2012 IEEE Network Operations and Management Symposium

Size: px
Start display at page:

Download "2012 IEEE Network Operations and Management Symposium"

Transcription

1 2012 IEEE Network Operations and Management Symposium (NOMS 2012) Maui, Hawaii, USA April 2012 Pages IEEE Catalog Number: ISBN: CFP12NOM-PRT /2

2 TABLE OF CONTENTS TS1 CLOUD RESOURCE ALLOCATION Cost-Effective Complex Service Mapping In Cloud Infrastructures... 1 K. Tran, N. Agoulmine, Y. Iraqi CloudMap: Workload-aware Placement in Private Heterogeneous Clouds... 9 B. Viswanathan, A. Verma, S. Dutta Feature Placement Algorithms for High-Variability Applications in Cloud Environments H. Moens, E. Truyen, S. Walraven, W. Joosen, B. Dhoedt, F. Turck Adapting Data-Intensive Workloads to Generic Allocation Policies in Cloud Infrastructures I. Kitsos, A. Papaioannou, N. Tsikoudis, K. Magoutis TS2 AUTONOMIC AND SELF-MANAGEMENT Optimizing System Monitoring Configurations for Non-Actionable Alerts L. Tang, T. Li, F. Pinel, L. Shwartz, G. Grabarnik Using a Semantic Knowledge Base for Communication Service Quality Management in Home Area Networks L. Fallon, D. O'Sullivan Interactive Learning of Alert Signatures in High Performance Cluster System Logs A. Makanju, A. Zincir-Heywood, E. Milios Closed Loop Performance Management for Service Delivery Systems Y. Diao, A. Heching TS3 DATA CENTER MANAGEMENT HERCULES: Integrated Control Framework for Datacenter Traffic Management W. Kim, P. Sharma Ranking Anomalies in Data Centers K. Viswanathan, L. Choudur, V. Talwar, C. Wang, G. Macdonald, W. Satterfield CrossRoads: Seamless VM Mobility Across Data Centers through Software Defined Networking V. Mann, A. Vishnoi, K. Kannan, S. Kalyanaraman TS4 SENSOR NETWORK MANAGEMENT Fault Tolerance in Spatial Query Processing for Wireless Sensor Networks R. Silva, D. Macedo, J. Nogueira A Secure Routing Protocol for Wireless Sensor Networks with Consideration of Energy Efficiency H. Ferng, D. Rachmarini An Efficient Data Acquisition Model for Urban Sensor Networks S. Furlaneto, A. Santos, C. Hara TS5 FUTURE INTERNET I Autonomic Cache Management in Information-Centric Networks V. Sourlas, P. Flegkas, L. Gkatzikis, L. Tassiulas FedRR A Federated Resource Reservation Algorithm for Multimedia Services J. Famaey, S. Latre, T. Wauters, F. Turck An Inter-AS Routing Component for Software-Defined Networks R. Bennesby, P. Fonseca, E. Mota, A. Passito Management by Network Search M. Uddin, R. Stadler, A. Clemm

3 TS6 PERFORMANCE MANAGEMENT Deterministic Finite Automaton for Scalable Traffic Identification: The Power of Compressing by Range R. Antonello, S. Fernandes, D. Sadok, J. Kelner, G. Szabo Model-based Real-time Volume Control for Interactive Network Traffic Replay W. Chu, X. Guan, L. Gao, Z. Cai Cost-Aware Replication for Dataflows C. Castillo, A. Tantawi, D. Arroyo, M. Steinder Leveraging Local Image Redundancy for Efficient Virtual Machine Provisioning A. Kochut, A. Karve TS7 CLOUD MANAGEMENT CloudVS: Enabling Version Control for Virtual Machines in an Open-Source Cloud under Commodity Settings C. Tang, Y. Wong, P. Lee Virtual Machine Migration in an Over-committed Cloud X. Zhang, Z. Shae, S. Zheng, H. Jamjoom An Adaptive Hybrid Elasticity Controller for Cloud Infrastructures A. Ali-Eldin, J. Tordsson, E. Elmroth CloudAffinity: A Framework For Matching Servers to Cloudmates M.Assuncao, M. Netto, B. Peterson, L. Renganarayana, J. Rofarano, C. Ward, C. Young TS8 FUTURE INTERNET II Optimization for Time-driven Link Sleeping Reconfigurations in ISP Backbone Networks F. Francois, N. Wang, K. Moessner, S. Georgoulas An Optimized Seamless IP Flow Mobility Management Architecture for Traffic Offloading J. Kim, Y. Morioka, J. Hagiwara Monitoring the Status of MPLS VPN and VPLS Based on BGP Signaling Information G. Battista, M. Rimondini, G. Sadolfo Optimization of Flow Record Handling by Applying a Decentralized Cooperative Semantic Caching Approach A. Vancea, L. d'orazio, B. Stiller TS9 SECURITY MANAGEMENT I On Network Intrusion Detection for Deployment in the Wild S. Kim, N. Nwanze, W. Edmonds, B. Johnson, P. Field Dynamic Exposure Control in P2PSIP Networks O. Dabbebi, R. Badonnel, O. Festor The Effects of DDoS Attacks on Flow Monitoring Applications R. Sadre, A. Sperotto, A. Pras TS10 WIRELESS NETWORK MANAGEMENT A Bio-inspired Scheme on Quorum Systems for Reliable Services Data Management in MANETs E. Mannes, M. Nogueira, A. Santos An Optimal Channel Assignment Strategy for WLANs using Distributed Optimization T. Monteiro, G. Pujolle, M. Pellenz, M. Penna, F. Enembreck, R. Souza MeshAdmin: an Integrated Platform for Wireless Mesh Network Management R. Valle, D. Muchaluat-Saade

4 TS11 MULTIMEDIA SERVICE MANAGEMENT AND CONTENT DISTRIBUTION Shared Content Addressing Protocol (SCAP): Optimizing Multimedia Content Distribution At The Transport Layer K. Schepper, B. Vleeschauwer, C. Hawinkel, W. Leekwijck, J. Famaey, W. Meerssche, F. Turck Analyzing Caching Benefits for YouTube Traffic in Edge Networks - A Measurement-Based Evaluation L. Braun, A. Klein, G. Carle, H. Reiser, J. Eisl Revenue-Maximizing Server Selection and Admission Control for IPTV Content Servers using Available Bandwidth Estimates B. Meskill, A. Davy, B. Jennings Characterizing Dissemination of Illegal Copies of Content through Monitoring of BitTorrent Networks A. Schmidt, R. Antunes, M. Barcellos, L. Gaspary TS12 SECURITY MANAGEMENT II Towards the Assessment of Distributed Vulnerabilities in Autonomic Networks and Systems M. Barrere, R. Badonnel, O. Festor Internet Bad Neighborhoods Aggregation G. Moura, R. Sadre, A. Sperotto, A. Pras An Evasive Attack on SNORT Flowbits T. Tran, I. Aib, E. Al-Shaer, R. Boutaba PCA-subspace Method Is it Good Enough for Network-wide Anomaly Detection B. Zhang, J. Yang, J. Wu, D. Qin, L. Gao TS13 IT MANAGEMENT Efficient Verification of IT Change Operations or: How We Could Have Prevented Amazon s Cloud Outage S. Hagen, M. Seibold, A. Kemper Modeling IT Support Organizations Using Multiple-Priority Queues C. Bartolini, C. Stefanelli, M. Tortonesi A BPM-Based Solution for Inter-domain Circuit Management J. Santanna, J. Wickboldt, L. Granville Maximizing Profit Using SLA-Aware Provisioning A. Das TS14 FAULT AND CONFIGURATION MANAGEMENT A Framework for the Design and Evaluation of Network Resilience Management A. Schaeffer-Filho, P. Smith, A. Mauthe, D. Hutchinson, Y. Yu, M. Fry A Highly Available Transaction Processing System with Non-Disruptive Failure Handling G. Su, A. Iyengar DACoRM: A Coordinated, Decentralized and Adaptive Network Resource Management Scheme D. Tuncer, M. Charalambides, G. Pavlou, N. Wang End-to-end Verification of QoS Policies A. El-Atawy, T. Samak TS15 ENERGY MANAGEMENT Distributed Multi-Agent Algorithm for Residential Energy Management in Smart Grids K. Mets, M. Strobbe, T. Verschueren, T. Roelens, F. Turck, C. Develder Energy Consumption Analysis of Video Streaming to Android Mobile Devices R. Trestian, A. Moldovan, O. Ormond, G. Muntean Towards Energy-Awareness in Managing Wireless LAN Applications M. Tauber, S. Bhatti, Y. Yu

5 PS1 POSTER SESSION 1 Adaptive Multiuser Detection in DS/CDMA Systems using Generalized Regression Neural Network M. Rajabpour, F. Razzazi, H. Bakhshi Firewall Anomaly Detection With A Model Checker for Visibility Logic B. Khorchani, S. Halle, R. Villemaire Towards Modeling Effect of Packet-level TCP Dynamics on Internet Operations and Management V. Marbukh Designing Standard Service Offerings for Reducing IT Service Management Cost S. Lee, S. Sahu, R. Puri An Energy-Efficient Data Storage Scheme in Wireless Sensor Networks W. Liao, H. Yang Effective Load Balancing in Ethernet Rings K. Lee, J. Ryoo, S. Kim, J. Lee VoIP Shield: A Transparent Protection of Deployed VoIP Systems from SIP-based Exploits R. Farley, X. Wang Converged Network and Device Management for Data Offloading A. Hadjiantonis, G. Ellinas Thoughts on the Internet Architecture from a Modern Enterprise Network Outage B. Ujcich, K. Wang, B. Parker, D. Schmiedt A Distance-Based Method to Detect Anomalous Attributes in Log Files S. Hommes, R. State, T. Engel Intelligent Cloud Capacity Management Y. Jiang, C. Perng, T. Li, R. Chang Aggregation-based Spectrum Allocation Algorithm in Cognitive Radio Networks Y. Li, L. Zhao, C. Wang, A. Daneshmand, Q. Hu SAFEM: Scalable Analysis of Flows with Entropic Measures and SVM J. Francois, C. Wagner, R. State, T. Engel Multi-Observer Privacy-Preserving Hidden Markov Models H. Nguyen, M. Roughan A First Look into SCADA Network Traffic R. Barbosa, R. Sadre, A. Pras Tracking Configuration Changes Proactively in Large IT Environments M. Soni, V. Madduri, M. Gupta, P. De An Object Tracking Scheme for Wireless Sensor Networks Using Data Mining Mechanism W. Liao, K. Chang, S. Kedia xaccess: A Unified User-Centric Access Control Framework for Web Applications K. Singh PS2 POSTER SESSION 2 What s Going On in Chinese IPv6 World L. Gao, J. Yang, H. Zhang, D. Qin, B. Zhang Estimated Zone Configuration for Fixed Mobile Substitution by RF Fingerprint J. Kim, J. Park Network Traffic Anomaly Detection using Machine Learning Approaches K. Limthong, T. Tawsook Spring-Based Geolocation S. Gunther, J. Schlamp, G. Carle A Framework to Leverage Domain Expertise to Support Novice Users in the Visual Exploration of Home Area Networks Y. Song, J. Keeney, O. Conlan An Efficient Data Storage Scheme for Top-k Query in Wireless Sensor Networks W. Liao, C. Huang Universal Economic Analysis Methodology for IT Transformations C. Perng, R. Chang, T. Tao, E. So, M. Choi, H. Shaikh Caching Techniques for Rapid Provisioning of Virtual Servers in Cloud Environment P. De, M. Gupta, M. Soni, A. Thatte SeCoA: Autonomous Semantic Service Composition Algorithm in Symbiotic Networks T. Pauw, B. Volckaert, V. Ongenae, F. Turck

6 Frequency Filtering Approach for Data Aggregation in Periodic Sensor Networks J. Bahi, A. Makhoul, M. Medlej Distributed Service Control Technique for Detecting Security Attacks U. Tupakula, V. Varadharajan Prediction of Failure Occurrence Time Based on System Log Message Pattern Learning M. Sonoda, Y. Watanabe, Y. Matsumoto Extending the NetServ Autonomic Management Capabilities using OpenFlow E. Maccherani, M. Femminella, J. Lee, R. Francescangeli, J. Janak, G. Reali, H. Shulzrinne PS3 POSTER SESSION 3 Content and Host-Centric Information Dissemination in Delay-Tolerant Smartphone MANETs: An Architecture and Demonstration P. Sharma, J. Biddle, A. Daubman, E. Fiore, T. Gallagher, M. Merfeld, S. Paredes, D. Souza, H. Zwahlen, J. Gottschalk, D. Marquis Policy and Mechanism for Carbon-Aware Cloud Applications N. Deng, C. Stewart, D. Gmach, M. Arlitt A QoS Architecture for Provisioning High Quality in Intelligent Transportation Services H. Alshaer, T. Ernst, A. Fortelle A Dynamic Flow Control Mechanism Based on a Hierarchical Feedback Model for Data Center Networks K. Mizutani, O. Akashi, A. Terauchi, T. Kugimoto, M. Maruyama Hybrid Protocol for Group Key Management and Transparent Cluster Interconnection in a Secure Wireless Sensor Network A. Menezes, C. Westphall, C. Westphall, E. Pinto An Experimental Evaluation of Lightweight Virtualization for Software-Defined Routing Platform C. Correa, C. Lucena, D. Marques, C. Rothenberg, M. Salvador TARWIS - A Testbed Management Architecture for Wireless Sensor Network Testbeds P. Hurni, M. Anwander, G. Wagenknecht, T. Staub, T. Braun On Feasibility of P2P Traffic Control through Network Performance Manipulation H. Lee, M. Yoshida, A. Nakao Optimization Of Fault Diagnosis Based On The Combination Of Bayesian Networks And Case-Based Reasoning L. Bennacer, L. Ciavaglia, A. Chibani, Y. Amirat, A. Mellouk NEEM: Network Energy Efficiency Manager P. Sharma, S. Banerjee, D. Demir, S. Natarajan, S. Mandavilli Naïve Bayesian Filters for Log File Analysis: Despam Your Logs R. Havens, B. Lunt, C. Teng Virtual Machine Re-Assignment Considering Migration Overhead T. Setzer, A. Wolke Multi-task Overlapping Coalition Formation Mechanism in Wireless Sensor Network X. Bao, Y. Yang, X. Qiu PS4 POSTER SESSION 4 A Future Internet Architecture Supporting Multipath Communication Networks M. Becke, T. Dreibholz, H. Adhari, E. Rathgeb Proposal and Development of the Web Services Input Validation Model R. Brinhosa, C. Westphall, C. Westphall Comparing Efficiency and Costs of Cloud Computing Models D. Gmach, J. Rolia, L. Cherkasova Impact Analysis of Hierarchical Transitions in Multi-hop Clustered Networks D. Palma, M. Curado Evaluating Compressive Sampling Strategies for Performance Monitoring of Data Centers T. Huang, N. Kandasamy, H. Sethu D-CRAS: Distributed Cloud Resource Allocation System G. Goncalves, M. Santos, G. Charamba, P. Endo, D. Sadok, J. Kelner, B. Melander, J. Mangs Fault Detection in MANETs W. Mamun, H. Lutfiyya, D. Kidston, L. Li

7 SAAM: a Self-Adaptive Aggregation Mechanism for Autonomous Management Systems R. Makhloufi, G. Doyen, G. Bonnet, D. Gaiti REGSOP : A Registry for Service Oriented Programming with Behavior based Discovery A. Kumar, H. Chauhan, D. Janakiram Estimating The Number Of Active Flows From Sampled Packets G. Cheng Advance Bandwidth Scheduling with Minimal Impact on Immediate Reservations in Highperformance Networks Q. Wu, P. Dharam Systemic Risks/Benefits of Selfish Network Operations & Management in Dynamic Environment V. Marbukh Cross-Community Approach for Efficient Information Retrieval in Social Networking Y. Sato, H. Shimokawa, S. Ata, I. Oka AS1 CLOUD AND DATA CENTER MANAGEMENT Patch Management Automation for Enterprise Cloud H. Huang, S. Baset, C. Tang, A. Gupta, M. Sudhan, F. Feroze, R. Garg, S. Ravichandran Network-based Synchronizing Control of a Practical Microgrid C. Cho, J. Jeon, J. Kim, S. Kwon, S. Kim A Novel Mechanism for Rapid Provisioning Virtual Machines of Cloud Services C. Liao, C. Wu, H. Young, K. Chang, H. Huang, C. Hsu, K. Liang Privileged Identity Management in Enterprise Service-Hosting Environments K. Bhaskaran, M. Hernandez, J. Laredo, L. Luan, Y. Ruan, M. Vukovic, P. Driscoll, D. Miller, A. Skinner, G. Verma,P. Vivekanandan, L. Chen, G. Gaskill AS2 IT OPERATIONS AND SERVICE ASSURANCE Integrated User Activity Monitoring for Regulatory Services M. Marder, K. Bhaskaran, M. Hernandez, J. Laredo, D. Rosu, Y. Ruan, P. Driscoll, A. Skinner IDEAL-TRAFFIC: A Self-adaptive Management Framework for Building Monitoring Applications with Support to Network Topology Changes S. Delabrida, R. Oliveira, A. Pereira Jr. Test Environment for QoS Testing of VoIP over LTE A. Diaz, P. Merino, F. Rivas AS3 ANALYSIS AND OPTIMIZATION Change Risk Expert: Leveraging Advanced Classification and Risk Management Techniques for Systematic Change Failure Reduction S. Guven, C. Barbu, D. Husemann, D. Wiesmann Hierarchical Resource Model-driven Performance Analysis with Dynamic Data Control M. Miyazawa, M. Hayashi A Service Optimization Model on Convergent Network-Based Service Delivery Platform J. Wang, Q. Zhu, Y. Ma Share and Visualize Your Data using the perfsonar NC Framework A. Oslebo DD1 DISSERTATION DIGEST SESSION 1 Automating the Generation, Deployment and Application of Charging Schemes for Composed Communications Services L. Xu, B. Jennings A Hybrid Approach to Operating System Discovery Based on Diagnosis Theory F. Gagnon, B. Esfandiari Integrated Detection of Anomalous Behavior of Computer Infrastructures F. Maggi, S. Zanero

8 DD2 DISSERTATION DIGEST SESSION 2 Autonomic Quality of Experience Management of Multimedia Networks S. Latre, F. Turck Rethinking Network Management : Models, Data-Mining and Self-Learning S. Wallin, C. Ahlund, J. Nordlander Topology Management for Mission Critical Networks: Applying Supply and Demand to Manage Public Safety Networks D. Camara, C. Bonnet, F. Filali MC1 CLOUD MANAGEMENT Performance Problems Diagnosis in Cloud Computing Systems by Mining Request Trace Logs H. Mi, H. Wang, G. Yin, H. Cai, Q. Zhou, T. Sun Deadline-based Workload Management for MapReduce Environments: Pieces of the Performance Puzzle A. Verma, L. Cherkasova, V. Kumar, R. Campbell Workflow Scheduling for SaaS / PaaS Cloud Providers Considering Two SLA Levels T. Genez, L. Bittencourt, E. Madeira Dynamic Prioritization of Transactions using Threshold-Prices C. Markl, T. Setzer MC2 NETWORK RESILIENCY Improving Network Services Resilience Through Automatic Service Node Configuration Generation M. Lopes, A. Costa, B. Dias A State-Based Availability Model to Shared Mesh Protection in MPLS-TP Networks with Preemption Support E. Jamhour, M. Penna A Replication Component for Resilient OpenFlow-based Networking P. Fonseca, R. Bennesby, E. Mota, A. Passito A Novel Crash-Tolerant Data Gathering in Wireless Sensor Networks S. Chakraborty, S. Chakraborty, S. Nandi, S. Karmakar MC3 IT MANAGEMENT Supervisory Control As Pattern for Integrated IT Management S. Graupner, D. Gmach A Cloud-based Solution for the Performance Improvement of IT Support Organizations C. Bartolini, C. Stefanelli, D. Targa, M. Tortonesi A Learning Feature Engineering Method for Task Assignment D. Loewenstern, F. Pinel, L. Shwartz, M. Gatti, R. Herrmann, V. Cavalcante MC4 WIRELESS NETWORK MANAGEMENT Adaptive Weighted Scheme for Improving Mobile Sensor Node Connectivity in IEEE Networks M. Yu, J. Leu Performance Assessment of Cluster Load Balancing Routing Methods for Triple Play Services in Wireless Mesh Networks V. Borges, E. Dimitrov, M. Curado, E. Monteiro Towards Network Invariant Fault Diagnosis in MANETs via Statistical Modeling: The Global Strength of Local Weak Decisions A. Vashist, R. Izmailov, K. Manousakis, R. Chadha, C. Chiang, C. Serban, S. Ali

9 MC5 SECURITY MANAGEMENT DNSSM: A Large Scale Passive DNS Security Monitoring Framework S. Marchal, J. Francois, C. Wagner, R. State, A. Dulaunoy, T. Engel, O. Festor On Stochastic Risk Ordering of Network Services for Proactive Security Management M. Amezziane, E. Al-Shaer, M. Ali SDBF: Smart DNS Brute-Forcer C. Wagner, J. Francois, R. State, T. Engel, G. Wagener, A. Dulaunoy Intelligent Network Management Using Graph Differential Anomaly Visualization Q. Liao, A. Streigel MC6 FUTURE INTERNET Management of Network Design through Molecular Assembly S. Habib, P. Marimuthu Gossip-based Signaling Dissemination Extension for Next Steps In Signaling M. Femminella, R. Francescangeli, G. Reali, H. Schulzrinne Enabling Open-Source High Speed Network Monitoring on NetFPGA G. Antichi, S. Giordano, D. Miller, A. Moore Should Users Be Entitled To Use And Control The Devices Of Their Choice On Networks? S. Jordan, G. Shaffer MC7 ADVANCED APPLICATIONS & MANAGEMENT An Integrated Architecture for Multi-homed Vehicle-to-Infrastructure Communications H. Alshaer, T. Ernst, A. Fortelle A Configuration Service for Home Networks D. Pediaditakis, A. Gopalan, N. Dulay, M. Sloman Self-Management of Mobile Clouds in Advanced Wireless Networks E. Karami, S. Glisic The Impact of Network Performance on Perceived Video Quality in H.264/AVC A. Kwon, J. Xiao, S. Seo, J. Hong, R. Boutaba MC8 AUTONOMIC MANAGEMENT itrack: Correlating User Activity with System Data V. Mann, A. Vishnoi Automated Classifier Generation for Application-Level Mobile Traffic Identification Y. Choi, J. Chung, B. Park, J. Hong New Models for Long-Term Internet Traffic Forecasting Using Artificial Neural Networks and Flow Based Information M. Miguel, M. Penna, J. Nievola, M. Pellenz CARMA: Complete Autonomous Responsible Management Agents for Telecommunications and Inter-cloud Services H. Mearns, J. Leaney, A. Parakhine, J. Debenham, D. Verchere TECHNICAL SESSION 1: FUTURE INTERNET MANAGEMENT ARCHITECTURE DESIGN ENM: A Service Oriented Architecture for Ontology-Driven Network Management in Heterogeneous Network Infrastructures S. Zrelli, A. Ishida, N. Okabe, F. Teraoka Autonomic Fault Management based on Cognitive Control Loops S. Kim, S. Seo, J. Kang, J. Hong ValidMaker: A Tool for Managing Device Configurations Using Logical Constraints S. Halle, E. Ngoupe, G. Nijdam, O. Cherkaoui, P. Valtchev, R. Villemaire Efficient Message-Passing And Autonomic Management Architecture For NGNs A. Louca, A. Mauthe, A. Schaeffer-Filho

10 Network Path Advising Service for the Future Internet X. Wu, J. Griffioen Deployment and Operation of Wide-area Hybrid OpenFlow Networks Y. Kanaumi, S. Saito, E. Kawai, S. Ishii, K. Kobayashi, S. Shimojo A Proposal Management of The Legacy Network Environment using OpenFlow Control Plane F. Farias, J. Salvatti, E. Cerqueira, A. Ablelem TECHNICAL SESSION 4: TRAFFIC IDENTIFICATION, TRUST AND QOS IN THE FUTURE INTERNET Signature Maintenance for Internet Application Traffic Identification using Header Signatures S. Yoon, J. Park, M. Kim SeRViTR: A Framework for Trust and Policy Management for a Secure Internet and Its Proof-of- Concept Implementation X. Liu, A. Wada, T. Xing, P. Juluri, Y. Sato, S. Ata, D. Huang, D. Medhi QoS-aware Network Operating System for Software Defined Networking with Generalized OpenFlows K. Jeong, J. Kim, Y. Kim POSTER PRESENTATIONS Graph Clustering Based Provisioning Algorithm for Virtual Network Embedding T. lee, S. Tursunova, T. Choi Autonomics in Policy based Network Management M. Siddiqui, C. Hong, M. Choi A Multi-Agent Architecture for Autonomic Management of Virtual Networks M. Soares Jr., E. Madeira A Non-repudiation Scheme for User Postings Based on BAC in Mesh Networks Y. Yang, B. Stiller Using BPEL Workflow Processing for Cross-Layer Orchestrations in IP-over-Optical Networks: A Proof of Concept M. Chamania, E. Demirbilek, A. Jukan, X. Masip-Bruin, M. Yannuzzi Design of an Autonomous Software Platform for Future Symbiotic Service Management T. Pauw, N. Matthys, B. Volckaert, V. Ongenae, S. Michiels, F. Turck Self-Organizing Decentralized Wireless Management through Social-Based Metrics L. Guardalben, T. Gomes, P. Salvador, S. Sargento Design and Evaluation of an Architecture for Future Smart Grid Service Provisioning M. Strobbe, T. Verschueren, K. Mets, S. Melis, C. Develder, F. Turck, T. Pollet, S. Veire FULL PAPER SESSION I Protocol-level Reconfigurations for Infusion of Resilience in Distributed Network Services K. Ravindran, M. Rabby Performance Analysis of Bayesian Networks-based Distributed Call Admission Control for NGN A. Bashar, G. Parr, S. McClean, B. Scotney, D. Nauck DISco: a Distributed Information Store for Network Challenges and Their Outcome S. Martin, L. Chiarello, G. Leduc Scalable Integrated Performance Analysis of Multi-Gigabit Networks E. Kissel, A. El-Hassany, G. Fernandes, M. Swany, D. Gunter, T. Samak, J. Schopf SPECIAL SESSION: MANAGING FEDERATIONS AND COOPERATIVE MANAGEMENT (MADFED) Correspondence Pattern Attribute Selection for Consumption of Federated Data Sources B. Walshe, R. Brennan, D. O'Sullivan An SLA-Driven Framework for Dynamic Multimedia Content Delivery Federations J. Famaey, S. Latre, T. Wauters, F. Turck

11 FULL PAPER SESSION II An Autonomic Delivery Framework for HTTP Adaptive Streaming in Multicast-enabled Multimedia Access Networks N. Bouten, S. Latre, W. Meerssche, K. Schepper, B. Vleeschauwer, W. Leekwijck, F. Turck Scalable Analysis of Network Measurements with Hadoop and Pig T. Samak, D. Gunter, V. Hendrix TECHNICAL SESSION The Design of an Instrumentation System for Federated and Virtualized Network Testbeds J. Griffioen, Z. Fei, H. Nasir, X. Wu, J. Reed, C. Carpenter Towards a Semantic Virtualization of Configurations S. Halle, O. Cherkaoui, P. Valtchev Parameters and Challenges for Virtual Network Embedding in the Future Internet D. Stezenbach, M. Hartmann, K. Tutschku TECHNICAL SESSION 1 Obfuscatory Obscanturism: Making Workload Traces Of Commercially-Sensitive Systems Safe To Release C. Reiss, J. Wilkes, J. Hellerstein Workload Characterization and Prediction in the Cloud: A Multiple Time Series Approach A. Khan, X. Yan, S. Tao, N. Anerousis Developing and Managing Customizable Software as a Service Using Feature Model Conversion H. Moens, E. Truyen, S. Walraven, W. Joosen, B. Dhoedt, F. Turck Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure T. Kim, Y. Choi, S. Han, J. Chung, J. Hyun, J. Li, J. Hong TECHNICAL SESSION 2 Automatic Generation of Platforms in Cloud Computing H. Borges, J. Souza, B. Schulze, A. Mury Kagemusha: A Guest-Transparent Mobile IPv6 Mechanism for Wide-Area Live VM Migration T. Hirofuchi, H. Nakada, S. Itoh, S. Sekiguchi Integrated and Autonomic Cloud Resource Scaling M. Hasan, E. Magana, A. Clemm, L. Tucker, S. Gudreddi TECHNICAL SESSION 1 A Business-Driven Framework for Evaluating Cloud Computing K. Sripanidkulchai, S. Sujichantararat Designing Pilot for Operational Innovation in IT Service Delivery G. Grabarnik, Y. Michlin, L. Shwartz SUITS: How to Make a Global IT Service Provider Sustainable? P. Dube, G. Grabarnik, L. Shwartz SHORT PAPER SESSION E-Tourism: Understanding Users' Intention to Adopt Podcasting in Tourism S. Chang, Y. Jang, C. Chiu An Approach To Consolidate And Optimize Monitoring Solutions C. Richter, T. Schaaf Implications of Modified Waterfall Model to the Roles and Education of Health IT Professionals C. Gao, G. Hembroff A Distributed, Multi-Staged, High-Throughput Middleware for Relational Databases R. Herrera, A. Felinto

12 Bussiness-Driven Automatic IT Change Management Based on Machine Learning H. Li, Z. Zhan TECHNICAL SESSION 2 Data Mining for Supporting IT Management C. Bozdogan, N. Zincir-Heywood Risk Assessment and Optimal Proactive Measure Selection for IT Service Continuity Management Q. Guo, Z. Zhan, T. Wang, X. Zhao Potential Benefits and Challenges of Closed-Loop Optimization Processes for IT Support Organizations C. Bartolini, C. Stefanelli, M. Tortonesi Seamless Integration of Wireless Access, Free Space Optical, and Fiber-based Backbone Networks S. Kartalopoulos Author Index

Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis

Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis Felipe Augusto Nunes de Oliveira - GRR20112021 João Victor Tozatti Risso - GRR20120726 Abstract. The increasing

More information

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 Network Virtualization Overview... 1 Network Virtualization Key Requirements to be validated...

More information

IEEE JAVA Project 2012

IEEE JAVA Project 2012 IEEE JAVA Project 2012 Powered by Cloud Computing Cloud Computing Security from Single to Multi-Clouds. Reliable Re-encryption in Unreliable Clouds. Cloud Data Production for Masses. Costing of Cloud Computing

More information

IEEE 2015-2016 JAVA TITLES

IEEE 2015-2016 JAVA TITLES ECWAY ECHNOLGIES IEEE 2015-2016 JAVA TITLES BE, B.TECH, ME, M.TECH, MSC, MCA PROJECTS Abstract: Introduction: Literature Survey: System Analysis: Existing System: Disadvantages: Proposed System: Advantages:

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless

More information

Management by Network Search

Management by Network Search Management by Network Search Misbah Uddin, Prof. Rolf Stadler KTH Royal Institute of Technology, Sweden Dr. Alex Clemm Cisco Systems, CA, USA November 11, 2014 ANRP Award Talks Session IETF 91 Honolulu,

More information

Brocade One Data Center Cloud-Optimized Networks

Brocade One Data Center Cloud-Optimized Networks POSITION PAPER Brocade One Data Center Cloud-Optimized Networks Brocade s vision, captured in the Brocade One strategy, is a smooth transition to a world where information and applications reside anywhere

More information

Restorable Logical Topology using Cross-Layer Optimization

Restorable Logical Topology using Cross-Layer Optimization פרויקטים בתקשורת מחשבים - 236340 - סמסטר אביב 2016 Restorable Logical Topology using Cross-Layer Optimization Abstract: Today s communication networks consist of routers and optical switches in a logical

More information

Big Data Storage Architecture Design in Cloud Computing

Big Data Storage Architecture Design in Cloud Computing Big Data Storage Architecture Design in Cloud Computing Xuebin Chen 1, Shi Wang 1( ), Yanyan Dong 1, and Xu Wang 2 1 College of Science, North China University of Science and Technology, Tangshan, Hebei,

More information

OpenMTC. M2M Solutions for Smart Cities and the Internet of Things. www.open-mtc.org info@open-mtc.org

OpenMTC. M2M Solutions for Smart Cities and the Internet of Things. www.open-mtc.org info@open-mtc.org OpenMTC M2M Solutions for Smart Cities and the Internet of Things www.open-mtc.org info@open-mtc.org 2. March März 2, 2013 Understanding M2M Machine-to-Machine (M2M) is a paradigm in which the end-to-end

More information

Participatory Cloud Computing and the Privacy and Security of Medical Information Applied to A Wireless Smart Board Network

Participatory Cloud Computing and the Privacy and Security of Medical Information Applied to A Wireless Smart Board Network Participatory Cloud Computing and the Privacy and Security of Medical Information Applied to A Wireless Smart Board Network Lutando Ngqakaza ngqlut003@myuct.ac.za UCT Department of Computer Science Abstract:

More information

Journal of Chemical and Pharmaceutical Research, 2014, 6(3):723-728. Research Article

Journal of Chemical and Pharmaceutical Research, 2014, 6(3):723-728. Research Article Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(3):723-728 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research on heterogeneous network architecture between

More information

Content Distribution over IP: Developments and Challenges

Content Distribution over IP: Developments and Challenges Content Distribution over IP: Developments and Challenges Adrian Popescu, Blekinge Inst of Technology, Sweden Markus Fiedler, Blekinge Inst of Technology, Sweden Demetres D. Kouvatsos, University of Bradford,

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms

Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Kirill Krinkin Open Source and Linux lab Saint Petersburg, Russia kirill.krinkin@fruct.org Eugene Kalishenko Saint Petersburg

More information

November 2013. Defining the Value of MPLS VPNs

November 2013. Defining the Value of MPLS VPNs November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do

More information

Survey on Models to Investigate Data Center Performance and QoS in Cloud Computing Infrastructure

Survey on Models to Investigate Data Center Performance and QoS in Cloud Computing Infrastructure Survey on Models to Investigate Data Center Performance and QoS in Cloud Computing Infrastructure Chandrakala Department of Computer Science and Engineering Srinivas School of Engineering, Mukka Mangalore,

More information

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing Security Infrastructure for Trusted Offloading in Mobile Cloud Computing Professor Kai Hwang University of Southern California Presentation at Huawei Forum, Santa Clara, Nov. 8, 2014 Mobile Cloud Security

More information

Monitoring within an Autonomic Network: A. Framework

Monitoring within an Autonomic Network: A. Framework Monitoring within an Autonomic Network: A GANA based Network Monitoring i Framework Anastasios Zafeiropoulos, Athanassios Liakopoulos, Alan Davy, Ranganai Chaparadza tzafeir@grnet.gr Greek Research and

More information

Network Resilience. From Concepts to Experimentation. FIRE Research Workshop - May 16 th 2011

Network Resilience. From Concepts to Experimentation. FIRE Research Workshop - May 16 th 2011 Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Resilience From Concepts to Experimentation FIRE Research Workshop - May 16 th 2011 Georg Carle, TU

More information

ENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE MODEL WITH QUALITY OF SERVICE SUPPORT USING WAXMAN MODEL

ENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE MODEL WITH QUALITY OF SERVICE SUPPORT USING WAXMAN MODEL R. RAVI: ENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE MODEL WITH QUALITY OF SERVICE SUPPORT USING WAXMAN MODEL ENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE

More information

SDN and NFV in the WAN

SDN and NFV in the WAN WHITE PAPER Hybrid Networking SDN and NFV in the WAN HOW THESE POWERFUL TECHNOLOGIES ARE DRIVING ENTERPRISE INNOVATION rev. 110615 Table of Contents Introduction 3 Software Defined Networking 3 Network

More information

Software-Defined Networks Powered by VellOS

Software-Defined Networks Powered by VellOS WHITE PAPER Software-Defined Networks Powered by VellOS Agile, Flexible Networking for Distributed Applications Vello s SDN enables a low-latency, programmable solution resulting in a faster and more flexible

More information

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India

More information

Mobile Multimedia Meet Cloud: Challenges and Future Directions

Mobile Multimedia Meet Cloud: Challenges and Future Directions Mobile Multimedia Meet Cloud: Challenges and Future Directions Chang Wen Chen State University of New York at Buffalo 1 Outline Mobile multimedia: Convergence and rapid growth Coming of a new era: Cloud

More information

Lecture 02b Cloud Computing II

Lecture 02b Cloud Computing II Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,

More information

Multi-protocol Label Switching

Multi-protocol Label Switching An INS White Paper Multi-protocol Label Switching An economic way to deliver integrated voice, video and data traffic March 2013 Run your business on one network Multi-protocol Label Switching (MPLS) is

More information

CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW

CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW 1 XINQIN GAO, 2 MINGSHUN YANG, 3 YONG LIU, 4 XIAOLI HOU School of Mechanical and Precision Instrument Engineering, Xi'an University

More information

Figure 1. The cloud scales: Amazon EC2 growth [2].

Figure 1. The cloud scales: Amazon EC2 growth [2]. - Chung-Cheng Li and Kuochen Wang Department of Computer Science National Chiao Tung University Hsinchu, Taiwan 300 shinji10343@hotmail.com, kwang@cs.nctu.edu.tw Abstract One of the most important issues

More information

A Model-based Methodology for Developing Secure VoIP Systems

A Model-based Methodology for Developing Secure VoIP Systems A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN

More information

Achieve Better Ranking Accuracy Using CloudRank Framework for Cloud Services

Achieve Better Ranking Accuracy Using CloudRank Framework for Cloud Services Achieve Better Ranking Accuracy Using CloudRank Framework for Cloud Services Ms. M. Subha #1, Mr. K. Saravanan *2 # Student, * Assistant Professor Department of Computer Science and Engineering Regional

More information

Task Placement in a Cloud with Case-based Reasoning

Task Placement in a Cloud with Case-based Reasoning Task Placement in a Cloud with Case-based Reasoning Eric Schulte-Zurhausen and Mirjam Minor Institute of Informatik, Goethe University, Robert-Mayer-Str.10, Frankfurt am Main, Germany {eschulte, minor}@informatik.uni-frankfurt.de

More information

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS Mestrado em Engenharia de Redes de Comunicações TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 2008-2009 Exemplos de Projecto - Network Design Examples 1 Hierarchical Network Design 2 Hierarchical

More information

Huawei Agile WAN Solution

Huawei Agile WAN Solution Huawei Agile WAN Solution WAN Development and Challenge As more Enterprise services are deployed on IT systems and transmitted over IP networks, Enterprise networks are expanding to support more service

More information

G-Lab: A Future Generation Internet Research Platform

G-Lab: A Future Generation Internet Research Platform Institute of Computer Science Department of Distributed Systems Prof. G-Lab: A Future Generation Internet Research Platform www3.informatik.uni-wuerzburg.de Institute of Computer Science University of

More information

A survey on Wireless Mesh Networks

A survey on Wireless Mesh Networks A survey on Wireless Mesh Networks IF Akyildiz, X Wang - Communications Magazine, IEEE, 2005 Youngbin Im ybim@mmlab.snu.ac.kr 2007.10.15. Contents Introduction to WMNs Network architecture Critical design

More information

THE FUTURE OF SMART GRID COMMUNICATIONS

THE FUTURE OF SMART GRID COMMUNICATIONS THE FUTURE OF SMART GRID COMMUNICATIONS KENNETH C. BUDKA CTO STRATEGIC INDUSTRIES MAY 2014 THE GRID OF THE FUTURE WIDE-SCALE DEPLOYMENT OF RENEWABLES INCREASED ENERGY EFFICIENCY PEAK POWER REDUCTION, DEMAND

More information

Security improvement in IoT based on Software Defined Networking (SDN)

Security improvement in IoT based on Software Defined Networking (SDN) Security improvement in IoT based on Software Defined Networking (SDN) Vandana C.P Assistant Professor, New Horizon College of Engineering Abstract With the evolving Internet of Things (IoT) technology,

More information

An Advanced Commercial Contact Center Based on Cloud Computing

An Advanced Commercial Contact Center Based on Cloud Computing An Advanced Commercial Contact Center Based on Cloud Computing Li Pengyu, Chen Xin, Zhang Guoping, Zhang Boju, and Huang Daochao Abstract With the rapid development of cloud computing and information technology,

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental

More information

Communication via M2M

Communication via M2M Chapter 5: Green Wireless Communication via M2M Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Abstract 1. Abstract Based on the observation

More information

Mobile Cloud Computing: Paradigms and Challenges 移 动 云 计 算 : 模 式 与 挑 战

Mobile Cloud Computing: Paradigms and Challenges 移 动 云 计 算 : 模 式 与 挑 战 Mobile Cloud Computing: Paradigms and Challenges 移 动 云 计 算 : 模 式 与 挑 战 Jiannong Cao Internet & Mobile Computing Lab Department of Computing Hong Kong Polytechnic University Email: csjcao@comp.polyu.edu.hk

More information

Internet Video Streaming and Cloud-based Multimedia Applications. Outline

Internet Video Streaming and Cloud-based Multimedia Applications. Outline Internet Video Streaming and Cloud-based Multimedia Applications Yifeng He, yhe@ee.ryerson.ca Ling Guan, lguan@ee.ryerson.ca 1 Outline Internet video streaming Overview Video coding Approaches for video

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R A p p l i c a t i o n D e l i v e r y f o r C l o u d S e r v i c e s : C u s t o m i z i n g S e r v i c e C r e a t i o n i n V i r t u a l E n v i r o n m e n t s Sponsored by: Brocade

More information

Load Balancing and Maintaining the Qos on Cloud Partitioning For the Public Cloud

Load Balancing and Maintaining the Qos on Cloud Partitioning For the Public Cloud Load Balancing and Maintaining the Qos on Cloud Partitioning For the Public Cloud 1 S.Karthika, 2 T.Lavanya, 3 G.Gokila, 4 A.Arunraja 5 S.Sarumathi, 6 S.Saravanakumar, 7 A.Gokilavani 1,2,3,4 Student, Department

More information

UPS battery remote monitoring system in cloud computing

UPS battery remote monitoring system in cloud computing , pp.11-15 http://dx.doi.org/10.14257/astl.2014.53.03 UPS battery remote monitoring system in cloud computing Shiwei Li, Haiying Wang, Qi Fan School of Automation, Harbin University of Science and Technology

More information

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification

More information

What is OpenFlow? What does OFELIA? An Introduction to OpenFlow and what OFELIA has to do with it

What is OpenFlow? What does OFELIA? An Introduction to OpenFlow and what OFELIA has to do with it What is OpenFlow? What does OFELIA? An Introduction to OpenFlow and what OFELIA has to do with it The internet is a GREAT INVENTION! The Internet is great! But, ehem.. Houston, we have a problem 2012 2

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015 RESEARCH ARTICLE OPEN ACCESS Ensuring Reliability and High Availability in Cloud by Employing a Fault Tolerance Enabled Load Balancing Algorithm G.Gayathri [1], N.Prabakaran [2] Department of Computer

More information

A Hybrid Electrical and Optical Networking Topology of Data Center for Big Data Network

A Hybrid Electrical and Optical Networking Topology of Data Center for Big Data Network ASEE 2014 Zone I Conference, April 3-5, 2014, University of Bridgeport, Bridgpeort, CT, USA A Hybrid Electrical and Optical Networking Topology of Data Center for Big Data Network Mohammad Naimur Rahman

More information

Carrier/WAN SDN. SDN Optimized MPLS Demo

Carrier/WAN SDN. SDN Optimized MPLS Demo Carrier/WAN SDN SDN Optimized MPLS Demo Problem Statement! Service Providers around the world have large investments in highly sophisticated and feature rich IP/MPLS network infrastructures for providing

More information

IBM 000-281 EXAM QUESTIONS & ANSWERS

IBM 000-281 EXAM QUESTIONS & ANSWERS IBM 000-281 EXAM QUESTIONS & ANSWERS Number: 000-281 Passing Score: 800 Time Limit: 120 min File Version: 58.8 http://www.gratisexam.com/ IBM 000-281 EXAM QUESTIONS & ANSWERS Exam Name: Foundations of

More information

Denial of Service Attacks and Resilient Overlay Networks

Denial of Service Attacks and Resilient Overlay Networks Denial of Service Attacks and Resilient Overlay Networks Angelos D. Keromytis Network Security Lab Computer Science Department, Columbia University Motivation: Network Service Availability Motivation:

More information

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India Call for Papers Cloud computing has emerged as a de facto computing

More information

Next Challenges in Optical Networking Research: Contribution from the CaON cluster for HORIZON 2020

Next Challenges in Optical Networking Research: Contribution from the CaON cluster for HORIZON 2020 Next Challenges in Optical Networking Research: Contribution from the CaON cluster for HORIZON 2020 Dimitra Simeonidou: dsimeo@essex.ac.uk, Sergi Figuerola: sergi.figuerola@i2cat.net + CaON projects CaON

More information

Leveraging SDN and NFV in the WAN

Leveraging SDN and NFV in the WAN Leveraging SDN and NFV in the WAN Introduction Software Defined Networking (SDN) and Network Functions Virtualization (NFV) are two of the key components of the overall movement towards software defined

More information

Publications of Ugo Fiore

Publications of Ugo Fiore Publications of Ugo Fiore Journal papers [J31] A. Castiglione, R. De Prisco, A. De Santis, U. Fiore, and F. Palmieri. A botnet-based command and control approach relying on swarm intelligence. In: Journal

More information

Mobile Storage and Search Engine of Information Oriented to Food Cloud

Mobile Storage and Search Engine of Information Oriented to Food Cloud Advance Journal of Food Science and Technology 5(10): 1331-1336, 2013 ISSN: 2042-4868; e-issn: 2042-4876 Maxwell Scientific Organization, 2013 Submitted: May 29, 2013 Accepted: July 04, 2013 Published:

More information

Introduction: Why do we need computer networks?

Introduction: Why do we need computer networks? Introduction: Why do we need computer networks? Karin A. Hummel - Adapted slides of Prof. B. Plattner, plattner@tik.ee.ethz.ch - Add-on material included of Peterson, Davie: Computer Networks February

More information

Key Challenges in Cloud Computing to Enable Future Internet of Things

Key Challenges in Cloud Computing to Enable Future Internet of Things The 4th EU-Japan Symposium on New Generation Networks and Future Internet Future Internet of Things over "Clouds Tokyo, Japan, January 19th, 2012 Key Challenges in Cloud Computing to Enable Future Internet

More information

Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing

Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing Deep Mann ME (Software Engineering) Computer Science and Engineering Department Thapar University Patiala-147004

More information

VMDC 3.0 Design Overview

VMDC 3.0 Design Overview CHAPTER 2 The Virtual Multiservice Data Center architecture is based on foundation principles of design in modularity, high availability, differentiated service support, secure multi-tenancy, and automated

More information

Load Balance Scheduling Algorithm for Serving of Requests in Cloud Networks Using Software Defined Networks

Load Balance Scheduling Algorithm for Serving of Requests in Cloud Networks Using Software Defined Networks Load Balance Scheduling Algorithm for Serving of Requests in Cloud Networks Using Software Defined Networks Dr. Chinthagunta Mukundha Associate Professor, Dept of IT, Sreenidhi Institute of Science & Technology,

More information

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management INTRODUCTION Traditional perimeter defense solutions fail against sophisticated adversaries who target their

More information

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

Research of Smart Distribution Network Big Data Model

Research of Smart Distribution Network Big Data Model Research of Smart Distribution Network Big Data Model Guangyi LIU Yang YU Feng GAO Wendong ZHU China Electric Power Stanford Smart Grid Research Institute Smart Grid Research Institute Research Institute

More information

Developing Scalable Smart Grid Infrastructure to Enable Secure Transmission System Control

Developing Scalable Smart Grid Infrastructure to Enable Secure Transmission System Control Developing Scalable Smart Grid Infrastructure to Enable Secure Transmission System Control EP/K006487/1 UK PI: Prof Gareth Taylor (BU) China PI: Prof Yong-Hua Song (THU) Consortium UK Members: Brunel University

More information

A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks

A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks A Coordinated Virtual Infrastructure for SDN in Enterprise Networks Software Defined Networking (SDN), OpenFlow and Application Fluent Programmable Networks Strategic White Paper Increasing agility and

More information

Injazat s Managed Services Portfolio

Injazat s Managed Services Portfolio Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.

More information

Network Level Multihoming and BGP Challenges

Network Level Multihoming and BGP Challenges Network Level Multihoming and BGP Challenges Li Jia Helsinki University of Technology jili@cc.hut.fi Abstract Multihoming has been traditionally employed by enterprises and ISPs to improve network connectivity.

More information

ENTERPRISE CONVERGED NETWORK SOLUTION. Deliver a quality user experience, streamline operations and reduce costs

ENTERPRISE CONVERGED NETWORK SOLUTION. Deliver a quality user experience, streamline operations and reduce costs ENTERPRISE CONVERGED NETWORK SOLUTION Deliver a quality user experience, streamline operations and reduce costs THE NEW CHALLENGES IN DELIVERING A HIGH-QUALITY USER EXPERIENCE Key trends are driving new

More information

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS Mestrado em Engenharia de Redes de Comunicações TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 2009-2010 Projecto de Rede / Sistema - Network / System Design 1 Hierarchical Network Design 2 Hierarchical

More information

Communication and Embedded Systems: Towards a Smart Grid. Radu Stoleru, Alex Sprintson, Narasimha Reddy, and P. R. Kumar

Communication and Embedded Systems: Towards a Smart Grid. Radu Stoleru, Alex Sprintson, Narasimha Reddy, and P. R. Kumar Communication and Embedded Systems: Towards a Smart Grid Radu Stoleru, Alex Sprintson, Narasimha Reddy, and P. R. Kumar Alex Sprintson Smart grid communication Key enabling technology Collecting data Control

More information

A Virtual Machine Searching Method in Networks using a Vector Space Model and Routing Table Tree Architecture

A Virtual Machine Searching Method in Networks using a Vector Space Model and Routing Table Tree Architecture A Virtual Machine Searching Method in Networks using a Vector Space Model and Routing Table Tree Architecture Hyeon seok O, Namgi Kim1, Byoung-Dai Lee dept. of Computer Science. Kyonggi University, Suwon,

More information

Intelligent. Data Sheet

Intelligent. Data Sheet Cisco IPS Software Product Overview Cisco IPS Software is the industry s leading network-based intrusion prevention software. It provides intelligent, precise, and flexible protection for your business

More information

Data Center Networking Designing Today s Data Center

Data Center Networking Designing Today s Data Center Data Center Networking Designing Today s Data Center There is nothing more important than our customers. Data Center Networking Designing Today s Data Center Executive Summary Demand for application availability

More information

Cross-layer Optimisation and Traffic Control for Delivering Super High Definition Video

Cross-layer Optimisation and Traffic Control for Delivering Super High Definition Video Cross-layer Optimisation and Traffic Control for Delivering Super High Definition Video Miguel Rio, John Mitchell, David Griffin, Eleni Mykoniati, Raul Landa, Richard Clegg Department of Electronic and

More information

WAN Traffic Management with PowerLink Pro100

WAN Traffic Management with PowerLink Pro100 Whitepaper WAN Traffic Management with PowerLink Pro100 Overview In today s Internet marketplace, optimizing online presence is crucial for business success. Wan/ISP link failover and traffic management

More information

International Journal of Computer & Organization Trends Volume21 Number1 June 2015 A Study on Load Balancing in Cloud Computing

International Journal of Computer & Organization Trends Volume21 Number1 June 2015 A Study on Load Balancing in Cloud Computing A Study on Load Balancing in Cloud Computing * Parveen Kumar * Er.Mandeep Kaur Guru kashi University,Talwandi Sabo Guru kashi University,Talwandi Sabo Abstract: Load Balancing is a computer networking

More information

Grid Computing Vs. Cloud Computing

Grid Computing Vs. Cloud Computing International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 577-582 International Research Publications House http://www. irphouse.com /ijict.htm Grid

More information

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram. Protection of Vulnerable Virtual machines from being compromised as zombies during DDoS attacks using a multi-phase distributed vulnerability detection & counter-attack framework Ashok Kumar Gonela MTech

More information

Service allocation in Cloud Environment: A Migration Approach

Service allocation in Cloud Environment: A Migration Approach Service allocation in Cloud Environment: A Migration Approach Pardeep Vashist 1, Arti Dhounchak 2 M.Tech Pursuing, Assistant Professor R.N.C.E.T. Panipat, B.I.T. Sonepat, Sonipat, Pin no.131001 1 pardeepvashist99@gmail.com,

More information

Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka. www.ijreat.org

Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka. www.ijreat.org Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks Kruthika S G 1, VenkataRavana Nayak 2, Sunanda Allur 3 1, 2, 3 Department of Computer Science, Visvesvaraya Technological

More information

Network Evolution, Cloud & Future Services. Opportunities & Challenges for Next-Decade Services

Network Evolution, Cloud & Future Services. Opportunities & Challenges for Next-Decade Services Network Evolution, Cloud & Future Services Opportunities & Challenges for Next-Decade Services Outline Trends: Data, Services & Networks Cloud What is Next? 2 Law of Telecom Complexity Telecom complexity,

More information

The Purview Solution Integration With Splunk

The Purview Solution Integration With Splunk The Purview Solution Integration With Splunk Integrating Application Management and Business Analytics With Other IT Management Systems A SOLUTION WHITE PAPER WHITE PAPER Introduction Purview Integration

More information

EVOLVED DATA CENTER ARCHITECTURE

EVOLVED DATA CENTER ARCHITECTURE EVOLVED DATA CENTER ARCHITECTURE A SIMPLE, OPEN, AND SMART NETWORK FOR THE DATA CENTER DAVID NOGUER BAU HEAD OF SP SOLUTIONS MARKETING JUNIPER NETWORKS @dnoguer @JuniperNetworks 1 Copyright 2014 Juniper

More information

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by

More information

Software Defined Networking

Software Defined Networking Software Defined Networking Stefano Giordano Dipartimento di Ingegneria dell Informazione Università di Pisa 3D Reference model of ISDN Hourglass reference model of a TCP/IP network Network Ossification

More information

Environments, Services and Network Management for Green Clouds

Environments, Services and Network Management for Green Clouds Environments, Services and Network Management for Green Clouds Carlos Becker Westphall Networks and Management Laboratory Federal University of Santa Catarina MARCH 3RD, REUNION ISLAND IARIA GLOBENET 2012

More information

Internet of Things (IoT): A vision, architectural elements, and future directions

Internet of Things (IoT): A vision, architectural elements, and future directions SeoulTech UCS Lab 2014-2 st Internet of Things (IoT): A vision, architectural elements, and future directions 2014. 11. 18 Won Min Kang Email: wkaqhsk0@seoultech.ac.kr Table of contents Open challenges

More information

A Study on Service Oriented Network Virtualization convergence of Cloud Computing

A Study on Service Oriented Network Virtualization convergence of Cloud Computing A Study on Service Oriented Network Virtualization convergence of Cloud Computing 1 Kajjam Vinay Kumar, 2 SANTHOSH BODDUPALLI 1 Scholar(M.Tech),Department of Computer Science Engineering, Brilliant Institute

More information

OpenFlow -Enabled Cloud Backbone Networks Create Global Provider Data Centers. ONF Solution Brief November 14, 2012

OpenFlow -Enabled Cloud Backbone Networks Create Global Provider Data Centers. ONF Solution Brief November 14, 2012 OpenFlow -Enabled Cloud Backbone Networks Create Global Provider Data Centers ONF Solution Brief November 14, 2012 Table of Contents 2 OpenFlow-Enabled Software-Defined Networking 2 Executive Summary 3

More information

SICSA SDN Workshop Event Report

SICSA SDN Workshop Event Report SICSA SDN Workshop Event Report Summary: 1. The workshop was held successfully on 19 September 2013 at the Informatics Forum within the School of Informatics, University of Edinburgh. 2. The event has

More information

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more

More information

A Case Study Design of Border Gateway Routing Protocol Using Simulation Technologies

A Case Study Design of Border Gateway Routing Protocol Using Simulation Technologies A Case Study Design of Border Gateway Routing Protocol Using Simulation Technologies Chengcheng Li School of Information Technology University of Cincinnati Cincinnati, OH 45221 Chengcheng.li@uc.edu ABSTRACT

More information

Cloud Computing for Agent-based Traffic Management Systems

Cloud Computing for Agent-based Traffic Management Systems Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion

More information

Data Sheet. V-Net Link 700 C Series Link Load Balancer. V-NetLink:Link Load Balancing Solution from VIAEDGE

Data Sheet. V-Net Link 700 C Series Link Load Balancer. V-NetLink:Link Load Balancing Solution from VIAEDGE Data Sheet V-Net Link 700 C Series Link Load Balancer V-NetLink:Link Load Balancing Solution from VIAEDGE V-NetLink : Link Load Balancer As the use of the Internet to deliver organizations applications

More information