Sunday, May 15

Tutorial 2
Peer-to-Peer Networking: Concepts, Applications and Management

Workshop on End-to-End Monitoring Techniques and Services (E2EMON)
Part I

Lunch Break

Workshop on End-to-End Monitoring Techniques and Services (E2EMON)
Part II

Welcome Reception

Monday, May 16
Welcome Address & Keynote Session 1
Lunch Break
Social Event
Tuesday, May 17
Keynote Session 2
Lunch Break
Wednesday, May 18
Keynote Session 3
Lunch Break
Distinguished Experts Panel
Thursday, May 19

Tutorial 8
Planning, Management and Auto-Tuning Techniques for UMTS and Heterogeneous Radio Access Networks

SelfMan Workshop
Part I

Lunch Break

SelfMan Workshop
Part II


Technical Program

  Technical Program - Session 1 : Network Management (DELPHES 3BC Room)
Chair : Jürgen Schönwälder, International University Bremen, Germany

Programmable Middleware for the Dynamic Deployment of Services and Protocols in Ad-Hoc networks
S.Gouveris, S.Sivavakeesar, G.Pavlou, A.Malatras. Centre for Communication Systems Research, Dept. of Electronic Engineering, University of Surrey, UK


Management of Mobile Ad-Hoc networks: Evaluating the Network Behavior
Rémi Badonnel, Radu State, Olivier Festor, The MADYNES Research Team, LORIA-INRIA Lorraine, France

  LHA-SP: Secure protocols for Hierarchical Wireless Sensor Networks
L B. Oliveira, H. Chi Wong, A. A. Loureiro, Federal University of Minas Gerais Computer Science Department Belo Horizonte, Minas Gerais, Brazil
  Efficient Energy Management Protocol for Target tracking Sensor Network
Xiaojiang Du, Fengjing Lin, North Dakota State University, USA
  Technical Program - Session 2 : Application Monitoring (DELPHES 2BC Room)
Chair : Ehab El-Shaer,DePaul University, Chicago, USA

Monitoring Mining: models for automated system management
Sandeep Uttamchandani, Xiaoxin Yin, John Palmer, IBM Almaden Research Center, USA
Gul Agha, University of Illinois at Urbana-Champaign, USA


Health monitoring and control for application server environment
Nikos Anerousis, Ann Black, Susan Hanson, Lily Mummert, Giovanni Pacifici, IBM TJ Watson Research Center, USA

  Data-driven monitoring design of service levels and resource utilization
Chang-shing Perng Sheng Ma Steve Lin, David Thoenen, IBM Watson Research Center, USA
  Technical Program - Session 3 : Traffic Monitoring (DELPHES 3BC Room)
Chair : Philippe Owesarski, LAAS-CNRS, Toulouse, France

Data-Mining techniques for Effective Multi-Gigabit traffic Analysis
Mario Baldi, Elena Baralis, Fulvio Risso, Dipartimento di Automatica e Informatica - Politecnico di Torino, Torino, Italy


Real-Time views of network traffic using decentralized management
Koon-Seng Lim and Rolf Stadler, Laboratory of Communication Networks, KTH Royal Institute of Technology, Stockholm, Sweden

  Anomaly Detection for Internet Worms
Yousof Al-Hammadi, Department of Electrical and Electronic Engineering, The University of Melbourne, Australia
Christopher Leckie, Department of Computer Science andSoftware Engineering he University of Melbourne, Australia
  Technical Program - Session 4 : Cluster & Server Control (DELPHES 2BC Room)
Chair : Joe Hellerstein, IBM Research, USA
  Adaptable Server Clusters with QoS Objectives
Constantin Adam and Rolf Stadler, Laboratory of Communication Networks, KTH Royal Institute of Technology, Stockholm, Sweden
  Adaptive Entitlement Control to resource containers on shared servers
Xue Liu, Xiaoyun Zhu, Sharad Singhal, Martin Arlitt, Hewlett-Packard Laboratories, Palo Alto, USA
  Control of Weighted Faire Queing: Modeling, Implementation and Experiences
Ronghua Zhang, Tarek Abdelzaher, John Stankovic, University of Virginia, USA
Sujay Parekh, Yixin Diao, Maheswaran Surendra, IBM, USA
  Technical Program - Session 5 : Topology Management (DELPHES 3BC Room)
Chair : Rolf Stadler, Laboratory of Communication Networks, KTH Royal Institute of Technology, Stockholm, Sweden
  Automatic Tuning of ADSL circuits
M. Matsuno, S. Nakai, M. Morimitsu, NEC Corporation, Chiba, Japan
H. Ide, T. Ito, eAccess Corporation, Tokyo, Japan
  Redesigning Network Topology with Technology Considerations
Sami J. Habib, Kuwait University, Computer Engineering Department, Kuwait

Reducing the Complexity of Application Deployment in Large Data Centers
Tamar Eilam, Michael Kalantar, Alexander Konstantinou, Giovanni Pacifici, IBM T.J. Watson Research Center, USA

  Technical Program - Session 6 : Utility & SAN Management (DELPHES 2BC Room)
Chair : Alexander Keller, IBM T.J. Watson Research Center, USA
  A framework for applying inventory control to capacity management for utility computing
Joseph L. Hellerstein, Kaan Katircioglu, Maheswaran Surendra, IBM T.J. Watson Research Center, USA
  Root cause analysis of SAN performance problems: an I/O Path affine search approach
David Breitgand, Ealan Henis, Edya Ladan-Mozes, Onn Shehory, Elena Yerushalmi
IBM - Haifa Research Labs, Haifa University, Israel
  Quartermaster - A resource utility system
Sharad Singhal, Sven Graupner, Akhil Sahai, Vijay Machiraju, Jim Pruyne, Xiaoyun Zhu, Jerry Rolia, Martin Arlitt, Cipriano Santos, Dirk Beyer, Julie Ward, HP Laboratories, Palo Alto, USA
  Technical Program - Session 7 : Dimensioning & Provisioning (DELPHES 3BC Room)
Chair : Prosper Chemouil, France Telecom, France

Cooperation of control and management plane for provisioning in MPLS networks
E. Grampín, Universidad de la República, Montevideo, Urugay
J. Serrat, Universitat Politècnica de Catalunya, Barcelona, Spain


A Novel service oriented framework for automatic switched transport network
Barbara Martini and Fabio Baroncelli, Consorzio Nazionale Interuniversitario per le Telecomunicazioni (CNIT), Pisa, Italy
Piero Castoldi, Scuola Superiore Sant’Anna, Pisa, Italy

  On the management of aggregation networks with rapidly moving traffic demands
Frederic Van Quickenborne, Filip De Greve, Ingrid Moerman, Filip De Turck, Piet Demeester Department of Information Technology (INTEC), Ghent University, Belgium
  Zero-budget network dimensioning
Wenli Liu, Youssef Iraqi and Raouf Boutaba, School of Computer Science University of Waterloo, Canada
  Technical Program - Session 8 : Pricing (DELPHES 2BC Room)
Chair : Emil Lupu, Imperial College, UK

A location based incentive pricing scheme for tree based relaying in multihop cellular networks
Ming-Hua Lin, Chi-Chun Lo, Institute of Information Management, National Chiao-Tung University,Hsinchu, Taiwan, R.O.C


A tariff model to charge IP services with guaranteed quality: effects of users demand in a case study
N. Blefari-Melazzi, Dipartimento di Ingegneria Elettronica (DIE) – University of Rome Tor Vergata, Italy.
D. Di Sorte, M. Femminella, G. Reali, Dipartimento di Ingegneria Elettronica e dell’Informazione (DIEI) – University of Perugia, Italy

  Stabilizing Market via a novel auction based pricing mechanism for short term contract for network services
Juong-Sik Lee and Boleslaw K. Szymanski, Optimaret Inc. and Department of Computer Science, RPI, NY, USA
  Decentralized auction based pricing with peermart
David Hausheer, ETH Zurich, Computer Engineering and Networks Laboratory TIK, Switzerland
Burkhard Stiller, UniBw Munich, Information Systems Laboratory IIS, Germany & ETH Zurich, Computer Engineering and Networks Laboratory TIK, Switzerland
  Technical Program - Session 9 : QoS composition and adaptation (DELPHES 3BC Room)
Chair : Takeo Hamada, Fujitsu Labs of America, USA

QoS aware Service composition in large scale multi-domain networks
Jin Xiao, Raouf Boutaba, School of Computer Science, University of Waterloo, Canada.


Self-adaptive Distribued Management of QoS and SLS in multiservice networks
Solange Rito Lima, Paulo Carvalho, and Vasco Freitas, University of Minho, Departament of Informatics, Braga, Portugal

  Efficient Management of transcoding and multicasting multimedia streams
Asaf Henig Danny Raz, Department of Computer Science Technion, Haifa, Israel.
  Technical Program - Session 10 : Policy Management (DELPHES 2BC Room)
Chair : Nazim Agoulmine, University of Evry Val d'Essonne, France

Integrating Changes to a Hierarchical Policy Model
Susan Hinrichs, CISCO Systems, Champaing, IL, USA


Policy Management for Networked Systems and Applications
Dakshi Agrawal, Seraphin Calo, James Giles, Kang-Won Lee, and Dinesh Verma, IBM T. J. Watson Research Center, USA

  Policy Refinement for Diffserv Quality of Service management
Arosha K Bandara, Emil C Lupu, Alessandra Russo, Naranker Dulay, Morris Sloman, Imperial College London, UK
Paris Flegkas, Marinos Charalambides, George Pavlou, Centre for Communications Systems Research, University of Surrey, Gilford, UK
  Technical Program - Session 11 : Measurement (DELPHES 3BC Room)
Chair : Radu State, The MADYNES Research Team, LORIA - INRIA, France
  Measurement based Networking approach applied to congestion control in the multi-domain internet
Nicolas Larrieu and Philippe Owesarski, LAAS–CNRS, Toulouse, France
  Packet Marking for Integrated Load Control
Martin Karsten, School of Computer Science, University of Waterloo, Canada
Jens Schmitt, Distributed Computer Systems Lab, University of Kaiserslautern, Germany
  Efficient transmission of periodic data that follows a consistent daily pattern
Mouayad Albaghdadi, Kumail Razvi, Motorola, Inc., Shaumburg, IL, USA
  Technical Program - Session 12 : Fault Management (DELPHES 2BC Room)
Chair : Morris Sloman, Imperial College London, UK
  Troubleshooting: comparing tree and matrix representations
Alina Beygelzimer, Mark Brodie, Sheng Ma, Irina Rish, IBM T. J. Watson Research Center, USA
  Active Integrated Fault localization in communication networks
Yongning Tang and Ehab S. Al-Shaer, Multimedia Networking Research Laboratory School of Computer Science, Telecommunications and Information Systems DePaul University, Chicago, USA
Raouf Boutaba, School of Computer Science, University of Waterloo, Canada
  Scalable fault management for mobile networks beyond 3G
Giorgio Nunzi, Jürgen Quittek, Marcus Brunner, NEC Europe Ltd., Network Laboratories, Heidelberg, Germany
  Technical Program - Session 13 : Internet Management (DELPHES 3BC Room)
Chair : Raouf Boutaba, School of Computer Science, University of Waterloo, Canada
  Management of NAT based private networks
O. T. Satyanarayanan, J. Shiva Shankar, Cisco Systems, Inc., San Jose, USA
  An Integrated Security framework for XML based Management
Vincent Cridlig, Radu State, Oliver Festor, The MADYNES Research Team, LORIA - INRIA Lorraine, Nancy France
  Comparing Web Services with SNMP in a Management by Delegation Environment
Tiago Fioreze, Lisandro Zambenedetti Granville, Maria Janilce Bosquiroli Almeida, Liane Margarida Rockenbach Tarouco, Institute of Informatics, Federal University of Rio Grande do Sul, Porto Allegre, Brazil
  Characterization of SNMP MIB Modules
Jürgen Schönwälder, International University Bremen, Bremen, Germany
  Technical Program - Session 14 : Service Management (DELPHES 2BC Room)
Chair : Gabi Dreo-Rodosek, Leibniz Supercomputing Center, Munich, Germany
  A model of configuration complexity and its application to a change management system
Aaron B. Brown, Alexander Keller, Joseph L. Hellerstein, IBM T.J. Watson Research Center, USA

Semantic techniques for reconfiguring and adapting networks in pervasive environment
Mohamed Khedr, Ahmed Karmouch, Multimedia and Mobile Agent Research Laboratory
School of Information Technology and Engineering, University of Ottawa, Ottawa, Canada

Mohamed Ganna, Eric Horlait, Université Pierre et Marie Curie, Laboratoire LIP6-CNRS, Paris, France

  A model driven approach to rapid service introduction
Munir Cochinwala, Hyong Sop Shim, John Wullert II, Applied Research, Telcordia Technologies Inc, USA
  Moving From Data Modeling to Process Modeling in CIM
Arun Kumar, Neeran Karnic, IBM India Research Lab, India
Ravindranath C.K., Learning Systems and Multimedia Lab, Department of Electrical Engineering, Indian Institute of Sc., Bangalore, India
  Technical Program - Session 15 : OSS & Middleware (DELPHES 3BC Room)
Chair : Jean-Philippe Martin-Flatin, UQAM, Canada
  Investigating the feasibility of Open Development of Operations Support Solutions
C.R. Gallen and J. F. Reeve, University of Southampton, UK
  Distributed Messaging using Meta Channels and Message Bins
Sean Rooney, Daniel Bauer, Paolo Scotton, IBM Research Zurich Research Laboratory, Rüschlikon, Switzerland
  OSS Functions for Flexible Charging and Billing of Mobile Services in a Federated Environment
Bharat Bhushan, Jane Hall, Fraunhofer FOKUS, Berlin, Germany
Pascal Kurtansky, Burkhard Stiller, ETH Zürich, Computer Engineering and Networks Laboratory TIK, Zürich, Switzerland
  Technical Program - Session 16 : Threshold Management (DELPHES 2BC Room)
Chair : Danny Raz, Department of Computer Science Technion, Haifa, Israel
  Threshold management for problem determination in transaction based E-commerce systems
Manoj K. Agarwal, Anindya Neogi, IBM India Research Lab, New Delhi, India
Karen Appleby, Jamal Faik, Gautam Kar, Anca Sailer, IBM T.J. Watson Research Center, New York, USA
  Using automatically derived load thresholds to manage compute resources on demand
Karen Appleby, Germán Goldszmidt, IBM T.J. Watson Research Center, New York, USA
  Towards an Optimal network survivability reporting threshold
Andrew P. Snow and Shweta Agarwal, McClure School of Communication Systems Management
Lindley Hall, Ohio University, Athens USA

Application Sessions Program

  Application Sessions Program - Session 1 : Security (THEMIS Auditorium)
Chair : Felix Wu, University of California at Davis, USA

Quarantine Net: Design and Application
Matthijs Bomhoff, Casper Joost Eyckelhof, Quarantainenet v.o.f., The Netherlands
Remco van de Meent, Aiko Pras, University of Twente, The Netherlands


Management Framework for Unified Content Security
Yao-Min Chen & Yanyan Yang, WatchGuard Technologies, Inc., USA

  Federated Identity for the Management of Web-Centric Computing Infrastructure
Subrata Mazumdar, Avaya Inc. USA
  DeepTrust Management Application for Discovery, Selection, and Composition of Trustworthy Services
Karl Quinn, Declan O’ Sullivan, Dave Lewis, Vincent P. Wade, Trinity College Dublin. Ireland
Rob Brennan, Ericsson Ireland, Ireland
  Application Sessions Program - Session 2 : Business Cases and Surveys (THEMIS Auditorium)
Chair : Yoshiaki Kiriha, NEC, Japan
  An on Demand Transformation of a Core IBM Supply Chain Business Process
German Goldszmidt, IBM T. J. Watson Research Center, USA
  Enterprise Development Strategy for Satellite Systems - How Important is the Ground Operations System
Joseph Betser, Mary Rich, Sergio Alvarado, Philip Schmidt, Jaime Milstein, The Aerospace Corporation, USA
  Service/Resource Naming a Comparative Study
Reaz Ahmed, Raouf Boutaba, Fernando Cuervo, Youssef Iraqi, Dennis Tianshu Li, Noura Limam, Jin, Xiao, Joanna Ziembicki, University of Waterloo, Canada
  Service Discovery Protocols A Comparative Study
Reaz Ahmed, Raouf Boutaba, Fernando Cuervo, Youssef Iraqi, Dennis Tianshu Li, Noura Limam, Jin, Xiao, Joanna Ziembicki, University of Waterloo, Canada
  Application Sessions Program - Session 3 : Policy, Ontology, and SNMP (THEMIS Auditorium)
Chair : Pierre Rolin, France Telecom, France
  QAME Support for Policy-Based Management of Country-wide Networks
Clarissa C. Marquezan, Lisandro Z. Granville, Ricardo L. Vianna, Rodrigo S. Alves, Federal University of Rio Grande do Sul, Brazil
  Motivation for the NGOSS Ontology
John Strassner, Motorola Lab, USA
  Exploring Integrated Resource Management with WebSNMP
Junseong Cho, Sunyoung Han, Doyoon Kim, JongMyung Lee, R&D Center, Hanaro Telecom Inc., Korea
  RADIUS-Based SNMP Authorization
Vincent Cridlig, Radu State, Olivier Festor, Jean-François Leroy, The MADYNES Research team, LORIA-INRIA, France
  Application Sessions Program - Session 4 : Service, Operations, and Topology (THEMIS Auditorium)
Chair : Kohei Iseda, Fujitsu Laboratories, Japan
  OSS and Operational Challenges for Managing Intelligent Metro Optical Networks
Guido Bruno, Andrea Pinnola, Giuseppe Ricucci, Telecom Italia Lab, Italy
  On the Integration of Network Information into Topology-Aware Applications
Roger Karrer, Rice University, USA
Thomas Gross, ETH Zurich, Switzerland
  Home Service Management based on Open Service Aggregation Platform Concept
Hiroyuki Maeomichi, Ryutaro Kawamura, Ikuo Yamasaki, Akihiro Tsutsui, Kouji Yata, NTT Corporation, Japan
  Application Sessions Program - Session 5 : Performance and Analysis (THEMIS Auditorium)
Chair : Hanan Lutfiyya, The University of Western Ontario, London, Canada.
  Enabling Adaptive Grid Scheduling and Resource Management
Aleksandar Lazarevic, Lionel Sacks, Ognjen Prnjat, University College London, UK
  Performance Evaluation for a DiffServ Networks PHBs EF, AF, BE and Scavenger
Augusto Castelan Carlson, Edison Tadeu Lopes Melo, Carlos Becker Westphall, Federal University of Santa Catarina/NPD, Brazil
  Online Web Cluster Capacity Estimation and its Application to Energy Conservation
Chang-hao Tsai, Kang G. Shin, University Of Michigan, USA
John Reumann, IBM Research, USA
Sharad Singhal, Hewlett Packard, USA
  Network Management Analytics
Kemal Delic, Hewlett Packard, France
Umeshwar Dayal, Hewlett Packard, USA

Poster Program

  Poster Program - Session 1 (DELPHES 2-3A)
Chair : Lisandro Zambenedetti Granville, Federal University of Rio Grande do Sul, Brazil
  Modelling the Sequential Aspects of Network Configurations
Sylvain Hallé, Rudy Deca, Omar Cherkaoui, Roger Villemaire, Université of Quebec in Montreal, Canada
Daniel Puche, Cisco Systems, Canada
  Plug and Play Configuration for Composable Networks
M. Brunner, S. Schueltz, J. Tobella, M. Stiemerling, NEC Europe Ltd., Germany
  Smart business networks : architectural aspects and risks
Louis-Francois Pau, Rotterdam School of management, The Netherlands
  Design and Implementation of Automated Home Network Diagnosis Based on Configuration Matching
Kiyohito Yoshihara, KDDI R&D Laboratories Inc., Japan
Takeshi Kouyama, Kentaro Ishii, KDDI Corporation, Japan
Hiroki Horiuchi, KDDI R&D Laboratories Inc., Japan
  Detecting Configuration Errors in Operational SONET/SDH Networks
Wee Teck Ng, Pankaj Risbood, Swarup Acharya, Edward Lafontaine, Lucent Technologies, Inc., USA.
  Federated Identity Management: Shortcomings of existing standards
Wolfgang Hommel, Leibniz Computing Centre, Munich, Germany
Helmut Reiser, Ludwig Maximilian University Munich, Germany
  Optimisation of Policy-Based Internet Routing using Access-Control Lists
Vic Grout, John McGinn, University of Wales, UK
  BGP Behavior Analysis During the August 2003 Blackout
Zhen Wu, Eric Purpus, Jun Li, University of Oregon, USA
  A Formal Theory for Analysis and Optimization of BGP VPNs
Marco Bruti, Telecom Italia Sparkle S.p.A., Italy
  Architecture for User-aware Network Self-configuration
Nicola Blefari-Melazzi, University of Rome "Tor Vergata", Italy
Dario Di Sorte, Mauro Femminella, Gianluca Reali, University of Perugia, Italy
  An Organizational-driven Specialization of the Multi-Agent System Paradigm for Self-Management
E. Lavinal, T. Desprats, Y. Raynaud, Paul Sabatier University, France
  Self-Managed Wireless Sensor Networks: A Study Case
Linnyer Ruiz, Thais Braga, Fabrício Silva, Helen Assunção, José Marcos Nogueira, Antonio Alfredo Ferreira Loureiro, Federal University of Minas Gerais, Brazil
  Remodeling Hotspot Economics with Voice over Wi-Fi
Vinoth Gunasekaran, Fotios Harmantzis, Stevens Institute of Technology, USA
  Ontology Based Policy Mobility for Pervasive Computing
Sven van der Meer, TSSG, Waterford Institute of Technology, Ireland
Declan O'Sullivan, David Lewis, Trinity College Dublin, Ireland
Nazim Agoulmine, University of Evry, France
  Closing the loop of on-demand video service provisioning using a policy based management approach
L. Maknavicius, S. Piekarec, Y. Gaste, Alcatel Research & Innovation, France
N. Agoulmine, M. Fonseca, K. Haddadou, University of Evry, France
  Coordination of Policy-Based Autonomic Managers
Mandis Beigi, Seraphin Calo, James Giles, IBM, USA
  Policy Enforcement Performance and PBNM Benchmarking
Shane Magrath, Robin Braun, University of Technology, Sydney, Australia
  Policy-Based Architecture for QoS Management in Enterprise IP Networks
Marcos Siqueira, Nadia Nassif, Raulison Resende, Ademilson Silva, CPqD, Brazil
Mamede Lima Marques, University of Brasilia - UnB, Brazil
  Optimization of Network Firewall Policies using Directed Acyclical Graphs
Errin Fulp, Wake Forest University, USA
  A Worm Traffic Detection Algorithm for Enterprise Networks
Seong-Cheol Hong, Long-Quan Zhao, James Won-Ki Hong, Hong-Tack Ju, POSTECH, Republic of Korea
  Detecting DDoS attacks using a multilayer Perceptron classifier
Christos Siaterlis, Basil Maglaris, National Technical University of Athens, Greece
  Towards Distributed Network Intrusion Prevention with Respect to QoS Requirements
Andreas Hess, Mathias Bohge, Guenter Schaefer, Technical University of Berlin, Germany
  Application Communication Emulation For Performance Management Of NOW Clusters
Jeffrey Evans, Purdue University, USA
Cynthia Hood, Illinois Institute of Technology, USA
  WS-DSAC: An Admission Control and Load balancing Mechanism to Assure QoS Differentiation on Web Servers Clusters
A. Serra, J. Boudy, G. Barros, R. Ramos, Institut National des Télécommunications, France
Dominique Gaiti, UTT, France
  Application of Grid Concepts and Technologies to Network Management Systems
N.J. Hurley, T. Cox, C. Doherty, University College Dublin, Ireland
S. Collins, R. Brennan, Ericsson R&D Ireland, Ireland
  A Business Driven Management Framework for IT Systems Management
Issam Aib, University of Paris 6, France
Mathias Sallé, Claudio Bartolini, HP Research Labs, USA
A. Boulmakoul, HP Research Labs, UK
  QoS Aware Resource Management Architecture for OGSA Services Deployment
Edgar Magaña, Joan Serrat, Universitat Politecnica de Catalunya, Spain
  Dimensioning Network Resources in DiffServ over MPLS based Expedited Forwarding Service Subclasses
Hamada Alshaer, Eric Horlait, LIP6, France
  Poster Program - Session 2 (DELPHES 2-3A)
Chair : Nikos Anerousis, IBM T. J. Watson Research Center, USA
  Design and implementation of a Layer-7 MPLS-based Web Switching Architecture
Antonio Mancuso, Elias Carotti, Politecnico di Torino, Italy
Juan Carlos De Martin, IEIIT-CNR, Italy
Angelo R. Meo, Politecnico di Torino, Italy
  GMPLS Control Plane Auto-discovery Evaluation and Its Interfacing with OSS in IP Optical Network
Qiang Song, Ibrahim Habib, City College of New York, USA
Wesam Alanqar, Sprint, USA
  Inter-AS MPLS routing by EJB-based path computation server
Hiroshi Matsuura, Yasushi Yamanaka, Tatsuro Murakami, NTT, Japan
Kazumasa Takami, Soka University, Japan
  An architectural framework for Inter-domain quality of service provisioning
Michael Howarth, Paris Flegkas, George Pavlou, Panos Trimintzios, University of Surrey, UK
Hamid Asgari, Thales Research & Tecnology Limited, UK
David Griffin, J. Griem, University College London, UK
Mohamed Boucadair, France Telecom R&D, France
Panagiotis Georgatsos, Algonet SA, Greece
  A Programmable Network Platform with QoS-Differentiated Resource Allocation
Bushar Yousef, Doan Hoang, Univesity of Technology Sydney, Australia
Glynn Rogers, CSIRO, Australia
  Network Resource Allocation Method Using Constraint Satisfaction Problem
Kenichi Tayama, Shiro Ogasawara, Tetsuya Yamamura, NTT, Japan
  Towards a Framework for Failure Impact Analysis and Recovery with Respect to Service Level Agreements
Andreas Hanemann, David Schmitz, Leibniz Supercomputing Center, Germany
Martin Sailer, University of Munich (LMU), Germany
  Multi-fault Diagnosis in Dynamic Systems
Natalia Odintsova, Irina Rish, Sheng Ma, IBM, USA
  Design and experimental implementation of a hybrid optical performance monitoring system for in-service SLA guarantee
Carolina Pinart, Abdelhafid Amrani, CTTC, Spain
Gabriel Junyent, UPC, Spain
  Passive Packet Loss Monitoring Using a Hash-based Identification Technique
Satoru Ohta, Toshiaki Miyazaki, NTT Corporation, Japan.
  Simple Standardized Application Monitoring in an IP Environment
J. A. Weinstock, W. N. Culpepper, Cisco Systems, USA
C. L. Lowery, Comcast IP Services, USA
  FLEXA: Distributed and Flexible Network Monitoring with Autonomous Group Formation
Akira Uchiyama, Takaaki Umedu, Teruo Higashino, Osaka University, Japan
Keiichi Yasumoto, Nara Institute of Science and Technology, Japan
  A Hybrid Approach to Event Correlation and Simulation Management
Gabriel Jakobson, J. Buford, Altusys, USA
Lundy Lewis, Southern New Hampshire University, USA
  An Infrastructure for Distributed Event Acquisition
Hervé Debar, Benjamin Morin, Vincent Boissée, Didier Guérin, France Telecom R&D, France
  XIP: A Scalable and Distributed Architecture for Cross-domain Services
Fernando Cuervo, Arnold Jansen, Pierrick Guingo, Michel Sim, Alcatel, Canada
  Multi-Agent System Co-ordination in a Distributed Network Resource Management Scenario
Pere Vila, Jose Luis Marzo, Eusebi Calle, Lluis Fabrega, Universitat de Girona, Spain
  Towards a Transaction-Based Charging and Accounting of Distributed Services and Applications
M. Schmid, M. Debusmann, R. Kroeger, M. Halbig, University of Applied Sciences, Germany
  Proactive Management Based on Dynamic Bayesian Networks in Distributed Systems
Jianguo Ding, Yingcai Bai, Shanghai Jiao Tong University, Republic of China
Bernd J. Krämer, FernUniversität Hagen, Germany
  Performace Evaluation of Video Flows Integration over IP Networks using TAO
Antonio-Javier Garcia-Sanchez, Felipe Garcia-Sanchez, Joan Garcia-Haro, Technical University of Cartagena, Spain
  Network Perception using Data Imaging and Image Analysis
David Rosenbluth, Marc Pucci, Telcordia Technologies, USA
  An OpEx Framework for Dynamic Provisioning in Service Providers' Networks
Richard Rabbat, Takeo Hamada, Fujitsu Labs of America, USA
  A system supported method to design IT services
S. Abeck, S. Link, C. Mayerl, O. Mehl, T. Vogel, Universität Karlsruhe, Germany
  Service-Oriented Accounting and Charging for 3G and B3G Mobile Environments
Uwe Foell, Changpeng Fan, Siemens AG, Germany
Georg Carle, Falko Dressler, University of Tuebingen, Germany
Mehran Roshandel, T-Systems, Germany
  Resource Management over Interworking of 3G and Digital Broadcasting Networks
Luan Huang, Kar Ann Chew, Rahim Tafazolli, University of Surrey, UK .
  Evaluating a Congestion Management Architecture for SMS Gateways
Alberto Gonzalez Prieto, Rolf Stadler, KTH Royal Institute of Technology, Sweden
  Sensor-based Architecture for Quality-of-Service Support in WLANs
Sonia Waharte, Raouf Boutaba, University of Waterloo, Canada
  XML based Protocols for Managing Mobile Devices and Services Over-the-Air
Paul Oommen, Nokia, USA
  A Web Service Based-Architecture for Detecting Faults in Web Services
Abdelghani Benharref, Roch Glitho, Rachida Dssouli, Concordia University, Canada
  Light-Weight WBEM Design for Small Devices
Hee Nam Cho, Chang-Won Ahn, Sung-In Jung, ETRI, South Korea


Tutorial #1 Control Theory and Its Application to Network and Systems Management (VERANY 1 Room)
Instructor Dr. Joseph Hellerstein, IBM T.J. Watson Research Center, New York, USA


Feedback control is central to network and systems management. It is employed to achieve service level objectives for metrics such as response times by taking resource actions (e.g., scheduling priorities and bandwidth allocations). Feedback is also used to optimize resource allocations for a workload mix.

While computing systems in general and network management in particular make broad use of feedback control, this has traditionally been done in an ad hoc manner. In contrast, mechanical, electrical, and other areas of engineering design systems using control theory, a well developed and systematic approach to the analysis and design of feedback systems. Control theory provides a way to determine if feedback loops are stable (e.g., avoid wild oscillations), accurate in their control (e.g., achieve the right resource allocation policies), and settle quickly to their steady state values (e.g., to adjust to workload dynamics). Unfortunately, existing books on control theory are not well suited to computer scientists both because of the examples (e.g., eletrical circuits, dash pots) and the emphasize on continuous time instead of discrete time systems.
This tutorial provides an introduction to control theory for computer scientists that is sufficient to do basic control analysis and design. The presentation is divided into three parts: elements of control theory, control analysis and design, and real world applications.
Elements of control theory is an introduction to key concepts. Included here are control goals (e.g., regulation, optimization, disturbance rejection); the control architecture (with examples from the Apache web server and the IBM Lotus Domino Server); and control objectives.
Control analysis and design has three subparts. The first provides an intuitive description of the z-transform that is sufficient for analyzing many control systems. Next, these concepts are applied to a spreadsheet model of the Lotus Domino Server and to results from a testbed of a production server. In the third section, basic controllers are discussed and various applications are explored.
The third part of the tutorial presents two applications of control theory to the IBM DB2 Universal Database Server. The first application regulates the impact on production work of high-overhead, long-running database utilities such as BACKUP, RESTORE, and REBALANCE. The second application of control theory is to automate the management of database memory pools.
The tutorial is intended for systems oriented computer practitioners with little experience withmathematical modeling. The only background assume is knowledge of the geometric series.

Table of Content

1. Elements of control theory
  a. Spreadsheet based analysis
  b. Control architecture
  c. Key concepts—closed loop vs. open loop, types of control,
  d. Exercises
2. Control analysis and design
  a. Foundations
    i. Signals and z-transforms
    ii. Poles and settling times
    iii. Transfer functions
    iv. Steady state gain
    v. Composition of systems, canonical closed loop system
    vi. Applications to simulated and real Notes system
  b. Control analysis
    i. Proportional control
    ii. Integral control
    iii. Proportional, integral control
    iv. Precompensation
    v. Filters
    vi. PI control
  c. Control design
    i. Design criteria
    ii. Pole placement procedure
    iii. Designing a load balancing system
3. Real world applications
  a. DB2 Utilities throttling
    i. Motivation and problem definition
    ii. Self-imposed sleep and its effectiveness
    iii. Adaptive baseline estimation
    iv. Controller evaluation
    v. Multiple utilities
  b. Self-tuning memory management
    i. Managing database memory pools
    ii. Model formulation
    iii. Load balancing
    iv. Cost of control
    v. Memory tuning as a non-linear optimization
    vi. Memory tuning as a MIMO linear regulation problem
4. References


Joseph L Hellerstein is a research staff member and manager of the Adaptive Systems Department at the IBM Thomas J Watson Research Center in Hawthorne, New York and an adjunct professor at Columbia University in New York City. Dr. Hellerstein received the Ph.D. in Computer Science from the University of California at Los Angeles. Since then his research has addressed various aspects of service quality in computing systems, including: predictive detection, automated diagnosis, expert systems, and the application of control theory to computing systems. Dr. Hellerstein has authored or co-authored approximately 80 peer reviewed articles, an Addison-Wesley book on expert systems, and a Wiley book entitled "Feedback Control of Computing Systems."

Tutorial #2 Peer-to-Peer Networking: Concepts, Applications and Management (VERANY 2 Room)
Instructor Prof. Raouf Boutaba, University of Waterloo, Canada


The past few years have witnessed the emergence of Peer-to-Peer (P2P) systems as a means to further facilitate the formation of communities of interest over the Internet in all areas of human life including technical/research, cultural, political, social, entertainment, etc. P2P technologies involve data storage, discovery and retrieval, overlay networks and application-level routing, security and reputation, measurements and management. This tutorial will give an appreciation of the issues and state of the art in Peer-to-Peer Networking. It will introduce the underlying concepts, present existing architectures, highlight the design requirements, discuss the research issues, compare existing approaches, and illustrate the concepts through case studies. The ultimate objective is to provide the tutorial attendees with an in-depth understanding of the issues inherent to the design, deployment and operation of large-scale P2P systems.

Table of Content

- Definitions
- Overlay networks
- P2P Networking: Goals
- P2P Applications
- Classification of P2P systems
- Design requirements
- Case Studies
- Measurements and Security
- Trust and reputation management
- P2P and management
- Putting it all together


Dr. Raouf Boutaba is an Associate Professor in the School of Computer Science of the University of Waterloo. Before that he was with the Department of Electrical and Computer Engineering of the University of Toronto. Before joining academia, he founded and was the director of the telecommunications and distributed systems division of the Computer Science Research Institute of Montreal (CRIM). Dr. Boutaba conducts research in the areas of network and distributed systems management and resource management in multimedia wired and wireless networks. He has published more than 140 papers in refereed journals and conference proceedings. He is the recipient of the Premier's Research Excellence Award, the NORTEL Networks research excellence Award and several Best Paper awards. He is a fellow of the faculty of mathematics of the University of Waterloo and a distinguished lecturer of the IEEE Computer Society. Dr. Boutaba is the Chairman of the IFIP Working Group on Networks and Distributed Systems, the Vice Chair of the IEEE Communications Society Technical Committee on Information Infrastructure, and the Director of standards board of the IEEE Communications Society. He is the founder and acting editor in Chief of the IEEE eTransactions on Network and Service Management, on the advisory editorial board of the Journal of Network and Systems Management, on the editorial board of the KIKS/IEEE Journal of Communications and Networks, the editorial board of the Journal of Computer Networks and the Journal of Computer Communications. He acted as the program chair for the IFIP Networking conference and the IEEE CCNC conference, and a program co-chair for the IEEE/IFIP NOMS, IFIP/IEEE MMNS, IEEE FIW, IEEE ACC and IEEE ICC symposia. Dr. Boutaba teaches computer networks and distributed systems and conducts research in the area of resource management in wired and wireless networks.

Tutorial #3 Internet Management: Status and Challenges (VERANY 3 Room)
Instructor Prof. Juergen Schönwälder, International University Bremen, Germany


This tutorial discusses the status of Internet management standards and ongoing standardization efforts within the IETF. It is targeted towards people who are familiar with basic Internet management concepts and who want to learn about the latest developments related to Internet management technologies.

The tutorial is organized into three parts. In the first part, an up-to-date overview will be given about the status of IETF management standards. The network management related work items of the various active IETF working groups will be surveyed.

The second part of the tutorial focuses on monitoring. It shows how the SNMP framework is currently being used to retrieve management information for monitoring and fault isolation purposes. This part concludes with a discussion of recent SNMP related work in the IETF (e.g., session based security models).

The third part of the tutorial focuses on configuration management. After a discussion of the successes and failures of SNMP based configuration management approaches, XML-based approaches and in particular the network configuration protocol NETCONF will be discussed in some detail.

Table of Content

1. IETF Management Standards Overview
1.1 Status of Management Standards
1.2 Active IETF Working Groups

2. Monitoring using SNMP
2.1 SNMP version 3 Framework
2.2 Session-based Security Model
2.3 External User-Based Security Model
2.4 Transport-layer Security Models
2.5 Uniform Resource Identifiers for SNMP

3. Configuration using NETCONF
3.1 Review of XML Basics
3.2 NETCONF Architecture
3.3 Protocol Operations
3.4 Transport Mappings (ssh, beep, soap)
3.5 Data Modeling Issues
3.6 Coexistance with SNMP

4. Discussion
4.1 Why SNMP and why NETCONF?
4.2 Using Web Services for Management?
4.3 Harmonization of Information / Data Models?


Prof. Juergen Schoenwaelder is working in the field of communication networks and distributed systems at the International University Bremen, Germany. He received his diploma in computer science in 1990 and his doctoral degree in 1996 from the Technical University Braunschweig, Germany. His specific research interests are network management, distributed systems and network security. He is an active member of the Internet Engineering Task Force (IETF) where he has involved in the publication of more than 20 network management related specifications and standards. Since 1999, he is the chair of the Network Management Research Group (NMRG) of the Internet Research Task Force (IRTF) and co-editor of the Simple Times. He participated as a program committee member in more than a dozen IEEE/IFIP workshops and conferences and served as technical program co-chair for IM 2003. Recently, he served as a guest co-editor of special issues of the IEEE Communications Magazine and the IEEE Journal on Selected Areas in Communications. He also serves on the editorial board of the IEEE eTransactions on Network and Service Management.

Tutorial #4 Autonomic Networking - Theory and Practice (VERANY 1 Room)
Instructor John Strassner, Motorola Lab, USA


A new genre of management applications is required to accommodate current and future uses of network services. The key to solving this problem is to realize that currently, network operation is divorced from how the business operates, and that current approaches don’t address this problem. This tutorial will examine how autonomic computing in general and autonomic networks in particular can be used to solve this problem. The foundation for this tutorial lies in work done in the TeleManagement Forum’s NGOSS program (particularly its Shared Information and Data model and its notion of contract-defined interfaces), along with current research in autonomic computing. After providing a brief primer on autonomic computing, this tutorial will concentrate on new research that focuses on implementing an autonomic network – an area that has been overlooked in current research. New enhancements on the OMG’s Model Driven Architecture initiative will be described that enable code to be generated from formal models. This will be supplemented with work on holistically combining process and policy management, and implementing this in a distributed service-oriented architecture. Real-life examples will be used to reinforce the contents of thistutorial. These principles are also applicable to Ubiquitous Networks.

Table of Content

- Motivation

- Autonomic Computing Primer

- Making the Network Autonomic

- Approach

- The role of Information and Data Modeling

- The role of Policy and Process Management

- Implementing Model-Driven Architectures

- Implementing Autonomic Architectures

- Case Study


John Strassner, the founder of Directory Enabled Networking (DEN) technology, currently does model driven architecture consulting. Previously, he was Chief Strategy Officer for Intelliden and a former Cisco Fellow. He was instrumental in setting the direction for directory- and policy-enabled products and technologies in the industry. He is the rapporteur of the NGOSS metamodel, behavior and control, and policy working groups, as well as the co-chair of the Shared Information and Data modeling of the TMF. He has been researching autonomic networks for the past four years. He is the author of two books: Directory Enabled Networks and Policy Based Network Management, and is a frequent speaker at many leading international industry conferences.

Tutorial #5 Managing Network Security Policies: Firewall and IPSec/VPN (VERANY 2 Room)
Instructor Prof. Ehab Al-Shaer, DePaul University, USA


The importance of network security has been significantly increasing in the past few years. However, the increasing complexity of managing security polices particularly in enterprise networks poses real challenge for efficient security solutions. Network security perimeters such as Firewalls, IPSec gateways, Intrusion Detection and Prevention Systems operate based on locally configured policies. Yet these policies are not necessarily autonomous and might interact between each other to construct a global network security policy.
In fact, security policies are configured not only in manual and ad hoc manner, but in isolation from each other due to different administrative roles or personnel. As a result, rules conflicts and policy inconsistency are very likely to exits, leading to serious security breach and network vulnerability. In addition, enterprise networks continuously grow in size and complexity, which makes policy modification, inspection and evaluation nightmare. Addressing these issues is a key requirement for obtaining provable security and seamless policy configuration.

In this tutorial, we present techniques to develop automated management tools for security policies particularly firewall and IPSec/VPN polices. The tutorial presents a comprehensive classification of policy anomalies or conflicts in a single device or across multiple devices. Special focus is given to modeling and verification of filtering-base security polices. The tutorial will also covers techniques and tools used to automatically discover and rectify policy anomalies in centralized and distributed security devices such as firewalls and IPSec gateways.

Table of Content

Overview of firewall operation and types
Firewall architectures and evaluation
Overview of IPSec operations and Policy structure
Classification of intra- and inter-policy conflicts in firewalls
Classification of intra- and inter-policy conflicts in IPSec
Policy modeling and verification using formal methods
Conflicts discovery and resolution security policy conflicts
Automated policy management: editing, distribution, optimization
Policy management of multi-vendor security solution
Policy translation: from high-to-low level and vice versa
Frameworks for policy testing, assessment, comparison and evaluation.
Policy performance issues.


Ehab Al-Shaer is an assistant professor and the director of the Multimedia Networking Research Lab (MNLAB)in the School of Computer Science, Telecommunications and Information System at DePaul University. His primary research areas are Network Security, Internet monitoring, and multimedia networks. Prof. Al Shaer published more than 50 refereed journal and conference publications. Prof. Al-Shaer is a Guest Editor, Steering committee member, TPC member for many IEEE/ACM/IFIP conferences. He is actively involved in many network security panels in NSF and Cisco systems. He is also working as the network security advisor and consultant for many companies in United States. His current research is funded by NSF and Cisco systems.

Tutorial #6 Management of Wireless Sensor Networks (VERANY 3 Room)
Instructor Prof. Antonio A.F. Loureiro, Linnyer Beatriz Ruiz
Jose Marcos Nogueira, Federal University of Minas Gerais, Brazil


In recent years, the increasing sophistication of monitoring and control systems with multiple sensors has generated a great deal of interest in development of wireless sensors. Advances in sensor technology make it possible to design very compact and autonomous sensor nodes, each containing one or more sensors, computation and wireless communications capabilities, and limited power supply. Some of the applications foreseen to sensor monitoring will require a large number of devices in the order of tens of thousands nodes. Traditional methods of sensor networking represent an impractical demand on cable installation, maintenance, and cost.

Wireless Sensor Networks (WSNs) are becoming an increasingly technology that will be used in a variety of applications such as environmental monitoring, infrastructure management, public safety, medical, home and office security, transportation, and military. WSNs will also play a key role in pervasive computing where computing devices and people are connected to the Internet. However, until now, WSNs and their applications have been developed without considering a integrated management solution.

The task of building and deploying autonomic management systems, in environments where there will be tens of thousand of network elements with particular features and organization, is very complex. This task becomes worse due to the physical restrictions of the sensor nodes, in particular energy and bandwidth restrictions. The management application to be build also depends on the kind of application being monitored.

This tutorial will present a perspective on emerging wireless sensor management, covering management issues and technologies, network management architectures, and opportunities. Traditional management and the differences of the sensor networks management are described, and a new management dimension is introduced. Management architectures for sensor network and information models are outlined, with emphasis on the MANNA architecture.

Until now, WSNs and their applications and services have been developed without considering a management solution. This may not be a problem for small networks but will definitely be when applications, in order to work properly, will need to reconfigure and adapt themselves based on profiles and information scattered over the network.

Management of WSNs is a new research area that only recently started to receive attention from the research community.

Table of Content

1. Introduction to management of wireless sensor network
  Presents an introduction to the area of management of WSNs.

2. Management Challenges
  Discusses the main management challenges to be overcome in the area of WSNs.

3. Management Dimensions
  Describes how dimensions can help in the management solutions for WSNs.

4. MANNA as an Integrating Architecture
  Presents an integrated management solution for different types of WSNs.

5. Putting It All Together
  Discusses how the different management aspects of WSNs must be considered together.

6. Research agenda for management of wireless sensor networks
  Presents some research topics related to sensor networks.

7. Conclusions
  Discusses how a proper management solution can benefit the productivity of the network resources and the QoS.


Antonio Loureiro is an Associate Professor of Computer Science at the Federal University of Minas Gerais (UFMG), Brazil. Professor Loureiro holds a PhD in Computer Science from the University of British Columbia, Canada, 1995. His main research areas are mobile computing, computer networks and distributed systems. In the last 10 years he has published over 50 papers in international conferences and journals. Currently, the three authors are preparing a book entitled Management of Wireless Sensor Networks to be published by an international publisher. He was the TPC Chair for LANOMS 2001.

Tutorial #7 MPLS Operations and Management (VERANY 1 Room)
Instructor Thomas Nadeau Cisco Systems, USA
Monique J. Morrow, Cisco Systems, Switzerland


This tutorial will present the ins and outs of the state of the art in MPLS Operations and Management. Areas of interest include detailed presentations of standards work going on at the IETF, ITU, IEEE, MEF and the MPLS-FrameRelay Alliance. The tutorial is broken into several components. First, we will explore tools available to monitoring and trouble-shooting the data plane. Tools in this area include LSP Ping LSP Traceroute, VCCV, BFD, among others. Next, we will present tools and techniques available to trouble-shoot and diagnose the MPLS control plane. The third area covered is the management plane. In this area, we discuss the management interfaces to these various tools and some techniques that management systems can use to manage each of the tools presented earlier. Finally, we present why it is important and critical to combine the information provided by tools used to diagnose the data and control planes to provide the user with a complete picture of MPLS network health, and how the combination of this information can not only be automated and displayed via the management plane, but also how devices may employ this information internally to more quickly repair the defect, thereby providing a certain degree of self-healing capability.

Table of Content

Prequisites and Logistics for this presentation

MPLS's Momentum in Convergence and Service Creation

What is MPLS OAM?

Where Does MPLS OAM Fit?

OAM Tools
    LSP Ping
    LSP Traceroute
    Troubleshooting Using LSP ping/trace

    VCCV Types
    Troubleshooting Using VCCV

LSR Self-Test

    BFD for MPLS
    Bootstrapping a BFD Session
    Trouble-shooting MPLS Applications with BFD

VCCV/BFD vs VCCV LSP Ping Modes?


Ethernet OAM

MPLS Core Related MIBs


Thomas Nadeau

Tom works at Cisco Systems where he is a Technical Leader responsible for the leadership of operations and management and network management standards, development and architecture for MPLS-related components at Cisco. Tom is an active participant in the IETF, ITU, and IEEE. He is co-author of many IETF MIBs, protocol and architecture documents in the L2/L3VPN, TE, PWE3, GMPLS and MPLS areas. Tom is co-author of RFC3811, RFC3812, RFC3813, RFC3814, RFC3945, and RFC3916. Tom was recently co-editor of the October 2004 IEEE Communications Magazine’s special section on MPLS Operations and Management. Tom has filed several patents in the area of networking.Tom received his BSCS from The University of New Hampshire, and a M.Sc. from The University of Massachusetts in Lowell, where he has been an Adjunct Professor of Computer Science since 2000. Tom currently teaches courses on the topic of data communications.
He is also on the technical committees of several prominent networking conferences where he provides technical guidance on their content. He is on the technical advisory board of Westridge Networks. He is the technical editor of Enabling VPN Aware Networks with MPLS (Prentice-Hall Publishers, 2001), and author of MPLS Network Management: MIBs, Tools, and Techniques (Morgan-Kaufman, 2002). Tom is currently working on a second text covering the topic of MPLS Operations and Management, which is expected in late 2004.

Monique Jeanne Morrow

Monique Morrow is currently CTO Consulting Engineer at Cisco Systems, Inc. She has over 20 years experience in IP internetworking that includes design, implementation of complex customer projects and service development for service providers. Monique has been involved in developing managed Network Services like Remote Access and LAN Switching in a Service Provider environment. Monique has worked for both enterprise and service provider companies in the United States and in Europe. Monique led the Engineering Project team for one of the first European MPLS-VPN deployments in 1999 for a European service provider. Monique has been a speaker in the following conferences: MPLS Congress-Paris, 2000; MPLSCon 2000, London; MPLS Japan, 2002; APRICOT, Taipei, Taiwan, 2003; MPLScon 2003; Supercomm 2003; MPLS Japan 2003, MPLS Japan 2004; IEEE IPOM in Beijing, 2004; MPLS Conference 2003; The 16th Communication Systems Workshop (CSWS) on Information, Communication and Signal Processing "Verification of Broadband Services and its Future" Nov. 12-13, 2003 by Communications System Engineers in IEICE, Japan; APRICOT 2004 in Kuala Lumpur; and has spoken in several Cisco Networker Conferences.Monique is co-author of the book Designing IP-Based Services: Solutions for Vendors and Service Providers (Morgan-Kaufmann, 2002). Monique has been a technical reviewer for the book, International QoS Architectures and Mechanisms, Zheng Wang (Morgan-Kaufmann, 2001); she has contributed a chapter on MPLS in the book, Networks : Internet-Telephony-Multimedia, Convergences and Complementarities, De Boeck Diffusion, 2002 (France Telecom Lead) and was content reviewer for the book, MPLS and VPN Architectures, Vol 2, Jim Guichard et al, Cisco Press, 2003. Monique is currently working on three books one exploring business aspects for MPLS; another discussing security for MPLS-VPN and the third book that presents enterprise drivers and concerns for IP-based service delivery.Monique is active in both the IETF and ITU-T SG 13 with a focus on OAM. She has a M.S in Telecommunications Management and an MBA. Monique is also a Cisco Certified Engineering Expert (#1711). Monique is currently engaged in MPLS OAM standards development and has been engaged in carrier discussions internationally on the topic. Monique is co-guest editor of a special issue of the IEEE Communications Magazine on the subject of “OAM in MPLS-based Networks. Published in October 2004 Monique is co-guest editor of a special issue of the IEEE Communications Magazine on the topic of "Inter-Provider Service Quality on the Internet" with publication scheduled for June 2005. Additionally, Monique is working on GMPLS, GRiD and Next Generation Network topics pertinent to both carriers and NRENs where delivery between providers is a key. In the area of GMPLS, Monique is co-guest editor of the IEEE Communications Magazine on the topic of “GMPLS: The Promise of the Next Generation Optical Control Plane” with publication scheduled for July 2005.

Tutorial #8 Planning, Management and Auto-Tuning Techniques for UMTS and Heterogeneous Radio Access Networks (VERANY 2 Room)
Instructor Dr. Zwi Altman and Dr. Peter Stuckmann, France Telecom R&D, France


The introduction and evolution of third-generation (3G) mobile radio systems leads to a highly complex and heterogeneous radio access network landscape. Network management will become crucial to guarantee optimum cooperation between network sub-systems. The quality of service provided by these networks and their profitability is intimately related to the ability of the operator to parameterize these networks and optimally utilize the available radio resources. This tutorial aims at presenting a comprehensive overview of UMTS network parameterization in a multi-system context using both automatic cell planning and auto-tuning strategies. The following items will be discussed in detail:

Strategies for automatic design and cell planning: Cell planning consists in optimizing network performance by adjusting antenna parameters and common channel powers. Automatic cell planning has been utilized for both GSM and UMTS network, and has a particular success in the latter case due to the lack of frequency planning in UMTS networks. A high quality Automatic Cell Planner (ACP) can typically lead to a capacity increase of 30 to 40 percent. This improvement is accompanied by the reduction of interference and improvement in quality of service offered to the end user. Four major automatic cell planning strategies will be presented: quality and capacity, capacity and coverage, steered optimization and optimization in a multi-system context.

Auto-tuning of Radio Resource Management (RRM) parameters: The migration from manual to automatic cell planning in cellular systems has induced a significant quality enhancement and deployment cost reduction. Similar gains are expected from the automation of parts of the operation of a mobile radio network. This expectation is especially justified in complex systems like UMTS or even heterogeneous access networks. Auto-tuning aims at improving network performance and adapting it to traffic variations by dynamically adjusting RRM parameters such as load target threshold and add- and drop-macrodiversity windows. First, the implementation of the auto-tuning process of UMTS networks using fuzzy logic controllers will be presented for both admission control and mobility management. Then, the extension of the auto-tuning to a multi-system context will be described. Current European research activities in the area covering automatic network management techniques like monitoring, self-diagnosis, optimization and parameterization will be presented.

Table of Content

1 Overview

    1.1 Introduction to network planning and management
    1.2 Quality of service evaluation using a system simulator

2 Planning and design

    2.1 Manual heuristics for network planning
    2.2 Automatic cell planning in UMTS
    2.3 Automatic cell planning in 2G-3G context

3 Auto-tuning in mobile networks

    3.1 Fuzzy logic controllers
    3.2 Auto-tuning of RRM parameters in UMTS networks
    3.3 Auto-tuning in heterogeneous multi-system context

4 European research on design and management of heterogeneous radio access networks

    4.1 European Research on Wireless and Mobile Systems beyond 3G
    4.2 European research on multi-system RAN concepts
    4.3 The EUREKA Gandalf project: Monitoring and automatic management of heterogeneous radio access networks


Zwi Altman received the B.Sc. and M.Sc. degrees in electrical engineering from the Technion-Israel Institute of Technology, in 1986 and 1989, and the Ph.D. degree in electronics from the Institut National Polytechnique de Toulouse, France, in 1994. He was a Laureate of the Lavoisier scholarship of the French Foreign Ministry in 1994, and from 1994 to 1996 he was a Post-Doctoral Research Fellow in University of Illinois at Urbana Champaign. In 1996 he joined France Telecom R&D, where he is currently responsible for a project developing new engineering methods for mobile networks. Dr. Altman was in the winning team of the 2003 Innovation Prize of France Telecom. He has published over eighty journal and conference papers. Dr. Altman is an IEEE Senior Member and a past Associate Editor in this society.

Peter Stuckmann received his diploma (master's) degree in 1999 and his doctor's degree in 2003 both from the Faculty of Electrical Engineering and Information Technology of Aachen University. From 1999 until 2003 he has served as a research engineer at the Communication Networks department of Aachen University, where he has led the research group Packet Data Services for 3G Mobile Radio Networks and has been responsible for several research projects funded by the German and European government and clients from industry. From 2003 on he has been working with AixCom GmbH as a consultant responsible for the radio network planning product group. In 2004 he joined France Telecom R&D where he is involved in research projects in the area of 2G/3G/B3G radio interface engineering. Dr. Stuckmann is the author of one text book (The GSM Evolution, Wiley & Sons, 2002), 2 book contributions, more than 20 journal and conference papers and has held several tutorials at IEEE conferences (Globecom, VTC, etc.). He is member of the IEEE and VDE/ITG.

Tutorial #9 Management of Enterprise Web Applications: Problems, Approaches, Solutions (VERANY 3 Room)
Instructors Dr. Alexander Keller & Dr. Nikos Anerousis, IBM TJ Watson Research Center


Today, web applications are a critical part of the foundation of a modern enterprise, supporting an ever increasing number of critical business functions. Effective management of web applications is a major
objective of every IT organization.

This tutorial presents state-of-the-art solutions covering the entire lifespan of web applications from planning, to deployment, to operations, to change management.

Intended audience: everyone interested in the operational aspects of web
applications: IT professionals, academics, researchers.

Level: Introductory to intermediate.

Table of Content

The tutorial is organized in 4 parts.

The first part teaches fundamental design issues for web applications (single-tier vs. N-tier, available technologies (J2EE and .Net) and development tools.

The second part addresses the planning stage, presenting an analysis of application sizing techniques (transaction profiling, load modeling, datacenter provisioning and long-hauling).

The third part presents recent standards for application installation, deployment and change
management (IT Infrastructure Library (ITIL), W3C Solution Installation Schema Submission, Gridforum CDDLM/SmartFrog).

The fourth part addresses the ever-important topic of performance management for Web applications
(the ARM specification and the CIM Metrics Model as examples for application performance instrumentation standards, performance monitoring tools and techniques, service differentiation, clustering, load balancing and on-demand capacity allocation).


Alexander Keller is a Research Staff Member in the Autonomic Computing Department at the IBM Thomas J. Watson Research Center. He received his M.Sc. and Ph.D. degrees in Computer Science from Technische Universität München, Germany, in 1994 and 1998, respectively and has published approximately 40 refereed papers in the area of distributed systems management. Dr. Keller's research interests revolve around change management for applications and services, service provisioning, and service level agreements. He serves on several technical program and organizing committees of related conferences and workshops and is a member of the USENIX Association, the IEEE, and the DMTF CIM Applications and Metric Extensions Working Groups.

Nikos Anerousis is currently with the Web Middleware Management department at IBM Research. Prior to IBM, he was Chief Technology Officer at Voicemate Inc., where he lead research and advanced product development in the areas of pervasive publishing and management, knowledge engineering, multimodal user interfaces and mobile computing. Prior to Voicemate he was a senior member of technical staff at AT&T Research where he conducted extensive research on network and distributed systems management, packet telephony, routing and control architectures for the internet, multimedia services, etc. In 1998 and 1999 he was also an adjunct assistant professor at Columbia University. He received a Diploma in Electrical Engineering from the National Technical University of Athens, Greece and MSc and PhD degrees in Electrical Engineering from Columbia University, NY, USA. He is the author or co-author of numerous papers in refereed international conferences and journals. He serves in the editorial board of the Journal of Network and Systems Management and the IEEE e-Transactions on Network and Service Management. He was technical program co-chair for the IEEE/IFIP Integrated Management Symposium 2001.

Tutorial #10 Integrated Management of Denial-of-Service Attacks (VERANY 1 Room)
Instructor Michael H. Behringer, Cisco Systems, France


Denial-of-service attacks have become a permanent issue on service provider networks. Over the last years network operators have had to adjust their operations to cover these new attack forms. This includes the management of the routers and the network, as well as operational procedures to communicate security issues to other providers, customers and third parties.

This tutorial gives an introduction on how DoS attacks affect an Internet network, and how they can be managed. It includes an overview of the threats, methods to detect and classify an attack, as well as mitigation techniques. Whilst many techniques presented can be executed directly on network devices, an efficient network management is required to scale operations to large networks and high number of attacks. This includes efficient communications methods for security incidents, as well as operational procedures to successfully mitigate the attacks.
Finally, the mitigation of DoS attacks is being introduced in many service provider networks as a managed service. We will outline here management issues to this approach, and how to secure this service.

Table of Content

Introduction: Tendencies in DoS Attacks
Detection and Classification of DoS Attacks
Traceback: Finding the Origin of the Attack
Mitigation: Maintaining Availability
Overall Management of DoS Attacks and Summary


Michael Behringer obtained his diploma in computer science at the Technical University of Munich. For five years he worked at the European Internet Service Provider DANTE, based in Cambridge, UK, where he last held the position of senior network engineer, responsible for the design and implementation of DANTE's pan-European networks. Since 1998 Michael works at Cisco Systems, now based in Nice. As senior consulting engineer for EMEA he focuses on service provider security issues, such as Denial-of-Service attack prevention and MPLS security. Michael is an active member of the IETF.

Tutorial #11 Traffic Engineering and Quality of Service Management for IP-based Next Generation Networks (VERANY 2 Room)
Instructor Prof. George Pavlou, University of Surrey, UK


Next Generation IP-based Networks will offer Quality of Service (QoS) guarantees by deploying technologies such as Differentiated Services (DiffServ) and Multi-Protocol Label Switching (MPLS) for traffic engineering and network-wide resource management. Despite the progress already made, a number of issues still exist regarding edge-to-edge intra-domain and inter-domain QoS provisioning and management. This tutorial will start by providing background on technologies such as DiffServ, MPLS and their potential combination for QoS support.

It will subsequently introduce trends in Service Level Agreements (SLAs) and Service Level Specifications (SLSs) for the subscription to QoS-based services It will then move to examine architectures and frameworks for the management and control of QoS-enabled networks, including the following aspects: approaches and algorithms for off-line traffic engineering and provisioning through explicit MPLS paths or through hop-by-hop IP routing; approaches for dynamic resource management to deal with traffic fluctuations outside the predicted envelope; a service management framework supporting a “resource provisioning cycle”; the derivation of expected traffic demand from subscribed SLSs and approaches for SLS invocation admission control; a monitoring architecture for scalable information collection supporting traffic engineering and service management; and realization issues given the current state-of-the-art of management protocols and monitoring support. The tutorial will also include coverage of emerging work towards inter-domain QoS provisioning, including aspects such as: an inter-domain business model; customer and peer provider SLSs; an architecture for the management and control of inter-domain services; inter-domain off-line traffic engineering; and QoS extensions to BGP for dynamic traffic engineering. In all these areas, recent research work will be presented, with pointers to bibliography and a specially tailored Web page with additional resources.

Table of Content

   Tutorial scope
   TE definition
   QoS definition
   Tutorial outline

Background: QoS Technologies and Routing
   QoS Approcahes: Per-flow / Per-Class
   Integrated Services (IntServ)
   Scalability problems

Differentiated Services (DiffServ)
   Service Classes / PHBs
   Open Issues / Bandwidth Broker

Multi-Protocol Label Switching (MPLS)
   MPLS Signaling: RSVP-TE / CR-LDP
   MPLS with DiffServ

IGP Link state routing protocols: OSPF/ISIS, CSPF
   EGP routing protocols: BGP (path vector)

Service Level Agreements and Specifications
   SLAs / SLSs
   Current Tier-1 Connectivity SLSs
   TEQUILA SLS proposal
   QoS Classes / IETF Per-Domain Behaviors

Framework for Intra-domain QoS Management
   Problem Space
   Domain management / Bandwidth Broker
   Functional Architecture
   Resource Provisioning Cycle
   Two-level approach: Off-line (Static) and Online (Dynamic)

Traffic Engineering
   Traffic Trunks (TTs) - Pipe & Hose models
   Routing Support for TTs: MPLS-based or IP-based TE

MPLS-based TE Solutions
   LSP support for TTs / Scalability
   Dynamic Route Management / Load Balancing
   Off-line TE: Network Dimensioning (ND) approaches
   Network flow linear problem formulation (1 criterion)
   Non-linear problem formulation (multiple criteria)
   Optimization approaches
   The Gradient Projection Method
   Network dimensioning examples

IP-based TE Solutions
   OSPF/ISIS weight setting
   Example of avoiding hot spots
   Optimal weight setting
   The Forz-Thorup heuristic
   QoS-aware TE: a RIB per class

Dynamic Resource Management (for both MPLS and IP-based TE)
   Dynamic link bandwidth partitioning to service classes
   Dynamic resource management algorithm

Service Management
   Resource Provisioning Cycle
   Traffic Forecasting
   SLS Invocation: explicit and implicit
   Invocation Admission Control approaches
   Traffic descriptor / MBAC / Enpoint schemes

Inter-domain QoS Management
   Business QoS Model
   Customer SLSs (cSLSs) and Peer Provider SLSs (pSLSs)
   Local and extended QoS Classes (l-QCs and e-QCs)
   Inter-domain Peering Models and the Cascaded QoS Model
   Functional Architecture and Blocks
   Solution Options
   Loose, Statistical and Hard Guarantees
   Off-line TE
   QoS-inferred BGP
   qBGP-based Dynamic TE

   Scalable monitoring principles
   Monitoring system architecture
   Required Node Moitoring Functionality
   SNMP limitations

Realization Issues
   Protocols for network configuration
   SNMP limitations, COPS-PR, CLI, XMLConf
   Example realization of a QoS architecture

Summary and Additional Information

Relevant Books
   IETF Charters
   Research papers
   Sites with more information
   Pointer to my tutorial Web page with material


Prof. George Pavlou holds the Chair of Communication and Information Systems at the Center for Communication Systems Research, Dept. of Electronics Engineering, University of Surrey, UK, where he leads the activities of the Networks Research Group ( He received a Diploma in Engineering from the National Technical University of Athens, Greece and MSc and PhD degrees in Computer Science from University College London, UK. His research interests encompass network and service management, network planning and dimensioning, traffic engineering, quality of service, mobile ad hoc networks, service engineering, multimedia service control and management, code mobility, programmable networks and communications middleware. He is the author or co-author of over 120 papers in fully refereed international conferences and journals and has contributed to 4 books. He has also contributed to standardization activities in ISO, ITU-T, TMF, OMG and IETF. He was the technical program co-chair of IEEE/IFIP Integrated Management 2001.

See also for additional information and his publications in PDF.

Tutorial #12 Grid Computing: Fundamentals and Management Challenges (VERANY 3 Room)
Instructors Prof. Heinz-Gerd Hegering, Leibniz Supercomputing Center, Germany
Prof. Gabi Dreo Rodosek, University of Federal Armed Forces


Grid computing enables the virtualization of both distributed computing and data resources such as processing, network bandwidth and storage capacity to create a single system image to allow users seamless access to IT resources not necessarily belonging to their own organization. The virtualization of organizations and resources as well as the cooperative usage of virtual resources are one of the key challenges of grid computing. The tutorial starts with a comprehensive overview of grid computing and outlines the fundamentals of grid environments. The characteristics of grid resources and services, virtual organizations as well as the grid networks and middleware are described. Furthermore, existing approaches like the Open Grid Services Architecture (OGSA), Open Grid Services Infrastructure (OGSI) and WSRF (Web Services Resource Framework) are reviewed. Finally, we explore the efforts that are underway in the Global Grid Forum and in the Globus Alliance. Initiatives such as the EGEE, NSF, D-Grid (the German Grid project) are addressed as well.

The second part of the tutorial concentrates on the management challenges implied by both the virtualization of resources and organizations and the cooperative usage of such resources. We address topics such as the description of (virtual) resources and services, the management of virtual organizations, the specification of SLAs for grid services, and grid management questions related to FCAPS (Fault, Configuration, Accounting, Performance, Security). Essentials of grid computing such as grid resource management and security issues are addressed in particular.

Table of Content

1. Introduction
  1.1 Motivation
  1.2 What is the idea of Grid Computing?
  1.3 Challenges of Grid Computing

2. Review of Existing Approaches
  2.1 Globus Toolkit
  2.2 Web Services Resource Management (WSRF)
  2.3 Open Grid Service Architecture (OSGA) and Infrastructure (OGSI)
  2.4 Unicore and others
  2.5 Initiatives
    2.5.1 Global Grid Forum
    2.5.2 OASIS
    2.5.3 Initiatives such as the EGEE (Enabling Grids for E-science in Europe), NSF,
D-Grid (Germany), DataTAG
  2.6 Commercial Approaches (IBM, Sun, HP, Oracle)

3. Management Challenges
    3.1 Management of Virtual Organizations (VO)
    3.2 Specifying Grid Services and SLAs for Grid Services
    3.3 Provisioning and Operation of a Grid Middleware
    3.4 Grid Resource Management and Scheduling Challenges (Resource Description,
Allocation and Discovery Scheduling and Distribution of Tasks across Resources
Monitoring, etc.)
    3.5 Grid Security,
    3.6 Grid Accounting
    3.7 Other Management Challenges (Problem and Incident management, Change management,
Interoperability and Dependability Issues, Customer Service Management, etc.)
    3.8 A sketch of legal aspects concerning grid computing

4. Conclusions and Outlook


Prof. Heinz-Gerd Hegering holds the Chair of Communication Systems and System Pro-gramming at the Ludwig-Maximilians University (LMU) Munich since 1989. He is Director of the Institute of Informatics at the LMU and the Leibniz Supercomputing Center of the Bavarian Academy of Sciences. He is a member of the board of directors of the Germany`s National Research and Education Network. His research interests include communication systems, integrated network and systems management, IT infrastructures.

Prof. Gabi Dreo Rodosek holds the Chair of Communication Systems and Internet Services at the University of Federal Armed Forces Munich. Since 1995 she was with the Leibniz Supercomputing Center where she was responsible for the planning and the introduction of management tools. Her research interests include in particular IT service management, fault and service level management.


Panel #1 Is Policy-Based Management Possible?
Leader Joe Hellerstein, IBM Research, USA
Panelists Seraphin Calo, IBM Research, USA
Morris Sloman, Imperial College, London
Mark Burgess, Oslo University, Norway


Policy-based management has been an area of intense interest for the last decade. The community is very active with an annual workshop and various standards efforts. While the ideal of policy-based management is a declarative approach in which the system takes actions to achieve policy-specified goals under policy-specified constraints, what is implemented in practice is much more limited. This panel will address the following issues: (1) To what extent is a declarative approach to policy possible? (2) What other kinds of policies should be considered? (3) What kind of policy standards are meaningful, especially contrasting syntactic and semantic approaches? (4) How can policies be acquired and maintained in practice? (5) How are the GRID, pervasive wireless computing and other technologies are shaping the field? (6) Are there alternatives to policy-based management?

Panel #2 Service Level Agreement - How to reach the practical Agreement, not Announcement
Leader Masayoshi Ejiri, Fujitsu, Japan
Panelists Lundy Lewis : Southern New Hampshire Univ. USA
Dave Milham : BT Exact UK
Isami Nakajima : NTT Service Integration Labs. Japan
Frank Birch : Fujitsu Labs. Europe, UK


SLA is becoming crucial in competitive ICT environment as one of key differentiations and in future demand where customer participated/centric operations are essential. SLA should be reached through the negotiation between customers and service providers. However current discussion of SLA is too much focused on QoS related features, most of them are not familiar with end users and also customers are forced to accept/select SLAs which are defined /announced by service providers . In the Panel, the following issues will be discussed, (1) What is " Services"? Operations services are becoming more important. (2) Level" should be defined by qualitative/quantitative way ? (3) SLA features should be customer perceptible/visible features and QoS should be translated by customer language. (4) Mechanism to reach "Agreement " by customers/service providers negotiation. (5) SLA negotiation process in service providers business processes.


Panel #3 Should we share Honeypot information for Security Management?
Leader Felix Wu, Univesity California Davis, USA
Panelists Marc Dacier, Eurecom, France
Herve Debar, France Telecom, France
Yao-Min Chen, Watchguard, USA


It is quite sensitive to share security information even for the purpose of security management across different administrative domains. On the other hand, for certain large-scale Internet-wide cyber attacks, sharing such information might greatly help others to develop the right preventive solution in time. In this panel, we will focus on sharing data being collected by the "honeypot", a virtual information playground that should only attract malicious/suspicious Internet users. Following opics will be addressed:

(1). What information can be collected by Honeypots?
(2). How will the Honeypot information be useful for others in management?
(3). What are the concerns in sharing them?


Keynote Speakers

Becoming an Innovative Operator [aka: The Cobbler’s Kids of Telecom]

Jim Warner, President, TMF

Jim Warner is president of the TeleManagement Forum, an international consortium of service providers, suppliers and systems integrators. Through their collaborative R&D activities, TMF is driving the telecom industry’s efforts to develop a new generation of Operations Systems and Software (NGOSS) as a foundation for lean, agile operations and business transformation.

Jim has over 25 years of marketing and product management experience in voice and data communications and information networking and is one of the industry’s leading authorities on improving telecom management and operations.

Integrated network management policy for FT networks and services

Patrice Collet, France Telecom

Patrice Collet graduated from Ecole Polytechnique and Ecole Nationale Supérieure des Télécommunications and then joined CNET, France Telecom Research Laboratories in 1970. He has been first involved in signalling systems development, numbering plan evolution and switching system engineering.
In 1979, he becomes Head of the switching and signalling department in CNET in Paris. During this period, his main responsibilities are TDM switching systems deployment, signalling system #7 implementation, numbering scheme evolution, and IN specification design. In 1989, he is in charge of one of the two CNET laboratories located in Lannion in charge of ATM networks, ISDN, voice services, and software technology. In May 1996, he leaves CNET and joins France Telecom Headquarters as Director of Network Architecture and Planning in the Network Branch. Presently, he is Director of Architecture and Security in the Networks, Carriers and IT Division of France Telecom.
Patrice Collet has been actively participating in International standardisation bodies such as CEPT and CCITT, in the field of switching and signalling. He has been Vice-President of CCITT study group XI (Switching and Signalling) from 1980 to 1992. He is also member of the Steering Committee of the World Telecommunications Congress (WTC), formerly International Switching Symposium (ISS).

Enabling Enterprise Automation with Services Oriented Architecture

Chris O'Connor, IBM

Chris O’Connor is the Vice President of the IBM Tivoli Availability & Business Service engineering team. His team’s mission is centered on delivering software that determines the business service impact of monitored resources. Mr. O’Connor is responsible for ensuring that IBM is positioned as a market leader of products and services for the systems management needs of the Fortune 5000 customers. He is responsible for creating the technical strategy, its key themes, the product architecture, and software products that place the IBM Tivoli brand at the forefront of the industry's thinking as it pertains to Enterprise Systems Management technology. He manages a team composed of expertise from around the world with key competencies from IBM, its recent Candle acquisition and other IBM organizations such as IBM Research. As an IBM executive, Mr. O’Connor has previously led the IBM Company’s Security strategy, as well as led networking hardware and software development, design and market management positions.

O’Connor received his bachelor’s of science degrees in computer science and electrical engineering from Rutgers University. He also holds a certificate from University of North Carolina Kenan-Flager School of Business Administration in technology management.

The Development of the Next Generation Network (NGN): Horizontal and Vertical
Integration, Fixed-Mobile Convergence and Ambient Communications

Dr. Paul J. Kühn, University of Stuttgart

Paul J. Kühn received the Dipl.-Ing. and Dr.-Ing. degrees in Electrical Engineering from the University of Stuttgart, Germany, in 1967 and 1972, respectively. From 1973 to 1977, he was head of a research group for traffic research in computer and communications systems at the University of Stuttgart. In 1977, he joined Bell Laboratories, Holmdel, NJ., where he worked in the field of computer communications. In 1978, he was appointed professor for Communications Switching and Transmission at the University of Siegen, Germany. Since 1982, he is holding the chair of Communication Networks and Computer Engineering at the University of Stuttgart, Germany. His areas of interest are communication network architectures and protocols, computer engineering, performance modelling and evaluation, wherein he authored more than 100 technical publications. Professor Kühn is a member of IEEE, ACM, ITG (German Information Technology Society), and GI (German Informatics Society). He has been appointed member of Communications Switching Committee of the ITG, IFIP Working Groups 6.2, 6.3 and 7.3 and International Advisory Council (IAC) of the International Teletraffic Congress (ITC). He was appointed Vice President of the ITC in 1985, and Governor of the ICCC in 1987. 1989 Professor Kühn has been elected Fellow IEEE. He was Program Chairman of ICCC 1986, Conference Chairman and Co-Chair of the IFIP Conferences "Broadband Communications" in 1998 and 1999, respectively, of various national conferences on Computer Communication and Performance Modelling, Editor and Guest Editor in the areas of Communication Networks for ETT and IEEE-JSAC. In 1991, Professor Kühn was appointed Professeur Associé at the Télécom Paris/ENST. 1991 Professor Kühn has been elected Chairman of the International Advisory Council IAC of the International Teletraffic Congress (ITC). In 1993, he was appointed Member of the Academy of Sciences of Heidelberg, Germany, and in 1995, Member of the Academy Leopoldina, Halle. In 1996, Professor Kühn has been awarded Dr. h.c. for Technology by the Lund Institute of Technology, Sweden, and in 1998 Dr.-Ing. E. h. by the University of Technology of Dresden, Germany. 1998 he was appointed Honorary Member of the Senat of the University of Mannheim, Germany, for his support of the new department of Computer Engineering. Also in 1998, he received the Christopher Columbus Gold Medal from the Council of the City of Genova, Italy, for his contributions in the field of telecommunications. Professor Kühn has held various responsible academic, research and industrial positions, among them Chairmann of the Board of the CTIT of the University of Twente, Coordinator of the DFG Research Centre Program on Mobile Communications, Chairman of the Graduate College Program "Parallel and Distributed Systems", Dean of the Faculty of Electrical Engineering and Course Director of the international Master of Science Program "Information Technology" at the University of Stuttgart. For more than 10 years Professor Kühn served as a member of the Board of Directors of communication technology companies.

Managing Globally Interwoven Multiple Life Cycles

Dr. Makoto Yoshida, University of Tokyo/NTT Group

Makoto Yoshida is professor for the School of Engineering, the University of Tokyo, responsible for the innovation of engineering education and the application of IT to education. He holds a B.E. in the electronics engineering and a Ph.D. in the electrical engineering from the University of Tokyo.
Before entering the University of Tokyo in 2002, Dr Yoshida worked for NTT with considerable experiences in the research and developmental fields of teletraffic engineering, network architecture/design, operations and management architecture/systems, and then with NTT Advanced Technology (NTT-AT) in charge of network/systems integration and operations service business. His experiences include numerous contributions to international standardisation arena such as former CCITT as well as international institutions/symposia. He has also been involved in the activities of TeleManagement Forum (TMF, formerly NM Forum) since its inception in 1988, having served as Vice President, Vice Chairman and former Chairman. He is Distinguished Fellow / Advisor to Board of Directors of TMF and also currently Advisor to Board of Japan Network Security Association (JNSA). Dr Yoshida is currently serving as a guest professor for Xi’an Jiaotong University.
He is a senior member of IEEE, Fellow of the Institute of Electronics, Information and Communication Engineers (IEICE) and a member of the Information Processing Society of Japan. Dr Yoshida has been serving as a variety of committee members to international symposia such as NOMS, IM (formerly ISINM), APNOMS and Telecommunications Management (TM) Technical Group of IEICE Communication Society. He authored and co-authored a number of books as well as over fifty technical papers in communication and mgmt areas.

Putting IM into IMS: Integrated Management challenges for the IP Multimedia System

Robbie Cohen, Telcordia

With more than 25 years experience in the telecommunications industry, Cohen currently serves as Group Vice President for Market Management in the Wireless, Cable and Emerging Markets Group of Telcordia Technologies. With her guidance, Telcordia is steadily increasing its technological leadership and market share in the wireless mobility space.
Prior to joining Telcordia, she held a variety of management positions at Lucent Technologies, Paradyne Corporation, AT&T and Bell Laboratories, including systems engineering and architecture roles, R&D management, product management and general management positions. . In the late 1980’s, she helped found the Network Management Forum, an international consortium of telecommunications service and equipment providers. In recognition of her service to the Forum, she became a Distinguished Fellow of Telemanagement Forum in 2003.
In May 1997, Cohen became the first recipient of the IEEE/IFIPS Daniel A. Stokesbury Memorial Award for contribution excellence in the field of network management. She served on the board of the Communications Society of the Institute of Electrical and Electronics Engineers (IEEE) from 1999-2003. Cohen has published numerous technical papers and holds a patent on a "Communication System having Unified Messaging".
Robbie holds bachelor, masters and Ph.D. degrees in Sociology from the University of Illinois and began her professional career as Assistant Professor of Sociology at Princeton University.


DEP Program

Management Challenges for New Networked Worlds

John Strassner, Motorola Labs
John Strassner, the founder of Directory Enabled Networking (DEN) technology, currently serves as a Fellow of Motorola Labs, where he directs their autonomic computing efforts. He also works on identity management, policy management and seamless mobility. John currently chairs the TeleManagement Forum's (TMF) Metamodel, Policy, and Shared Information and Data model working groups, and is an advisor to the TMF Board of Directors. He is also active in the ITU-T's NGN focus group. John has authored two books (Directory Enabled Networks and Policy Based Network Management) and over 70 refereed conference papers. He was previously the CSO for Intelliden and a former Cisco Fellow. John Strassner is currently a Visiting Professor for Waterford's Institute of Technology.


Dr. Alexander Clemm, Cisco
Dr. Alexander Clemm is a Senior Architect in Cisco's Device Instrumentation Group, where he is setting the technical direction for projects that relate to the improvement of management interfaces and to providing embedded management intelligence (also known as self-management) for Cisco devices. Before his current role, he developed the architecture of several management applications and turnkey management solutions for the management of Packet Telephony and VoIP networks, and (prior to Cisco) for Optical and Broadband Access Networks. Alex has published well over 20 technical papers and is a committee member of several IEEE and IFIP management-related workshops and conferences, including IM, NOMS, DSOM, IPOM, and MMNS. He holds Master's and Ph.D. degrees in Computer Science from Stanford University and the University of Munich, respectively.


Mr. David Raymer, Motorola
Dave is a Distinguished Member of Technical Staff with Motorola’s Networks Business working as part of the Operation Support Systems Division Systems Engineering Group with responsibilities for standards and advanced technology investigation for Motorola’s cellular infrastructure OAM&P products. Dave has 16 years of experience in the software industry building large scale distributed systems with object-oriented technologies. Dave is a frequent speaker at industry conferences such as TeleManagement World and JavaOne.



Prof. Juergen Schoenwaelder, International University Bremen
Dr. Jürgen Schönwälder is professor of Computer Science at the International University Bremen, specializing in the field of communication networks and distributed systems. He received his diploma in computer science in 1990 and his doctoral degree in 1996 from the Technical University Braunschweig, Germany. His research interests are network management, distributed systems and network security. He is an active member of the Internet Engineering Task Force (IETF) where he has edited more than 20 network management related specifications and standards. He is the initiator and chair of the Network Management Research Group (NMRG) of the Internet Research Task Force (IRTF) and a regular program committee member of more than a dozen IEEE/IFIP workshops and conferences. He is a member of the editorial board of the IEEE eTransactions on Network and Service Management and served as a guest co-editor of special issues of the IEEE Communications Magazine and the IEEE Journal on Selected Areas in Communications. He has been technical program co-chair of IM 2003 and DSOM 2005.

Prof. Morris Sloman, Imperial College London
Professor Morris Sloman is Director of Research and Deputy Head of the Department of Computing, Imperial College London. His research interests include management of networks and distributed systems, adaptive security management, trust and security for pervasive systems, autonomic management for pervasive systems. He is on the steering committees for the conferences on Policies for Distributed Systems and Networks, Integrated Management (IM), Network Operations and Management (NOMS).



Conference Registration
View the Preliminary Program
View the Calls of the Co-located Workshops
View the Call for Patrons