Issue VI

Dec Cover 08

New Trends in Network Management

Volume: 2008, No. VI

Date: December 2008

Guest Editors: Ramon Puigjaner-Trepat and Raouf Boutaba

Contents: Download full issue (PDF 7.4MB)

Jump to: Monograph | UPgrade European NETwork | CEPIS News


Papers

Abstracts

Application Oriented Network Management

This article provides an overview of application-oriented network management. First we present the general issues facing this environment, before looking at the metrics most commonly used to assess this type of management, especially in terms of performance and availability. Then we describe existing monitoring techniques before closing by emphasizing the importance of a good network design as part of any management strategy. Download

E2E Service Delivery Through User Mobile Session Management

A revolution in network connectivity is leading us towards the Next Generation Network (NGN) era with novel types of services which are driven by two trends: user-centric, End-to-End (E2E) service delivery respecting Service Level Agreement (SLA) and mobility. The user-centric requirements need a new session management paradigm for providing ubiquitous services. This paradigm should take into account the changing environment (user, terminal, network and service mobility) that we consider as various types of mobility, in order to ensure continuous service delivery conforming to E2E and SLA specifications. This paper provides a solution to the above requirements. We first propose a horizontal service overlay architecture for the composition of ubiquitous services. A mobile service session management paradigm based on virtual communities is then proposed to resolve Quality of Service (QoS) dysfunction due to various types of mobility. Using a dynamic cross-layer binding of the managed mobility, the proposed user mobile session enables E2E service delivery in a continuous and automatic way. A realistic application scenario is provided. Download

Secure Management of SCADA Networks

When a Supervisory Control and Data Acquisition (SCADA) system monitors and manages other complex infrastructures through the use of distributed technologies, it becomes a critical infrastructure by itself: a failure or disruption in any of its components could implicate a serious impact on the performance of the other infrastructures. The connection with other systems makes a SCADA system more vulnerable against attacks, generating new security problems. As a result, it is essential to perform diverse security analysis frequently in order to keep an updated knowledge and to provide recommendations and/or solutions to mitigate or avoid anomalous events. This will facilitate the existence of a suitable, reliable and available control network. Download

Converting Computer Malicious Activity into Digital Footprints Based on a Notional Representation

A vast amount of network traffic generated by distributed and heterogeneous Intrusion Detection Systems (IDS) could be unified and put together to form the source of a very detailed network event repository. However, this repository inevitably expands constantly making it difficult to query and build a holistic picture of the network activity stored within a reasonable time window. Consequently, there is a need for a more interactive approach that identifies and builds up an understanding of the network events as the data collection is progressing. The need to achieve this understanding efficiently brought forth the idea of creating a dynamic, interactive and flexible way to build attack signatures called digital footprints. Describing footprints by making use of the dynamic representation capabilities of eXtensible Markup Language (XML) feeds the threat assessment process with a notional understanding of what it should be looking for. This distinguishes the tasks that should be performed by each key element. Consequently, the engine that performs the threat assessment is based on a specific logic and the intelligence resides on the human factor that creates each digital footprint. Download

An Autonomic Architecture for Network Management and Control

Today’s networks comprise a large number of Network Elements (NEs) such as routers, firewalls, gateways, hosts, etc., each performing a set of elementary functions related to routing, security management, resource reservation, Quality of Service (QoS) management, etc. More sophisticated functions such as configuration of NEs, optimization of routing tables, troubleshooting, etc., are mainly handled in a centralized fashion often involving human intervention. However, networks are increasingly faced with rapidly changing situations and ever more complex configurations which are harder to adequately control in a centralized manner, because of timing issues (collecting and processing information takes time) and complexity issues (dealing with networks centrally/globally is increasingly complex). In this paper we propose an autonomic architecture for controlling and managing current and future networks. This solution enables the performance of control and management functions in a decentralized way, dealing locally with simpler situations in a more responsive way. Download

Autonomic Systems in Network and Service Management

Network and service management can be almost too complex to be carried out by suppliers and administrators without the aid of systems specifically dedicated to that task. One such solution is based on management systems designed around the Autonomic Computing paradigm. The idea is to get systems and the services to manage themselves, by performing a large percentage of management tasks without the need for any intervention by operators or administrators. FOCALE architecture is an example of the implementation of the concept of autonomic computing in network and service management systems. The article provides a description of this architecture applied to a specific scenario involving the provision of multimedia services in mobile Internet environments. Download

Users and Network Management for Secure Interworking and Roaming in WiMAX, 3G and Wi-Fi Networks Using RII Architcture

The increase in the usage of different access technologies has led to a need for new mechanisms to manage interworking and roaming between different network technologies. To provide secure and seamless roaming capability for mobile users across different access network domains, belonging to the same or different operators, we propose a roaming and interworking solution using an intermediary entity, called Roaming Interworking Intermediary (RII). A generic RII-based interworking and roaming architecture between WiMAX, 3GPP (third Generation Partnership Project) and WLAN networks is presented. This paper describes the operational practices, technical architectures, authentications and mobility mechanisms to enable a subscriber of one operator to roam securely into the access networks of another operator. Using ontology-based network management the operator and subscribers are handled efficiently. We provided details of network management for operators and subscriber management in the proposed architecture. A test-bed has been set up, using real pre-WiMAX and Wi-Fi equipment and a real operational cellular network, to demonstrate and evaluate the proposed solutions. The robustness, feasibility and efficiency of the proposed architecture are proven through different user scenarios. Download

A Life Devoted to Innovation in IT

Since the beginning of her career, innovation has been a common denominator in all the projects Radia Perlman has taken part in. Thanks to her great ability to innovate she has made significant contributions to computer science; indeed her development of the spanning-tree protocol has caused her to be widely regarded as “The Mother of the Internet”. During this press conference, which lasted an hour and a quarter, she informed and entertained her audience with her experiences and opinions on a range of subjects. We would like to give our readers the opportunity to enjoy the conference as much as her audience did. Download


CEPIS UPENET Novatica