首页 > 最新文献

12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops最新文献

英文 中文
Towards adopting a tooldriven, integrated and automated change management process for virtual machine provisioning 朝着采用工具驱动的、集成的和自动化的变更管理流程来提供虚拟机
M. Hauser
Integrating legacy applications and establishing automated process flows often is a main requirement while establishing an effective IT service management (ITSM) system on historically grown and functionally separated organizations. The Leibniz Supercomputing Centre (LRZ, Leibniz-Rechenzentrum) as the main IT service provider for all universities in the area of Munich (Bavaria, Germany) handles IT services for more than 100,000 academic customers. Therefore the LRZ launched an ITSM project and aims to become one of the first ISO/IEC 20000 certified academic IT service providers. As a first pilot service for establishing a change management process, the ITSM working group at the LRZ chose the provisioning of virtual machines. On one hand the attention was turned on implementing an ISO/IEC 20000 compliant process model as well as the integration of legacy tools and applications. Another important requirement is the automation of the process, as the number of hosted virtual machines continual grows. This paper gives a hint on structuring legacy workflows and shows a way to describe them sufficiently. It is shown how to apply concepts on legacy applications and describes some challenges in implementing such an integrated and automated ITSM process.
集成遗留应用程序和建立自动化流程流通常是在历史发展和功能分离的组织上建立有效的IT服务管理(ITSM)系统时的主要需求。莱布尼茨超级计算中心(LRZ, Leibniz- rechenzentrum)作为慕尼黑(德国巴伐利亚州)地区所有大学的主要IT服务提供商,为超过10万名学术客户提供IT服务。因此,LRZ推出了ITSM项目,目标是成为首批获得ISO/IEC 20000认证的学术IT服务提供商之一。作为建立变更管理流程的第一个试验服务,LRZ的ITSM工作组选择了虚拟机的供应。一方面,注意力转向实现符合ISO/IEC 20000的过程模型以及遗留工具和应用程序的集成。随着托管虚拟机数量的不断增长,另一个重要的需求是流程的自动化。本文给出了构建遗留工作流的提示,并展示了一种充分描述它们的方法。它展示了如何在遗留应用程序上应用概念,并描述了在实现这样一个集成和自动化的ITSM过程中的一些挑战。
{"title":"Towards adopting a tooldriven, integrated and automated change management process for virtual machine provisioning","authors":"M. Hauser","doi":"10.1109/INM.2011.5990509","DOIUrl":"https://doi.org/10.1109/INM.2011.5990509","url":null,"abstract":"Integrating legacy applications and establishing automated process flows often is a main requirement while establishing an effective IT service management (ITSM) system on historically grown and functionally separated organizations. The Leibniz Supercomputing Centre (LRZ, Leibniz-Rechenzentrum) as the main IT service provider for all universities in the area of Munich (Bavaria, Germany) handles IT services for more than 100,000 academic customers. Therefore the LRZ launched an ITSM project and aims to become one of the first ISO/IEC 20000 certified academic IT service providers. As a first pilot service for establishing a change management process, the ITSM working group at the LRZ chose the provisioning of virtual machines. On one hand the attention was turned on implementing an ISO/IEC 20000 compliant process model as well as the integration of legacy tools and applications. Another important requirement is the automation of the process, as the number of hosted virtual machines continual grows. This paper gives a hint on structuring legacy workflows and shows a way to describe them sufficiently. It is shown how to apply concepts on legacy applications and describes some challenges in implementing such an integrated and automated ITSM process.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124875613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extension for information card systems to achieve User-Controlled Automated Identity Delegation 扩展信息卡系统,实现用户控制的自动身份授权
Thorsten Höllrigl, H. Kühner, J. Dinger, H. Hartenstein
The growing number of IT services in distributed systems is directly related to the security and privacy of personal data. User-centric federated identity management (FIM) attends to the privacy issue by enabling users to approve each data dissemination between the providers of identity-related information, so-called identity providers (IdPs), and the consumers of this information, the service providers (SPs). Furthermore, user-centric FIM tries to improve security and usability by providing users with a consistent digital-identity experience using so-called information cards (InfoCards). The InfoCard-based approach can help to improve usability, privacy and security, however, the approach is limited to front-channel communication and requires that each data exchange is manually approved by the user. A back-channel communication might be required in scenarios, in which an IdP wants to notify SPs about e.g. a deactivation of a user. In [3] we proposed an approach, named User-Controlled Automated Identity Delegation, that allows a back-channel communication by automating user approval based on delegation. In this paper we demonstrate the practicality of the approach in a real-world scenario by providing a performance evaluation conducted on a prototypical implementation.
分布式系统中越来越多的IT服务直接关系到个人数据的安全和隐私。以用户为中心的联邦身份管理(FIM)通过允许用户批准与身份相关的信息的提供者(所谓的身份提供者(idp))和该信息的消费者(服务提供者(sp))之间的每次数据分发来解决隐私问题。此外,以用户为中心的FIM试图通过使用所谓的信息卡(InfoCards)为用户提供一致的数字身份体验来提高安全性和可用性。基于infcard的方法可以帮助改进可用性、隐私性和安全性,但是,该方法仅限于前通道通信,并且要求每个数据交换都由用户手动批准。在某些情况下可能需要反向通道通信,其中IdP希望通知sp有关例如用户停用的情况。在b[3]中,我们提出了一种名为“用户控制的自动身份委托”的方法,该方法通过基于委托的自动化用户审批来实现反向通道通信。在本文中,我们通过提供对原型实现进行的性能评估,在现实场景中演示了该方法的实用性。
{"title":"Extension for information card systems to achieve User-Controlled Automated Identity Delegation","authors":"Thorsten Höllrigl, H. Kühner, J. Dinger, H. Hartenstein","doi":"10.1109/INM.2011.5990580","DOIUrl":"https://doi.org/10.1109/INM.2011.5990580","url":null,"abstract":"The growing number of IT services in distributed systems is directly related to the security and privacy of personal data. User-centric federated identity management (FIM) attends to the privacy issue by enabling users to approve each data dissemination between the providers of identity-related information, so-called identity providers (IdPs), and the consumers of this information, the service providers (SPs). Furthermore, user-centric FIM tries to improve security and usability by providing users with a consistent digital-identity experience using so-called information cards (InfoCards). The InfoCard-based approach can help to improve usability, privacy and security, however, the approach is limited to front-channel communication and requires that each data exchange is manually approved by the user. A back-channel communication might be required in scenarios, in which an IdP wants to notify SPs about e.g. a deactivation of a user. In [3] we proposed an approach, named User-Controlled Automated Identity Delegation, that allows a back-channel communication by automating user approval based on delegation. In this paper we demonstrate the practicality of the approach in a real-world scenario by providing a performance evaluation conducted on a prototypical implementation.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115464256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
COPD24: From Future Internet technologies to health telemonitoring and teletreatment application COPD24:从未来互联网技术到健康远程监测和远程治疗的应用
K. Wac, D. Hausheer
The emergence of high bandwidth public wireless networks and miniaturized personal mobile devices gives rise to new mobile healthcare services. To this end, the COPD24 system provides highly customizable vital signs tele-monitoring and tele-treatment for Chronic Obtrusive Pulmonary Disease (COPD) patients based on a body area network (BAN) and a mobile health care (m-health) service platform utilizing next generation public wireless networks. The developed system allows the incorporation of diverse medical sensors via wireless connections, and the live transmission of the measured vital signs to healthcare providers as well as real-time feedback to the patient. The system also incorporates environmental state sensors, e.g., air quality sensors deployed in access points of Future Internet (FI) infrastructure, enabling to derive high-granularity, up to date information about the state of the air the patient is in and thus enabling him to make an informed choice on how to manage his health. In this paper we present the COPD system case study, and we derive its design implications for m-health and FI technologies.
高带宽公共无线网络和小型化个人移动设备的出现,催生了新的移动医疗服务。为此,COPD24系统基于体域网络(BAN)和利用下一代公共无线网络的移动医疗(m-health)服务平台,为慢性阻塞性肺疾病(COPD)患者提供高度可定制的生命体征远程监测和远程治疗。开发的系统允许通过无线连接整合各种医疗传感器,并将测量到的生命体征实时传输给医疗保健提供者,并实时反馈给患者。该系统还集成了环境状态传感器,例如部署在未来互联网(FI)基础设施接入点的空气质量传感器,从而能够获得有关患者所处空气状态的高粒度最新信息,从而使患者能够就如何管理自己的健康做出明智的选择。在本文中,我们提出了慢性阻塞性肺病系统的案例研究,并得出了其对移动健康和FI技术的设计意义。
{"title":"COPD24: From Future Internet technologies to health telemonitoring and teletreatment application","authors":"K. Wac, D. Hausheer","doi":"10.1109/INM.2011.5990491","DOIUrl":"https://doi.org/10.1109/INM.2011.5990491","url":null,"abstract":"The emergence of high bandwidth public wireless networks and miniaturized personal mobile devices gives rise to new mobile healthcare services. To this end, the COPD24 system provides highly customizable vital signs tele-monitoring and tele-treatment for Chronic Obtrusive Pulmonary Disease (COPD) patients based on a body area network (BAN) and a mobile health care (m-health) service platform utilizing next generation public wireless networks. The developed system allows the incorporation of diverse medical sensors via wireless connections, and the live transmission of the measured vital signs to healthcare providers as well as real-time feedback to the patient. The system also incorporates environmental state sensors, e.g., air quality sensors deployed in access points of Future Internet (FI) infrastructure, enabling to derive high-granularity, up to date information about the state of the air the patient is in and thus enabling him to make an informed choice on how to manage his health. In this paper we present the COPD system case study, and we derive its design implications for m-health and FI technologies.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"681 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123050948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Conflict analysis during authoring of management policies for federations 在为联邦编写管理策略期间进行冲突分析
J. Barron, S. Davy, B. Jennings
We outline a policy conflict analysis process for the analysis of newly specified federation-level policies against previously deployed local/federation policies. The process is generic in the sense that it can be employed by each domain participating in a federation to help maintain the consistency of their local system with that of the federation. The conflict analysis process utilises an information model and associated ontology for representing both the static and dynamic application-specific aspects of the local operating environment and the federation to aid in the detection of potential inconsistencies. It employs two algorithms, one for the selection of previously deployed policies related to the federation-level policy and the other for analysing the returned policies against the federation-level policy. The selection algorithm reduces the number of deployed policies required to be retrieved for analysis against any newly specified federation-level policy, while the conflict analysis algorithm detects inconsistencies relating to the conditional element of a policy rule. We discuss a concrete example in the form of a federated XMPP communication scenario.
我们概述了一个策略冲突分析流程,用于根据先前部署的本地/联邦策略分析新指定的联邦级策略。该流程是通用的,因为参与联合的每个域都可以使用它来帮助维护其本地系统与联合系统的一致性。冲突分析过程利用信息模型和相关本体来表示本地操作环境和联合的静态和动态特定于应用程序的方面,以帮助检测潜在的不一致。它使用两种算法,一种用于选择先前部署的与联邦级策略相关的策略,另一种用于根据联邦级策略分析返回的策略。选择算法减少了针对任何新指定的联邦级策略进行分析所需检索的已部署策略的数量,而冲突分析算法则检测与策略规则的条件元素相关的不一致性。我们以联邦XMPP通信场景的形式讨论一个具体示例。
{"title":"Conflict analysis during authoring of management policies for federations","authors":"J. Barron, S. Davy, B. Jennings","doi":"10.1109/INM.2011.5990579","DOIUrl":"https://doi.org/10.1109/INM.2011.5990579","url":null,"abstract":"We outline a policy conflict analysis process for the analysis of newly specified federation-level policies against previously deployed local/federation policies. The process is generic in the sense that it can be employed by each domain participating in a federation to help maintain the consistency of their local system with that of the federation. The conflict analysis process utilises an information model and associated ontology for representing both the static and dynamic application-specific aspects of the local operating environment and the federation to aid in the detection of potential inconsistencies. It employs two algorithms, one for the selection of previously deployed policies related to the federation-level policy and the other for analysing the returned policies against the federation-level policy. The selection algorithm reduces the number of deployed policies required to be retrieved for analysis against any newly specified federation-level policy, while the conflict analysis algorithm detects inconsistencies relating to the conditional element of a policy rule. We discuss a concrete example in the form of a federated XMPP communication scenario.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121791030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
On the design of Virtual machine Intrusion detection system 虚拟机入侵检测系统的设计
U. Tupakula, V. Varadharajan
In this paper we propose comprehensive security architecture called VICTOR to deal with different types of attacks on virtual machines. Our model takes into account the specific characteristics of operating system and applications running in each virtual machine (VM) at a fine granular level to deal with the attacks. Our architecture has several components such as entity validation, intrusion detection engine and dynamic analyzer. The entity validation component is used in the detection of attack traffic with spoofed source address, secure logging, and capturing information of the operating system and applications running in the virtual machines. The intrusion detection engine component is used for detection of known attacks and suspicious behaviour by monitoring the incoming and outgoing traffic of virtual machines. The dynamic analyzer is used for detection and validation of suspicious processes, detection of zero day attacks and fine granular isolation of malicious process or application that is generating the attack traffic.
本文提出了一种名为VICTOR的综合安全架构来应对不同类型的虚拟机攻击。我们的模型考虑了在每个虚拟机(VM)中运行的操作系统和应用程序的特定特征,并在细粒度级别上处理攻击。该体系结构由实体验证、入侵检测引擎和动态分析器等组成。实体验证组件用于检测具有欺骗源地址的攻击流量、安全日志记录以及捕获在虚拟机中运行的操作系统和应用程序的信息。入侵检测引擎组件通过监控虚拟机的进出流量来检测已知的攻击和可疑行为。动态分析器用于检测和验证可疑进程、检测零日攻击以及对生成攻击流量的恶意进程或应用程序进行细粒度隔离。
{"title":"On the design of Virtual machine Intrusion detection system","authors":"U. Tupakula, V. Varadharajan","doi":"10.1109/INM.2011.5990655","DOIUrl":"https://doi.org/10.1109/INM.2011.5990655","url":null,"abstract":"In this paper we propose comprehensive security architecture called VICTOR to deal with different types of attacks on virtual machines. Our model takes into account the specific characteristics of operating system and applications running in each virtual machine (VM) at a fine granular level to deal with the attacks. Our architecture has several components such as entity validation, intrusion detection engine and dynamic analyzer. The entity validation component is used in the detection of attack traffic with spoofed source address, secure logging, and capturing information of the operating system and applications running in the virtual machines. The intrusion detection engine component is used for detection of known attacks and suspicious behaviour by monitoring the incoming and outgoing traffic of virtual machines. The dynamic analyzer is used for detection and validation of suspicious processes, detection of zero day attacks and fine granular isolation of malicious process or application that is generating the attack traffic.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125202561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Incorporating virtualization awareness in service monitoring systems 在服务监控系统中整合虚拟化意识
M. D. Carvalho, L. Granville
Traditional service monitoring systems (e.g., Nagios and Cacti) have been conceived to monitor services hosted in physical computers. With the recent popularization of server virtualization platforms (e.g., Xen and VMware), monitored services can migrate from a physical computer to another, invalidating the original monitoring logic. In this paper, we investigate which strategies should be used to modify traditional service monitoring systems so that they can still provide accurate status information even for monitored services that are constantly moving on top of a set of servers with virtualization support.
传统的服务监视系统(例如Nagios和Cacti)被设想为监视驻留在物理计算机中的服务。随着最近服务器虚拟化平台(如Xen和VMware)的普及,被监控的服务可以从一台物理计算机迁移到另一台物理计算机,从而使原来的监控逻辑失效。在本文中,我们研究了应该使用哪些策略来修改传统的服务监视系统,以便它们仍然可以提供准确的状态信息,甚至对于在一组具有虚拟化支持的服务器上不断移动的被监视服务。
{"title":"Incorporating virtualization awareness in service monitoring systems","authors":"M. D. Carvalho, L. Granville","doi":"10.1109/INM.2011.5990704","DOIUrl":"https://doi.org/10.1109/INM.2011.5990704","url":null,"abstract":"Traditional service monitoring systems (e.g., Nagios and Cacti) have been conceived to monitor services hosted in physical computers. With the recent popularization of server virtualization platforms (e.g., Xen and VMware), monitored services can migrate from a physical computer to another, invalidating the original monitoring logic. In this paper, we investigate which strategies should be used to modify traditional service monitoring systems so that they can still provide accurate status information even for monitored services that are constantly moving on top of a set of servers with virtualization support.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126094040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Taking advantage of the diversity in wireless access networks: On the simulation of a user centric approach 利用无线接入网的多样性:以用户为中心方法的仿真研究
E. H. Cherkaoui, N. Agoulmine, Thinh P. Q. Nguyen, L. Toni, J. Fontaine
“Always Best Connected” or simply ABC concept has been introduced to express the possibility for mobile users to experience with smartphone/computer a continuity of service at any place any time. In this context, the aim of the fourth generation of wireless networks is to not only support high speed connection but also implement ABC taking benefit of the numerous underlying wireless technologies. For that, smart-phones should implement sophisticated access network selection mechanism to take benefit of this diversity. In our previous works, we have used the utility theory to propose several utility functions that measures the value of each access network vs. the preferences of the end users and we have shown how these preferences can be used by the user terminal to select the most appropriate access network. In this paper, we extend that work with the implementation of the solution in a simulator of heterogeneous access networks and perform a set of simulations to highlight the value added of the proposed solution. The obtained results show similar results as those obtained analytically and confirm the validity of the approach for the end users and the operators.
“始终最佳连接”或简单的ABC概念已经被引入,以表达移动用户在任何地点任何时间通过智能手机/电脑体验连续服务的可能性。在这种情况下,第四代无线网络的目标不仅是支持高速连接,而且要实现ABC,利用众多底层无线技术的优势。为此,智能手机应该实现复杂的接入网选择机制,以利用这种多样性。在我们之前的工作中,我们使用效用理论提出了几个效用函数,这些效用函数测量了每个接入网的价值与最终用户的偏好,并且我们已经展示了用户终端如何使用这些偏好来选择最合适的接入网。在本文中,我们通过在异构接入网络的模拟器中实现该解决方案来扩展该工作,并执行一组模拟以突出所提出的解决方案的附加价值。所得结果与解析结果相似,验证了该方法对终端用户和运营商的有效性。
{"title":"Taking advantage of the diversity in wireless access networks: On the simulation of a user centric approach","authors":"E. H. Cherkaoui, N. Agoulmine, Thinh P. Q. Nguyen, L. Toni, J. Fontaine","doi":"10.1109/INM.2011.5990516","DOIUrl":"https://doi.org/10.1109/INM.2011.5990516","url":null,"abstract":"“Always Best Connected” or simply ABC concept has been introduced to express the possibility for mobile users to experience with smartphone/computer a continuity of service at any place any time. In this context, the aim of the fourth generation of wireless networks is to not only support high speed connection but also implement ABC taking benefit of the numerous underlying wireless technologies. For that, smart-phones should implement sophisticated access network selection mechanism to take benefit of this diversity. In our previous works, we have used the utility theory to propose several utility functions that measures the value of each access network vs. the preferences of the end users and we have shown how these preferences can be used by the user terminal to select the most appropriate access network. In this paper, we extend that work with the implementation of the solution in a simulator of heterogeneous access networks and perform a set of simulations to highlight the value added of the proposed solution. The obtained results show similar results as those obtained analytically and confirm the validity of the approach for the end users and the operators.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123698005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A framework for migrating production snapshots of composite applications to virtualized environments 用于将组合应用程序的生产快照迁移到虚拟化环境的框架
Manish Sethi, Narendran Sachindran, Manoj Soni, Manish Gupta, P. Gupta
Migrating production applications from physical datacenters to a virtualized environment is becoming essential to reduce operational costs. In order to avoid direct access to production systems, migration from disk snapshots is preferable. Model based migration approaches are not suitable for this purpose since they need to perform configuration discovery on production systems. Recent approaches that rely upon an isolated network require special setup and are limited to handling network configurations only. In this paper we present a framework for instantiating an application from disk snapshots in a virtualized environment. Our approach comprises of formally specifying the knowledge about product configurations and compiling the knowledge into a plan. The plan is capable of discovering application configurations in an inconsistent configuration setup. A key feature of our framework is that knowledge is specified once per product and re-used across applications that use the product. We have implemented a prototype of our approach and evaluated it on a real world application. The evaluation demonstrates the feasibility of our approach for migration using disk snapshots.
将生产应用程序从物理数据中心迁移到虚拟化环境对于降低运营成本变得至关重要。为了避免直接访问生产系统,最好从磁盘快照迁移。基于模型的迁移方法不适合此目的,因为它们需要在生产系统上执行配置发现。最近依赖于隔离网络的方法需要特殊的设置,并且仅限于处理网络配置。在本文中,我们提出了一个框架,用于在虚拟环境中从磁盘快照实例化应用程序。我们的方法包括正式指定有关产品配置的知识,并将这些知识汇编成计划。该计划能够在不一致的配置设置中发现应用程序配置。我们框架的一个关键特性是,知识在每个产品中指定一次,并在使用该产品的应用程序中重用。我们已经实现了我们的方法的原型,并在一个真实世界的应用程序中对其进行了评估。评估证明了我们使用磁盘快照进行迁移的方法的可行性。
{"title":"A framework for migrating production snapshots of composite applications to virtualized environments","authors":"Manish Sethi, Narendran Sachindran, Manoj Soni, Manish Gupta, P. Gupta","doi":"10.1109/INM.2011.5990562","DOIUrl":"https://doi.org/10.1109/INM.2011.5990562","url":null,"abstract":"Migrating production applications from physical datacenters to a virtualized environment is becoming essential to reduce operational costs. In order to avoid direct access to production systems, migration from disk snapshots is preferable. Model based migration approaches are not suitable for this purpose since they need to perform configuration discovery on production systems. Recent approaches that rely upon an isolated network require special setup and are limited to handling network configurations only. In this paper we present a framework for instantiating an application from disk snapshots in a virtualized environment. Our approach comprises of formally specifying the knowledge about product configurations and compiling the knowledge into a plan. The plan is capable of discovering application configurations in an inconsistent configuration setup. A key feature of our framework is that knowledge is specified once per product and re-used across applications that use the product. We have implemented a prototype of our approach and evaluated it on a real world application. The evaluation demonstrates the feasibility of our approach for migration using disk snapshots.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"307 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116341420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Flow signatures of popular applications 流行应用程序的流签名
Vladislav Perelman, N. Melnikov, J. Schönwälder
Network flow data is widely used to analyze the protocol mix forwarded by a router or to identify anomalies that may be caused by hardware and software failures, configuration errors, or intrusion attempts. The goal of our research is to find application signatures in network flow traces that can be used to pinpoint certain applications, such as specific web browsers, mail clients, or media-players. Our starting point is the hypothesis that popular applications generate application specific flow signatures. In order to verify our hypothesis, we recorded traffic traces of several applications and we subsequently analyzed the traces to identify flow signatures of these applications. The flow signatures were formalized as queries of a stream-based flow query language. The queries have been executed on several flow traces in order to evaluate our approach.
网络流数据被广泛用于分析路由器转发的协议组合,或识别可能由硬件和软件故障、配置错误或入侵企图引起的异常。我们研究的目标是在网络流跟踪中找到应用程序签名,这些签名可用于精确定位某些应用程序,例如特定的web浏览器、邮件客户端或媒体播放器。我们的出发点是假设流行的应用程序生成特定于应用程序的流签名。为了验证我们的假设,我们记录了几个应用程序的流量痕迹,并随后分析了这些痕迹,以识别这些应用程序的流量签名。流签名被形式化为基于流的流查询语言的查询。为了评估我们的方法,查询已经在几个流跟踪上执行。
{"title":"Flow signatures of popular applications","authors":"Vladislav Perelman, N. Melnikov, J. Schönwälder","doi":"10.1109/INM.2011.5990668","DOIUrl":"https://doi.org/10.1109/INM.2011.5990668","url":null,"abstract":"Network flow data is widely used to analyze the protocol mix forwarded by a router or to identify anomalies that may be caused by hardware and software failures, configuration errors, or intrusion attempts. The goal of our research is to find application signatures in network flow traces that can be used to pinpoint certain applications, such as specific web browsers, mail clients, or media-players. Our starting point is the hypothesis that popular applications generate application specific flow signatures. In order to verify our hypothesis, we recorded traffic traces of several applications and we subsequently analyzed the traces to identify flow signatures of these applications. The flow signatures were formalized as queries of a stream-based flow query language. The queries have been executed on several flow traces in order to evaluate our approach.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121186009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Cost-efficient deployment of a wireless sensor network under dynamic spectrum sharing 动态频谱共享下无线传感器网络的经济高效部署
Jae-Young Seol, Seong-Lyun Kim
In this paper, we consider a way to deploy a wireless sensor network under the dynamic spectrum sharing. The dynamic spectrum sharing technique can help a sensor network overcome the shortage of radio resources because of getting crowded unlicensed ISM bands commonly used by it. For the purpose of this, we analyze the aggregate interference to a primary network from the sensor network as a secondary network. Base on the analysis, we propose a cost-efficient deployment algorithm. The proposed algorithm consists of the power control framework to avoid harmful interference and the inhomogeneous deployment strategy to guarantee k-coverage and k-connectivity with the least number of additional sensor nodes reducing the deployment cost. Through the numerical analysis to verify the performance of the proposed algorithm, we show the power control framework makes it possible that the sensor network is deployed with a primary network even under more restricted conditions, and the inhomogeneous deployment strategy saves the number of additional sensor nodes needed to cover a given sensing area by about 20%.
本文研究了一种动态频谱共享下无线传感器网络的部署方法。动态频谱共享技术可以帮助传感器网络克服由于其常用的未授权ISM频段拥挤而导致的无线电资源短缺的问题。为此,我们分析了传感器网络作为辅助网络对主网络的综合干扰。在此基础上,提出了一种经济高效的部署算法。该算法由功率控制框架和非均匀部署策略组成,以避免有害干扰,以最少的额外传感器节点数量保证k覆盖和k连通性,从而降低部署成本。通过数值分析验证算法的性能,我们表明功率控制框架使得传感器网络可以在更有限的条件下部署主网络,非均匀部署策略将覆盖给定传感区域所需的额外传感器节点数量节省了约20%。
{"title":"Cost-efficient deployment of a wireless sensor network under dynamic spectrum sharing","authors":"Jae-Young Seol, Seong-Lyun Kim","doi":"10.1109/INM.2011.5990555","DOIUrl":"https://doi.org/10.1109/INM.2011.5990555","url":null,"abstract":"In this paper, we consider a way to deploy a wireless sensor network under the dynamic spectrum sharing. The dynamic spectrum sharing technique can help a sensor network overcome the shortage of radio resources because of getting crowded unlicensed ISM bands commonly used by it. For the purpose of this, we analyze the aggregate interference to a primary network from the sensor network as a secondary network. Base on the analysis, we propose a cost-efficient deployment algorithm. The proposed algorithm consists of the power control framework to avoid harmful interference and the inhomogeneous deployment strategy to guarantee k-coverage and k-connectivity with the least number of additional sensor nodes reducing the deployment cost. Through the numerical analysis to verify the performance of the proposed algorithm, we show the power control framework makes it possible that the sensor network is deployed with a primary network even under more restricted conditions, and the inhomogeneous deployment strategy saves the number of additional sensor nodes needed to cover a given sensing area by about 20%.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116314256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1