Scheduled System Maintenance
On Saturday, December 10, single article sales and account management will be unavailable from 5:00 AM-7:30 PM ET.
We apologize for the inconvenience.
By Topic

Proceedings of the 3rd IEEE Workshop on IP Operations & Management (IPOM 2003) (IEEE Cat. No.03EX764)

1-3 Oct. 2003

Filter Results

Displaying Results 1 - 21 of 21
  • A reordering-free multipath traffic engineering architecture for DiffServ-MPLS networks

    Publication Year: 2003, Page(s):107 - 113
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (545 KB) | HTML iconHTML

    We propose a novel traffic engineering architecture for IP networks with multiprotocol label switching (MPLS) backbones. In this architecture, two (primary and secondary) label switched paths (LSPs) are established among every pair of IP routers located at the edge of an MPLS cloud. Traffic between a source-destination pair is then split between the primary and secondary LSPs using an ABR-like exp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flow-level upstream traffic behavior in broadband access networks: DSL versus broadband fixed wireless

    Publication Year: 2003, Page(s):135 - 141
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (483 KB) | HTML iconHTML

    We present flow-level upstream traffic behavior based on data collected from broadband fixed wireless (BFW) and digital subscriber line (DSL) access services. The study involves data collected using Cisco's NetFlow tools on both access networks. The observations indicate that a number of applications based on peer-to-peer (P2P) concepts create most of the upstream traffic. The flows observed are m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Off-line reduced complexity layout design for MPLS networks

    Publication Year: 2003, Page(s):99 - 105
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB) | HTML iconHTML

    One of the main reasons for the present market enthusiasm for the MPLS architecture is its capability for implementing evolved traffic engineering (TE) functionalities, as they are required, for example, to support the next generation Internet. MPLS paths (LSPs) can be calculated on-line, as demands arrive, or off-line for a given estimate of the traffic matrix. Off-line calculation has the advant... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A QoS specification proposal for IP virtual private networks

    Publication Year: 2003, Page(s):85 - 90
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB) | HTML iconHTML

    Demand for virtual private networks (VPN) are on the increase as enterprises opt for secure cost effective data networking solutions with specific quality of service (QoS) guarantees. The advantages of the Internet Protocol (IP) have made it the primary network layer protocol of choice for the future as well. Nevertheless, the concept of service differentiation and how to specify and guarantee it ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An integrated service and network management system for MPLS traffic engineering and VPN services

    Publication Year: 2003, Page(s):69 - 75
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (603 KB) | HTML iconHTML

    MPLS technology has recently been widely adopted, not only in large-scale IP backbones, but in metro and enterprise networks as well. Among the merits of MPLS, effective and efficient support of TE (traffic engineering) and VPN (virtual private network) services is the most influential factor that has facilitated the diffusion of the technology. However, although MPLS itself has become a currently... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MobyDick FlowVis - using NeTraMet for distributed protocol analysis in a 4G network environment

    Publication Year: 2003, Page(s):55 - 60
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (481 KB) | HTML iconHTML

    The commercial operation of future "4G" mobile wireless networks, comprising both IP-based voice and data uniformly, is widely considered as the next challenge for service providers. Within such an IP-environment, with its implicit integration of the control and data plane, passive measuring and metering will be one of the key elements for AAA and QoS provision, for performance and fault managemen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IPv6 migration implications for network management - introducing the site transitioning framework (STF)

    Publication Year: 2003, Page(s):39 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB) | HTML iconHTML

    The paper outlines the need to supplement the current work on network management for IPv6 with a system specifically to support IP transitioning. As something that is likely to play a major role in any IPv6 network for the considerable future, support for managing the transitioning aspects of managed networks is vital in terms of their infrastructure and service provision. While there is work bein... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RTTometer: measuring path minimum RTT with confidence

    Publication Year: 2003, Page(s):127 - 134
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (599 KB) | HTML iconHTML

    Internet path delay is a substantial metric in determining path quality. Therefore, it is not surprising that round-trip time (RTT) plays a tangible role in several protocols and applications, such as overlay network construction protocol, peer-to-peer services, and proximity-based server redirection. Unfortunately, current RTT measurement tools report delay without any further insight about path ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of adjusted probabilistic packet marking

    Publication Year: 2003, Page(s):9 - 13
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (374 KB) | HTML iconHTML

    Probabilistic packet marking (PPM) has been proposed for the identification of the source of a denial of service (DoS) attack (Savage, S. et al., Proc. ACM SIGCOM, p.295-305, 2000). PPM is based on marking packets with a fixed probability by all routers. However, using a fixed marking probability allows a large number of packets to reach the victim unmarked, which can be spoofed to impede tracebac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An algorithm for rerouting in traffic engineering of MPLS based IP networks

    Publication Year: 2003, Page(s):115 - 118
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (358 KB) | HTML iconHTML

    Multiprotocol label switching (MPLS) enables IP networks with quality of service to be traffic engineered well. Rerouting and bumping of label switched paths (LSP) are caused by link or node failure or recovery, connection admission or load balancing. We develop an algorithm for the traffic engineering problem associated with rerouting. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A bicriteria optimization approach for robust OSPF routing

    Publication Year: 2003, Page(s):91 - 98
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (591 KB) | HTML iconHTML

    For intra-domain routing, open shortest path first (OSPF) is the most commonly used protocol. In OSPF, traffic is routed using paths that are shortest with respect to a set of link costs. One problem is the optimization of OSPF link costs. The problem amounts to finding a set of link costs such that the total network congestion is minimized. We consider robust OSPF routing that takes into account ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An alarm management approach in the management of multi-layered networks

    Publication Year: 2003, Page(s):77 - 84
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB) | HTML iconHTML

    We consider large interconnected networks that operate under a user-provider paradigm (such as IP over SONET) where networks from different layers are in different administrative domains. In such a relationship, the overall network survivability can benefit from a limited sharing of network management data between networks of different layers. The paper proposes a multi-layered alarm management fr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation of an IPFIX compliant flow traffic meter: challenges and performance assessment

    Publication Year: 2003, Page(s):61 - 67
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB) | HTML iconHTML

    Several tools are already available for measuring IP traffic flows. However, a standard for exporting results is still missing and the IETF IPFIX WG (IP flow information export working group) is currently working towards this target. We present a prototype implementation of an IPFIX compliant flow meter and discuss its major challenges. Through an extensive profiling activity, we try to point out ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of telephony routing over IP (TRIP)

    Publication Year: 2003, Page(s):47 - 53
    Cited by:  Papers (3)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (545 KB) | HTML iconHTML

    A new signaling protocol being developed for use in the Internet or an enterprise IP network is analyzed. The protocol is telephony routing over IP (TRIP). The most basic function of TRIP is to locate the optimum gateway on a voice over IP (VoIP) network connected to the public switched telephone network (PSTN). TRIP is analyzed from a carrier perspective and performance results are discussed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing IPv4-to-IPv6 transition process in cellular networks and introducing new peer-to-peer services

    Publication Year: 2003, Page(s):31 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (573 KB) | HTML iconHTML

    The paper describes the acute problems with the current Internet Protocol (IPv4), especially from the IP-based cellular network point of view. As a solution to the problem, the document proposes the use of the new Internet Protocol (IPv6). Its adequate address space is clearly needed to enable new type of peer-to-peer services in mobile networks. Transition from IPv4 to IPv6 is a challenging task.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Traffic balancing via smart packets

    Publication Year: 2003, Page(s):15 - 21
    Cited by:  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (433 KB) | HTML iconHTML

    The World Wide Web (WWW) has caught people's attention since its inception and today is a major source of traffic in the Internet. WWW traffic is typically asymmetric: servers receive small requests but answer with large number of packets. To ensure good service, WWW servers require a large egress bandwidth to the Internet. We propose an innovative approach to connect Web servers to the Internet v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A data clustering algorithm for mining patterns from event logs

    Publication Year: 2003, Page(s):119 - 126
    Cited by:  Papers (41)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (615 KB) | HTML iconHTML

    Today, event logs contain vast amounts of data that can easily overwhelm a human. Therefore, mining patterns from event logs is an important system management task. The paper presents a novel clustering algorithm for log file data sets which helps one to detect frequent patterns from log files, to build log file profiles, and to identify anomalous log file lines. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of IP address fragmentation strategies for DDoS traceback

    Publication Year: 2003, Page(s):1 - 7
    Cited by:  Papers (5)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (518 KB) | HTML iconHTML

    Distributed denial-of-service (DDoS) attacks are among the most difficult and damaging security problems that the Internet currently faces. The component problems for an end-system that is the victim of a DDoS attack are: determining which incoming packets are part of the attack (intrusion detection); tracing back to find the origins of the attack (i.e., "traceback"); taking action to mitigate or ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proceedings of the 3rd IEEE Workshop on IP Operations & Management (IPOM 2003) [front matter]

    Publication Year: 2003, Page(s):i - xii
    Request permission for commercial reuse | PDF file iconPDF (302 KB)
    Freely Available from IEEE
  • Proceedings of the 3rd IEEE Workshop on IP Operations & Management (IPOM 2003) (IEEE Cat. No.03EX764)

    Publication Year: 2003
    Request permission for commercial reuse | PDF file iconPDF (538 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2003, Page(s): 142
    Request permission for commercial reuse | PDF file iconPDF (27 KB)
    Freely Available from IEEE