共查询到20条相似文献,搜索用时 15 毫秒
1.
We propose a framework for service level negotiation within s elf-management systems. The negotiation process occurs between high-level autonomic managers to guarantee an end-to-end service level for specific application traffic flows. In the proposed framework, we provide autonomic systems with a new interaction opportunity thanks to the negotiation with their peers. To be in conformance with the concepts of self-aware management systems, the proposed negotiation protocol called SLNP is used in a Web Services environment. 相似文献
2.
Thi Mai Trang Nguyen Boukhatem N. Doudane Y.G. Pujolle G. 《Communications Magazine, IEEE》2002,40(5):158-165
The deployment of QoS over the Internet may achieve protocols for the negotiation of service levels, as well as mechanisms for the end-to-end realization of service level agreements. Such general-purpose protocols include Common Open Policy Service (COPS) for policy specification within a domain. This article proposes an extension of the COPS protocol for intra- and interdomain service level negotiation. The proposed protocol is known as COPS-SLS. This allows the configuration of domain policies regarding service levels, and the automatic negotiation of service levels within the domain policies 相似文献
3.
J. Kannisto T. Takahashi J. Harju S. Heikkinen M. Helenius S. Matsuo B. Silverajan 《International Journal of Communication Systems》2015,28(15):2067-2081
Security service level agreements (SSLAs) provide a systematic way for end users at home or in the office to guarantee sufficient security level when doing business or exchanging sensitive personal or organizational data with an online service. In this paper, we propose an SSLA negotiation protocol that implements non‐repudiation with cryptographic identities and digital signatures and includes features that make it resistant to denial of service attacks. The basic version of the protocol does not rely on the use of a trusted third party, and it can be used for all kinds of simple negotiations. For the negotiation about SSLAs, the protocol provides an option to use an external knowledge base that may help the user in the selection of suitable security measures. We have implemented a prototype of the system, which uses JSON Web Signature for the message exchange and made some performance tests with it. The results show that the computational effort required by the cryptographic operations of the negotiation protocol remains at a reasonable level. Copyright © 2014 John Wiley & Sons, Ltd. 相似文献
4.
An efficient communication protocol of group negotiation was proposed.The protocol adopted self-checking authentication in group to avoid the nodes sending certificates to the authentication center which improved the efficiency of identification.At the same time,the group establishment among nodes which through negotiation ensured the communication confidentiality and prevented the phenomenon of single-point failure.Besides,a group key transmission scheme was proposed to reduce the frequency of authentication for legal vehicles and improve the speed of joining in the group.At the end,theoretical analysis and simulation results demonstrate that the proposed protocol not only meets the security requirements of communication in VANET,but also shows much better performance than previous reported schemes on verification delay,transmission overhead and average delay. 相似文献
5.
6.
Michel Du-Pondd Olivier Audouin Bela Berde Belkacem Daheb Wissam Fawaz Guy Pujolle Martin Vigoureux 《电信纪事》2005,60(9-10):1268-1280
This article proposes a Service Level Agreement applied to the optical domain (O-sla), which is expected to be the near and long term network technology thanks, among other things, to the great bandwidth capacity offered by optical devices. After an exposition of the rationale behind an optical sla, parameters which could enter in thisO-sla, as well as their values for four classes of services, are proposed. Different client (wavelength or sub-wavelength) and services types (from leased wavelength to bandwidth on demand) are distinguished when necessary. 相似文献
7.
In this paper, we analyze the effect of the frame aggregation level on the PCF (Point Coordination Function) MAC performance in IEEE 802.11 wireless LANs and analytically derive the optimal frame aggregation level for maximizing the PCF MAC performance. For various values of unit data frame size and transmission error probability, we propose the optimal frame aggregation levels. By computer simulations, we show that the derived optimal frame aggregation level significantly enhances the PCF MAC performance in IEEE 802.11 wireless LANs. 相似文献
8.
Service level agreements on IP networks 总被引:4,自引:0,他引:4
Verma D.C. 《Proceedings of the IEEE. Institute of Electrical and Electronics Engineers》2004,92(9):1382-1388
This paper provides an overview of service level agreements (SLAs) in IP networks. It looks at the typical components of an SLA and identifies three common approaches that are used to satisfy SLAs in IP networks. The implications of using the approaches in the context of a network service provider, a hosting service provider, and an enterprise are examined. While most providers currently offer a static insurance approach toward supporting SLAs, the schemes that can lead to more dynamic approaches are identified. 相似文献
9.
10.
Service level agreement and provisioning in optical networks 总被引:15,自引:0,他引:15
This article proposes a service level agreement applied to the optical domain (O-SLA), which is expected to be the near- and long-term network technology of the great bandwidth capacity offered by optical devices. After an exposition of the rationale behind an optical SLA, parameters that could be included in this O-SLA, as well as their values for four classes of services are proposed. Different client (wavelength or subwavelength) and service types (from leased wavelength to bandwidth on demand) are distinguished when necessary. The last part of this article presents issues related to the provisioning of services emanating from this O-SLA. 相似文献
11.
12.
An alternative protocol for measuring multiple power levels of GSM/GPRS mobiles is proposed. The protocol makes use of the slow associated common control channel to signal the mobile to change the transmission power in consecutive steps with the issue of a single command. Such an arrangement can reduce the overall overhead time required compared with the conventional method in mobile testing equipment, which makes use of the fast associated common control channel to issue consecutive commands to demand the mobile to change its transmission power level. By reducing the testing time, the production throughput of the mobiles can be improved. The theoretical minimum testing times required based on these two protocols are computed. Finally, the new protocol is implemented in the testing equipment and the actual testing times based on these two protocols are compared. 相似文献
13.
Wireless Networks - One big contributor in the future of the Internet of Things is the Periodic Sensor Networks (PSNs) because it has been used by many applications in real life. The main challenge... 相似文献
14.
MLAP: a MAC level access protocol for the HFC 802.14 network 总被引:3,自引:0,他引:3
Interactive residential broadband/multimedia services are expected to be the next main event in the cyberspace experience. The large excess bandwidth (well over 300 MHz) available in today's cable TV (CATV) hybrid fiber/coaxial (HFC) plants is an ideal candidate to provide the underlying communications infrastructure for interactive digital services to the home; cable operators that have not yet upgraded their all-coaxial plants to HFC are quickly moving in this direction. MLAP is a flexible ATM-friendly MAC protocol that is capable of supporting various types of traffic with diverse quality-of-service requirements. We introduce a very versatile MAC protocol for the HFC 802.14 network. MLAP can provide integrated broadband services to the home, internetwork easily with ATM wide area networks, support QoS constraints for various types of traffic, and operate over a variety of physical layer protocols. Our presentation is only an extended summary of our medium-sharing protocol proposal to the IEEE 802.14 WG. We consider only error-free system operation. MLAP provides for the use of timers for the recovery of error situations in the network. MLAP is also supported by a management suite of protocols for management of the overall system 相似文献
15.
Mai-Huong Nguyen Schwartz M. 《Selected Areas in Communications, IEEE Journal on》1996,14(7):1404-1421
The multiparty conference management protocol (MCMP) is an end-to-end distributed session/transport level protocol intended for group management of desktop conferencing applications. This paper describes the MCMP conference setup algorithms and proves that they meet specified correctness properties. MCMP sets up control channels for use in exchanging control information while the conference is in progress. The logical topology used is a completely interconnected mesh, MCMP always provides best effort services in cases of failures. Correctness properties guaranteed upon termination of the protocol include connectivity, validity, uniqueness, and consistency of local views. Application control information that can be exchanged using the control channels include resource negotiation and subconferencing 相似文献
16.
17.
James Aweya Michel Ouellette Delfin Y. Montuno 《International Journal of Network Management》2002,12(2):81-98
This paper describes a multi‐level active queue management scheme that combines packet classification and random early detection (RED) capabilities to provide differentiated performance characteristics for different classes of service. The proposed RED scheme uses a simple control‐theoretic algorithm to randomly discard packets with a load‐dependent probability when a buffer in a router gets congested. Copyright © 2002 John Wiley & Sons, Ltd. 相似文献
18.
19.
Agent behaviors in virtual negotiation environments 总被引:1,自引:0,他引:1
Krovi R. Graesser A.C. Pracht W.E. 《IEEE transactions on systems, man and cybernetics. Part C, Applications and reviews》1999,29(1):15-25
A computational prototype of negotiation behavior is presented where the following occurs: (1) agents employ different concession matching tactics; (2) agents are unaware of opponent preferences; (3) agents incur a cost for delaying settlements; (4) agents vary in terms of goal difficulty and initial offer magnitude; and (5) demands and counter-offers are made and evaluated based on the opponent's degree of concession matching. This research explores the impact of the interaction of different agent behaviors on the negotiation process and the outcome of the negotiation. Simulation experiments show that the prototype is able to manifest fundamental patterns and confirms the effectiveness of classical negotiation and mediation strategies, such as ambitious goals and aggressive concession matching tactics. The model reveals some counterintuitive patterns that may shed a new perspective on the effects of time constraints and information availability 相似文献
20.
SA Deetz 《The Journal of communication》1997,47(4):118-134