Network Operations and Management Symposium, 2000. NOMS 2000. 2000 IEEE/IFIP

10-14 April 2000

Filter Results

Displaying Results 1 - 25 of 103
  • NOMS 2000. 2000 IEEE/IFIP Network Operations and Management Symposium 'The Networked Planet: Management Beyond 2000' (Cat. No.00CB37074)

    Publication Year: 2000
    Request permission for commercial reuse | PDF file iconPDF (587 KB)
    Freely Available from IEEE
  • Meta-level management of active network nodes and services

    Publication Year: 2000, Page(s):963 - 964
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (134 KB)

    This paper presents the usage of meta-level architectures within the framework of active network systems, in order to facilitate the management of services and applications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2000, Page(s):1019 - 1022
    Request permission for commercial reuse | PDF file iconPDF (129 KB)
    Freely Available from IEEE
  • Developing platform for cooperative Internet management

    Publication Year: 2000, Page(s):505 - 518
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (664 KB)

    This paper discusses the necessity of supporting the cooperative management of TCP/IP-based networks and describes a platform for this kind of management. The Internet and intra/extranets tend to be managed by organizations that have different management skills and policies. Because these organizations use different network management systems, their cooperation causes many problems. One is an incr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Economically managing multiple private data networks

    Publication Year: 2000, Page(s):491 - 503
    Cited by:  Papers (2)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (604 KB)

    In many cases, there is a need to manage a local addressing realm from a manager site located outside the realm. A particular important example is the case of NM service providers who provide network management services from a remote site. Such providers may have many customers, each using the same private address space. When all these networks are to be managed from a single management station, a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • COJ: a free CMIS compliant Java API and its various implementations

    Publication Year: 2000, Page(s):381 - 393
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (720 KB)

    Despite the potential advantages of the Java technology, very few experiments have been made so far on trying to provide an in depth integration of this technology with the TMN framework. To foster the experimentation of these advantages, we present a generic and free Java API developed for both OSI CMIS Manager and Agent sides. The main objective of this API is provide a solid basis for researche... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Traffic measurement based bandwidth dimensioning of broadband networks

    Publication Year: 2000, Page(s):307 - 320
    Cited by:  Papers (5)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB)

    Capability to optimally allocate network resources such as bandwidth is the key to the economical viability of modern telecommunication networks. Requirements such as adaptive updating of bandwidth allocations to track dynamic load variations, and preferential treatment for some services at the expense of others, based on economic considerations, however, add to the complexity of the task. We prop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proactive maintenance tools for transaction oriented wide area networks

    Publication Year: 2000, Page(s):847 - 860
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (880 KB)

    The motivation of the work presented in this paper comes from a real network management center in charge of supervising a very large hybrid telecommunications/data transaction-oriented network. We present a set of tools that we have developed and implemented in the AT&T Transaction Access Services (TAS) network, in order to automate and facilitate the process of diagnosing network faults and i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient polling layer for SNMP

    Publication Year: 2000, Page(s):477 - 490
    Cited by:  Papers (3)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (668 KB)

    We propose the introduction of a polling layer that allows the efficient instrumentation of management information models for the use of monitoring-intensive management applications. The polling layer allows the optimization of the number of polling packets sent to the SNMP agents to collect management data. We describe the architecture of the polling layer that allows the management applications ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proposal of a hierarchical network management method based on network management protocol monitoring

    Publication Year: 2000, Page(s):973 - 974
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (100 KB)

    This paper proposes a method for a hierarchical network management system that is mainly used in large-scale networks. In this method, management information is extracted from the standard management protocol packets exchanged between a manager and network elements, and is provided for an integrated manager View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building a service provisioning system using the Enterprise JavaBean framework

    Publication Year: 2000, Page(s):367 - 380
    Cited by:  Papers (1)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (628 KB)

    This paper provides an overview of the Sun Microsystems Enterprise JavaBeansTM application framework in the context of a service provisioning system for GTE's IP Telecom offerings. The provisioning system takes advantage of the capabilities of EJB to provide a scalable, robust system that supports easy introduction of new services. The paper further describes the strengths and weaknesse... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tele-traffic theory meets data mining

    Publication Year: 2000, Page(s):997 - 998
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB)

    This paper presents an idea of which kind of methods and their combination are necessary to realize a pro-active network management system, which works in almost real time, for heterogeneous networks with grade of service requirements View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A middleware architecture for active distributed management of IP networks

    Publication Year: 2000, Page(s):291 - 304
    Cited by:  Papers (6)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (712 KB)

    We argue that a management platform for the future Internet has to be inherently distributed and programmable. This motivates us to introduce a new management architecture, named the active distributed management (ADM) architecture, which exploits the active network and mobile agent paradigms and provides the properties of distributed control and programmability inside the network. We realize the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predictive models for proactive network management: application to a production Web server

    Publication Year: 2000, Page(s):833 - 846
    Cited by:  Papers (15)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB)

    Proactive management holds the promise of taking corrective actions in advance of service disruptions. Achieving this goal requires predictive models so that potential problems can be anticipated. Our approach builds on previous research in which HTTP operations per second are studied in a Web server. As in this prior work, we model HTTP operations as two subprocesses, a (deterministic) trend subp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient content placement and management on cluster-based Web servers

    Publication Year: 2000, Page(s):463 - 476
    Cited by:  Papers (3)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (776 KB)

    Clustered server architectures have been employed for many years on the Internet as a way to improve performance, reliability and scalability in the presence of the Internet's explosive growth. Placing and managing content in such a complex system poses a number of challenging problems. In this paper, we describe the work that we are pursuing to design and implement a content placement and managem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet service provider access networking

    Publication Year: 2000, Page(s):971 - 972
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (88 KB)

    In this paper an alternative hybrid network solution is evaluated, which we have called the Internet Service Provider Access Network (ISPAN) View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrated management solution architecture

    Publication Year: 2000, Page(s):217 - 230
    Cited by:  Papers (5)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (720 KB)

    This paper discusses an integrated management architecture for building end-to-end management applications. While many efforts have been made by the industry to define the management architecture, the great challenge to the telecommunication software development industry is still to find a technology management strategy to cope with existing and emerging new network and management technologies. Al... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using CORBA and Java for PBX management

    Publication Year: 2000, Page(s):353 - 365
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB)

    Telephone switches are characteristically long-lived, evolving systems. We describe how a legacy two-tier system for telephone switch management was re-engineered as a three-tier Web-based application using CORBA and Java. In this solution the design-time advantages of portability and abstraction brought by an IDL information model are combined with the universality and ease of use of a Java GUI. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security considerations for workflow systems

    Publication Year: 2000, Page(s):655 - 668
    Cited by:  Papers (2)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (768 KB)

    Security services for workflow systems are becoming increasingly important for cross-domain interoperability in insecure environments. Workflow interfaces and system components involve the whole spectrum of security services including authentication, authorization, access control, data confidentiality and integrity, audit, non-repudiation, and administration. With the equipment of these services, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Addressing interoperability in network management with intelligent agents

    Publication Year: 2000, Page(s):925 - 926
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (124 KB)

    In this paper, we argue that the standard-based intelligent agents constitute an attractive technology to address the challenging issues arising from the unpredictable nature and dynamism of modern heterogeneous networks. Paramount among these issues are diverse services, networks and technologies, multiple vendor equipment, loosely organized management applications and inconsistent databases, mul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing application services over service provider networks: architecture and dependency analysis

    Publication Year: 2000, Page(s):61 - 74
    Cited by:  Papers (19)  |  Patents (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (828 KB)

    This paper proposes a novel approach for managing IP-based services and applications, reflecting the authors' experience with the IBM Global Network. It describes how one can extend the existing network and systems management paradigms to address problems in the management of application services hosted by network service providers (NSP). We introduce the concept of “service management domai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An adaptable service assurance system with CORBA and Remedy

    Publication Year: 2000, Page(s):995 - 996
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB)

    This paper presents an adaptable service assurance system that can be easily integrated into an operation support system for the telecommunication business. It adopts technologies like CORBA, Java, and workflow management. It also adopts off-the-shelf products to shorten the development cycle View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Management middleware for application front-ends on active networks

    Publication Year: 2000, Page(s):279 - 289
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB)

    Active networks allow network applications to customize the network infrastructure. This paradigm improves the end-to-end performance of some types of network application by delegating the “front-end” part of application tasks to network nodes. This paper proposes the architecture of middleware to promote the use of front-end delegation. The middleware provides functions for service pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integration of mobile agents with SNMP: why and how

    Publication Year: 2000, Page(s):609 - 622
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (704 KB)

    Mobile agents have been proposed as a solution to the problem of the management of increasingly heterogeneous networks. However, the proposed solutions often ignore the value of legacy solutions and protocols. This paper extends an existing mobile agent framework targeted at network management with an architecture and design for integration with an SNMP agent. Brief descriptions of the use of this... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security policy management for networked information systems

    Publication Year: 2000, Page(s):817 - 830
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (604 KB)

    Successful management of networked information systems is largely dependent on security. However, security is a very complex task that ranges from the level of crypto-primitives over crypto-protocols to the level of organizational matters and legislation. All this is comprised in a so-called security policy, which is often treated as an afterthought. One of the main reasons is the lack of appropri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.