Contact The DL Team Contact Us | Switch to tabbed view

top of pageABSTRACT

Virtualization technologies like VMware and Xen provide features to specify the minimum and maximum amount of resources that can be allocated to a virtual machine (VM) and a shares based mechanism for the hypervisor to distribute spare resources among contending VMs. However much of the existing work on VM placement and power consolidation in data centers fails to take advantage of these features. One of our experiments on a real testbed shows that leveraging such features can improve the overall utility of the data center by 47% or even higher.

Motivated by these, we present a novel suite of techniques for placement and power consolidation of VMs in data centers taking advantage of the min-max and shares features inherent in virtualization technologies. Our techniques provide a smooth mechanism for power-performance tradeoffs in modern data centers running heterogeneous applications, wherein the amount of resources allocated to a VM can be adjusted based on available resources, power costs, and application utilities. We evaluate our techniques on a range of large synthetic data center setups and a small real data center testbed comprising of VMware ESX servers. Our experiments confirm the end-to-end validity of our approach and demonstrate that our final candidate algorithm, PowerExp and MinMax, consistently yields the best overall utility across a broad spectrum of inputs - varying VM sizes and utilities, varying server capacities and varying power costs - thus providing a practical solution for administrators.

Advertisements



top of pageAUTHORS



Author image not provided  Michael Cardosa

No contact information provided yet.

Bibliometrics: publication history
Publication years2008-2012
Publication count8
Citation Count68
Available for download1
Downloads (6 Weeks)6
Downloads (12 Months)69
Downloads (cumulative)1,081
Average downloads per article1,081.00
Average citations per article8.50
View colleagues of Michael Cardosa


Author image not provided  Madhukar R. Korupolu

No contact information provided yet.

Bibliometrics: publication history
Publication years1997-2016
Publication count25
Citation Count355
Available for download8
Downloads (6 Weeks)198
Downloads (12 Months)2,177
Downloads (cumulative)8,895
Average downloads per article1,111.88
Average citations per article14.20
View colleagues of Madhukar R. Korupolu


Author image not provided  Aameek Singh

No contact information provided yet.

Bibliometrics: publication history
Publication years2002-2012
Publication count28
Citation Count272
Available for download7
Downloads (6 Weeks)24
Downloads (12 Months)331
Downloads (cumulative)7,441
Average downloads per article1,063.00
Average citations per article9.71
View colleagues of Aameek Singh

top of pageREFERENCES

Note: OCR errors may be found in this Reference List extracted from the full text article. ACM has opted to expose the complete List rather than only correct and linked references.

 
1
CiRBA, http://www.cirba.com.
 
2
 
3
N. Bobroff, A. Kochut, and K. Beaty, "Dynamic Placement of Virtual Machines for Managing SLA Violations," in Proceedings of the 10th IEEE Symposium on Integrated Management (IM), 2007.
 
4
G. Khanna, K. Beaty, G. Kar, and A. Kochut, "Application performance management in virtualized server environments," in Proceedings of 10th IEEE/IFIP Network Ops and Management Symp. (NOMS 2006), 2006.
 
5
VMware, http://www.vmware.com/.
6
 
7
J. G. Koomey, "Estimating regional power consumption by servers: A technical note," AMD Technical Study, 2007.
 
8
IDC, 2007.
 
9
 
10
11
 
12
D. Pisinger, "A minimal algorithm for the Multiple-choice Knapsack Problem," European Journal of Operational Research, vol. 83, p. 394410, 1995.
 
13
VMWare Virtual Center, http://www.vmware.com/products/vi/vc/.
 
14
V. Kumar, K. Schwan, S. Iyer, Y. Chen, and A. Sahai, "A State-Space Approach to SLA based Management," in Proceedings of 11th IEEE/IFIP Network Ops and Management Symp. (NOMS 2008), 2008.
 
15
IBM Enterprise Workload Manager, http://www.ibm.com/ developerworks/autonomic/ewlm/.
 
16
IBM Active Energy Manager, http://www.ibm.com/systems/ management/director/extensions/actengmrg.html.
 
17
HPC Challenge Benchmark, http://icl.cs.utk.edu/hpcc/.
 
18
19
20
 
21
D. Carrera, M. Steinder, I. Whalley, J. Torres, and E. Ayguade, "Utility-based Placement of Dynamic Web Applications with Fairness Goals," in Proceedings of 11th IEEE/IFIP Network Ops and Management Symp. (NOMS 2008), 2008.
 
22
A. AuYoung, L. Rit, S. Wiener, and J. Wilkes, "Service contracts and aggregate utility functions," in HPDC, 2006, pp. 119-131.
 
23
M. Steinder, I. Whalley, D. Carrera, I. Gaweda, and D. M. Chess, "Server virtualization in autonomic management of heterogeneous workloads," in Integrated Network Management, 2007, pp. 139-148.
 
24
 
25

top of pageCITED BY

46 Citations

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

top of pageINDEX TERMS

Index Terms are not available

top of pagePUBLICATION

Title IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management table of contents
Pages 327-334
Publication Date2009-06-01 (yyyy-mm-dd)
PublisherIEEE Press Piscataway, NJ, USA ©2009
ISBN: 978-1-4244-3486-2

top of pageREVIEWS


Reviews are not available for this item
Computing Reviews logo

top of pageCOMMENTS

Be the first to comment To Post a comment please sign in or create a free Web account

top of pageTable of Contents

Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
Table of Contents
Configuring resource managers using model fuzzing: a case study of the .NET thread pool
Joseph L. Hellerstein
Pages: 1-8

Resource managers (RMs) often expose configuration parameters that have a significant impact on the performance of the systems they manage. Configuring RMs is challenging because it requires accurate estimates of performance for a large number of configuration ...
expand
Business-impact analysis and simulation of critical incidents in IT service management
C. Bartolini, C. Stefanelli, M. Tortonesi
Pages: 9-16

Service disruptions can have a considerable impact on business operations of IT support organizations, thus calling for the implementation of efficient incident management and service restoration processes. The evaluation and improvement of incident ...
expand
A universal method for composing business transaction models using logs
Joel W. Branch, Chatschik Bisdikian, Ho Yin Starsky Wong, Dakshi Agrawal
Pages: 17-24

In this paper, a novel procedural framework for increasing the efficiency of the model composition process for the end-to-end transactional behavior of various classes of business-level computer applications is presented. The objectives of the framework ...
expand
Probabilistic decentralized network management
Marcus Brunner, Dominique Dudkowski, Chiara Mingardi, Giorgio Nunzi
Pages: 25-32

This work proposes a probabilistic management paradigm for solving some major challenges of decentralized network management. Specifically, we show how to cope with 1) the overhead of redundant information gathering and processing, 2) the decentralized ...
expand
Robust and scalable trust management for collaborative intrusion detection
Carol J. Fung, Jie Zhang, Issam Aib, Raouf Boutaba
Pages: 33-40

The accuracy of detecting intrusions within an Intrusion Detection Network (IDN) depends on the efficiency of collaboration between the peer Intrusion Detection Systems (IDSes) as well as the security itself of the IDN against insider threats. In this ...
expand
A rule-based distributed system for self-optimization of constrained Devices
Javier Baliosian, Jorge Visca, Eduardo Grampín, Leonardo Vidal, Martín Giachino
Pages: 41-48

During the last years there has been a strong research effort on the autonomic communications and self-management paradigms. Following this impulse, the academic community and the industry have proposed several architectures and techniques to allow network ...
expand
Policy control management for web services
Arlindo L. Marcon, Altair O. Santin, Luiz A. de Paula Lima, Rafael R. Obelheiro, Maicon Stihler
Pages: 49-56

The decentralization of corporate policy administration aiming to maintain the unified management of user permissions is a hard task. The heterogeneity and complexity of corporate environments burdens the security administrator with writing equally complex ...
expand
Predictive routing of contexts in an overlay network
Hahnsang Kim, Kang G. Shin
Pages: 57-64

While mobile nodes (MNs) undergo handovers across inter-wireless access networks, their contexts must be propagated for seamless re-establishment of on-going application sessions, including IP header compression, secure Mobile IP, authentication, authorization, ...
expand
Planning-based configuration and management of distributed systems
Kyriaki Levanti, Anand Ranganathan
Pages: 65-72

The configuration and runtime management of distributed systems is often complex due to the presence of a large number of configuration options and dependencies between interacting sub-systems. Inexperienced users usually choose default configurations ...
expand
Service management architecture and system capacity design for PhoneFactor: a two-factor authentication service
Haiyang Qian, Chandra Sekhar Surapaneni, Stephen Dispensa, Deep Medhi
Pages: 73-80

PhoneFactor™ is a token-less two-factor authentication service for user remote logons [13]. This allows users of an organization to be authenticated through an automated phone call to the user's phone before access is allowed. In this ...
expand
Autonomic service hosting for large-scale distributed MOVE-services
Bruno Van Den Bossche, Filip De Turck, Bart Dhoedt, Piet Demeester
Pages: 81-88

Massively Online Virtual Environments (MOVEs) have been gaining popularity for several years. Today, these complex networked applications are serving thousands of clients simultaneously. However, these MOVEs are typically hosted on specialized server ...
expand
A systematic and practical approach to generating policies from service level objectives
Yuan Chen, Subu Iyer, Dejan Milojicic, Akhil Sahai
Pages: 89-96

In order to manage a service to meet the agreed upon SLA, it is important to design a service of the required capacity and to monitor the service thereafter for violations at runtime. This objective can be achieved by translating SLOs specified in the ...
expand
CHANGEMINER: a solution for discovering IT change templates from past execution traces
Weverton Luis da Costa Cordeiro, Guilherme Sperb Machado, Fabrício Girardi Andreis, Juliano Araújo Wickboldt, Roben Castagna Lunardi, Alan Diego dos Santos, Cristiano Bonato Both, Luciano Paschoal Gaspary, Lisandro Zambenedetti Granville, David Trastour, Claudio Bartolini
Pages: 97-104

The main goal of change management is to ensure that standardized methods and procedures are used for the efficient and prompt handling of changes in IT systems, in order to minimize change-related incidents and service-delivery disruption. To meet this ...
expand
DACS scheme as next generation policy-based network management scheme
Kazuya Odagiri, Rihito Yaegashi, Masaharu Tadauchi, Naohiro Ishii
Pages: 105-108

As the work for managing a whole network effectively without a limited purpose, there is the work of PBNM (Policy-based network management). PBNM has two structural problems such as communication concentration from many clients to a communication control ...
expand
A new approach for multi-sink environments in WSNs
Ricardo Silva, Jorge Sá Silva, Milan Simek, Fernando Boavida
Pages: 109-112

Wireless Sensor Networks are low cost networks constituted by modest devices with limited resources, whose main function is monitoring. Based on the low price of these devices, it will be cheap to deploy a large amount of nodes to monitor a large area. ...
expand
Towards an information model for ITIL and ISO/IEC 20000 processes
Michael Brenner, Thomas Schaaf, Alexander Scherer
Pages: 113-116

As IT service providers are adopting more comprehensive approaches towards IT Service Management (ITSM), they increasingly need to rely on ITSM software solutions in their day-to-day operations. However, when wishing to integrate ITSM software from one ...
expand
Rapid service creation environment for service delivery platform based on service templates
Ling Jin, Ping Pan, Chun Ying, Jinhua Liu, Qiming Tian
Pages: 117-120

The requirement of quickly creating new value-added telecom services is increasingly becoming a business imperative today. Telecom operators and service providers are facing the challenge how to reduce cost and time-to-market of creating new services. ...
expand
Designing stand-by gateway for managing a waste of networked home-device power
Jungmee Yun, Jinwook Chung, Sanghak Lee
Pages: 121-124

The Internet protocols were designed when there were relatively few devices connected to the Internet and these devices were in use most of the time. Studies show many of these computers especially in home have their power management features disabled ...
expand
Rate-based SIP flow management for SLA satisfaction
Jing Sun, Ruixiong Tian, Jinfeng Hu, Bo Yang
Pages: 125-128

SIP flow management should respect the specific characteristics of SIP protocol applied in multimedia or telecom services for meeting stringent quality of service (QoS) requirement. The specific characteristics include explicit session structure for ...
expand
A generic end-to-end monitoring architecture for multimedia services
A. Cuadra, F. Garces, J. A. del Sol, G. Nieto
Pages: 129-132

This paper describes a generic architecture for monitoring multimedia services, such as IPTV, MobileTV or VoIP, by analyzing the traffic of real users from an end-to-end perspective. The main data source is the information gathered by different types ...
expand
Secure interworking & roaming of WiMAX with 3G and Wi-Fi
Vamsi Krishna Gondi, Nazim Agoulmine
Pages: 133-136

The roaming between different WiMAX (Worldwide Interoperability for Microwave Access) networks as well as the interworking between WiMAX and other access technologies will be a key enabler for global WiMAX deployment. To provide secure and seamless roaming ...
expand
Four questions that determine whether traffic management is reasonable
Scott Jordan
Pages: 137-140

As part of the wider debate over net neutrality, traffic management practices of Internet Service Providers have become an issue of public concern. The Federal Communications Commission has asked for public input on whether deep packet inspection and ...
expand
Real-time root cause analysis in OSS for a multilayer and multi-domain network using a hierarchical circuit model and scanning algorithm
Masanori Miyazawa, Tomohiro Otani
Pages: 141-144

One of the major issues for telecom operators today is how to rapidly identify the cause of failure and affected services within a multi-layer and multi-domain network to achieve high-quality service on an end-to-end basis. To assess this issue, this ...
expand
Extending the CIM-SPL policy language with RBAC for distributed management systems in the WBEM infrastructure
Li Pan, Jorge Lobo, Seraphin Calo
Pages: 145-148

In spite of the large effort behind the development of the WBEM and CIM standards for the management of distributed systems, there has been very little work addressing security in those standards. In this paper we present a Role-based Access Control ...
expand
Probabilistic fault diagnosis for IT services in noisy and dynamic environments
Lu Cheng, Xue-song Qiu, Luoming Meng, Yan Qiao, Zhi-qing Li
Pages: 149-156

The modern society has come to rely heavily on IT services. To improve the quality of IT services it is important to quickly and accurately detect and diagnose their faults which are usually detected as disruption of a set of dependent logical services ...
expand
Session resumption for the secure shell protocol
Jürgen Schönwälder, Georgi Chulkov, Elchin Asgarov, Mihai Cretu
Pages: 157-163

The secure shell protocol (SSH) is widely deployed to access command line interfaces of network devices and host systems over an insecure network. Recently, the IETF has produced specifications how to run network management protocols such as NETCONF ...
expand
PCE-based hierarchical segment restoration
Mohamed Abouelela, Mohamed El-Darieby
Pages: 164-171

Providing network QoS involves, among other things, ensuring network survivability in spite of network faults. Fault recovery mechanisms should reduce recovery time, especially for real-time and mission-critical applications while guaranteeing QoS requirements, ...
expand
SecSip: a stateful firewall for SIP-based networks
Abdelkader Lahmadi, Olivier Festor
Pages: 172-179

SIP-based networks are becoming the de-facto standard for voice, video and instant messaging services. Being exposed to many threats while playing an major role in the operation of essential services, the need for dedicated security management approaches ...
expand
Using argumentation logic for firewall configuration management
Arosha K. Bandara, Antonis C. Kakas, Emil C. Lupu, Alessandra Russo
Pages: 180-187

Firewalls remain the main perimeter security protection for corporate networks. However, network size and complexity make firewall configuration and maintenance notoriously difficult. Tools are needed to analyse firewall configurations for errors, to ...
expand
Evaluating WS-security and XACML in web services-based network management
Estêvão Miguel Zanette Rohr, Lisandro Zambenedetti Granville, Liane Margarida R. Tarouco
Pages: 188-194

The use of Web services in network management has became a reality after recent researches and industry standardization effort. Although performance is a critical issue, as well as security support, no investigation so far has observed how secure Web ...
expand
Performance management via adaptive thresholds with separate control of false positive and false negative errors
David Breitgand, Maayan Goldstein, Ealan Henis, Onn Shehory
Pages: 195-202

Component level performance thresholds are widely used as a basic means for performance management. As the complexity of managed systems increases, manual threshold maintenance becomes a difficult task. This may result from a) a large number of system ...
expand
Optimizing correlation structure of event services considering time and capacity constraints
Bin Zhang, Ehab Al-Shaer
Pages: 203-210

Constructing optimal event correlation architecture is crucial to large-scale event services. It plays an instrumental role in detecting composite events requested by different subscribers in scalable and timely manner. However, events generated from ...
expand
Fault detection in IP-based process control networks using data mining
Byungchul Park, Young J. Won, Hwanjo Yu, James Won-Ki Hong, Hong-Sun Noh, Jang Jin Lee
Pages: 211-217

Industrial process control IP networks support communications between process control applications and devices. Communication faults in any stage of these control networks can cause delays or even shutdown of the entire manufacturing process. The current ...
expand
A user-centric network management framework for high-density wireless LANs
Yanfeng Zhu, Qian Ma, Chatschik Bisdikian, Chun Ying
Pages: 218-225

With the ever increasing deployment density of Wireless Local Area Networks (WLANs), more and more access points (APs) are deployed within users' vicinity. The effective management of these APs to optimize users' eventual throughput becomes an important ...
expand
MeshMan: a management framework for wireless mesh networks
Vivek Aseeja, Rong Zheng
Pages: 226-233

As wireless mesh networks become more popular, there exists a need to provide centralized management solutions, which facilitate network administrators to control, troubleshoot and collect statistics from their networks. Managing wireless mesh networks ...
expand
A scalable PBNM framework for MANET management
Wang-Cheol Song, Shafqat-Ur Rehman, Hanan Lutfiyya
Pages: 234-241

Policy-based Network Management (PBNM) in Mobile Ad-hoc Networks (MANETs) requires additional reliable and efficient mechanisms over PBNM in wired networks. Thus, it is important that the management system in MANETs should cluster the moving nodes and ...
expand
Adaptable misbehavior detection and isolation in wireless ad hoc networks using policies
Oscar F. Gonzalez Duque, Antonis M. Hadjiantonis, George Pavlou, Michael Howarth
Pages: 242-250

Wireless ad hoc networks provide the communications platform for new technologies and applications, such as vehicular ad hoc networks or wireless mesh networks. However, their multihop wireless nature makes them inherently unreliable and vulnerable, ...
expand
Monitoring of SLA compliances for hosted streaming services
Hasan Peter Racz, Burkhard Stiller
Pages: 251-258

Monitoring of Service Level Objectives (SLOs) determines an essential part of Service Level Agreement (SLA) management, since customers are to be reimbursed, if a provider fails to fulfil them. By automating this process, a timely detection of a violation ...
expand
Gossiping for threshold detection
Fetahi Wuhib, Rolf Stadler, Mads Dam
Pages: 259-266

We investigate the use of gossip protocols to detect threshold crossings of network-wide aggregates. Aggregates are computed from local device variables using functions such as SUM, AVERAGE, COUNT, MAX and MIN. The process of aggregation and detection ...
expand
Monitoring and counter-profiling for voice over IP networks and services
Rémi Badonnel, Olivier Festor, Khaled Hamlaoui
Pages: 267-274

Voice over IP (VoIP) has become a major paradigm for providing lower operational costs and higher flexibility in networks and services. VoIP infrastructures are however facing multiple security issues. In particular, monitoring methods and techniques ...
expand
Event handling in clean-slate future internet management
C. Mingardi, G. Nunzi, D. Dudkowski, M. Brunner
Pages: 275-278

Event handling is a management mechanism that provides means for the network to react on changes in the network conditions or performance. In the construction of a clean-slate management architecture, we consider this as a main building block. This paper ...
expand
Security and mobility architecture for isolated wireless networks using WIMAX as an infrastructure
Vamsi Krishna Gondi, Nazim Agoulmine
Pages: 279-282

The main aim of the paper is to define a security and mobility architecture for users to roam along isolated wireless networks. Due to the mobility of the users as well as the networks some of the key issues like security and mobility management are ...
expand
Investigating the role of a transmission initiator in private peering arrangements
Ruzana Davoyan, Jörn Altmann
Pages: 283-286

This paper investigates the impact of determination of an original initiator of transmission on demand as well as profits of the providers. For that purpose we present a new model, called differentiated traffic-based interconnection agreement (DTIA) ...
expand
Framework to achieve multi-domain service management
Anindo Bagchi, Francesco Caruso, Andrew Mayer, Ronald Roman, Prabha Kumar, Sitaram Kowtha
Pages: 287-290

An ongoing trend within the telecommunications industry has been toward providing end-to-end (E2E) IP based services. Accordingly, the associated management perspective has shifted from management of services within a single service provider domain towards ...
expand
Analysing Joost peer to peer IPTV protocol
Mehdi Nafaa, Nazim Agoulmine
Pages: 291-294

After Kazaa and Skype, Niklas Zennstrom and Janus Friis released Joost: A peer to peer TV client. Joost claims that it can work seamlessly and has better video quality than existing p2p video streaming applications and even approaching number of traditional ...
expand
Problem classification method to enhance the ITIL incident and problem
Yang Song, Anca Sailer, Hidayatullah Shaikh
Pages: 295-298

Problem determination and resolution PDR is the process of detecting anomalies in a monitored system, locating the problems responsible for the issue, determining the root cause and fixing the cause of the problem. The cost of PDR represents a substantial ...
expand
How much management is management enough? providing monitoring processes with online adaptation and learning capability
Josiane Ortolan Coelho, Luciano Paschoal Gaspary, Liane Margarida Rockenbach Tarouco
Pages: 299-302

Recent investigations of management traffic patterns in production networks suggest that just a small and static set of management data tends to be used, the flow of management data is relatively constant, and the operations in use for manager-agent ...
expand
Application-specific packet capturing using kernel probes
Byungjoon Lee, Seong Moon, Youngseok Lee
Pages: 303-306

When we reverse-engineer unknown protocols or analyze the Internet traffic, it is critical to capture complete traffic traces generated by a target application. Besides, to prove the accuracy of Internet traffic classification algorithms of the traffic ...
expand
RESERVOIR: management technologies and requirements for next generation service oriented infrastructures
B. Rochwerger, A. Galis, E. Levy, J. A. Cáceres, D. Breitgand, Y. Wolfsthal, I. M. Llorente, M. Wusthoff, R. S. Montero, E. Elmroth
Pages: 307-310

RESERVOIR project [16] is developing an advanced system and service management approach that will serve as the infrastructure for Cloud Computing and Communications and Future Internet of Services by creative coupling of service virtualization, grid ...
expand
Collaborative content caching algorithms in mobile ad hoc networks environment
Y. Abdelmalek, A. Abd El Al, T. Saadawi
Pages: 311-314

In this paper, we address the problem of collaborative video caching in ad hoc mobile networks. We consider network portraying static video server with wired interface to gateway node that is equipped with wireless interfaces, other nodes are requiring ...
expand
A policy based security management architecture for sensor networks
Sérgio de Oliveira, Thiago Rodrigues de Oliveira, José Marcos Nogueira
Pages: 315-318

Wireless sensor networks are subjected to several types of attacks specially attacks of denial of service types (DoS). Several mechanisms and techniques were proposed to provide security to wireless sensor networks, like cryptographic process, key management ...
expand
Managing responsiveness of virtual desktops using passive monitoring
Rajdeep Bhowmik, Andrzej Kochut, Kirk Beaty
Pages: 319-326

Desktop virtualization is a new computing approach to application delivery and management. It leverages OS virtualization and remoting protocols to provide users with remote access to virtual machines running in a centralized data center. It promises ...
expand
Shares and utilities based power consolidation in virtualized server environments
Michael Cardosa, Madhukar R. Korupolu, Aameek Singh
Pages: 327-334

Virtualization technologies like VMware and Xen provide features to specify the minimum and maximum amount of resources that can be allocated to a virtual machine (VM) and a shares based mechanism for the hypervisor to distribute spare resources among ...
expand
iMark: an identity management framework for network virtualization environment
N. M. Mosharaf Kabir Chowdhury, Fida-E Zaheer, Raouf Boutaba
Pages: 335-342

In recent years, network virtualization has been propounded as an open and flexible future internetworking paradigm that allows multiple virtual networks (VNs) to co-exist on a shared physical substrate. Each VN in a network virtualization environment ...
expand
Enabling high-speed and extensible real-time communications monitoring
Francesco Fusco, Felipe Huici, Luca Deri, Saverio Niccolini, Thilo Ewald
Pages: 343-350

The use of the Internet as a medium for real-time communications has grown significantly over the past few years. However, the best-effort model of this network is not particularly well-suited to the demands of users who are familiar with the reliability, ...
expand
Monitoring the impact of P2P users on a broadband operator's network
H. J. Kolbe, O. Kettig, E. Golic
Pages: 351-358

Since their emergence peer-to-peer (P2P) applications have been generating a considerable fraction of the overall transferred bandwidth in broadband networks. Residential broadband service has been moving from one geared towards technology enthusiasts ...
expand
Controlling performance trade-offs in adaptive network monitoring
Alberto Gonzalez Prieto, Rolf Stadler
Pages: 359-366

A key requirement for autonomic (i.e., self-*) management systems is a short adaptation time to changes in the networking conditions. In this paper, we show that the adaptation time of a distributed monitoring protocol can be controlled. We show this ...
expand
Computing histograms of local variables for real-time monitoring using aggregation trees
Dan Jurca, Rolf Stadler
Pages: 367-374

In this paper we present a protocol for the continuous monitoring of a local network state variable. Our aim is to provide a management station with the value distribution of the local variables across the network, by means of partial histogram aggregation, ...
expand
Heteroscedastic models to track relationships between management metrics
Miao Jiang, Mohammad A. Munawar, Thomas Reidemeister, Paul A. S. Ward
Pages: 375-381

Modern software systems expose management metrics to help track their health. Recently, it was demonstrated that correlations among these metrics allow faults to be detected and their causes localized. In particular, linear regression models have been ...
expand
SIPFIX: a scheme for distributed SIP monitoring
Sven Anderson, Saverio Niccolini, Dieter Hogrefe
Pages: 382-389

Voice-over-IP (VoIP) is a key component of Next-Generation-Networks and rapidly becoming more and more common in the Internet in general. This also increases the demand of VoIP operators for a scalable, distributed and flexible monitoring. But current ...
expand
Embedded system management using WBEM
Michael Hutter, Alexander Szekely, Johannes Wolkerstorfer
Pages: 390-397

Web-based management solutions have become an increasingly important and promising approach especially for small and embedded environments. This article presents the design and implementation of an embedded system that leverages the Web-based Enterprise ...
expand
Control information description model and processing mechanism in the trustworthy and controllable network
Peng Wang, Junzhou Luo, Wei Li, Yansheng Qu
Pages: 398-405

Traditional networks are surprisingly fragile and difficult to manage. The problem can partly be attributed to the exposition of too many details of the controlled objects leading to the deluge of complexity in control plane, and the absence of network-wide ...
expand
Supporting communities in programmable grid networks: gTBN
Mihai Lucian Cristea, Rudolf J. Strijkers, Damien Marchal, Leon Gommans, Cees de Laat, Robert J. Meijer
Pages: 406-413

This paper presents the generalised Token Based Networking (gTBN) architecture, which enables dynamic binding of communities and their applications to specialised network services. gTBN uses protocol independent tokens to provide decoupling of authorisation ...
expand
A latency-aware algorithm for dynamic service placement in large-scale overlays
Jeroen Famaey, Wouter De Cock, Tim Wauters, Filip De Turck, Bart Dhoedt, Piet Demeester
Pages: 414-421

A generic and self-managing service hosting infrastructure, provides a means to offer a large variety of services to users across the Internet. Such an infrastructure provides mechanisms to automatically allocate resources to services, discover the location ...
expand
ITU-T RACF implementation for application-driven QoS control in MPLS networks
B. Martini, F. Baroncelli, V. Martini, K. Torkman, P. Castoldi
Pages: 422-429

Within the ITU-T Next Generation Network (NGN) architecture, the Resource Admission Control Function (RACF) has been designated to perform the application-driven QoS control across both access and core networks. However, an actual RACF implementation ...
expand
Management of SOA based NGN service exposure, service discovery and service composition
N. Blum, T. Magedanz, F. Schreiner
Pages: 430-437

Next generation telecommunication network operators securely opening up their network capabilities and services to third party service providers require flexible service delivery platforms. Policy based service exposure, service discovery and service ...
expand
Using heuristics to improve service portfolio selection in P2P grids
Álvaro Coêlho, Francisco Brasileiro, Paulo Ditarso Maciel
Pages: 438-444

In this paper we consider a peer-to-peer grid system which provides multiple services to its users. An incentive mechanism promotes collaboration among peers. It has been shown that the use of a reciprocation-based incentive mechanism in such a system ...
expand
A solution to support risk analysis on IT change management
Juliano Araújo Wickboldt, Guilherme Sperb Machado, Weverton Luis da Costa Cordeiro, Roben Castagna Lunardi, Alan Diego dos Santos, Fabrício Girardi Andreis, Cristiano Bonato Both, Lisandro Zambenedetti Granville, Luciano Paschoal Gaspary, Claudio Bartolini, David Trastour
Pages: 445-452

The growing necessity of organizations in using technologies to support to their operations implies that managing IT resources became a mission-critical issue for the health of the primary companies' businesses. Thus, in order to minimize problems in ...
expand
Defensive configuration with game theory
Sheila Becker, Radu State, Thomas Engel
Pages: 453-459

This paper proposes a new model, based on mainstream game theory for the optimal configuration of services. We consider the case of reliable realtime P2P communications and show how the configuration of security mechanisms can be configured using game ...
expand
Algorithms for SLA composition to provide inter-domain services
Nabil Bachir Djarallah, Hélia Pouyllau
Pages: 460-467

Providing inter-domain QoS guaranteed services is a huge challenge for operators and will bring new revenues to them. But, establishing end-to-end services requires a level of resource management that does not exist yet, even locally to an operator. ...
expand
On semantic and compliance of SNMP MIBs in IP/MPLS routers
K. Torkman, B. Martini, F. Baroncelli, V. Martini, P. Castoldi
Pages: 468-473

The Simple Network Management Protocol (SNMP) Framework, is one of the most diffused and successful protocol for network management generally available in current network devices. This work studies the dynamic evolution of the SNMP Management Information ...
expand
Monitoring probabilistic SLAs in web service orchestrations
Sidney Rosario, Albert Benveniste, Claude Jard
Pages: 474-481

Web services are software applications that are published over the Web, and can be searched and invoked by other programs. New Web services can be formed by composing elementary services, such composite services are called Web service orchestrations. ...
expand
Queuing model based end-to-end performance evaluation for MPLS virtual private networks
Yanfeng Zhu, Yibo Zhang, Chun Ying, Wei Lu
Pages: 482-488

Monitoring the end-to-end Quality-or-Service (QoS) is an important work for service providers' Operation Support System (OSS), because it is the fundamental requirement for QoS provisioning. However, it is in fact a challenging work, and there are few ...
expand
Enhanced cognitive resource management for QoS-guaranteed service provisioning in home/office network
Shahnaza Tursunova, Son Tran Trong, Bong-Kyun Lee, Eun-Young Cho, You-Hyeon Jeong, Young-Tak Kim
Pages: 489-496

In this paper, we propose an enhanced cognitive resource management for QoS-aware service provisioning in wired and wireless home/office network. We enhance QoS-aware customer network management (Q-CNM) system. The Q-CNM controls overall management process ...
expand
End to End session based bearer control for IP multimedia subsystems
Richard Good, Neco Ventura
Pages: 497-504

The IP Multimedia Subsystem (IMS) is a converged service enabler that facilitates the rapid deployment of multimedia services in IP networks. The IMS defines a Policy Based Management model to ensure QoS-enabled connectivity by providing mediation and ...
expand
Performance of distributed reservation control in wavelength-routed all-optical WDM networks with adaptive alternate routing
Iyad Katib, Deep Medhi
Pages: 505-512

In this work, we consider the performance benefits of distribution reservation control schemes in partially-connected wavelength-routed all-optical WDM networks. In particular, we propose a new distributed reservation control scheme designed to work ...
expand
Techniques for better alias resolution in internet topology discovery
S. García-Jiménez, E. Magaña, D. Morató, M. Izal
Pages: 513-520

One of the challenging problems related with network topology discovery in Internet is the process of IP address alias identification. Topology information is usually obtained from a set of traceroutes that provide IP addresses of routers in the path ...
expand
On the feasibility of static analysis for BGP convergence
Luca Cittadini, Massimo Rimondini, Matteo Corea, Giuseppe Di Battista
Pages: 521-528

Internet Service Providers can enforce a fine grained control of Interdomain Routing by cleverly configuring the Border Gateway Protocol. However, the price to pay for the flexibility of BGP is the lack of convergence guarantees. Network protocol design ...
expand
Architectural principles and elements of in-network management
Dominique Dudkowski, Marcus Brunner, Giorgio Nunzi, Chiara Mingardi, Chris Foley, Miguel Ponce de Leon, Catalin Meirosu, Susanne Engberg
Pages: 529-536

Recent endeavors in addressing the challenges of the current and future Internet pursue a clean slate design methodology. Simultaneously, it is argued that the Internet is unlikely to be changed in one fell swoop and that its next generation requires ...
expand
An evaluation of network management protocols
Pedro Gonçalves, José Luís Oliveira, Rui L. Aguiar
Pages: 537-544

During the last decade several network management solutions have been proposed or extended to cope with the growing complexity of networks, systems and services. Architectures, protocols, and information models have been proposed as a way to better respond ...
expand
Adaptive management of connections to meet availability guarantees in SLAs
Anders Mykkeltveit, Bjarne E. Helvik
Pages: 545-552

Today's backbone communication networks serve a wide range of services with different availability requirements. Each customer has a contract, denoted a Service Level Agreement (SLA) which specifies the availability requirement over the contract period. ...
expand
A management scheme of SRLG-disjoint protection path
Alisson Barbosa de Souza, Ana Luiza de B. de P. Barros, Antônio Sérgio de S. Vieira, Gustavo Augusto, L. de Campos, Jéssyca Alencar L. e Silva, Joaquim Celestino, Joel Uchôa, Laure W. N. Mendouga
Pages: 553-560

With the emergence of new applications and requirements it became necessary to create new monitoring and reactive configuration mechanisms to try to meet the SLAs (Service Level Agreements). In WDM (Wavelength Division Multiplexing) optical networks, ...
expand
Experiences in using MUWS for scalable distributed monitoring
Aimilios Chourmouziadis, Oscar F. Gonzalez Duque, George Pavlou
Pages: 561-568

Efficient Web Services (WS) based network monitoring of managed devices is a difficult task due to the relatively big overhead WS impose. In the past we proposed mechanisms to perform distributed monitoring efficiently, minimizing the relevant overhead. ...
expand
Towards an optimized model of incident ticket correlation
Patricia Marcu, Genady Grabarnik, Laura Luan, Daniela Rosu, Larisa Shwartz, Chris Ward
Pages: 569-576

In recent years, IT Service Management (ITSM) has become one of the most researched areas of IT. Incident and Problem Management are two of the Service Operation processes in the IT Infrastructure Library (ITIL). These two processes aim to recognize, ...
expand
Self-management of hybrid networks: can we trust NetFlow data?
Tiago Fioreze, Lisandro Zambenedetti Granville, Aiko Pras, Anna Sperotto, Ramin Sadre
Pages: 577-584

Network measurement provides vital information on the health of managed networks. The collection of network information can be used for several reasons (e.g., accounting or security) depending on the purpose the collected data will be used for. At the ...
expand
Analyzing end-to-end network reachability
Sruthi Bandhakavi, Sandeep Bhatt, Cat Okita, Prasad Rao
Pages: 585-590

Network security administrators cannot always accurately tell which end-to-end accesses are permitted within their network, and which ones are not. The problem is that every access is determined by the configurations of multiple, separately administered, ...
expand
Applying quorum role in network management
Edemilson da Silva, Altair Olivo Santin, Edgard Jamhour, Carlos Maziero, Emir Toktar
Pages: 591-597

This work presents a proposal for extending the Role-Based Access control (RBAC) model to support activities that demand runtime mutability in their authorization attributes. Such activities cannot be subdivided in a set of subtasks executed sequentially ...
expand
Security management with scalable distributed IP traceback
Djakhongir Siradjev, Laziz Yunusov, Young-Tak Kim
Pages: 598-605

In this paper we propose an IP traceback mechanism based on deterministic packet marking and logging, using protected nodes set to reduce logged data amount. The proposed scheme exploits the fact that the number of nodes that may be under attack is usually ...
expand
Survivable keying for wireless ad hoc networks
Michele Nogueira, Guy Pujolle, Eduardo Silva, Aldri Santos, Luiz Albini
Pages: 606-613

Cryptographic techniques are at the center of security solutions for wireless ad hoc networks. Public key infrastructures (PKIs) are essential for their efficient operation. However, the fully distributed organization of these networks makes a challenge ...
expand
EJB-based implementation of L1VPN NMS controlled by each customer
Hiroshi Matsuura, Naotaka Morita
Pages: 614-621

We propose a new service for the L1VPN (layer-1 virtual private network), in which an L1VPN customer can manage and control its own L1VPN from an end-to-end point of view. In the service, a customer can change its routing policy on the basis of a decision ...
expand
DeskBench: flexible virtual desktop benchmarking toolkit
Junghwan Rhee, Andrzej Kochut, Kirk Beaty
Pages: 622-629

The thin-client computing model has been recently regaining popularity in a new form known as the virtual desktop. That is where the desktop is hosted on a virtualized platform. Even though the interest in this computing paradigm is broad there are relatively ...
expand
Memory overbooking and dynamic control of Xen virtual machines in consolidated environments
Jin Heo, Xiaoyun Zhu, Pradeep Padala, Zhikui Wang
Pages: 630-637

The newly emergent cloud computing environments host hundreds to thousands of services on a shared resource pool. The sharing is enhanced by virtualization technologies allowing multiple services to run in different virtual machines (VMs) on a single ...
expand
Refined failure remediation for IT change management systems
Guilherme Sperb Machado, Weverton Luis da Costa Cordeiro, Alan Diego dos Santos, Juliano Wickboldt, Roben Castagna Lunardi, Fabrício Girardi Andreis, Cristiano Bonato Both, Luciano Paschoal Gaspary, Lisandro Zambenedetti Granville, David Trastour, Claudio Bartolini
Pages: 638-645

In order to deal with failures in the deployment of IT changes and to always leave IT infrastructures into consistent states, we proposed in a previous work, a solution to automate the generation of rollback plans in IT change management systems. The ...
expand
Mobile service-oriented content delivery in wireless mesh networks
Mohamed Elshenawy, Mohamed El-Darieby, Baher Abdulhai
Pages: 646-652

Wireless mesh networks (WMN) is poised to be a cost-effective platform for many municipal applications in public safety, business and entertainment. In this paper we present WMN-based platform for content delivery within Intelligent Transportation Systems ...
expand
An efficient spectrum management mechanism for cognitive radio networks
Gülfem Isiklar Alptekin, Ayse Basar Bener
Pages: 653-660

The traditional static spectrum access approach, which assigns a fixed portion of the spectrum to a specific license holder for exclusive use, is unable to manage the spectrum efficiently any longer. In an effort to improve the efficiency of its usage, ...
expand
Building end-to-end management analytics for enterprise data centers
Hai Huang, Yaoping Ruan, Anees Shaikh, Ramani Routray, Chung-hao Tan, Sandeep Gopisetty
Pages: 661-675

The complexity of modern data centers has evolved significantly in recent years. One typically is comprised of a large number and types of middleware and applications that are hosted in a heterogeneous pool of both physical and virtual servers, connected ...
expand
SURFmap: a network monitoring tool based on the maps API
Rick Hofstede, Tiago Fioreze
Pages: 676-690

Network monitoring allows network managers to get a better insight in the network traffic transiting in a managed network. In order to make the tasks of a network manager easier, many network monitoring tools are made available for a wide range of purposes ...
expand
Auto-connectivity and security setup for access network elements
Henning Sanneck, Christoph Schmelz, Eddy Troch, Luc De Bie
Pages: 691-705

In access networks, the roll-out of new network elements (NE) or changes to the NE HW and SW cause considerable overhead. The total number of NE is significant and is increasing for new radio access technologies like Long Term Evolution (LTE) due to ...
expand
Introducing process-oriented IT service management at an academic computing center: an interim report
Michael Brenner, Heiz-Gerd Hegerin, Helmut Reiser, Christian Richter, Thomas Schaaf
Pages: 706-720

The Leibniz Supercomputing Centre (Leibniz-Rechenzentrum, LRZ) is a service provider for a variety of academic institutions, mainly in the Munich (Germany) area. The services provided range from network services, server hosting, application services ...
expand
Multi-tenant solution for IT service management: a quantitative study of benefits
Larisa Shwartz, Yixin Diao, Genady Ya. Grabarnik
Pages: 721-731

The very competitive business climate dictates efficient and cost effective delivery and support of IT services. Compounded by complexity of IT environments and criticality of IT to business success, IT service providers seek multitenant solutions to ...
expand
Best practices for deploying a CMDB in large-scale environments
Alexander Keller, Suraj Subramanian
Pages: 732-745

We describe best practices for deploying a Configuration Management Database (CMDB) that we have developed during several recent client engagements. Given the complexity and novelty of CMDB solutions that deal with discovering, storing and tracking actual ...
expand
Modeling remote desktop systems in utility environment with application to QoS management
Vanish Talwar, Klara Nahrstedt, Dejan Milojicic
Pages: 746-760

A remote desktop utility system is an emerging client/server networked model for enterprise desktops. In this model, a shared pool of consolidated compute and storage servers host users' desktop applications and data respectively. End-users are allocated ...
expand
A model based approach to autonomic management of virtual networks
Steven Davy, Claire Fahy, Zohra Boudjemil, Leigh Griffin, John Strassner
Pages: 761-774

Enabling the automated deployment and maintenance of current and future services over the Internet is a difficult task and requires self-aware functions that can adapt the services offered by the network to changing customer demand, business goals, and/or ...
expand
Web-based administration of grid credentials for identity and authority delegation
Songjie Wei, Subrata Mazumdar
Pages: 775-789

Grid computing, as a technology to coordinate loosely-coupled computing resources for dynamic virtual organizations, has become prevalent in both industry and academia in the past decade. While providing or utilizing heterogeneous and distributed grids, ...
expand
Adaptive real-time monitoring for large-scale networked systems
Alberto Gonzalez Prieto, Rolf Stadler
Pages: 790-795

The focus of this thesis is continuous real-time monitoring, which is essential for the realization of adaptive management systems in large-scale dynamic environments. Real-time monitoring provides the necessary input to the decision-making process of ...
expand
Policy-based self-management of wireless ad hoc networks
Antonis M. Hadjiantonis, George Pavlou
Pages: 796-802

The motivation of the presented thesis emanated from the need for unrestricted wireless communication in a scalable and predictable manner. This need is accentuated by the increasing users' demand for spontaneous communication. The objective is to propose ...
expand
STACO: an accounting configuration architecture for multi-service mobile networks
Peter Racz, Burkhard Stiller
Pages: 803-808

Accounting is a key task in commercial networks. With the increasing number of IP-based services and mobility support, accounting needs to evolve towards an integrated, service-oriented accounting approach in a mobile environment. Therefore, this dissertation ...
expand
Adaptive response system for distributed denial-of-service attacks
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dulay
Pages: 809-814

This dissertation presents a Distributed denial-of-service Adaptive ResponsE (DARE) system, capable of executing appropriate detection and mitigation responses automatically and adaptively according to the attacks. It supports easy integration of distributed ...
expand
Performance of network and service monitoring frameworks
Abdelkader Lahmadi, Laurent Andrey, Olivier Festor
Pages: 815-820

The efficiency and the performance of management systems is becoming a hot research topic within the networks and services management community. This concern is due to the new challenges of large scale managed systems, where the management plane is integrated ...
expand
On harnessing information models and ontologies for policy conflict analysis
Steven Davy, Brendan Jennings, John Strassner
Pages: 821-826

We present a policy conflict analysis process that makes use of pre-defined semantic models of an application to perform effective and efficient conflict analysis. The process is effective as it can be used to analyse for policy conflicts that may occur ...
expand
An approach to measurement based quality of service control for communications networks
Alan Davy, Dmitri Botvich, Brendan Jennings
Pages: 827-832

This paper presents a purely empirical approach to estimating the effective bandwidth of aggregated traffic flows independent of traffic model assumptions. The approach is shown to be robust when used in a variety of traffic scenarios such as both elastic ...
expand

Powered by The ACM Guide to Computing Literature


The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2016 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us

Useful downloads: Adobe Reader    QuickTime    Windows Media Player    Real Player
Did you know the ACM DL App is now available?
Did you know your Organization can subscribe to the ACM Digital Library?
The ACM Guide to Computing Literature
All Tags
Export Formats
 
 
Save to Binder