodes to monitor a large area. However, to provide an efficient ad hoc network using these limited devices, new and optimized algorithms should be proposed. Most of the current work about WSNs are based on simulation studies and do not take in consideration engineering processes. This paper presents a Multi-Sink Node alternative to multi-hop solutions. The proposed solution also provides a new system for the discovery of devices and services over IPv6, allowing nodes to be automatically incorporated in the nearest WSN. This paper also presents a paradigm to efficiently provide mobility, granting a fast handover of nodes between different WSNs, without loosing the connection.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127159309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A systematic and practical approach to generating policies from service level objectives 从服务水平目标生成策略的系统和实用方法
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188791
Yuan Chen, Subu Iyer, D. Milojicic, Akhil Sahai
In order to manage a service to meet the agreed upon SLA, it is important to design a service of the required capacity and to monitor the service thereafter for violations at runtime. This objective can be achieved by translating SLOs specified in the SLA into lower-level policies that can then be used for design and enforcement purposes. Such design and operational policies are often constraints on thresholds of lower level metrics. In this paper, we propose a systematic and practical approach that combines fine-grained performance modeling with regression analysis to translate service level objectives into design and operational policies for multi-tier applications. We demonstrate that our approach can handle both request-based and session-based workloads and deal with workload changes in terms of both request volume and transaction mix. We validate our approach using both the RUBiS e-commerce benchmark and a trace-driven simulation of a business-critical enterprise application. These results show the effectiveness of our approach.
为了管理服务以满足商定的SLA,重要的是设计具有所需容量的服务,并在运行时监视服务的违规行为。通过将SLA中指定的slo转换为可用于设计和实施目的的较低级策略,可以实现这一目标。这样的设计和操作策略通常是对较低级别度量的阈值的约束。在本文中,我们提出了一种系统和实用的方法,将细粒度性能建模与回归分析相结合,将服务水平目标转化为多层应用程序的设计和操作策略。我们演示了我们的方法可以处理基于请求和基于会话的工作负载,并在请求量和事务组合方面处理工作负载变化。我们使用RUBiS电子商务基准测试和业务关键型企业应用程序的跟踪驱动模拟来验证我们的方法。这些结果表明了我们的方法的有效性。
{"title":"A systematic and practical approach to generating policies from service level objectives","authors":"Yuan Chen, Subu Iyer, D. Milojicic, Akhil Sahai","doi":"10.1109/INM.2009.5188791","DOIUrl":"https://doi.org/10.1109/INM.2009.5188791","url":null,"abstract":"In order to manage a service to meet the agreed upon SLA, it is important to design a service of the required capacity and to monitor the service thereafter for violations at runtime. This objective can be achieved by translating SLOs specified in the SLA into lower-level policies that can then be used for design and enforcement purposes. Such design and operational policies are often constraints on thresholds of lower level metrics. In this paper, we propose a systematic and practical approach that combines fine-grained performance modeling with regression analysis to translate service level objectives into design and operational policies for multi-tier applications. We demonstrate that our approach can handle both request-based and session-based workloads and deal with workload changes in terms of both request volume and transaction mix. We validate our approach using both the RUBiS e-commerce benchmark and a trace-driven simulation of a business-critical enterprise application. These results show the effectiveness of our approach.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126484866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
iMark: An identity management framework for network virtualization environment iMark:网络虚拟化环境下的身份管理框架
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188833
Mosharaf Chowdhury, Fida-E. Zaheer, R. Boutaba
In recent years, network virtualization has been propounded as an open and flexible future internetworking paradigm that allows multiple virtual networks (VNs) to co-exist on a shared physical substrate. Each VN in a network virtualization environment (NVE) is free to implement its own naming, addressing, routing, and transport mechanisms. While such flexibility allows fast and easy deployment of diversified applications and services, ensuring end-to-end communication and universal connectivity poses a daunting challenge. This paper advocates that effective and efficient management of heterogeneous identifier spaces is the key to solving the problem of end-to-end connectivity in an NVE. We propose iMark, an identity management framework based on a global identity space, which enables end hosts to communicate with each other within and outside of their own networks through a set of controllers, adapters, and well-placed mappings without sacrificing the autonomy of the concerned VNs. We describe the procedures that manipulate these mappings between different identifier spaces and provide performance evaluation of the proposed framework.
近年来,网络虚拟化被认为是一种开放和灵活的未来互连范例,它允许多个虚拟网络(VNs)在共享的物理基板上共存。网络虚拟化环境(NVE)中的每个VN都可以自由地实现自己的命名、寻址、路由和传输机制。虽然这种灵活性允许快速和轻松地部署各种应用程序和服务,但确保端到端通信和通用连接是一项艰巨的挑战。本文认为对异构标识符空间进行有效和高效的管理是解决NVE端到端连接问题的关键。我们提出了iMark,这是一个基于全局身份空间的身份管理框架,它使终端主机能够通过一组控制器、适配器和位置良好的映射在自己的网络内外相互通信,而不会牺牲相关vpn的自主权。我们描述了操作不同标识符空间之间的这些映射的过程,并提供了所建议框架的性能评估。
{"title":"iMark: An identity management framework for network virtualization environment","authors":"Mosharaf Chowdhury, Fida-E. Zaheer, R. Boutaba","doi":"10.1109/INM.2009.5188833","DOIUrl":"https://doi.org/10.1109/INM.2009.5188833","url":null,"abstract":"In recent years, network virtualization has been propounded as an open and flexible future internetworking paradigm that allows multiple virtual networks (VNs) to co-exist on a shared physical substrate. Each VN in a network virtualization environment (NVE) is free to implement its own naming, addressing, routing, and transport mechanisms. While such flexibility allows fast and easy deployment of diversified applications and services, ensuring end-to-end communication and universal connectivity poses a daunting challenge. This paper advocates that effective and efficient management of heterogeneous identifier spaces is the key to solving the problem of end-to-end connectivity in an NVE. We propose iMark, an identity management framework based on a global identity space, which enables end hosts to communicate with each other within and outside of their own networks through a set of controllers, adapters, and well-placed mappings without sacrificing the autonomy of the concerned VNs. We describe the procedures that manipulate these mappings between different identifier spaces and provide performance evaluation of the proposed framework.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"281 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121263968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Security and mobility architecture for isolated wireless networks using WIMAX as an infrastructure 使用WIMAX作为基础设施的隔离无线网络的安全性和移动性架构
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188821
V. Gondi, N. Agoulmine
The main aim of the paper is to define a security and mobility architecture for users to roam along isolated wireless networks. Due to the mobility of the users as well as the networks some of the key issues like security and mobility management are not addressed properly due to non availability of infrastructure to handle authentications, mobility management in the access networks. To provide services in a isolated areas, and to cover large areas the ideal solution is provided by the cellular networks, but the bandwidth, cost of communication and the availability for different services are limited by the cellular networks. For this purpose we propose to integrate WIMAX (IEEE 802.16) based networks working in a mesh configuration with WLAN (IEEE 802.11) as a solution to provide different services. By this method a centralized system is proposed to process authentication and mobility management in the network for the users as well as access networks. In the proposed architecture, a master node acts as a gateway for mesh and slave nodes. The gateway has an AAA server which acts as an authentication and accounting server for the mesh nodes. WLAN are interconnected to mesh nodes and slave nodes and the users use WLAN as an access network. The user authenticates to the network using EAP or a onetime password method to access the services in the network. We also proposed mobility management in the architecture where users roams along different access networks in an efficient manner. We evaluated the architecture using a testbed, we calculated the time of authentications and re-authentications during roaming, delay at the user level while networks are in mobile mode.
本文的主要目的是为用户在孤立的无线网络上漫游定义一个安全和移动性架构。由于用户和网络的移动性,一些关键问题,如安全性和移动性管理,由于不可用的基础设施来处理身份验证,移动性管理在接入网络中没有得到适当的解决。为了在偏远地区提供服务,并覆盖大面积,蜂窝网络提供了理想的解决方案,但带宽、通信成本和不同服务的可用性受到蜂窝网络的限制。为此,我们建议将基于WIMAX (IEEE 802.16)的网状网络与WLAN (IEEE 802.11)集成在一起,作为提供不同服务的解决方案。通过这种方法,提出了一个集中的系统来处理用户和接入网在网络中的认证和移动管理。在提出的体系结构中,主节点充当网格和从节点的网关。网关有一个AAA服务器,作为mesh节点的认证和记帐服务器。无线局域网与mesh节点和slave节点互联,用户使用无线局域网作为接入网。用户通过EAP或一次性密码方式对网络进行认证,从而访问网络中的业务。我们还提出了架构中的移动性管理,用户可以在不同的接入网道上高效地漫游。我们使用测试平台评估了架构,我们计算了漫游期间认证和重新认证的时间,网络处于移动模式时用户级的延迟。
{"title":"Security and mobility architecture for isolated wireless networks using WIMAX as an infrastructure","authors":"V. Gondi, N. Agoulmine","doi":"10.1109/INM.2009.5188821","DOIUrl":"https://doi.org/10.1109/INM.2009.5188821","url":null,"abstract":"The main aim of the paper is to define a security and mobility architecture for users to roam along isolated wireless networks. Due to the mobility of the users as well as the networks some of the key issues like security and mobility management are not addressed properly due to non availability of infrastructure to handle authentications, mobility management in the access networks. To provide services in a isolated areas, and to cover large areas the ideal solution is provided by the cellular networks, but the bandwidth, cost of communication and the availability for different services are limited by the cellular networks. For this purpose we propose to integrate WIMAX (IEEE 802.16) based networks working in a mesh configuration with WLAN (IEEE 802.11) as a solution to provide different services. By this method a centralized system is proposed to process authentication and mobility management in the network for the users as well as access networks. In the proposed architecture, a master node acts as a gateway for mesh and slave nodes. The gateway has an AAA server which acts as an authentication and accounting server for the mesh nodes. WLAN are interconnected to mesh nodes and slave nodes and the users use WLAN as an access network. The user authenticates to the network using EAP or a onetime password method to access the services in the network. We also proposed mobility management in the architecture where users roams along different access networks in an efficient manner. We evaluated the architecture using a testbed, we calculated the time of authentications and re-authentications during roaming, delay at the user level while networks are in mobile mode.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116418780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Towards an information model for ITIL and ISO/IEC 20000 processes 建立ITIL和ISO/IEC 20000流程的信息模型
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188795
M. Brenner, T. Schaaf, Alexander Scherer
As IT service providers are adopting more comprehensive approaches towards IT Service Management (ITSM), they increasingly need to rely on ITSM software solutions in their day-to-day operations. However, when wishing to integrate ITSM software from one vendor with that of another, the lack of underlying standards becomes woefully apparent. Without any standardized information model for ITSM processes, efficient and integrated ITSM will remain a vision.
随着资讯科技服务供应商采用更全面的资讯科技服务管理(ITSM)方法,他们在日常运作中越来越需要依靠ITSM软件解决方案。然而,当希望将来自一个供应商的ITSM软件与另一个供应商的ITSM软件集成在一起时,底层标准的缺乏变得非常明显。如果没有针对ITSM过程的任何标准化信息模型,那么高效和集成的ITSM将仍然是一种愿景。
{"title":"Towards an information model for ITIL and ISO/IEC 20000 processes","authors":"M. Brenner, T. Schaaf, Alexander Scherer","doi":"10.1109/INM.2009.5188795","DOIUrl":"https://doi.org/10.1109/INM.2009.5188795","url":null,"abstract":"As IT service providers are adopting more comprehensive approaches towards IT Service Management (ITSM), they increasingly need to rely on ITSM software solutions in their day-to-day operations. However, when wishing to integrate ITSM software from one vendor with that of another, the lack of underlying standards becomes woefully apparent. Without any standardized information model for ITSM processes, efficient and integrated ITSM will remain a vision.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127213452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Adaptable misbehavior detection and isolation in wireless ad hoc networks using policies 使用策略的无线自组织网络中的自适应错误行为检测和隔离
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188816
O. Gonzalez, A. Hadjiantonis, G. Pavlou, M. Howarth
Wireless ad hoc networks provide the communications platform for new technologies and applications, such as vehicular ad hoc networks or wireless mesh networks. However, their multihop wireless nature makes them inherently unreliable and vulnerable, since their overall performance depends on the cooperative packet forwarding behavior of each individual node. In this paper we present a role-based approach that uses a distributed management overlay and gathers information about the packet forwarding activities of each node in the network. Using policies to control an adaptive algorithmic method that monitors the individual behavior of each node, we show that it is possible to detect, accuse and punish misbehaving nodes with a high degree of confidence. Our evaluation results demonstrate that after the successful detection of misbehaving nodes, their punishment through network isolation can significantly improve network performance in terms of packet delivery and throughput.
无线自组织网络为车载自组织网络或无线网状网络等新技术和新应用提供了通信平台。然而,它们的多跳无线特性使它们本质上不可靠且易受攻击,因为它们的整体性能取决于每个单独节点的协作数据包转发行为。在本文中,我们提出了一种基于角色的方法,该方法使用分布式管理覆盖层并收集有关网络中每个节点的数据包转发活动的信息。使用策略来控制一种自适应算法方法来监控每个节点的个体行为,我们证明了有可能以高度的置信度检测、指控和惩罚行为不端的节点。我们的评估结果表明,在成功检测到行为不端的节点后,通过网络隔离对其进行惩罚可以显著提高网络在数据包传输和吞吐量方面的性能。
{"title":"Adaptable misbehavior detection and isolation in wireless ad hoc networks using policies","authors":"O. Gonzalez, A. Hadjiantonis, G. Pavlou, M. Howarth","doi":"10.1109/INM.2009.5188816","DOIUrl":"https://doi.org/10.1109/INM.2009.5188816","url":null,"abstract":"Wireless ad hoc networks provide the communications platform for new technologies and applications, such as vehicular ad hoc networks or wireless mesh networks. However, their multihop wireless nature makes them inherently unreliable and vulnerable, since their overall performance depends on the cooperative packet forwarding behavior of each individual node. In this paper we present a role-based approach that uses a distributed management overlay and gathers information about the packet forwarding activities of each node in the network. Using policies to control an adaptive algorithmic method that monitors the individual behavior of each node, we show that it is possible to detect, accuse and punish misbehaving nodes with a high degree of confidence. Our evaluation results demonstrate that after the successful detection of misbehaving nodes, their punishment through network isolation can significantly improve network performance in terms of packet delivery and throughput.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126175474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
2009 IFIP/IEEE International Symposium on Integrated Network Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1