首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
The research objective of our work is to develop a SNMP MIB to XML translation algorithm and to implement an SNMP‐XML gateway using this algorithm. The gateway is used to transfer management information between an XML‐based manager and SNMP‐based agents. SNMP is widely used for Internet management, but SNMP is insufficient to manage continuously expanding networks because of constraints in scalability and efficiency. XML–based network management architectures are newly proposed as alternatives to SNMP‐based network management, but the XML‐based Network Management System (XML‐based NMS) cannot directly manage legacy SNMP agents. We also implemented an automatic specification translator (SNMP MIB to XML Translator) and an SNMP‐XML gateway. Copyright © 2003 John Wiley &Sons, Ltd.  相似文献   

2.
Precise network topology information is required to perform management activities such as fault detection, root cause analysis, performance monitoring, and load balancing in enterprise networks. To accomplish these management tasks, both network discovery and connectivity information are essential. This paper examines various problems with the existing topology discovery mechanisms and proposes an SNMP‐based approach to discover physical as well as logical topology. We present algorithms for identifying network device types and discovering connectivity among them. The connectivity of end host and management information base (MIB)‐enabled devices with switches and routers is discussed and evaluated. We also present an algorithm for discovering logical topology, such as VLAN and subnet connectivity. Finally, we present a combination of graph and tree layouts, to visualize connectivity information. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

3.
OAM MIB: an end-to-end performance management solution for ATM   总被引:1,自引:0,他引:1  
Current network management needs an end-to-end overview of various connections rather than the information that is purely local to the individual devices. The typical manager-centric polling approach, however, is not adequate to understand network-wide behavior of a large-scale broadband network. We propose a new management information base (MIB) approach, called operation, administration, and maintenance (OAM) MIB. The MIB provides a network manager with dynamic end-to-end management information by utilizing special standard ATM cells. The MIB makes end-to-end management feasible while it reduces management-related traffic and manager-to-manager interactions. In our model, a customer network management system accesses the MIB through M1/M2 reference points of the ATM Forum management architecture with simple network management protocol (SNMP)  相似文献   

4.
Monitoring speech quality in Voice over IP (VoIP) networks is important to ensure a minimal acceptable level of speech quality for IP calls running through a managed network. Information such as packet loss, codec type, jitter, end‐to‐end delay and overall speech quality enables the network manager to verify and accurately tune parameters in order to adjust network problems. The present article proposes the deployment of a monitoring architecture that collects, stores and displays speech quality information about concluded voice calls. This architecture is based on our proposed MIB (Management Information Base) VOIPQOS, deployed for speech quality monitoring purposes. Currently, the architecture is totally implemented, but under adjustment and validation tests. In the future, the VOIPQOS MIB can be expanded to automatically analyze collected data and control VoIP clients and network parameters for tuning the overall speech quality of ongoing calls. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   

5.
In this paper, we propose a new network management protocol to address the unique challenges of managing cognitive radio ad hoc networks that have distributed, multihop architectures with dynamic spectrum availability. We focus on performance management for these networks, and address the problem of network congestion for secondary users, because of its significant impact on data throughput. Specifically, we define a performance metric, the average congestion level of the network, and derive it analytically as a function of the primary users’ activities and the secondary users’ strategy. For practical implementation, we further propose a cluster‐based management architecture that utilizes a designated central manager and cluster heads that function as distributed managers. The cluster heads collect information from multiple layers of the protocol stack using new MIB (management information base) variables to capture the characteristics of cognitive radio ad hoc networks, such as the location‐dependent spectrum availability. The objective of the management action is to utilize a network‐level view of the congestion situation in the network by directing the secondary users to select the highest‐quality links available and avoid congested clusters. This hierarchical networkmanagement design allows us to take advantage of its scalability to achieve near‐real‐time management. Numerical results demonstrate the effectiveness of the proposed scheme. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   

6.
One of the main challenges in delivering end‐to‐end service chains across multiple software‐defined networking (SDN) and network function virtualization (NFV) domains is to achieve unified management and orchestration functions. A very critical aspect is the definition of an open, vendor‐agnostic, and interoperable northbound interface (NBI) that should be as abstract as possible and decoupled from domain‐specific data and control plane technologies. In this paper, we propose a reference architecture and an intent‐based NBI for end‐to‐end service management across multiple technological domains. The general approach is tested in a heterogeneous OpenFlow/Internet‐of‐Things (IoT) SDN test bed, where the proposed solution is applied to a rather complex service provisioning scenario spanning three different technological domains: an IoT infrastructure deployment, a cloud‐based data collection, processing, and publishing platform, and a transport domain over a geographic network interconnecting the IoT domain and the data center hosting the cloud services.  相似文献   

7.
Due to increasing bandwidth capacities, the Internet has become a viable transport medium for a (live) video. Often, delivery of video streams relies on the client–server paradigm and therefore exhibits limited scalability. The Peer‐to‐Peer (P2P) network model is an attractive and scalable candidate to stream video content to end users. However, these P2P frameworks typically operate in a network agnostic mode. Introducing network topology information into these P2P frameworks offers opportunities to enhance the performance. In this paper, we introduce a model to include network information when streaming a (multilayered) video in P2P frameworks. An important metric for video stream providers is the content quality perceived by end users. The optimization studied here aims at maximizing the number of users receiving a high quality video. The paper addresses the optimization problem seen from the stream provider's viewpoint, having access to network topology information. An exact optimization approach is presented for benchmarking purposes and a heuristic approach to cope with realistic network sizes. In addition, we present an approach to decide the deployment location of peering functionality. The results show that our strategy significantly decreases the fraction of destinations receiving only the base layer, and by introducing extra peering functionality, network capacities are used more efficiently. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

8.
The new Internet will be deployed with a number of tools for network management and quality of service control. To this end, we focus on a single administrative domain based on the Differentiated Services architectural model, and we recognize the need for two main functions for each supported traffic class: an admission control procedure, and a monitoring of the edge‐to‐edge bandwidth availability. In this work, we specifically focus on the second issue. To preserve scalability and thus to be compliant with Differentiated Services architecture, we propose stateless and distributed procedures based on traffic measurements. Our technique tests network resources by means of ‘special’ probing packets, which have the task of implicitly conveying the network status to its edges. We show by means of simulations the effectiveness of our solutions, in spite of a very low overhead. Copyright © 2007 John Wiley & Sons, Ltd.  相似文献   

9.
In the modern era of software‐defined networking (SDN), network monitoring is becoming more important for providing information about a network and helping SDN controllers to make decisions about the network. In‐band Network Telemetry (INT) is a new network monitoring framework that collects packet‐level network information to provide real‐time and fine‐grained network monitoring. In this paper, we present the design of the overall INT management architecture and its two main components: the INT management system and INTCollector. The INT management system controls heterogeneous INT‐capable devices through a common interface. INTCollector is a high‐performance collector for INT data, which uses eXpress Data Path and an event detection mechanism. The evaluation result shows that INTCollector processes telemetry reports 27 times faster than other packet‐level telemetry collectors. We made the implementation as open source, to make researchers who are interested in INT implement their own ideas on top of our work.  相似文献   

10.
The proliferation of the Internet and related applications has led to an increasing need for a more efficient and scalable network management framework. As the size of networks increases, more challenges are presented to network managers. One of these challenges is how to distribute the management tasks to achieve efficiency and scalability. In this paper, we present a framework using JPVM to distribute the management work among multiple gateways. We compare the performance of this approach and that of the single gateway approach. Both approaches are DOM‐based. Our findings show that the parallel approach can considerably reduce the response time for requesting the management information from multiple devices. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   

11.
This article is aimed at defining items of analysis using SNMP MIB‐II for the purpose of analyzing the performance of Internet‐based networks running on TCP/IP protocol, and then utilizing these items, in conjunction with various Web technology and JAVA, to design and implement a Web‐based interface of a management system to analyze the performance of the Internet. Copyright © 1999 John Wiley & Sons, Ltd.  相似文献   

12.
建设一套对1550nm数字专网和模拟混网的性能、运行状态进行监测和控制的网络管理系统。系统由前端系统设备管理器、分前端外置式代理服务器、光纤收发器等组成,运用IP/SNMP网络管理技术,建立起由管理者、代理和管理信息库(MIB)3部分组成的SNMP管理体系结构。  相似文献   

13.
A traffic matrix can exhibit the volume of network traffic from origin nodes to destination nodes. It is a critical input parameter to network management and traffic engineering, and thus it is necessary to obtain accurate traffic matrix estimates. Network tomography method is widely used to reconstruct end‐to‐end network traffic from link loads and routing matrix in a large‐scale Internet protocol backbone networks. However, it is a significant challenge because solving network tomography model is an ill‐posed and under‐constrained inverse problem. Compressive sensing reconstruction algorithms have been well known as efficient and precise approaches to deal with the under‐constrained inference problem. Hence, in this paper, we propose a compressive sensing‐based network traffic reconstruction algorithm. Taking into account the constraints in compressive sensing theory, we propose an approach for constructing a novel network tomography model that obeys the constraints of compressive sensing. In the proposed network tomography model, a framework of measurement matrix according to routing matrix is proposed. To obtain optimal traffic matrix estimates, we propose an iteration algorithm to solve the proposed model. Numerical results demonstrate that our method is able to pursuit the trace of each origin–destination flow faithfully. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

14.
Technology has revolutionized medical practices by enabling more convenient and non‐intrusive monitoring of patient's health, leading to next generation ubiquitous healthcare (u‐healthcare). The exploitation of the Internet protocol version 6 addressing space along with the miniaturization of electronic devices has fostered providing interoperability and connectivity of wearable sensor devices in wireless body area networks to the Internet of Things. In this paper, we propose to integrate the IPv6 over low power wireless personal area network (6LoWPAN) to the u‐healthcare monitoring system architecture. The main objective is to study the feasibility of the 6LoWPAN‐enabled platform in real‐world scenarios dealing with medical data. The performance evaluation of this platform is carried out initially through simulations using OMNet++ and then supported by an experimental study using sensor motes and a customized micro‐computing unit. Performance metrics such as throughput, end‐to‐end delay, packet error rate, and energy consumption are investigated under acute health conditions, where patient's health information has to be sent continuously and at maximum rate to the care provider. The obtained results show that the proposed 6LoWPAN solution fulfills the main quality of service requirements of u‐healthcare applications. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

15.
Today the policy‐based management (PBM) approach is recognized as an efficient solution to simplify the complex task of managing and controlling networks. To this end, the Internet Engineering Task Force (IETF) has introduced a reference framework to build PBM systems. However, this framework only addresses the provisioning of relatively long validity period services based on predefined service‐level agreements. Furthermore, very little work addresses the scalability properties of the instantiation of this framework in a real network. This work aims to extend the IETF PBM framework in order to support dynamic provisioning of short‐term services (end‐system signalling) as well as an instantiation scheme that is scalable (distributed provisioning of edge routers). This instantiation scheme is based on the distribution of the provisioning process while keeping centralized only the parts that involve critical resources, namely bandwidth brokerage. The performance properties of the proposed scheme are then demonstrated throughout both extensive experimentation and an analytical study. The extension of this performance analysis to the case where multiple bandwidth brokers are used is also discussed. The results of this work are intended to be used as a guideline to help network operators to design a scalable PBM system in order to offer to their customers services with quality of service assurance on an on‐demand basis. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   

16.
The amount of wireless traffic is increasing at an overwhelming speed. Information‐centric networking (ICN) has been proposed as a promising Future Internet Architecture, which can reduce network traffic by putting data objects toward the edge. It is expected that in information‐centric mobile Internet (ICMI), the wireless traffic can be significantly reduced. Yet, DoS/DDoS attack becomes a critical issue in ICMI by causing wireless gateway blockade. To tackle the problem, we propose a dual‐collaborative DoS/DDoS mitigation approach (DCMA) and advanced DCMA to protect wireless gateways. In the algorithm, the attackers' visiting information including international mobile equipment identity (IMEI) and data object name (DON) are analyzed jointly to accurately identify potential attackers through the collaboration between the Internet and mobile network. In addition, the attacker's behaviors are analyzed centrally, and security strategies are applied distributively throughout wireless edge through the collaboration between wireless core network (CN) and radio access network (RAN). Extensive simulations are performed to verify the effectiveness of the proposed algorithms. The results demonstrate that advanced DCMA can achieve high DDoS and attacker detection probability and small false positive probability.  相似文献   

17.
Internet of things (IoT) has evolved as an innovation of next generation in this world of smart devices. IoT tends to provide services for data collection, data management, and data and device security required for application development. Things or devices in IoT communicate and compute to make our lives comfortable and safe. In inventory automation, real‐time check on items, their information management, and status management, monitoring can be carried out using IoT. The huge amount of data that flows among the devices in the network demands for a security framework that ensures authentication, authorization, integrity, and confidentiality of data. The existing security solutions like SIMON or SPECK offer lightweight security solutions but are vulnerable to differential attack because of their simplicity. Moreover, existing solutions do not offer inbuilt authentication. Therefore, this research work contributes a secure and lightweight IoT‐based framework using wireless sensor network (WSN) as a technology. The existing security solutions SPECK and SIMON are compared with the proposed security approach using COOJA simulator. The results show that proposed approach outstands others by 2% reduction in number of CPU cycles, 10% less execution time, 4% less memory requirements of security approach, and with minimum 10% more security impact.  相似文献   

18.
In this paper we study delay patterns of weighted voice traffic of end‐to‐end users on the Voice over Internet Protocol (VoIP) network. We compare the delay performance of voice traffic which varies with queue management techniques such as First‐In First‐Out (FIFO) and Weighted Fair Queuing (WFQ) and voice codec algorithms such as G.723 and G.729 and select an optimal algorithm. Copyright © 2002 John Wiley & Sons, Ltd.  相似文献   

19.
O'Mahony  D. 《IEEE network》1994,8(3):12-17
Considers the security aspects of communication between two management processes operating in different management domains; identifies two major risks: the security of information exchanged during the management association, and control of access to the management information base (MIB); and enumerates the various threats that must be guarded against and possible methods of attack. Security techniques, including symmetric and public key cryptosystems, are employed in the design of a method of achieving a secure management association. A scheme of authorization control for MIB access is developed. The management of an open system's network resources takes place in the context of a management association. The resources themselves are controlled by an agent process which presents a view of these resources to the outside world as a number of managed objects, each of which contains a number of attributes. The collection of objects presented to the outside world by the agent is known as the MIB. A manager process regulates the operation of the managed resources by engaging in a management association with the agent and instructing it to carry out simple operations on elements of the MIB. Within a single management domain where all processing nodes and network links are under the control of the same administration, security is not such a critical issue. However, when the management association takes place across the boundary between two separate management domains, and make use of public data networks, security issues must be considered in greater detail  相似文献   

20.
Power line communication (PLC) is an evolving technology which uses existing power lines for data transmission. Like any other communication network, PLC networks need to be managed to ensure efficient use of resources and secure operations. Currently, major PLC chip vendors are trying to provide network management solutions based on the Simple Network Management Protocol (SNMP) by developing their own management systems, but they cannot manage heterogeneous PLC networks comprised of PLC devices from various PLC chip vendors. In this paper, we provide our experience of developing and testing an integrated management system for a heterogeneous PLC network based on SNMP. We present our approach for integrated management by defining the common PLC management information base (MIB) and an integrated PLC proxy agent for providing interoperability to legacy PLC devices which do not support the common PLC MIB. We also present the development of an integrated PLC network management system and its test in heterogeneous PLC networks deployed in South Korea. The contribution of our work is to provide a guideline for developing and testing integrated NMSs for any heterogeneous networks including PLC networks. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号