FINAL PROGRAM
(19h-21h) Welcome Reception |
(8h30-10h) Welcome Address & Keynote Session
1 |
(10h-10h30) Break |
(19h30-23h30)
Social
Event |
(8h30-10h) Keynote Session 2 |
(10h-10h30) Break |
(8h30-10h) Keynote Session 3 |
(10h-10h30) Break |
(15-15h30) Break |
(15h30-17h) Distinguished Experts Panel |
(17h-17h30) Closing |
|
Technical Program -
Session 1 : Network Management (DELPHES 3BC Room)
Chair : Jürgen Schönwälder, International University Bremen, Germany |
|
Programmable Middleware for the Dynamic Deployment of
Services and Protocols in Ad-Hoc networks
S.Gouveris, S.Sivavakeesar, G.Pavlou, A.Malatras. Centre
for Communication Systems Research, Dept. of Electronic Engineering,
University of Surrey, UK |
|
Management of Mobile Ad-Hoc networks: Evaluating the
Network Behavior
Rémi Badonnel, Radu State, Olivier Festor, The MADYNES Research
Team, LORIA-INRIA Lorraine, France |
|
LHA-SP:
Secure protocols for Hierarchical Wireless Sensor
Networks
L B. Oliveira, H. Chi Wong, A. A. Loureiro, Federal University
of Minas Gerais Computer Science Department Belo Horizonte, Minas
Gerais, Brazil |
|
Efficient Energy Management Protocol for Target
tracking Sensor Network
Xiaojiang Du, Fengjing Lin, North Dakota State University,
USA |
|
|
|
Technical Program - Session
2 : Application Monitoring (DELPHES 2BC Room)
Chair : Ehab
El-Shaer,DePaul University, Chicago, USA |
|
Monitoring Mining: models for automated system
management Sandeep Uttamchandani, Xiaoxin Yin, John
Palmer, IBM Almaden Research Center, USA Gul Agha,
University of Illinois at Urbana-Champaign,
USA |
|
Health
monitoring and control for application server
environment Nikos Anerousis, Ann Black, Susan Hanson,
Lily Mummert, Giovanni Pacifici, IBM TJ Watson Research Center,
USA |
|
Data-driven monitoring design of service levels and
resource utilization
Chang-shing Perng Sheng Ma Steve Lin, David Thoenen, IBM Watson
Research Center, USA |
|
|
|
Technical Program -
Session 3 : Traffic Monitoring (DELPHES 3BC Room)
Chair : Philippe Owesarski, LAAS-CNRS, Toulouse, France |
|
Data-Mining techniques for Effective Multi-Gigabit
traffic Analysis
Mario Baldi, Elena Baralis, Fulvio Risso, Dipartimento di
Automatica e Informatica - Politecnico di Torino, Torino, Italy |
|
Real-Time views of network traffic using
decentralized management
Koon-Seng Lim and Rolf Stadler, Laboratory of Communication
Networks, KTH Royal Institute of Technology, Stockholm, Sweden |
|
Anomaly
Detection for Internet Worms Yousof Al-Hammadi,
Department of Electrical and Electronic Engineering, The
University of Melbourne, Australia
Christopher Leckie, Department of Computer Science andSoftware
Engineering he University of Melbourne, Australia |
|
|
|
Technical Program - Session 4 : Cluster
& Server Control (DELPHES 2BC Room)
Chair : Joe Hellerstein, IBM Research, USA |
|
Adaptable Server Clusters with QoS Objectives
Constantin Adam and Rolf Stadler, Laboratory of Communication
Networks, KTH Royal Institute of Technology, Stockholm, Sweden |
|
Adaptive Entitlement Control to resource containers
on shared servers
Xue Liu, Xiaoyun Zhu, Sharad Singhal, Martin Arlitt, Hewlett-Packard
Laboratories, Palo Alto, USA |
|
Control
of Weighted Faire Queing: Modeling, Implementation and Experiences
Ronghua Zhang, Tarek Abdelzaher, John Stankovic, University
of Virginia, USA
Sujay Parekh, Yixin Diao, Maheswaran Surendra, IBM, USA |
|
|
|
Technical Program - Session 5 : Topology
Management (DELPHES 3BC Room)
Chair : Rolf Stadler, Laboratory of Communication Networks,
KTH Royal Institute of Technology, Stockholm, Sweden |
|
Automatic Tuning of ADSL circuits
M. Matsuno, S. Nakai, M. Morimitsu, NEC Corporation, Chiba,
Japan
H. Ide, T. Ito, eAccess Corporation, Tokyo, Japan |
|
Redesigning Network Topology with Technology
Considerations
Sami J. Habib, Kuwait University, Computer Engineering Department,
Kuwait |
|
Reducing the Complexity of Application Deployment in
Large Data Centers
Tamar Eilam, Michael Kalantar, Alexander Konstantinou, Giovanni
Pacifici, IBM T.J. Watson Research Center, USA
|
|
|
|
Technical Program - Session 6 : Utility
& SAN Management (DELPHES 2BC Room)
Chair : Alexander Keller, IBM T.J. Watson Research Center,
USA |
|
A
framework for applying inventory control to capacity management for
utility computing
Joseph L. Hellerstein, Kaan Katircioglu, Maheswaran Surendra,
IBM T.J. Watson Research Center, USA |
|
Root
cause analysis of SAN performance problems: an I/O Path affine
search approach David Breitgand, Ealan Henis, Edya
Ladan-Mozes, Onn Shehory, Elena Yerushalmi
IBM - Haifa Research Labs, Haifa University, Israel |
|
Quartermaster - A resource utility
system
Sharad Singhal, Sven Graupner, Akhil Sahai, Vijay Machiraju, Jim
Pruyne, Xiaoyun Zhu, Jerry Rolia, Martin Arlitt, Cipriano Santos,
Dirk Beyer, Julie Ward, HP Laboratories, Palo Alto, USA |
|
|
|
Technical Program -
Session 7 : Dimensioning & Provisioning (DELPHES 3BC Room)
Chair : Prosper Chemouil, France Telecom, France |
|
Cooperation of control and management plane for
provisioning in MPLS networks
E. Grampín, Universidad de la República, Montevideo, Urugay
J.
Serrat, Universitat Politècnica de Catalunya, Barcelona,
Spain |
|
A Novel
service oriented framework for automatic switched transport
network
Barbara Martini and Fabio Baroncelli, Consorzio Nazionale
Interuniversitario per le Telecomunicazioni (CNIT), Pisa, Italy
Piero Castoldi, Scuola Superiore
Sant’Anna, Pisa, Italy |
|
On the
management of aggregation networks with rapidly moving traffic
demands
Frederic Van Quickenborne, Filip De Greve, Ingrid Moerman, Filip
De Turck, Piet Demeester Department of Information Technology
(INTEC), Ghent University, Belgium |
|
Zero-budget network dimensioning Wenli
Liu, Youssef Iraqi and Raouf Boutaba, School of Computer Science
University of Waterloo, Canada |
|
|
|
Technical Program -
Session 8 : Pricing (DELPHES 2BC Room) Chair : Emil Lupu, Imperial
College, UK |
|
A
location based incentive pricing scheme for tree based relaying in
multihop cellular networks
Ming-Hua Lin, Chi-Chun Lo, Institute of Information Management,
National Chiao-Tung University,Hsinchu, Taiwan, R.O.C |
|
A tariff
model to charge IP services with guaranteed quality: effects of
users demand in a case study N. Blefari-Melazzi,
Dipartimento di Ingegneria Elettronica (DIE) – University of
Rome Tor Vergata, Italy.
D. Di Sorte, M. Femminella, G. Reali, Dipartimento di Ingegneria
Elettronica e dell’Informazione (DIEI) – University of Perugia,
Italy |
|
Stabilizing Market via a novel auction based pricing
mechanism for short term contract for network
services
Juong-Sik Lee and Boleslaw K. Szymanski, Optimaret Inc. and
Department of Computer Science, RPI, NY, USA |
|
Decentralized auction based pricing with
peermart David Hausheer, ETH Zurich, Computer
Engineering and Networks Laboratory TIK,
Switzerland
Burkhard Stiller, UniBw Munich, Information Systems Laboratory
IIS, Germany & ETH Zurich, Computer Engineering and Networks
Laboratory TIK, Switzerland |
|
|
|
Technical Program -
Session 9 : QoS composition and adaptation (DELPHES 3BC Room) Chair :
Takeo Hamada, Fujitsu Labs of America, USA |
|
QoS
aware Service composition in large scale multi-domain
networks Jin Xiao, Raouf Boutaba, School of Computer
Science, University of Waterloo, Canada. |
|
Self-adaptive Distribued Management of QoS and SLS in
multiservice networks Solange Rito Lima, Paulo Carvalho,
and Vasco Freitas, University of Minho, Departament of
Informatics, Braga, Portugal |
|
Efficient Management of transcoding and multicasting
multimedia streams Asaf Henig Danny Raz, Department
of Computer Science Technion, Haifa, Israel. |
|
|
|
Technical Program -
Session 10 : Policy Management (DELPHES 2BC Room) Chair : Nazim
Agoulmine, University of Evry Val d'Essonne,
France |
|
Integrating Changes to a Hierarchical Policy
Model Susan Hinrichs, CISCO Systems, Champaing, IL,
USA |
|
Policy
Management for Networked Systems and Applications Dakshi
Agrawal, Seraphin Calo, James Giles, Kang-Won Lee, and Dinesh Verma,
IBM T. J. Watson Research Center, USA |
|
Policy
Refinement for Diffserv Quality of Service
management Arosha K Bandara, Emil C Lupu, Alessandra Russo, Naranker
Dulay, Morris Sloman, Imperial College London, UK Paris
Flegkas, Marinos Charalambides, George Pavlou, Centre for
Communications Systems Research, University of Surrey, Gilford, UK
|
|
|
|
Technical Program - Session 11 :
Measurement (DELPHES 3BC Room) Chair : Radu State, The MADYNES Research
Team, LORIA - INRIA, France |
|
Measurement based Networking approach applied to
congestion control in the multi-domain internet Nicolas
Larrieu and Philippe Owesarski, LAAS–CNRS, Toulouse,
France |
|
Packet Marking for Integrated Load Control
Martin Karsten, School of Computer Science, University of
Waterloo, Canada
Jens Schmitt, Distributed Computer Systems Lab, University
of Kaiserslautern, Germany |
|
Efficient transmission of periodic data that follows
a consistent daily pattern
Mouayad Albaghdadi, Kumail Razvi, Motorola, Inc., Shaumburg,
IL, USA |
|
|
|
Technical Program - Session 12 : Fault
Management (DELPHES 2BC Room) Chair : Morris Sloman, Imperial
College London, UK |
|
Troubleshooting: comparing tree and matrix
representations Alina Beygelzimer, Mark Brodie, Sheng
Ma, Irina Rish, IBM T. J. Watson Research Center,
USA |
|
Active
Integrated Fault localization in communication
networks Yongning Tang and Ehab S. Al-Shaer,
Multimedia Networking Research Laboratory School of Computer
Science, Telecommunications and Information Systems DePaul
University, Chicago, USA Raouf Boutaba, School of
Computer Science, University of Waterloo, Canada |
|
Scalable fault management for mobile networks beyond
3G Giorgio Nunzi, Jürgen Quittek, Marcus Brunner,
NEC Europe Ltd., Network Laboratories, Heidelberg,
Germany |
|
|
|
Technical Program -
Session 13 : Internet Management (DELPHES 3BC Room) Chair : Raouf
Boutaba, School of Computer Science, University of Waterloo,
Canada |
|
Management of NAT based private
networks O. T. Satyanarayanan, J. Shiva Shankar,
Cisco Systems, Inc., San Jose, USA |
|
An
Integrated Security framework for XML based
Management Vincent Cridlig, Radu State, Oliver Festor,
The MADYNES Research Team, LORIA - INRIA Lorraine, Nancy
France |
|
Comparing Web Services with SNMP in a Management by
Delegation Environment Tiago Fioreze, Lisandro
Zambenedetti Granville, Maria Janilce Bosquiroli Almeida, Liane
Margarida Rockenbach Tarouco, Institute of Informatics, Federal
University of Rio Grande do Sul, Porto Allegre,
Brazil |
|
Characterization of SNMP MIB
Modules Jürgen Schönwälder, International University
Bremen, Bremen, Germany |
|
|
|
Technical Program - Session 14 :
Service Management (DELPHES 2BC Room) Chair : Gabi Dreo-Rodosek,
Leibniz Supercomputing Center, Munich, Germany |
|
A model
of configuration complexity and its application to a change
management system Aaron B. Brown, Alexander Keller,
Joseph L. Hellerstein, IBM T.J. Watson Research Center,
USA |
|
Semantic
techniques for reconfiguring and adapting networks in pervasive
environment Mohamed Khedr, Ahmed Karmouch,
Multimedia and Mobile Agent Research Laboratory School of
Information Technology and Engineering, University of Ottawa,
Ottawa, Canada Mohamed Ganna, Eric Horlait, Université
Pierre et Marie Curie, Laboratoire LIP6-CNRS, Paris,
France |
|
A model
driven approach to rapid service introduction Munir
Cochinwala, Hyong Sop Shim, John Wullert II, Applied Research,
Telcordia Technologies Inc, USA |
|
Moving
From Data Modeling to Process Modeling in CIM Arun
Kumar, Neeran Karnic, IBM India Research Lab,
India
Ravindranath C.K., Learning Systems and Multimedia Lab, Department
of Electrical Engineering, Indian Institute of Sc., Bangalore,
India |
|
|
|
Technical Program - Session 15 : OSS
& Middleware (DELPHES 3BC Room) Chair : Jean-Philippe Martin-Flatin, UQAM, Canada |
|
Investigating the feasibility of Open Development of
Operations Support Solutions C.R. Gallen and J. F.
Reeve, University of Southampton, UK |
|
Distributed Messaging using Meta Channels and Message
Bins Sean Rooney, Daniel Bauer, Paolo Scotton, IBM
Research Zurich Research Laboratory, Rüschlikon,
Switzerland |
|
OSS
Functions for Flexible Charging and Billing of Mobile Services in a
Federated Environment Bharat Bhushan, Jane Hall,
Fraunhofer FOKUS, Berlin, Germany Pascal Kurtansky,
Burkhard Stiller, ETH Zürich, Computer Engineering and Networks
Laboratory TIK, Zürich, Switzerland |
|
|
|
Technical Program - Session 16 :
Threshold Management (DELPHES 2BC Room) Chair : Danny Raz,
Department of Computer Science Technion, Haifa,
Israel |
|
Threshold management for problem determination in
transaction based E-commerce systems Manoj K. Agarwal,
Anindya Neogi, IBM India Research Lab, New Delhi,
India Karen Appleby, Jamal Faik, Gautam Kar, Anca Sailer,
IBM T.J. Watson Research Center, New York, USA |
|
Using
automatically derived load thresholds to manage compute resources on
demand Karen Appleby, Germán Goldszmidt, IBM T.J.
Watson Research Center, New York, USA |
|
Towards
an Optimal network survivability reporting
threshold Andrew P. Snow and Shweta Agarwal, McClure
School of Communication Systems Management Lindley Hall, Ohio
University, Athens USA |
|
|
Application Sessions
Program |
|
Application Sessions
Program - Session 1 : Security (THEMIS Auditorium) Chair : Felix Wu,
University of California at Davis, USA |
|
Quarantine Net: Design and
Application Matthijs Bomhoff, Casper Joost Eyckelhof,
Quarantainenet v.o.f., The Netherlands Remco van de
Meent, Aiko Pras, University of Twente, The
Netherlands
|
|
Management Framework for Unified Content
Security Yao-Min Chen & Yanyan Yang, WatchGuard
Technologies, Inc., USA |
|
Federated Identity for the Management of Web-Centric
Computing Infrastructure Subrata Mazumdar, Avaya
Inc. USA |
|
DeepTrust Management Application for Discovery,
Selection, and Composition of Trustworthy Services Karl
Quinn, Declan O’ Sullivan, Dave Lewis, Vincent P. Wade, Trinity
College Dublin. Ireland Rob Brennan, Ericsson Ireland,
Ireland |
|
|
|
Application Sessions Program - Session 2
: Business Cases and Surveys (THEMIS Auditorium) Chair : Yoshiaki
Kiriha, NEC, Japan |
|
An on
Demand Transformation of a Core IBM Supply Chain Business
Process German Goldszmidt, IBM T. J. Watson Research
Center, USA |
|
Enterprise Development Strategy for Satellite Systems
- How Important is the Ground Operations System Joseph
Betser, Mary Rich, Sergio Alvarado, Philip Schmidt, Jaime Milstein,
The Aerospace Corporation, USA |
|
Service/Resource Naming a Comparative
Study Reaz Ahmed, Raouf Boutaba, Fernando Cuervo,
Youssef Iraqi, Dennis Tianshu Li, Noura Limam, Jin, Xiao, Joanna
Ziembicki, University of Waterloo, Canada |
|
Service
Discovery Protocols A Comparative Study Reaz Ahmed,
Raouf Boutaba, Fernando Cuervo, Youssef Iraqi, Dennis Tianshu Li,
Noura Limam, Jin, Xiao, Joanna Ziembicki, University of
Waterloo, Canada |
|
|
|
Application Sessions Program - Session 3
: Policy, Ontology, and SNMP (THEMIS Auditorium) Chair : Pierre Rolin,
France Telecom, France |
|
QAME
Support for Policy-Based Management of Country-wide
Networks Clarissa C. Marquezan, Lisandro Z. Granville,
Ricardo L. Vianna, Rodrigo S. Alves, Federal University of Rio
Grande do Sul, Brazil |
|
Motivation for the NGOSS Ontology
John Strassner, Motorola Lab, USA |
|
Exploring Integrated Resource Management with
WebSNMP Junseong Cho, Sunyoung Han, Doyoon Kim,
JongMyung Lee, R&D Center, Hanaro Telecom Inc.,
Korea |
|
RADIUS-Based SNMP Authorization
Vincent Cridlig, Radu State, Olivier Festor, Jean-François Leroy,
The MADYNES Research team, LORIA-INRIA, France |
|
|
|
Application Sessions Program - Session 4
: Service, Operations, and Topology (THEMIS Auditorium) Chair : Kohei
Iseda, Fujitsu Laboratories, Japan |
|
OSS and
Operational Challenges for Managing Intelligent Metro Optical
Networks Guido Bruno, Andrea Pinnola, Giuseppe Ricucci,
Telecom Italia Lab, Italy |
|
On the
Integration of Network Information into Topology-Aware
Applications Roger Karrer, Rice University,
USA Thomas Gross, ETH Zurich,
Switzerland |
|
Home
Service Management based on Open Service Aggregation Platform
Concept Hiroyuki Maeomichi, Ryutaro Kawamura, Ikuo
Yamasaki, Akihiro Tsutsui, Kouji Yata, NTT Corporation,
Japan |
|
|
|
Application Sessions Program - Session 5
: Performance and Analysis (THEMIS Auditorium) Chair : Hanan Lutfiyya,
The University of Western Ontario, London,
Canada. |
|
Enabling Adaptive Grid Scheduling and Resource
Management Aleksandar Lazarevic, Lionel Sacks, Ognjen
Prnjat, University College London, UK |
|
Performance Evaluation for a DiffServ Networks PHBs
EF, AF, BE and Scavenger Augusto Castelan Carlson,
Edison Tadeu Lopes Melo, Carlos Becker Westphall, Federal
University of Santa Catarina/NPD, Brazil |
|
Online
Web Cluster Capacity Estimation and its Application to Energy
Conservation Chang-hao Tsai, Kang G. Shin,
University Of Michigan, USA John Reumann, IBM
Research, USA Sharad Singhal, Hewlett Packard,
USA |
|
Network
Management Analytics Kemal Delic, Hewlett Packard,
France Umeshwar Dayal, Hewlett Packard,
USA |
|
|
|
Poster
Program - Session 1 (DELPHES 2-3A)
Chair : Lisandro Zambenedetti Granville, Federal University
of Rio Grande do Sul, Brazil |
|
Modelling
the Sequential Aspects of Network Configurations
Sylvain
Hallé, Rudy Deca, Omar Cherkaoui, Roger Villemaire, Université
of Quebec in Montreal, Canada
Daniel Puche, Cisco Systems, Canada |
|
Plug
and Play Configuration for Composable Networks
M.
Brunner, S. Schueltz, J. Tobella, M. Stiemerling, NEC Europe
Ltd., Germany |
|
Smart
business networks : architectural aspects and risks
Louis-Francois
Pau, Rotterdam School of management, The Netherlands |
|
Design
and Implementation of Automated Home Network Diagnosis Based on
Configuration Matching Kiyohito
Yoshihara, KDDI R&D Laboratories Inc., Japan
Takeshi Kouyama, Kentaro Ishii, KDDI Corporation, Japan
Hiroki Horiuchi, KDDI R&D Laboratories Inc., Japan |
|
Detecting
Configuration Errors in Operational SONET/SDH Networks
Wee
Teck Ng, Pankaj Risbood, Swarup Acharya, Edward Lafontaine,
Lucent Technologies, Inc., USA. |
|
Federated
Identity Management: Shortcomings of existing standards
Wolfgang
Hommel, Leibniz Computing Centre, Munich, Germany
Helmut Reiser, Ludwig Maximilian University Munich, Germany |
|
Optimisation
of Policy-Based Internet Routing using Access-Control Lists
Vic
Grout, John McGinn, University of Wales, UK
|
|
BGP
Behavior Analysis During the August 2003 Blackout
Zhen
Wu, Eric Purpus, Jun Li, University of Oregon, USA
|
|
A
Formal Theory for Analysis and Optimization of BGP VPNs
Marco
Bruti, Telecom Italia Sparkle S.p.A., Italy |
|
Architecture
for User-aware Network Self-configuration Nicola
Blefari-Melazzi, University of Rome "Tor Vergata", Italy
Dario Di Sorte, Mauro Femminella, Gianluca Reali, University
of Perugia, Italy
|
|
An
Organizational-driven Specialization of the Multi-Agent System
Paradigm for Self-Management E.
Lavinal, T. Desprats, Y. Raynaud, Paul Sabatier University,
France |
|
Self-Managed
Wireless Sensor Networks: A Study Case Linnyer
Ruiz, Thais Braga, Fabrício Silva, Helen Assunção, José Marcos
Nogueira, Antonio Alfredo Ferreira Loureiro,
Federal University of Minas Gerais, Brazil
|
|
Remodeling
Hotspot Economics with Voice over Wi-Fi Vinoth
Gunasekaran, Fotios Harmantzis, Stevens Institute of Technology,
USA |
|
Ontology
Based Policy Mobility for Pervasive Computing
Sven
van der Meer, TSSG, Waterford Institute of Technology, Ireland
Declan O'Sullivan, David Lewis, Trinity College Dublin, Ireland
Nazim Agoulmine, University of Evry, France
|
|
Closing
the loop of on-demand video service provisioning using a policy
based management approach L.
Maknavicius, S. Piekarec, Y. Gaste, Alcatel Research &
Innovation, France
N. Agoulmine, M. Fonseca, K. Haddadou, University of Evry,
France
|
|
Coordination
of Policy-Based Autonomic Managers Mandis
Beigi, Seraphin Calo, James Giles, IBM, USA
|
|
Policy
Enforcement Performance and PBNM Benchmarking
Shane
Magrath, Robin Braun, University of Technology, Sydney, Australia
|
|
Policy-Based
Architecture for QoS Management in Enterprise IP Networks
Marcos
Siqueira, Nadia Nassif, Raulison Resende, Ademilson Silva, CPqD,
Brazil
Mamede Lima Marques, University of Brasilia - UnB, Brazil |
|
Optimization
of Network Firewall Policies using Directed Acyclical Graphs
Errin
Fulp, Wake Forest University, USA
|
|
A
Worm Traffic Detection Algorithm for Enterprise Networks
Seong-Cheol
Hong, Long-Quan Zhao, James Won-Ki Hong, Hong-Tack Ju,
POSTECH, Republic of Korea
|
|
Detecting
DDoS attacks using a multilayer Perceptron classifier
Christos
Siaterlis, Basil Maglaris, National Technical University
of Athens, Greece
|
|
Towards
Distributed Network Intrusion Prevention with Respect to QoS Requirements
Andreas
Hess, Mathias Bohge, Guenter Schaefer, Technical University
of Berlin, Germany
|
|
Application
Communication Emulation For Performance Management Of NOW Clusters
Jeffrey
Evans, Purdue University, USA
Cynthia Hood, Illinois Institute of Technology, USA
|
|
WS-DSAC:
An Admission Control and Load balancing Mechanism to Assure QoS
Differentiation on Web Servers Clusters A.
Serra, J. Boudy,
G. Barros, R. Ramos, Institut National des Télécommunications,
France
Dominique Gaiti, UTT, France
|
|
Application
of Grid Concepts and Technologies to Network Management Systems
N.J.
Hurley, T. Cox, C. Doherty, University College Dublin, Ireland
S. Collins, R. Brennan, Ericsson R&D Ireland, Ireland
|
|
A
Business Driven Management Framework for IT Systems Management
Issam
Aib, University of Paris 6, France
Mathias Sallé, Claudio Bartolini, HP Research Labs, USA
A. Boulmakoul, HP Research Labs, UK
|
|
QoS
Aware Resource Management Architecture for OGSA Services Deployment
Edgar
Magaña, Joan Serrat, Universitat Politecnica de Catalunya,
Spain
|
|
Dimensioning
Network Resources in DiffServ over MPLS based Expedited Forwarding
Service Subclasses Hamada
Alshaer, Eric Horlait, LIP6, France
|
|
|
|
Poster
Program - Session 2 (DELPHES 2-3A)
Chair : Nikos Anerousis, IBM T. J. Watson Research Center,
USA |
|
Design
and implementation of a Layer-7 MPLS-based Web Switching Architecture
Antonio
Mancuso, Elias Carotti, Politecnico di Torino, Italy
Juan Carlos De Martin, IEIIT-CNR, Italy
Angelo R. Meo, Politecnico di Torino, Italy |
|
GMPLS
Control Plane Auto-discovery Evaluation and Its Interfacing with
OSS in IP Optical Network Qiang
Song, Ibrahim Habib, City College of New York, USA
Wesam Alanqar, Sprint, USA
|
|
Inter-AS
MPLS routing by EJB-based path computation server
Hiroshi
Matsuura, Yasushi Yamanaka, Tatsuro Murakami, NTT, Japan
Kazumasa Takami, Soka University, Japan |
|
An
architectural framework for Inter-domain quality of service provisioning
Michael
Howarth, Paris Flegkas, George Pavlou, Panos Trimintzios, University
of Surrey, UK
Hamid Asgari,
Thales Research & Tecnology Limited, UK
David Griffin, J. Griem, University College London, UK
Mohamed Boucadair,
France Telecom R&D, France
Panagiotis Georgatsos, Algonet SA, Greece
|
|
A
Programmable Network Platform with QoS-Differentiated Resource
Allocation Bushar
Yousef, Doan Hoang, Univesity
of Technology Sydney, Australia
Glynn Rogers, CSIRO, Australia
|
|
Network
Resource Allocation Method Using Constraint Satisfaction Problem
Kenichi
Tayama, Shiro Ogasawara, Tetsuya Yamamura, NTT, Japan
|
|
Towards
a Framework for Failure Impact Analysis and Recovery with Respect
to Service Level Agreements Andreas
Hanemann, David Schmitz, Leibniz Supercomputing Center, Germany
Martin Sailer, University of Munich (LMU), Germany
|
|
Multi-fault
Diagnosis in Dynamic Systems Natalia
Odintsova, Irina Rish, Sheng Ma, IBM, USA
|
|
Design
and experimental implementation of a hybrid optical performance
monitoring system for in-service SLA guarantee
Carolina
Pinart, Abdelhafid Amrani, CTTC, Spain
Gabriel Junyent, UPC, Spain
|
|
Passive
Packet Loss Monitoring Using a Hash-based Identification Technique
Satoru
Ohta, Toshiaki Miyazaki, NTT
Corporation, Japan.
|
|
Simple
Standardized Application Monitoring in an IP Environment
J. A. Weinstock, W. N. Culpepper, Cisco Systems, USA
C. L. Lowery, Comcast IP Services, USA |
|
FLEXA:
Distributed and Flexible Network Monitoring with Autonomous Group
Formation Akira
Uchiyama, Takaaki Umedu, Teruo Higashino, Osaka University,
Japan
Keiichi Yasumoto, Nara Institute of Science and Technology,
Japan
|
|
A
Hybrid Approach to Event Correlation and Simulation Management
Gabriel
Jakobson, J. Buford, Altusys, USA
Lundy Lewis, Southern New Hampshire University, USA
|
|
An
Infrastructure for Distributed Event Acquisition
Hervé
Debar, Benjamin Morin, Vincent Boissée, Didier Guérin, France
Telecom R&D, France
|
|
XIP:
A Scalable and Distributed Architecture for Cross-domain Services
Fernando
Cuervo, Arnold Jansen, Pierrick Guingo, Michel Sim, Alcatel,
Canada
|
|
Multi-Agent
System Co-ordination in a Distributed Network Resource Management
Scenario Pere
Vila, Jose Luis Marzo, Eusebi Calle, Lluis Fabrega, Universitat
de Girona, Spain
|
|
Towards
a Transaction-Based Charging and Accounting of Distributed Services
and Applications M.
Schmid, M. Debusmann, R. Kroeger, M. Halbig, University of
Applied Sciences, Germany
|
|
Proactive
Management Based on Dynamic Bayesian Networks in Distributed Systems
Jianguo
Ding, Yingcai Bai, Shanghai Jiao Tong University, Republic
of China
Bernd J. Krämer, FernUniversität Hagen, Germany
|
|
Performace
Evaluation of Video Flows Integration over IP Networks using TAO
Antonio-Javier
Garcia-Sanchez, Felipe Garcia-Sanchez, Joan Garcia-Haro, Technical
University of Cartagena, Spain
|
|
Network
Perception using Data Imaging and Image Analysis
David
Rosenbluth, Marc Pucci, Telcordia Technologies, USA
|
|
An
OpEx Framework for Dynamic Provisioning in Service Providers'
Networks Richard
Rabbat, Takeo Hamada, Fujitsu Labs of America, USA
|
|
A
system supported method to design IT services
S.
Abeck, S. Link, C. Mayerl, O. Mehl, T. Vogel, Universität
Karlsruhe, Germany
|
|
Service-Oriented
Accounting and Charging for 3G and B3G Mobile Environments
Uwe
Foell, Changpeng Fan, Siemens AG, Germany
Georg Carle, Falko Dressler, University of Tuebingen, Germany
Mehran Roshandel, T-Systems, Germany
|
|
Resource
Management over Interworking of 3G and Digital Broadcasting Networks
Luan
Huang, Kar Ann Chew, Rahim Tafazolli, University of Surrey,
UK .
|
|
Evaluating
a Congestion Management Architecture for SMS Gateways
Alberto
Gonzalez Prieto, Rolf Stadler, KTH Royal Institute of Technology,
Sweden
|
|
Sensor-based
Architecture for Quality-of-Service Support in WLANs
Sonia
Waharte, Raouf Boutaba, University of Waterloo, Canada
|
|
XML
based Protocols for Managing Mobile Devices and Services Over-the-Air
Paul
Oommen, Nokia, USA
|
|
A
Web Service Based-Architecture for Detecting Faults in Web Services
Abdelghani
Benharref, Roch Glitho, Rachida Dssouli, Concordia University,
Canada
|
|
Light-Weight
WBEM Design for Small Devices Hee
Nam Cho, Chang-Won Ahn, Sung-In Jung, ETRI, South Korea
|
|
|
Tutorial #1
|
Control Theory and Its Application to
Network and Systems Management (VERANY 1 Room) |
Instructor |
Dr. Joseph
Hellerstein, IBM T.J. Watson Research Center, New York, USA
|
Abstract
Feedback control
is central to network and systems management. It is employed to
achieve service level objectives for metrics such as response times
by taking resource actions (e.g., scheduling priorities and
bandwidth allocations). Feedback is also used to optimize resource
allocations for a workload mix.
While computing systems in general and network management in
particular make broad use of feedback control, this has
traditionally been done in an ad hoc manner. In contrast,
mechanical, electrical, and other areas of engineering design
systems using control theory, a well developed and systematic
approach to the analysis and design of feedback systems. Control
theory provides a way to determine if feedback loops are stable
(e.g., avoid wild oscillations), accurate in their control (e.g.,
achieve the right resource allocation policies), and settle quickly
to their steady state values (e.g., to adjust to workload dynamics).
Unfortunately, existing books on control theory are not well suited
to computer scientists both because of the examples (e.g., eletrical
circuits, dash pots) and the emphasize on continuous time instead of
discrete time systems. This tutorial provides an
introduction to control theory for computer scientists that is
sufficient to do basic control analysis and design. The presentation
is divided into three parts: elements of control theory, control
analysis and design, and real world applications. Elements of control theory is an introduction to key
concepts. Included here are control goals (e.g., regulation,
optimization, disturbance rejection); the control architecture (with
examples from the Apache web server and the IBM Lotus Domino
Server); and control objectives. Control analysis and
design has three subparts. The first provides an intuitive
description of the z-transform that is sufficient for analyzing many
control systems. Next, these concepts are applied to a spreadsheet
model of the Lotus Domino Server and to results from a testbed of a
production server. In the third section, basic controllers are
discussed and various applications are explored. The
third part of the tutorial presents two applications of control
theory to the IBM DB2 Universal Database Server. The first
application regulates the impact on production work of
high-overhead, long-running database utilities such as BACKUP,
RESTORE, and REBALANCE. The second application of control theory is
to automate the management of database memory pools. The
tutorial is intended for systems oriented computer practitioners
with little experience withmathematical modeling. The only
background assume is knowledge of the geometric
series. |
Table of Content
1.
Elements of control theory a. Spreadsheet based
analysis b. Control architecture c.
Key concepts—closed loop vs. open loop, types of
control, d. Exercises 2. Control analysis and
design a. Foundations i.
Signals and z-transforms ii. Poles and
settling times iii. Transfer
functions iv. Steady state
gain v. Composition of systems, canonical
closed loop system vi. Applications to
simulated and real Notes system b. Control
analysis i. Proportional
control ii. Integral
control iii. Proportional, integral
control iv.
Precompensation v.
Filters vi. PI control c.
Control design i. Design
criteria ii. Pole placement
procedure iii. Designing a load balancing
system 3. Real world applications a. DB2 Utilities
throttling i. Motivation and problem
definition ii. Self-imposed sleep and its
effectiveness iii. Adaptive baseline
estimation iv. Controller
evaluation v. Multiple
utilities b. Self-tuning memory
management i. Managing database memory
pools ii. Model
formulation iii. Load balancing
iv. Cost of
control v. Memory tuning as a non-linear
optimization vi. Memory tuning as a MIMO
linear regulation problem 4.
References |
Biography
Joseph L
Hellerstein is a research staff member and manager of the Adaptive
Systems Department at the IBM Thomas J Watson Research Center in
Hawthorne, New York and an adjunct professor at Columbia University
in New York City. Dr. Hellerstein received the Ph.D. in Computer
Science from the University of California at Los Angeles. Since then
his research has addressed various aspects of service quality in
computing systems, including: predictive detection, automated
diagnosis, expert systems, and the application of control theory to
computing systems. Dr. Hellerstein has authored or co-authored
approximately 80 peer reviewed articles, an Addison-Wesley book on
expert systems, and a Wiley book entitled "Feedback Control of
Computing Systems." |
Tutorial
#2 |
Peer-to-Peer Networking: Concepts,
Applications and Management (VERANY 2 Room) |
Instructor |
Prof. Raouf
Boutaba, University of Waterloo,
Canada |
Abstract
The past few
years have witnessed the emergence of Peer-to-Peer (P2P) systems as
a means to further facilitate the formation of communities of
interest over the Internet in all areas of human life including
technical/research, cultural, political, social, entertainment, etc.
P2P technologies involve data storage, discovery and retrieval,
overlay networks and application-level routing, security and
reputation, measurements and management. This tutorial will give an
appreciation of the issues and state of the art in Peer-to-Peer
Networking. It will introduce the underlying concepts, present
existing architectures, highlight the design requirements, discuss
the research issues, compare existing approaches, and illustrate the
concepts through case studies. The ultimate objective is to provide
the tutorial attendees with an in-depth understanding of the issues
inherent to the design, deployment and operation of large-scale P2P
systems. |
Table of Content
-
Definitions - Overlay networks - P2P Networking: Goals -
P2P Applications - Classification of P2P systems - Design
requirements - Case Studies - Measurements and Security -
Trust and reputation management - P2P and management - Putting
it all together |
Biography
Dr. Raouf
Boutaba is an Associate Professor in the School of Computer Science
of the University of Waterloo. Before that he was with the
Department of Electrical and Computer Engineering of the University
of Toronto. Before joining academia, he founded and was the director
of the telecommunications and distributed systems division of the
Computer Science Research Institute of Montreal (CRIM). Dr. Boutaba
conducts research in the areas of network and distributed systems
management and resource management in multimedia wired and wireless
networks. He has published more than 140 papers in refereed journals
and conference proceedings. He is the recipient of the Premier's
Research Excellence Award, the NORTEL Networks research excellence
Award and several Best Paper awards. He is a fellow of the faculty
of mathematics of the University of Waterloo and a distinguished
lecturer of the IEEE Computer Society. Dr. Boutaba is the Chairman
of the IFIP Working Group on Networks and Distributed Systems, the
Vice Chair of the IEEE Communications Society Technical Committee on
Information Infrastructure, and the Director of standards board of
the IEEE Communications Society. He is the founder and acting editor
in Chief of the IEEE eTransactions on Network and Service
Management, on the advisory editorial board of the Journal of
Network and Systems Management, on the editorial board of the
KIKS/IEEE Journal of Communications and Networks, the editorial
board of the Journal of Computer Networks and the Journal of
Computer Communications. He acted as the program chair for the IFIP
Networking conference and the IEEE CCNC conference, and a program
co-chair for the IEEE/IFIP NOMS, IFIP/IEEE MMNS, IEEE FIW, IEEE ACC
and IEEE ICC symposia. Dr. Boutaba teaches computer networks and
distributed systems and conducts research in the area of resource
management in wired and wireless
networks. |
Tutorial
#3 |
Internet Management: Status and
Challenges (VERANY 3 Room) |
Instructor |
Prof. Juergen
Schönwälder, International University Bremen,
Germany |
Abstract
This tutorial
discusses the status of Internet management standards and ongoing
standardization efforts within the IETF. It is targeted towards
people who are familiar with basic Internet management concepts and
who want to learn about the latest developments related to Internet
management technologies.
The tutorial is
organized into three parts. In the first part, an up-to-date
overview will be given about the status of IETF management
standards. The network management related work items of the various
active IETF working groups will be surveyed.
The second part
of the tutorial focuses on monitoring. It shows how the SNMP
framework is currently being used to retrieve management information
for monitoring and fault isolation purposes. This part concludes
with a discussion of recent SNMP related work in the IETF (e.g.,
session based security models).
The third part
of the tutorial focuses on configuration management. After
a discussion of the successes and failures of SNMP based configuration
management approaches, XML-based approaches and in particular
the network configuration protocol NETCONF will be discussed
in some detail.
|
Table of Content
1. IETF
Management Standards Overview 1.1 Status of Management
Standards 1.2 Active IETF Working Groups
2. Monitoring
using SNMP 2.1 SNMP version 3 Framework 2.2 Session-based
Security Model 2.3 External User-Based Security Model 2.4
Transport-layer Security Models 2.5 Uniform Resource Identifiers
for SNMP
3. Configuration
using NETCONF 3.1 Review of XML Basics 3.2 NETCONF
Architecture 3.3 Protocol Operations 3.4 Transport Mappings
(ssh, beep, soap) 3.5 Data Modeling Issues 3.6 Coexistance
with SNMP
4.
Discussion 4.1 Why SNMP and why NETCONF? 4.2 Using Web
Services for Management? 4.3 Harmonization of Information / Data
Models? |
Biography
Prof. Juergen
Schoenwaelder is working in the field of communication networks and
distributed systems at the International University Bremen, Germany.
He received his diploma in computer science in 1990 and his doctoral
degree in 1996 from the Technical University Braunschweig, Germany.
His specific research interests are network management, distributed
systems and network security. He is an active member of the Internet
Engineering Task Force (IETF) where he has involved in the
publication of more than 20 network management related
specifications and standards. Since 1999, he is the chair of the
Network Management Research Group (NMRG) of the Internet Research
Task Force (IRTF) and co-editor of the Simple Times. He participated
as a program committee member in more than a dozen IEEE/IFIP
workshops and conferences and served as technical program co-chair
for IM 2003. Recently, he served as a guest co-editor of special
issues of the IEEE Communications Magazine and the IEEE Journal on
Selected Areas in Communications. He also serves on the editorial
board of the IEEE eTransactions on Network and Service
Management. |
Tutorial
#4 |
Autonomic Networking - Theory and
Practice (VERANY 1 Room) |
Instructor |
John Strassner,
Motorola Lab, USA |
Abstract
A new genre of
management applications is required to accommodate current and
future uses of network services. The key to solving this problem is
to realize that currently, network operation is divorced from how
the business operates, and that current approaches don’t address
this problem. This tutorial will examine how autonomic computing in
general and autonomic networks in particular can be used to solve
this problem. The foundation for this tutorial lies in work done in
the TeleManagement Forum’s NGOSS program (particularly its Shared
Information and Data model and its notion of contract-defined
interfaces), along with current research in autonomic computing.
After providing a brief primer on autonomic computing, this tutorial
will concentrate on new research that focuses on implementing an
autonomic network – an area that has been overlooked in current
research. New enhancements on the OMG’s Model Driven Architecture
initiative will be described that enable code to be generated from
formal models. This will be supplemented with work on holistically
combining process and policy management, and implementing this in a
distributed service-oriented architecture. Real-life examples will
be used to reinforce the contents of thistutorial. These principles
are also applicable to Ubiquitous
Networks. |
Table of Content
-
Motivation
- Autonomic
Computing Primer
- Making the
Network Autonomic
-
Approach
- The role of
Information and Data Modeling
- The role of
Policy and Process Management
- Implementing
Model-Driven Architectures
- Implementing
Autonomic Architectures
- Case
Study |
Biography
John Strassner,
the founder of Directory Enabled Networking (DEN) technology,
currently does model driven architecture consulting. Previously, he
was Chief Strategy Officer for Intelliden and a former Cisco Fellow.
He was instrumental in setting the direction for directory- and
policy-enabled products and technologies in the industry. He is the
rapporteur of the NGOSS metamodel, behavior and control, and policy
working groups, as well as the co-chair of the Shared Information
and Data modeling of the TMF. He has been researching autonomic
networks for the past four years. He is the author of two books:
Directory Enabled Networks and Policy Based Network Management, and
is a frequent speaker at many leading international industry
conferences. |
Tutorial
#5 |
Managing Network Security Policies:
Firewall and IPSec/VPN (VERANY 2 Room) |
Instructor |
Prof. Ehab
Al-Shaer, DePaul University, USA |
Abstract
The importance
of network security has been significantly increasing in the past
few years. However, the increasing complexity of managing security
polices particularly in enterprise networks poses real challenge for
efficient security solutions. Network security perimeters such as
Firewalls, IPSec gateways, Intrusion Detection and Prevention
Systems operate based on locally configured policies. Yet these
policies are not necessarily autonomous and might interact between
each other to construct a global network security policy. In
fact, security policies are configured not only in manual and ad hoc
manner, but in isolation from each other due to different
administrative roles or personnel. As a result, rules conflicts and
policy inconsistency are very likely to exits, leading to serious
security breach and network vulnerability. In addition, enterprise
networks continuously grow in size and complexity, which makes
policy modification, inspection and evaluation nightmare. Addressing
these issues is a key requirement for obtaining provable security
and seamless policy configuration.
In this
tutorial, we present techniques to develop automated management
tools for security policies particularly firewall and IPSec/VPN
polices. The tutorial presents a comprehensive classification of
policy anomalies or conflicts in a single device or across multiple
devices. Special focus is given to modeling and verification of
filtering-base security polices. The tutorial will also covers
techniques and tools used to automatically discover and rectify
policy anomalies in centralized and distributed security devices
such as firewalls and IPSec gateways.
|
Table of Content
Overview of
firewall operation and types Firewall architectures and
evaluation Overview of IPSec operations and Policy structure
Classification of intra- and inter-policy conflicts in
firewalls Classification of intra- and inter-policy conflicts in
IPSec Policy modeling and verification using formal methods
Conflicts discovery and resolution security policy conflicts
Automated policy management: editing, distribution,
optimization Policy management of multi-vendor security solution
Policy translation: from high-to-low level and vice
versa Frameworks for policy testing, assessment, comparison and
evaluation. Policy performance issues.
|
Biography
Ehab Al-Shaer is
an assistant professor and the director of the Multimedia Networking
Research Lab (MNLAB)in the School of Computer Science,
Telecommunications and Information System at DePaul University. His
primary research areas are Network Security, Internet monitoring,
and multimedia networks. Prof. Al Shaer published more than 50
refereed journal and conference publications. Prof. Al-Shaer is a
Guest Editor, Steering committee member, TPC member for many
IEEE/ACM/IFIP conferences. He is actively involved in many network
security panels in NSF and Cisco systems. He is also working as the
network security advisor and consultant for many companies in United
States. His current research is funded by NSF and Cisco systems.
|
Tutorial
#6 |
Management of Wireless Sensor
Networks (VERANY 3 Room) |
Instructor |
Prof. Antonio
A.F. Loureiro, Linnyer Beatriz Ruiz
Jose Marcos Nogueira, Federal University of Minas Gerais,
Brazil |
Abstract
In recent years,
the increasing sophistication of monitoring and control systems with
multiple sensors has generated a great deal of interest in
development of wireless sensors. Advances in sensor technology make
it possible to design very compact and autonomous sensor nodes, each
containing one or more sensors, computation and wireless
communications capabilities, and limited power supply. Some of the
applications foreseen to sensor monitoring will require a large
number of devices in the order of tens of thousands nodes.
Traditional methods of sensor networking represent an impractical
demand on cable installation, maintenance, and cost.
Wireless Sensor
Networks (WSNs) are becoming an increasingly technology that will be
used in a variety of applications such as environmental monitoring,
infrastructure management, public safety, medical, home and office
security, transportation, and military. WSNs will also play a key
role in pervasive computing where computing devices and people are
connected to the Internet. However, until now, WSNs and their
applications have been developed without considering a integrated
management solution.
The task of
building and deploying autonomic management systems, in environments
where there will be tens of thousand of network elements with
particular features and organization, is very complex. This task
becomes worse due to the physical restrictions of the sensor nodes,
in particular energy and bandwidth restrictions. The management
application to be build also depends on the kind of application
being monitored.
This tutorial
will present a perspective on emerging wireless sensor management,
covering management issues and technologies, network management
architectures, and opportunities. Traditional management and the
differences of the sensor networks management are described, and a
new management dimension is introduced. Management architectures for
sensor network and information models are outlined, with emphasis on
the MANNA architecture.
Until now, WSNs
and their applications and services have been developed without
considering a management solution. This may not be a problem for
small networks but will definitely be when applications, in order to
work properly, will need to reconfigure and adapt themselves based
on profiles and information scattered over the network.
Management of
WSNs is a new research area that only recently started to receive
attention from the research
community. |
Table of Content
1. Introduction
to management of wireless sensor network Presents an
introduction to the area of management of WSNs.
2. Management
Challenges Discusses the main management challenges
to be overcome in the area of WSNs.
3. Management
Dimensions Describes how dimensions can help in the
management solutions for WSNs.
4. MANNA as an
Integrating Architecture Presents an integrated
management solution for different types of WSNs.
5. Putting It
All Together Discusses how the different management
aspects of WSNs must be considered together.
6. Research
agenda for management of wireless sensor
networks Presents some research topics related to
sensor networks.
7.
Conclusions Discusses how a proper management
solution can benefit the productivity of the network resources and
the QoS. |
Biography
Antonio Loureiro
is an Associate Professor of Computer Science at the Federal
University of Minas Gerais (UFMG), Brazil. Professor Loureiro holds
a PhD in Computer Science from the University of British Columbia,
Canada, 1995. His main research areas are mobile computing, computer
networks and distributed systems. In the last 10 years he has
published over 50 papers in international conferences and journals.
Currently, the three authors are preparing a book entitled
Management of Wireless Sensor Networks to be published by an
international publisher. He was the TPC Chair for LANOMS
2001. |
Tutorial
#7 |
MPLS Operations and
Management (VERANY 1 Room) |
Instructor |
Thomas Nadeau
Cisco Systems, USA Monique J. Morrow, Cisco Systems,
Switzerland |
Abstract
This tutorial
will present the ins and outs of the state of the art in MPLS
Operations and Management. Areas of interest include detailed
presentations of standards work going on at the IETF, ITU, IEEE, MEF
and the MPLS-FrameRelay Alliance. The tutorial is broken into
several components. First, we will explore tools available to
monitoring and trouble-shooting the data plane. Tools in this area
include LSP Ping LSP Traceroute, VCCV, BFD, among others. Next, we
will present tools and techniques available to trouble-shoot and
diagnose the MPLS control plane. The third area covered is the
management plane. In this area, we discuss the management interfaces
to these various tools and some techniques that management systems
can use to manage each of the tools presented earlier. Finally, we
present why it is important and critical to combine the information
provided by tools used to diagnose the data and control planes to
provide the user with a complete picture of MPLS network health, and
how the combination of this information can not only be automated
and displayed via the management plane, but also how devices may
employ this information internally to more quickly repair the
defect, thereby providing a certain degree of self-healing
capability. |
Table of Content
Prequisites and
Logistics for this presentation
MPLS's Momentum in
Convergence and Service Creation
What is MPLS
OAM?
Where Does MPLS
OAM Fit?
OAM
Tools LSP
Ping LSP
Traceroute Tree-trace Path-trace Troubleshooting
Using LSP ping/trace
VCCV VCCV
Types Troubleshooting Using
VCCV
LSR
Self-Test
BFD Description BFD
for MPLS Bootstrapping a BFD
Session Trouble-shooting MPLS
Applications with BFD
VCCV/BFD vs VCCV
LSP Ping Modes?
BFD for MPLS
TE
Ethernet
OAM
MPLS Core
Related MIBs |
Biography
Thomas
Nadeau
Tom works at
Cisco Systems where he is a Technical Leader responsible for the
leadership of operations and management and network management
standards, development and architecture for MPLS-related components
at Cisco. Tom is an active participant in the IETF, ITU, and IEEE.
He is co-author of many IETF MIBs, protocol and architecture
documents in the L2/L3VPN, TE, PWE3, GMPLS and MPLS areas. Tom is
co-author of RFC3811, RFC3812, RFC3813, RFC3814, RFC3945, and
RFC3916. Tom was recently co-editor of the October 2004 IEEE
Communications Magazine’s special section on MPLS Operations and
Management. Tom has filed several patents in the area of
networking.Tom received his BSCS from The University of New
Hampshire, and a M.Sc. from The University of Massachusetts in
Lowell, where he has been an Adjunct Professor of Computer Science
since 2000. Tom currently teaches courses on the topic of data
communications. He is also on the technical committees of
several prominent networking conferences where he provides technical
guidance on their content. He is on the technical advisory board of
Westridge Networks. He is the technical editor of Enabling VPN Aware
Networks with MPLS (Prentice-Hall Publishers, 2001), and author of
MPLS Network Management: MIBs, Tools, and Techniques
(Morgan-Kaufman, 2002). Tom is currently working on a second text
covering the topic of MPLS Operations and Management, which is
expected in late 2004.
Monique Jeanne
Morrow
Monique Morrow
is currently CTO Consulting Engineer at Cisco Systems, Inc. She has
over 20 years experience in IP internetworking that includes design,
implementation of complex customer projects and service development
for service providers. Monique has been involved in developing
managed Network Services like Remote Access and LAN Switching in a
Service Provider environment. Monique has worked for both enterprise
and service provider companies in the United States and in Europe.
Monique led the Engineering Project team for one of the first
European MPLS-VPN deployments in 1999 for a European service
provider. Monique has been a speaker in the following conferences:
MPLS Congress-Paris, 2000; MPLSCon 2000, London; MPLS Japan, 2002;
APRICOT, Taipei, Taiwan, 2003; MPLScon 2003; Supercomm 2003; MPLS
Japan 2003, MPLS Japan 2004; IEEE IPOM in Beijing, 2004; MPLS
Conference 2003; The 16th Communication Systems Workshop (CSWS) on
Information, Communication and Signal Processing "Verification of
Broadband Services and its Future" Nov. 12-13, 2003 by
Communications System Engineers in IEICE, Japan; APRICOT 2004 in
Kuala Lumpur; and has spoken in several Cisco Networker
Conferences.Monique is co-author of the book Designing IP-Based
Services: Solutions for Vendors and Service Providers
(Morgan-Kaufmann, 2002). Monique has been a technical reviewer for
the book, International QoS Architectures and Mechanisms, Zheng Wang
(Morgan-Kaufmann, 2001); she has contributed a chapter on MPLS in
the book, Networks : Internet-Telephony-Multimedia, Convergences and
Complementarities, De Boeck Diffusion, 2002 (France Telecom Lead)
and was content reviewer for the book, MPLS and VPN Architectures,
Vol 2, Jim Guichard et al, Cisco Press, 2003. Monique is currently
working on three books one exploring business aspects for MPLS;
another discussing security for MPLS-VPN and the third book that
presents enterprise drivers and concerns for IP-based service
delivery.Monique is active in both the IETF and ITU-T SG 13 with a
focus on OAM. She has a M.S in Telecommunications Management and an
MBA. Monique is also a Cisco Certified Engineering Expert (#1711).
Monique is currently engaged in MPLS OAM standards development and
has been engaged in carrier discussions internationally on the
topic. Monique is co-guest editor of a special issue of the IEEE
Communications Magazine on the subject of “OAM in MPLS-based
Networks. Published in October 2004
http://www.comsoc.org/ci1/Public/2004/oct/index.html. Monique is
co-guest editor of a special issue of the IEEE Communications
Magazine on the topic of "Inter-Provider Service Quality on the
Internet" with publication scheduled for June 2005. Additionally,
Monique is working on GMPLS, GRiD and Next Generation Network topics
pertinent to both carriers and NRENs where delivery between
providers is a key. In the area of GMPLS, Monique is co-guest editor
of the IEEE Communications Magazine on the topic of “GMPLS: The
Promise of the Next Generation Optical Control Plane” with
publication scheduled for July
2005. |
Tutorial
#8 |
Planning, Management and Auto-Tuning
Techniques for UMTS and Heterogeneous Radio Access Networks
(VERANY 2 Room) |
Instructor |
Dr. Zwi Altman
and Dr. Peter Stuckmann, France Telecom R&D,
France |
Abstract
The introduction
and evolution of third-generation (3G) mobile radio systems leads to
a highly complex and heterogeneous radio access network landscape.
Network management will become crucial to guarantee optimum
cooperation between network sub-systems. The quality of service
provided by these networks and their profitability is intimately
related to the ability of the operator to parameterize these
networks and optimally utilize the available radio resources. This
tutorial aims at presenting a comprehensive overview of UMTS network
parameterization in a multi-system context using both automatic cell
planning and auto-tuning strategies. The following items will be
discussed in detail:
Strategies for
automatic design and cell planning: Cell planning consists in
optimizing network performance by adjusting antenna parameters and
common channel powers. Automatic cell planning has been utilized for
both GSM and UMTS network, and has a particular success in the
latter case due to the lack of frequency planning in UMTS networks.
A high quality Automatic Cell Planner (ACP) can typically lead to a
capacity increase of 30 to 40 percent. This improvement is
accompanied by the reduction of interference and improvement in
quality of service offered to the end user. Four major automatic
cell planning strategies will be presented: quality and capacity,
capacity and coverage, steered optimization and optimization in a
multi-system context.
Auto-tuning of
Radio Resource Management (RRM) parameters: The migration
from manual to automatic cell planning in cellular systems
has induced a significant quality enhancement and deployment
cost reduction. Similar gains are expected from the automation
of parts of the operation of a mobile radio network. This
expectation is especially justified in complex systems like
UMTS or even heterogeneous access networks. Auto-tuning aims
at improving network performance and adapting it to traffic
variations by dynamically adjusting RRM parameters such as
load target threshold and add- and drop-macrodiversity windows.
First, the implementation of the auto-tuning process of UMTS
networks using fuzzy logic controllers will be presented for
both admission control and mobility management. Then, the
extension of the auto-tuning to a multi-system context will
be described. Current European research activities in the
area covering automatic network management techniques like
monitoring, self-diagnosis, optimization and parameterization
will be presented.
|
Table of Content
1
Overview
1.1 Introduction to network planning
and management 1.2 Quality of service
evaluation using a system simulator
2 Planning and design
2.1 Manual heuristics for network
planning 2.2 Automatic cell planning in
UMTS 2.3 Automatic cell planning in
2G-3G context
3 Auto-tuning in mobile networks
3.1 Fuzzy logic controllers
3.2 Auto-tuning of RRM parameters in
UMTS networks 3.3 Auto-tuning in
heterogeneous multi-system context
4 European research on
design and management of heterogeneous radio access
networks
4.1 European Research on
Wireless and Mobile Systems beyond 3G 4.2
European research on multi-system RAN concepts
4.3 The EUREKA Gandalf project:
Monitoring and automatic management of heterogeneous radio access
networks |
Biography
Zwi Altman
received the B.Sc. and M.Sc. degrees in electrical engineering from
the Technion-Israel Institute of Technology, in 1986 and 1989, and
the Ph.D. degree in electronics from the Institut National
Polytechnique de Toulouse, France, in 1994. He was a Laureate of the
Lavoisier scholarship of the French Foreign Ministry in 1994, and
from 1994 to 1996 he was a Post-Doctoral Research Fellow in
University of Illinois at Urbana Champaign. In 1996 he joined France
Telecom R&D, where he is currently responsible for a project
developing new engineering methods for mobile networks. Dr. Altman
was in the winning team of the 2003 Innovation Prize of France
Telecom. He has published over eighty journal and conference papers.
Dr. Altman is an IEEE Senior Member and a past Associate Editor in
this society.
Peter Stuckmann
received his diploma (master's) degree in 1999 and his doctor's
degree in 2003 both from the Faculty of Electrical Engineering and
Information Technology of Aachen University. From 1999 until 2003 he
has served as a research engineer at the Communication Networks
department of Aachen University, where he has led the research group
Packet Data Services for 3G Mobile Radio Networks and has been
responsible for several research projects funded by the German and
European government and clients from industry. From 2003 on he has
been working with AixCom GmbH as a consultant responsible for the
radio network planning product group. In 2004 he joined France
Telecom R&D where he is involved in research projects in the
area of 2G/3G/B3G radio interface engineering. Dr. Stuckmann is the
author of one text book (The GSM Evolution, Wiley & Sons, 2002),
2 book contributions, more than 20 journal and conference papers and
has held several tutorials at IEEE conferences (Globecom, VTC,
etc.). He is member of the IEEE and VDE/ITG.
|
Tutorial
#9 |
Management of Enterprise Web
Applications: Problems, Approaches, Solutions (VERANY 3 Room) |
Instructors |
Dr. Alexander
Keller & Dr. Nikos Anerousis, IBM TJ Watson Research
Center |
Abstract
Today, web
applications are a critical part of the foundation of a modern
enterprise, supporting an ever increasing number of critical
business functions. Effective management of web applications is a
major objective of every IT organization.
This tutorial
presents state-of-the-art solutions covering the entire lifespan of
web applications from planning, to deployment, to operations, to
change management.
Intended
audience: everyone interested in the operational aspects of
web applications: IT professionals, academics,
researchers.
Level:
Introductory to intermediate. |
Table of Content
The tutorial is
organized in 4 parts.
The first part
teaches fundamental design issues for web applications (single-tier
vs. N-tier, available technologies (J2EE and .Net) and development
tools.
The second part
addresses the planning stage, presenting an analysis of application
sizing techniques (transaction profiling, load modeling, datacenter
provisioning and long-hauling).
The third part
presents recent standards for application installation, deployment
and change management (IT Infrastructure Library (ITIL), W3C
Solution Installation Schema Submission, Gridforum CDDLM/SmartFrog).
The fourth part
addresses the ever-important topic of performance management for Web
applications (the ARM specification and the CIM Metrics Model as
examples for application performance instrumentation standards,
performance monitoring tools and techniques, service
differentiation, clustering, load balancing and on-demand capacity
allocation). |
Biography
Alexander Keller
is a Research Staff Member in the Autonomic Computing Department at
the IBM Thomas J. Watson Research Center. He received his M.Sc. and
Ph.D. degrees in Computer Science from Technische Universität
München, Germany, in 1994 and 1998, respectively and has published
approximately 40 refereed papers in the area of distributed systems
management. Dr. Keller's research interests revolve around change
management for applications and services, service provisioning, and
service level agreements. He serves on several technical program and
organizing committees of related conferences and workshops and is a
member of the USENIX Association, the IEEE, and the DMTF CIM
Applications and Metric Extensions Working Groups.
Nikos Anerousis
is currently with the Web Middleware Management department at IBM
Research. Prior to IBM, he was Chief Technology Officer at Voicemate
Inc., where he lead research and advanced product development in the
areas of pervasive publishing and management, knowledge engineering,
multimodal user interfaces and mobile computing. Prior to Voicemate
he was a senior member of technical staff at AT&T Research where
he conducted extensive research on network and distributed systems
management, packet telephony, routing and control architectures for
the internet, multimedia services, etc. In 1998 and 1999 he was also
an adjunct assistant professor at Columbia University. He received a
Diploma in Electrical Engineering from the National Technical
University of Athens, Greece and MSc and PhD degrees in Electrical
Engineering from Columbia University, NY, USA. He is the author or
co-author of numerous papers in refereed international conferences
and journals. He serves in the editorial board of the Journal of
Network and Systems Management and the IEEE e-Transactions on
Network and Service Management. He was technical program co-chair
for the IEEE/IFIP Integrated Management Symposium
2001. |
Tutorial
#10 |
Integrated Management of
Denial-of-Service Attacks (VERANY 1 Room) |
Instructor |
Michael H.
Behringer, Cisco Systems, France |
Abstract
Denial-of-service attacks have become a permanent issue on
service provider networks. Over the last years network operators
have had to adjust their operations to cover these new attack forms.
This includes the management of the routers and the network, as well
as operational procedures to communicate security issues to other
providers, customers and third parties.
This
tutorial gives an introduction on how DoS attacks affect an Internet
network, and how they can be managed. It includes an overview of the
threats, methods to detect and classify an attack, as well as
mitigation techniques. Whilst many techniques presented can be
executed directly on network devices, an efficient network
management is required to scale operations to large networks and
high number of attacks. This includes efficient communications
methods for security incidents, as well as operational procedures to
successfully mitigate the attacks.Finally, the mitigation
of DoS attacks is being introduced in many service provider networks
as a managed service. We will outline here management issues to this
approach, and how to secure this
service.
|
Table of Content
Introduction:
Tendencies in DoS Attacks Detection and Classification of DoS
Attacks Traceback: Finding the Origin of the
Attack Mitigation: Maintaining Availability Overall Management
of DoS Attacks and Summary |
Biography
Michael
Behringer obtained his diploma in computer science at the Technical
University of Munich. For five years he worked at the European
Internet Service Provider DANTE, based in Cambridge, UK, where he
last held the position of senior network engineer, responsible for
the design and implementation of DANTE's pan-European networks.
Since 1998 Michael works at Cisco Systems, now based in Nice. As
senior consulting engineer for EMEA he focuses on service provider
security issues, such as Denial-of-Service attack prevention and
MPLS security. Michael is an active member of the
IETF. |
Tutorial
#11 |
Traffic Engineering and Quality of
Service Management for IP-based Next Generation
Networks (VERANY 2 Room) |
Instructor |
Prof. George
Pavlou, University of Surrey, UK |
Abstract
Next Generation
IP-based Networks will offer Quality of Service (QoS) guarantees by
deploying technologies such as Differentiated Services (DiffServ)
and Multi-Protocol Label Switching (MPLS) for traffic engineering
and network-wide resource management. Despite the progress already
made, a number of issues still exist regarding edge-to-edge
intra-domain and inter-domain QoS provisioning and management. This
tutorial will start by providing background on technologies such as
DiffServ, MPLS and their potential combination for QoS support.
It will
subsequently introduce trends in Service Level Agreements (SLAs) and
Service Level Specifications (SLSs) for the subscription to
QoS-based services It will then move to examine architectures and
frameworks for the management and control of QoS-enabled networks,
including the following aspects: approaches and algorithms for
off-line traffic engineering and provisioning through explicit MPLS
paths or through hop-by-hop IP routing; approaches for dynamic
resource management to deal with traffic fluctuations outside the
predicted envelope; a service management framework supporting a
“resource provisioning cycle”; the derivation of expected traffic
demand from subscribed SLSs and approaches for SLS invocation
admission control; a monitoring architecture for scalable
information collection supporting traffic engineering and service
management; and realization issues given the current
state-of-the-art of management protocols and monitoring support. The
tutorial will also include coverage of emerging work towards
inter-domain QoS provisioning, including aspects such as: an
inter-domain business model; customer and peer provider SLSs; an
architecture for the management and control of inter-domain
services; inter-domain off-line traffic engineering; and QoS
extensions to BGP for dynamic traffic engineering. In all these
areas, recent research work will be presented, with pointers to
bibliography and a specially tailored Web page with additional
resources. |
Table of Content
Introduction Tutorial
scope TE definition QoS
definition Overprovisioning Tutorial
outline
Background: QoS
Technologies and Routing QoS Approcahes:
Per-flow / Per-Class Integrated Services
(IntServ) RSVP Scalability
problems
Differentiated
Services (DiffServ) Service Classes /
PHBs Open Issues / Bandwidth Broker
Multi-Protocol
Label Switching (MPLS) MPLS Signaling: RSVP-TE
/ CR-LDP MPLS with DiffServ
IGP Link state
routing protocols: OSPF/ISIS, CSPF EGP routing
protocols: BGP (path vector)
Service Level
Agreements and Specifications SLAs /
SLSs Current Tier-1 Connectivity
SLSs TEQUILA SLS
proposal QoS Classes / IETF Per-Domain
Behaviors
Framework for
Intra-domain QoS Management Problem
Space Domain management / Bandwidth
Broker Functional
Architecture Resource Provisioning
Cycle Two-level approach: Off-line (Static) and
Online (Dynamic)
Traffic
Engineering Traffic Trunks (TTs) - Pipe &
Hose models Routing Support for TTs: MPLS-based
or IP-based TE
MPLS-based TE
Solutions LSP support for TTs /
Scalability Dynamic Route Management / Load
Balancing Off-line TE: Network Dimensioning
(ND) approaches Network flow linear problem
formulation (1 criterion) Non-linear problem
formulation (multiple criteria) Optimization
approaches The Gradient Projection
Method Network dimensioning examples
IP-based TE
Solutions OSPF/ISIS weight
setting Example of avoiding hot
spots Optimal weight
setting The Forz-Thorup
heuristic QoS-aware TE: a RIB per
class
Dynamic Resource
Management (for both MPLS and IP-based
TE) Dynamic link bandwidth partitioning to
service classes Dynamic resource management
algorithm
Service Management Resource
Provisioning Cycle Traffic
Forecasting SLS Invocation: explicit and
implicit Invocation Admission Control
approaches Traffic descriptor / MBAC / Enpoint
schemes
Inter-domain QoS
Management Business QoS
Model Customer SLSs (cSLSs) and Peer Provider
SLSs (pSLSs) Local and extended QoS Classes
(l-QCs and e-QCs) Inter-domain Peering Models
and the Cascaded QoS Model Functional
Architecture and Blocks Solution
Options Loose, Statistical and Hard
Guarantees Off-line
TE QoS-inferred
BGP qBGP-based Dynamic TE
Monitoring Scalable monitoring
principles Monitoring system
architecture Required Node Moitoring
Functionality SNMP limitations
Realization
Issues Protocols for network
configuration SNMP limitations, COPS-PR, CLI,
XMLConf Example realization of a QoS
architecture
Summary and
Additional Information
Relevant
Books IETF
Charters Research
papers Sites with more
information Pointer to my tutorial Web page
with material |
Biography
Prof. George
Pavlou holds the Chair of Communication and Information Systems at
the Center for Communication Systems Research, Dept. of Electronics
Engineering, University of Surrey, UK, where he leads the activities
of the Networks Research Group
(http://www.ee.surrey.ac.uk/CCSR/Networks/). He received a Diploma
in Engineering from the National Technical University of Athens,
Greece and MSc and PhD degrees in Computer Science from University
College London, UK. His research interests encompass network and
service management, network planning and dimensioning, traffic
engineering, quality of service, mobile ad hoc networks, service
engineering, multimedia service control and management, code
mobility, programmable networks and communications middleware. He is
the author or co-author of over 120 papers in fully refereed
international conferences and journals and has contributed to 4
books. He has also contributed to standardization activities in ISO,
ITU-T, TMF, OMG and IETF. He was the technical program co-chair of
IEEE/IFIP Integrated Management 2001.
See also
http://www.ee.surrey.ac.uk/Personal/G.Pavlou/ for additional
information and his publications in
PDF. |
Tutorial
#12 |
Grid Computing: Fundamentals and
Management Challenges (VERANY 3 Room) |
Instructors |
Prof.
Heinz-Gerd Hegering, Leibniz Supercomputing Center, Germany
Prof. Gabi Dreo Rodosek, University of Federal Armed
Forces |
Abstract
Grid computing enables the virtualization of both distributed
computing and data resources such as processing, network bandwidth
and storage capacity to create a single system image to allow users
seamless access to IT resources not necessarily belonging to their
own organization. The virtualization of organizations and resources
as well as the cooperative usage of virtual resources are one of the
key challenges of grid computing. The tutorial starts with a comprehensive
overview of grid computing and outlines the fundamentals of grid environments.
The characteristics of grid resources and services, virtual organizations
as well as the grid networks and middleware are described. Furthermore,
existing approaches like the Open Grid Services Architecture (OGSA),
Open Grid Services Infrastructure (OGSI) and WSRF (Web Services Resource Framework)
are reviewed. Finally, we explore the efforts that are underway in the
Global Grid Forum and in the Globus Alliance. Initiatives such as the EGEE,
NSF, D-Grid (the German Grid project) are addressed as well.
The second part of the tutorial concentrates on the management challenges
implied by both the virtualization of resources and organizations and the
cooperative usage of such resources. We address topics such as the description
of (virtual) resources and services, the management of virtual organizations,
the specification of SLAs for grid services, and grid management questions
related to FCAPS (Fault, Configuration, Accounting, Performance, Security).
Essentials of grid computing such as grid resource management and security
issues are addressed in particular. |
Table of Content
1. Introduction
1.1 Motivation
1.2 What is the idea of Grid Computing?
1.3 Challenges of Grid Computing
2. Review of
Existing Approaches
2.1 Globus Toolkit
2.2 Web Services Resource Management (WSRF)
2.3 Open Grid Service Architecture (OSGA) and Infrastructure
(OGSI)
2.4 Unicore and others
2.5 Initiatives
2.5.1 Global Grid Forum
2.5.2 OASIS
2.5.3 Initiatives such as the EGEE (Enabling Grids for E-science
in Europe), NSF,
D-Grid (Germany), DataTAG
2.6 Commercial Approaches (IBM, Sun, HP, Oracle)
3. Management
Challenges
3.1 Management of Virtual Organizations (VO)
3.2 Specifying Grid Services and SLAs for Grid Services
3.3 Provisioning and Operation of a Grid Middleware
3.4 Grid Resource Management and Scheduling Challenges (Resource
Description,
Allocation and Discovery Scheduling and Distribution of
Tasks across Resources
Monitoring, etc.)
3.5 Grid Security,
3.6 Grid Accounting
3.7 Other Management Challenges (Problem and Incident management,
Change management,
Interoperability and Dependability Issues, Customer Service
Management, etc.)
3.8 A sketch of legal aspects concerning grid computing
4. Conclusions
and Outlook
|
Biography
Prof. Heinz-Gerd
Hegering holds the Chair of Communication Systems and System
Pro-gramming at the Ludwig-Maximilians University (LMU) Munich since
1989. He is Director of the Institute of Informatics at the LMU and
the Leibniz Supercomputing Center of the Bavarian Academy of
Sciences. He is a member of the board of directors of the Germany`s
National Research and Education Network. His research interests
include communication systems, integrated network and systems
management, IT infrastructures.
Prof. Gabi Dreo
Rodosek holds the Chair of Communication Systems and Internet
Services at the University of Federal Armed Forces Munich. Since
1995 she was with the Leibniz Supercomputing Center where she was
responsible for the planning and the introduction of management
tools. Her research interests include in particular IT service
management, fault and service level management.
|
Panel #1 |
Is Policy-Based Management Possible? |
Leader |
Joe Hellerstein,
IBM Research, USA |
Panelists |
Seraphin Calo, IBM Research, USA
Morris Sloman, Imperial College, London
Mark Burgess, Oslo University, Norway |
Abstract
Policy-based
management has been an area of intense interest for the last
decade. The community is very active with an annual workshop
and various standards efforts. While the ideal of policy-based
management is a declarative approach in which the system takes
actions to achieve policy-specified goals under policy-specified
constraints, what is implemented in practice is much more
limited. This panel will address the following issues: (1)
To what extent is a declarative approach to policy possible?
(2) What other kinds of policies should be considered? (3)
What kind of policy standards are meaningful, especially contrasting
syntactic and semantic approaches? (4) How can policies be
acquired and maintained in practice? (5) How are the GRID,
pervasive wireless computing and other technologies are shaping
the field? (6) Are there alternatives to policy-based management?
|
Panel #2 |
Service Level Agreement - How to reach
the practical Agreement, not Announcement |
Leader |
Masayoshi
Ejiri, Fujitsu, Japan |
Panelists |
Lundy Lewis : Southern New Hampshire Univ. USA
Dave Milham : BT Exact UK
Isami Nakajima : NTT Service Integration Labs. Japan
Frank Birch : Fujitsu Labs. Europe, UK |
Abstract
SLA is becoming
crucial in competitive ICT environment as one of key differentiations
and in future demand where customer participated/centric operations
are essential. SLA should be reached through the negotiation
between customers and service providers. However current discussion
of SLA is too much focused on QoS related features, most of
them are not familiar with end users and also customers are
forced to accept/select SLAs which are defined /announced
by service providers . In the Panel, the following issues
will be discussed, (1) What is " Services"? Operations
services are becoming more important. (2) Level" should
be defined by qualitative/quantitative way ? (3) SLA features
should be customer perceptible/visible features and QoS should
be translated by customer language. (4) Mechanism to reach
"Agreement " by customers/service providers negotiation.
(5) SLA negotiation process in service providers business
processes.
|
Panel #3 |
Should we share Honeypot information
for Security Management? |
Leader |
Felix Wu,
Univesity California Davis, USA |
Panelists |
Marc Dacier,
Eurecom, France
Herve Debar, France Telecom, France
Yao-Min Chen, Watchguard, USA |
Abstract
It is
quite sensitive to share security information even for the
purpose of security management across different administrative
domains. On the other hand, for certain large-scale Internet-wide
cyber attacks, sharing such information might greatly help
others to develop the right preventive solution in time. In
this panel, we will focus on sharing data being collected
by the "honeypot", a virtual information playground
that should only attract malicious/suspicious Internet users.
Following opics will be addressed:
(1). What information can be collected by
Honeypots?
(2). How will the Honeypot information be useful for others
in management?
(3). What are the concerns in sharing them?
|
Becoming
an Innovative Operator [aka: The Cobbler’s Kids of Telecom]
Jim Warner,
President, TMF
|
Jim
Warner is president of the TeleManagement Forum, an international
consortium of service providers, suppliers and systems integrators.
Through their collaborative R&D activities, TMF is driving the
telecom industry’s efforts to develop a new generation of
Operations Systems and Software (NGOSS) as a foundation for lean,
agile operations and business transformation.
Jim has over 25 years of marketing and product management experience
in voice and data communications and information networking and
is one of the industry’s leading authorities on improving
telecom management and operations.
|
Integrated
network management policy for FT networks and services
Patrice
Collet, France Telecom
|
Patrice
Collet graduated from Ecole Polytechnique and Ecole Nationale
Supérieure des Télécommunications and
then joined CNET, France Telecom Research Laboratories in
1970. He has been first involved in signalling systems development,
numbering plan evolution and switching system engineering.
In 1979, he becomes Head of the switching and signalling
department in CNET in Paris. During this period, his main
responsibilities are TDM switching systems deployment, signalling
system #7 implementation, numbering scheme evolution, and
IN specification design. In 1989, he is in charge of one
of the two CNET laboratories located in Lannion in charge
of ATM networks, ISDN, voice services, and software technology.
In May 1996, he leaves CNET and joins France Telecom Headquarters
as Director of Network Architecture and Planning in the
Network Branch. Presently, he is Director of Architecture
and Security in the Networks, Carriers and IT Division of
France Telecom.
Patrice Collet has been actively participating in International
standardisation bodies such as CEPT and CCITT, in the field
of switching and signalling. He has been Vice-President
of CCITT study group XI (Switching and Signalling) from
1980 to 1992. He is also member of the Steering Committee
of the World Telecommunications Congress (WTC), formerly
International Switching Symposium (ISS).
|
|
Enabling
Enterprise Automation with Services Oriented Architecture
Chris
O'Connor, IBM
|
Chris
O’Connor is the Vice President of the IBM Tivoli Availability
& Business Service engineering team. His team’s mission
is centered on delivering software that determines the business
service impact of monitored resources. Mr. O’Connor is responsible
for ensuring that IBM is positioned as a market leader of products
and services for the systems management needs of the Fortune 5000
customers. He is responsible for creating the technical strategy,
its key themes, the product architecture, and software products
that place the IBM Tivoli brand at the forefront of the industry's
thinking as it pertains to Enterprise Systems Management technology.
He manages a team composed of expertise from around the world with
key competencies from IBM, its recent Candle acquisition and other
IBM organizations such as IBM Research. As an IBM executive, Mr.
O’Connor has previously led the IBM Company’s Security
strategy, as well as led networking hardware and software development,
design and market management positions.
O’Connor received his bachelor’s of
science degrees in computer science and electrical engineering
from Rutgers University. He also holds a certificate from University
of North Carolina Kenan-Flager School of Business Administration
in technology management.
|
The Development
of the Next Generation Network (NGN): Horizontal and Vertical
Integration, Fixed-Mobile Convergence and Ambient Communications
Dr.
Paul J. Kühn, University of Stuttgart
|
Paul
J. Kühn received the Dipl.-Ing. and Dr.-Ing. degrees in Electrical
Engineering from the University of Stuttgart, Germany, in 1967 and
1972, respectively. From 1973 to 1977, he was head of a research
group for traffic research in computer and communications systems
at the University of Stuttgart. In 1977, he joined Bell Laboratories,
Holmdel, NJ., where he worked in the field of computer communications.
In 1978, he was appointed professor for Communications Switching
and Transmission at the University of Siegen, Germany. Since 1982,
he is holding the chair of Communication Networks and Computer Engineering
at the University of Stuttgart, Germany. His areas of interest are
communication network architectures and protocols, computer engineering,
performance modelling and evaluation, wherein he authored more than
100 technical publications. Professor Kühn is a member of IEEE,
ACM, ITG (German Information Technology Society), and GI (German
Informatics Society). He has been appointed member of Communications
Switching Committee of the ITG, IFIP Working Groups 6.2, 6.3 and
7.3 and International Advisory Council (IAC) of the International
Teletraffic Congress (ITC). He was appointed Vice President of the
ITC in 1985, and Governor of the ICCC in 1987. 1989 Professor Kühn
has been elected Fellow IEEE. He was Program Chairman of ICCC 1986,
Conference Chairman and Co-Chair of the IFIP Conferences "Broadband
Communications" in 1998 and 1999, respectively, of various
national conferences on Computer Communication and Performance Modelling,
Editor and Guest Editor in the areas of Communication Networks for
ETT and IEEE-JSAC. In 1991, Professor Kühn was appointed Professeur
Associé at the Télécom Paris/ENST. 1991 Professor
Kühn has been elected Chairman of the International Advisory
Council IAC of the International Teletraffic Congress (ITC). In
1993, he was appointed Member of the Academy of Sciences of Heidelberg,
Germany, and in 1995, Member of the Academy Leopoldina, Halle. In
1996, Professor Kühn has been awarded Dr. h.c. for Technology
by the Lund Institute of Technology, Sweden, and in 1998 Dr.-Ing.
E. h. by the University of Technology of Dresden, Germany. 1998
he was appointed Honorary Member of the Senat of the University
of Mannheim, Germany, for his support of the new department of Computer
Engineering. Also in 1998, he received the Christopher Columbus
Gold Medal from the Council of the City of Genova, Italy, for his
contributions in the field of telecommunications. Professor Kühn
has held various responsible academic, research and industrial positions,
among them Chairmann of the Board of the CTIT of the University
of Twente, Coordinator of the DFG Research Centre Program on Mobile
Communications, Chairman of the Graduate College Program "Parallel
and Distributed Systems", Dean of the Faculty of Electrical
Engineering and Course Director of the international Master of Science
Program "Information Technology" at the University of
Stuttgart. For more than 10 years Professor Kühn served as
a member of the Board of Directors of communication technology companies. |
Managing
Globally Interwoven Multiple Life Cycles
Dr.
Makoto Yoshida, University of Tokyo/NTT Group |
Makoto Yoshida
is professor for the School of Engineering, the University of Tokyo,
responsible for the innovation of engineering education and the
application of IT to education. He holds a B.E. in the electronics
engineering and a Ph.D. in the electrical engineering from the University
of Tokyo.
Before entering the University of Tokyo in 2002, Dr Yoshida worked
for NTT with considerable experiences in the research and developmental
fields of teletraffic engineering, network architecture/design,
operations and management architecture/systems, and then with NTT
Advanced Technology (NTT-AT) in charge of network/systems integration
and operations service business. His experiences include numerous
contributions to international standardisation arena such as former
CCITT as well as international institutions/symposia. He has also
been involved in the activities of TeleManagement Forum (TMF, formerly
NM Forum) since its inception in 1988, having served as Vice President,
Vice Chairman and former Chairman. He is Distinguished Fellow /
Advisor to Board of Directors of TMF and also currently Advisor
to Board of Japan Network Security Association (JNSA). Dr Yoshida
is currently serving as a guest professor for Xi’an Jiaotong
University.
He is a senior member of IEEE, Fellow of the Institute of Electronics,
Information and Communication Engineers (IEICE) and a member of
the Information Processing Society of Japan. Dr Yoshida has been
serving as a variety of committee members to international symposia
such as NOMS, IM (formerly ISINM), APNOMS and Telecommunications
Management (TM) Technical Group of IEICE Communication Society.
He authored and co-authored a number of books as well as over fifty
technical papers in communication and mgmt areas. |
Putting
IM into IMS: Integrated Management challenges for the IP Multimedia
System
Robbie
Cohen, Telcordia |
With more
than 25 years experience in the telecommunications industry,
Cohen currently serves as Group Vice President for Market
Management in the Wireless, Cable and Emerging Markets Group
of Telcordia Technologies. With her guidance, Telcordia is
steadily increasing its technological leadership and market
share in the wireless mobility space.
Prior to joining Telcordia, she held a variety of management
positions at Lucent Technologies, Paradyne Corporation, AT&T
and Bell Laboratories, including systems engineering and architecture
roles, R&D management, product management and general
management positions. . In the late 1980’s, she helped
found the Network Management Forum, an international consortium
of telecommunications service and equipment providers. In
recognition of her service to the Forum, she became a Distinguished
Fellow of Telemanagement Forum in 2003.
In May 1997, Cohen became the first recipient of the IEEE/IFIPS
Daniel A. Stokesbury Memorial Award for contribution excellence
in the field of network management. She served on the board
of the Communications Society of the Institute of Electrical
and Electronics Engineers (IEEE) from 1999-2003. Cohen has
published numerous technical papers and holds a patent on
a "Communication System having Unified Messaging".
Robbie holds bachelor, masters and Ph.D. degrees in Sociology
from the University of Illinois and began her professional
career as Assistant Professor of Sociology at Princeton University. |
|
Management Challenges
for New Networked Worlds |
Chair:
|
John
Strassner, Motorola Labs
John
Strassner, the founder of Directory Enabled Networking (DEN) technology,
currently serves as a Fellow of Motorola Labs, where he directs
their autonomic computing efforts. He also works on identity management,
policy management and seamless mobility. John currently chairs
the TeleManagement Forum's (TMF) Metamodel, Policy, and Shared
Information and Data model working groups, and is an advisor to
the TMF Board of Directors. He is also active in the ITU-T's NGN
focus group. John has authored two books (Directory Enabled Networks
and Policy Based Network Management) and over 70 refereed conference
papers. He was previously the CSO for Intelliden and a former
Cisco Fellow. John Strassner is currently a Visiting Professor
for Waterford's Institute of Technology.
|
Panelists: |
Dr.
Alexander Clemm, Cisco
Dr.
Alexander Clemm is a Senior Architect in Cisco's Device Instrumentation
Group, where he is setting the technical direction for projects
that relate to the improvement of management interfaces and to
providing embedded management intelligence (also known as self-management)
for Cisco devices. Before his current role, he developed the architecture
of several management applications and turnkey management solutions
for the management of Packet Telephony and VoIP networks, and
(prior to Cisco) for Optical and Broadband Access Networks. Alex
has published well over 20 technical papers and is a committee
member of several IEEE and IFIP management-related workshops and
conferences, including IM, NOMS, DSOM, IPOM, and MMNS. He holds
Master's and Ph.D. degrees in Computer Science from Stanford University
and the University of Munich, respectively.
Mr.
David Raymer, Motorola
Dave
is a Distinguished Member of Technical Staff with Motorola’s
Networks Business working as part of the Operation Support Systems
Division Systems Engineering Group with responsibilities for standards
and advanced technology investigation for Motorola’s cellular
infrastructure OAM&P products. Dave has 16 years of experience
in the software industry building large scale distributed systems
with object-oriented technologies. Dave is a frequent speaker
at industry conferences such as TeleManagement World and JavaOne.
Prof.
Juergen Schoenwaelder, International University Bremen
Dr.
Jürgen Schönwälder is professor of Computer Science
at the International University Bremen, specializing in the field
of communication networks and distributed systems. He received
his diploma in computer science in 1990 and his doctoral degree
in 1996 from the Technical University Braunschweig, Germany. His
research interests are network management, distributed systems
and network security. He is an active member of the Internet Engineering
Task Force (IETF) where he has edited more than 20 network management
related specifications and standards. He is the initiator and
chair of the Network Management Research Group (NMRG) of the Internet
Research Task Force (IRTF) and a regular program committee member
of more than a dozen IEEE/IFIP workshops and conferences. He is
a member of the editorial board of the IEEE eTransactions on Network
and Service Management and served as a guest co-editor of special
issues of the IEEE Communications Magazine and the IEEE Journal
on Selected Areas in Communications. He has been technical program
co-chair of IM 2003 and DSOM 2005.
Prof.
Morris Sloman, Imperial College London
Professor
Morris Sloman is Director of Research and Deputy Head of the Department
of Computing, Imperial College London. His research interests
include management of networks and distributed systems, adaptive
security management, trust and security for pervasive systems,
autonomic management for pervasive systems. He is on the steering
committees for the conferences on Policies for Distributed Systems
and Networks, Integrated Management (IM), Network Operations and
Management (NOMS).
|
|
|