725 research outputs found
Initial service management architecture
This document describes D2.2 of the Internet Next Generation project. Internet Next Generation is a project performed within the context of the Gigaport programme, and is funded by many organizations within the Netherlands. The architecture that is described within this document explains how customers of a Differentiated Services (DiffServ) network can manage the service that is provided by them, by reading and modifying QoS parameters in an interactive way. Which parameters are available and which values these parameters can take, is defined in the Service Level Specification (SLS), which is part of the Service Level Agreement (SLA). The form of management in which customers can modify the behaviour of the provided service is called Customer Service Management (CSM); the idea that customers can manage the behaviour of the provided service is not only interesting in case of DiffServ, but also in cases like Mobile IP, IP security or Virtual Private Networks (VPNs). The scope of this deliverable is restricted to QoS management in a DiffServ environment; a subsequent deliverable will extend this work and address how service .management can be performed in other environments, like IntServ / RSVP. This new deliverable will also address the problem of inter domain management
A web services based framework for efficient monitoring and event reporting.
Network and Service Management (NSM) is a research discipline with significant research contributions the last 25 years. Despite the numerous standardised solutions that have been proposed for NSM, the quest for an "all encompassing technology" still continues. A new technology introduced lately to address NSM problems is Web Services (WS). Despite the research effort put into WS and their potential for addressing NSM objectives, there are efficiency, interoperability, etc issues that need to be solved before using WS for NSM. This thesis looks at two techniques to increase the efficiency of WS management applications so that the latter can be used for efficient monitoring and event reporting. The first is a query tool we built that can be used for efficient retrieval of management state data close to the devices where they are hosted. The second technique is policies used to delegate a number of tasks from a manager to an agent to make WS-based event reporting systems more efficient. We tested the performance of these mechanisms by incorporating them in a custom monitoring and event reporting framework and supporting systems we have built, against other similar mechanisms (XPath) that have been proposed for the same tasks, as well as previous technologies such as SNMP. Through these tests we have shown that these mechanisms are capable of allowing us to use WS efficiently in various monitoring and event reporting scenarios. Having shown the potential of our techniques we also present the design and implementation challenges for building a GUI tool to support and enhance the above systems with extra capabilities. In summary, we expect that other problems WS face will be solved in the near future, making WS a capable platform for it to be used for NSM
Towards Automated Network Configuration Management
Modern networks are designed to satisfy a wide variety of competing goals related to network operation requirements such as reachability, security, performance, reliability and availability. These high level goals are realized through a complex chain of low level configuration commands performed on network devices.
As networks become larger, more complex and more heterogeneous, human errors become the most significant threat to network operation and the main cause of network outage. In addition, the gap between high-level requirements and low-level configuration data is continuously increasing and difficult to close. Although many solutions have been introduced to reduce the complexity of configuration management, network changes, in most cases, are still manually performed via low--level command line interfaces (CLIs). The Internet Engineering Task Force (IETF) has introduced NETwork CONFiguration (NETCONF) protocol along with its associated data--modeling language, YANG, that significantly reduce network configuration complexity. However, NETCONF is limited to the interaction between managers and agents, and it has weak support for compliance to high-level management functionalities.
We design and develop a network configuration management system called AutoConf that addresses the aforementioned problems. AutoConf is a distributed system that manages, validates, and automates the configuration of IP networks. We propose a new framework to augment NETCONF/YANG framework. This framework includes a Configuration Semantic Model (CSM), which provides a formal representation of domain knowledge needed to deploy a successful management system. Along with CSM, we develop a domain--specific language called Structured Configuration language to specify configuration tasks as well as high--level requirements. CSM/SCL together with NETCONF/YANG makes a powerful management system that supports network--wide configuration. AutoConf supports two levels of verifications: consistency verification and behavioral verification. We apply a set of logical formalizations to verifying the consistency and dependency of configuration parameters. In behavioral verification, we present a set of formal models and algorithms based on Binary Decision Diagram (BDD) to capture the behaviors of forwarding control lists that are deployed in firewalls, routers, and NAT devices. We also adopt an enhanced version of Dyna-Q algorithm to support dynamic adaptation of network configuration in response to changes occurred during network operation. This adaptation approach maintains a coherent relationship between high level requirements and low level device configuration.
We evaluate AutoConf by running several configuration scenarios such as interface configuration, RIP configuration, OSPF configuration and MPLS configuration. We also evaluate AutoConf by running several simulation models to demonstrate the effectiveness and the scalability of handling large-scale networks
On the use of mobility in distributed network management
Information Technology has been under unprecedented
transformations and it is dramatically changing the way
of work inside organizations. Information management
systems must be adequate to cope with the profound
effects of this evolution, which expectations includes the
introduction into the networks of enormous quantities of
different elements. Mobile agent paradigm seems to be,
for many researchers, the right solution to deal with the
pressures of these new demands.
This paper discuss the issues around mobility of code on
network management environments and presents ongoing
work that provides mobility capability to distributed
managers upon recent work of IETFâs Disman working group
Development of an adaptive learning network-failure detection system
The purpose of this work consists in finding a method able to detect anomalies and adapt to
new behaviours in an IP-network. Here is possible to find a work of investigation about the
different anomaly detection systems.
During the introduction and the first points, the audience could realize how the field of
anomaly detection is divided in two big groups: Anomaly detection systems based in rules, and
adaptive anomaly detection systems. These two ideas will be discuss, and some examples of
each technology are given.
In the case of adaptive anomaly detection, there are some techniques proposed. One of them
is developed during the rest of the work. I wanted to implement this technique in a small
network property of the RUS department of the University of Stuttgart. The implementation,
the problems found and additional information can be found in this report. Later the tests and
results applied make us think if the behaviour is correct or not.
The discussion and the ideas obtained can be found at the end of the report, where is possible
to find also the advices for future developers.
This report has been designed as a guide for developers which lend them to avoid too much
time in understanding the present algorithm. The aid of this work is to be considered as a
helper reference to people who wants to implement this kind of systems.IngenieriÌa de TelecomunicacioÌ
- âŠ