725 research outputs found

    Initial service management architecture

    Get PDF
    This document describes D2.2 of the Internet Next Generation project. Internet Next Generation is a project performed within the context of the Gigaport programme, and is funded by many organizations within the Netherlands. The architecture that is described within this document explains how customers of a Differentiated Services (DiffServ) network can manage the service that is provided by them, by reading and modifying QoS parameters in an interactive way. Which parameters are available and which values these parameters can take, is defined in the Service Level Specification (SLS), which is part of the Service Level Agreement (SLA). The form of management in which customers can modify the behaviour of the provided service is called Customer Service Management (CSM); the idea that customers can manage the behaviour of the provided service is not only interesting in case of DiffServ, but also in cases like Mobile IP, IP security or Virtual Private Networks (VPNs). The scope of this deliverable is restricted to QoS management in a DiffServ environment; a subsequent deliverable will extend this work and address how service .management can be performed in other environments, like IntServ / RSVP. This new deliverable will also address the problem of inter domain management

    A web services based framework for efficient monitoring and event reporting.

    Get PDF
    Network and Service Management (NSM) is a research discipline with significant research contributions the last 25 years. Despite the numerous standardised solutions that have been proposed for NSM, the quest for an "all encompassing technology" still continues. A new technology introduced lately to address NSM problems is Web Services (WS). Despite the research effort put into WS and their potential for addressing NSM objectives, there are efficiency, interoperability, etc issues that need to be solved before using WS for NSM. This thesis looks at two techniques to increase the efficiency of WS management applications so that the latter can be used for efficient monitoring and event reporting. The first is a query tool we built that can be used for efficient retrieval of management state data close to the devices where they are hosted. The second technique is policies used to delegate a number of tasks from a manager to an agent to make WS-based event reporting systems more efficient. We tested the performance of these mechanisms by incorporating them in a custom monitoring and event reporting framework and supporting systems we have built, against other similar mechanisms (XPath) that have been proposed for the same tasks, as well as previous technologies such as SNMP. Through these tests we have shown that these mechanisms are capable of allowing us to use WS efficiently in various monitoring and event reporting scenarios. Having shown the potential of our techniques we also present the design and implementation challenges for building a GUI tool to support and enhance the above systems with extra capabilities. In summary, we expect that other problems WS face will be solved in the near future, making WS a capable platform for it to be used for NSM

    Towards Automated Network Configuration Management

    Get PDF
    Modern networks are designed to satisfy a wide variety of competing goals related to network operation requirements such as reachability, security, performance, reliability and availability. These high level goals are realized through a complex chain of low level configuration commands performed on network devices. As networks become larger, more complex and more heterogeneous, human errors become the most significant threat to network operation and the main cause of network outage. In addition, the gap between high-level requirements and low-level configuration data is continuously increasing and difficult to close. Although many solutions have been introduced to reduce the complexity of configuration management, network changes, in most cases, are still manually performed via low--level command line interfaces (CLIs). The Internet Engineering Task Force (IETF) has introduced NETwork CONFiguration (NETCONF) protocol along with its associated data--modeling language, YANG, that significantly reduce network configuration complexity. However, NETCONF is limited to the interaction between managers and agents, and it has weak support for compliance to high-level management functionalities. We design and develop a network configuration management system called AutoConf that addresses the aforementioned problems. AutoConf is a distributed system that manages, validates, and automates the configuration of IP networks. We propose a new framework to augment NETCONF/YANG framework. This framework includes a Configuration Semantic Model (CSM), which provides a formal representation of domain knowledge needed to deploy a successful management system. Along with CSM, we develop a domain--specific language called Structured Configuration language to specify configuration tasks as well as high--level requirements. CSM/SCL together with NETCONF/YANG makes a powerful management system that supports network--wide configuration. AutoConf supports two levels of verifications: consistency verification and behavioral verification. We apply a set of logical formalizations to verifying the consistency and dependency of configuration parameters. In behavioral verification, we present a set of formal models and algorithms based on Binary Decision Diagram (BDD) to capture the behaviors of forwarding control lists that are deployed in firewalls, routers, and NAT devices. We also adopt an enhanced version of Dyna-Q algorithm to support dynamic adaptation of network configuration in response to changes occurred during network operation. This adaptation approach maintains a coherent relationship between high level requirements and low level device configuration. We evaluate AutoConf by running several configuration scenarios such as interface configuration, RIP configuration, OSPF configuration and MPLS configuration. We also evaluate AutoConf by running several simulation models to demonstrate the effectiveness and the scalability of handling large-scale networks

    On the use of mobility in distributed network management

    Get PDF
    Information Technology has been under unprecedented transformations and it is dramatically changing the way of work inside organizations. Information management systems must be adequate to cope with the profound effects of this evolution, which expectations includes the introduction into the networks of enormous quantities of different elements. Mobile agent paradigm seems to be, for many researchers, the right solution to deal with the pressures of these new demands. This paper discuss the issues around mobility of code on network management environments and presents ongoing work that provides mobility capability to distributed managers upon recent work of IETF’s Disman working group

    Network management and security for Unix

    Get PDF

    Development of an adaptive learning network-failure detection system

    Get PDF
    The purpose of this work consists in finding a method able to detect anomalies and adapt to new behaviours in an IP-network. Here is possible to find a work of investigation about the different anomaly detection systems. During the introduction and the first points, the audience could realize how the field of anomaly detection is divided in two big groups: Anomaly detection systems based in rules, and adaptive anomaly detection systems. These two ideas will be discuss, and some examples of each technology are given. In the case of adaptive anomaly detection, there are some techniques proposed. One of them is developed during the rest of the work. I wanted to implement this technique in a small network property of the RUS department of the University of Stuttgart. The implementation, the problems found and additional information can be found in this report. Later the tests and results applied make us think if the behaviour is correct or not. The discussion and the ideas obtained can be found at the end of the report, where is possible to find also the advices for future developers. This report has been designed as a guide for developers which lend them to avoid too much time in understanding the present algorithm. The aid of this work is to be considered as a helper reference to people who wants to implement this kind of systems.Ingeniería de Telecomunicació
    • 

    corecore