Creat membership Creat membership
Sign in

Forgot password?

Confirm
  • Forgot password?
    Sign Up
  • Confirm
    Sign In
home > search

Now showing items 1 - 16 of 58

  • Computer Networks (COMNET) Editorial for 2018

    Akyildiz, Ian F.   Rudin, Harry   Stiller, Burkhard  

    Download Collect
  • Updated Taxonomy for the Network and Service Management Research Field

    van der Hooft, Jeroen   Claeys, Maxim   Bouten, Niels   Wauters, Tim   Schoenwaelder, Juergen   Pras, Aiko   Stiller, Burkhard   Charalambides, Marinos   Badonnel, Remi   Serrat, Joan   Paula dos Santos, Carlos Raniery   De Turck, Filip  

    Network and service management is an established research field within the general area of computer networks. A few years ago, an initial taxonomy, organizing a comprehensive list of terms and topics, was established through interviews with experts from both industry and academia. This taxonomy has since been used to better partition standardization efforts, identify classes of managed objects and improve the assignment of reviewers to papers submitted in the field. Because the field of network and service management is rapidly evolving, a biyearly update of the taxonomy was proposed. In this paper, a large-scale questionnaire is presented which was answered by experts in the field, evaluating the relevance of each individual topic for the next five years. Missing topics, which are likely to become relevant over the next few years, are identified as well. Furthermore, an analysis is performed of the records of papers submitted to major conferences in the area. Based on the obtained results, an updated version of the taxonomy is proposed.
    Download Collect
  • The Use of Blockchains: Application-Driven Analysis of Applicability

    Rodrigues, Bruno   Bocek, Thomas   Stiller, Burkhard  

    Bitcoin paved the way for a highly successful FinTech (Financial Technology) application on the basis of a newer technology termed blockchain. As this technology has evolved very recently beyond the financial market, gaining more public attention, other promising blockchain applications areas and use cases are emerging. However, it is still not a straightforward in which application areas and use cases blockchains do provide an advantage beyond distributed databases and decentralized systems. Through a decentralized and immutable data storage blockchains enable the enforcement and verification of exchange assets, while disrupting potentially existing business models by promoting the disintermediation of processes involving multiple stakeholders. While having no mediator or a third party controlling the operation, less operational costs and a higher business agility are targeted at. However, the adoption of blockchains requires not only overcoming its technical challenges, but it also implies to reach the ability to understand and handle the impact on existing business models, processes, and legal compliances. This chapter will overview the main blockchain application areas by providing examples and by discussing from the technical perspective on how and under which conditions the use of blockchains can be useful for a successful use case.
    Download Collect
  • Editorial for COMNET 2017

    Akyildiz, Ian F.   Rudin, Harry   Stiller, Burkhard  

    Download Collect
  • Autonomic Communications in Software-Driven Networks

    Zhao, Zhongliang   Schiller, Eryk   Kalogeiton, Eirini   Braun, Torsten   Stiller, Burkhard   Garip, Mevlut Turker   Joy, Joshua   Gerla, Mario   Akhtar, Nabeel   Matta, Ibrahim  

    Autonomic communications aim to provide the quality-of-service in networks using self-management mechanisms. It inherits many characteristics from autonomic computing, in particular, when communication systems are running as specialized applications in software-defined networking (SDN) and network function virtualization (NFV)-enabled cloud environments. This paper surveys autonomic computing and communications in the context of software-driven networks, i.e., networks based on SDN/NFV concepts. Autonomic communications create new challenges in terms of security, operations, and business support. We discuss several goals, research challenges, and development issues on self-management mechanisms and architectures in software-driven networks. This paper covers multiple perspectives of autonomic communications in software-driven networks, such as automatic testing, integration, and deployment of network functions. We also focus on self-management and optimization, which make use of machine learning techniques.
    Download Collect
  • FENDE: Marketplace-Based Distribution, Execution, and Life Cycle Management of VNFs

    Bondan, Lucas   Franco, Muriel F.   Marcuzzo, Leonardo   Venancio, Giovanni   Santos, Ricardo L.   Pfitscher, Ricardo J.   Scheid, Eder J.   Stiller, Burkhard   De Turck, Filip   Duarte, Elias P.   Schaeffer-Filho, Alberto E.   Santos, Carlos R. P. dos   Granville, Lisandro Z.  

    Download Collect
  • Communication Systems Group CSG, University of Zürich

    Stiller, Burkhard  

    Download Collect
  • A Survey on Metrics and Measurement Tools for Sustainable Distributed Cloud Networks

    Riekstin, Ana Carolina   Rodrigues, Bruno Bastos   Kim Khoa Nguyen   Melo de Brito Carvalho, Tereza Cristina   Meirosu, Catalin   Stiller, Burkhard   Cheriet, Mohamed  

    Energy efficiency and emissions awareness are core capabilities for sustainable and lower cost distributed cloud networks. In this context, metrics are fundamental for comparison and management purposes, along with the methods and tools which support such metrics' capture and analysis. However, prior works on green metrics and tools have presented only a partial view, mainly as a result of the recent advances in green networking technologies. In this survey, we present an extensive study of metrics, methods, and tools to support sustainable operations in distributed cloud networks, with the aim of providing an end-to-end and up-to-date scenario to support current and coming research, as well as to analyze existing gaps.
    Download Collect
  • Special Issue on Management Issues in the Future Internet

    Hong, James Won-Ki   De Turck, Filip   Stiller, Burkhard   Medhi, Deep  

    Download Collect
  • An Overview of IP Flow-Based Intrusion Detection

    Sperotto, Anna   Schaffrath, Gregor   Sadre, Ramin   Morariu, Cristian   Pras, Aiko   Stiller, Burkhard  

    Intrusion detection is an important area of research. Traditionally, the approach taken to find attacks is to inspect the contents of every packet. However, packet inspection cannot easily be performed at high-speeds. Therefore, researchers and operators started investigating alternative approaches, such as flow-based intrusion detection. In that approach the flow of data through the network is analyzed, instead of the contents of each individual packet. The goal of this paper is to provide a survey of current research in the area of flow-based intrusion detection. The survey starts with a motivation why flow-based intrusion detection is needed. The concept of flows is explained, and relevant standards are identified. The paper provides a classification of attacks and defense techniques and shows how flow-based techniques can be used to detect scans, worms, Botnets and Denial of Service (DoS) attacks.
    Download Collect
  • Monitoring of SLA Compliances for Hosted Streaming Services

    Hasan   Racz, Peter   Stiller, Burkhard  

    Monitoring of Service Level Objectives (SLOs) determines an essential part of Service Level Agreement (SLA) management, since customers are to be reimbursed, if a provider fails to fulfil them. By automating this process, a timely detection of a violation is possible. The compliance approach must be flexible to adapt to potential changes, must be scalable with respect to the amount of data, and has to support multi-domain environments. This paper determines a Hosted Streaming Services scenario and defines relevant SLOs. Key requirements are derived, the respective architecture is designed, and the approach is implemented prototypically based on a generic auditing framework. Further-more, a new scheme is proposed that considers the degree and duration of SLO violations in calculating reimbursements.
    Download Collect
  • A model for the mobile market based on customers profile to analyze the churning process

    Rogelio Flores-Mendez, Mario   Postigo-Boix, Marcos   Luis Melus-Moreno, Jose   Stiller, Burkhard  

    In the current telecommunications market that is reaching high saturation levels, mobile network operators (MNOs) try to position themselves among customers through aggressive marketing campaigns and offers. In this environment where customers have multiple MNOs to choose from, different factors influence customers' decisions. In addition to this, mobile number portability contributes to a phenomenon called churning where customers migrate from one MNO to another. Churning impacts not only the network design but also the pricing methods adopted by MNOs, and hence their revenue. It is because of this that MNOs try to reduce churn through retention campaigns. The key factor for the success of these campaigns is to detect potential churners before they leave the service. The state of the art has focused on proposing methods to identify churners based on data mining techniques, however these techniques doesn't always offer clear explanations for churn reasons. Instead, we use a technique called agent-based modeling to model customers in the mobile telecommunication market and assess the effects of customers characteristics and behaviors on such market. We propose a model that includes some relevant demographic and psychographic characteristics and the utilizations of usage profiles to describe customers. We show with simple experiments how different factors lead to churn in different ways. We believe the proposed approach is useful because MNOs can use it for explanatory, exploratory and predictive purposes.
    Download Collect
  • A Survey of Payment Approaches for Identity Federations in Focus of the SAML Technology

    Lutz, David J.   Stiller, Burkhard  

    Identity Federations are increasingly being used to establish convenient and secure attribute-based authentication and authorization systems. Whilst this process began mainly in the academic sector, it is assumed that over the next few years more and more commercial Service Providers will join Identity Federations in order to offer their services and products to federated customers. However, the introduction of commercial Service Providers demands a solution for payment, which has not been deployed during the early years of Identity Federations. Thus, Service Providers have to implement not only the federation application, but also additional payment solutions; a problem, by which the federation may appear unattractive for Service Providers, especially semi-commercial or those requiring micropayments. Even for large commercial providers entering a federation, the lack of payment support is a major disadvantage that may lead to either customer or profit loss. Thus, although a combination of electronic Payment solutions and Identity Federation approaches would provide several benefits to its participants, there has not been much investigation of such combinations. Therefore, this paper analyses electronic payment approaches as well as Identity Federation mechanisms and focuses on a solution to bridge these two aspects. Besides early stages of identity-based payments, final full integrated SAML-based payment approaches, which merge payments and Identity Federation into a powerful business solution, are also highlighted. However, since security is a major concern when focusing on payment solutions, several approaches have been investigated, including security and privacy evaluations, and, within this survey, only those solutions providing a sufficient level of security and privacy have been taken into consideration.
    Download Collect
  • Peer-to-peer technologies in network and service management

    Pras, Aiko   Schoenwaelder, Juergen   Stiller, Burkhard  

    Download Collect
  • A Survey of the State-of-the-Art in Fair Multi-Resource Allocations for Data Centers

    Poullie, Patrick   Bocek, Thomas   Stiller, Burkhard  

    Multi-resource allocation in data centers determines a network and service management task of crucial importance. While, traditionally computing systems are shared based on a single resource, it was shown that in data centers this simplification often impedes overall efficiency and fairness. Therefore, newer approaches consider data center resource allocations as a multi-resource allocation problem. However, the capability of these approaches to reach overall fairness or efficiency is limited due to theoretical assumptions they make or due to practical means they deploy to control resources. This survey: 1) details all steps necessary to allocate data center resources and puts these steps in relation to each other; 2) highly relevant concepts in support of fair data center resource allocations, such as utility functions and allocation characteristics, are discussed and compared; and 3) in turn, major approaches to allocate multiple data center resources in a fair manner are outlined, mapped to practical steps and economically driven-targets, and compared with respect to their suitability of being applied in today's data centers.
    Download Collect
  • A Service Model and Architecture in Support of IP Service Accounting

    Racz, Peter   Stiller, Burkhard  

    Accounting of service usage is one of the main tasks of service providers in their operation and management processes, providing the necessary information for the subsequent charging process. Because of the increasing number and diversity of services in IP-based networks, accounting has to provide flexible anti extensible means supporting different service specific accounting attributes in order to meet the providers' requirements. Furthermore, users typically access services of different providers, resulting in a service composition in a multi-provider environment. After identifying key players in this scenario, this paper presents a service model, classifying different service types, and proposes an architecture (SMArch) for a common accounting scheme, which is implemented based on the IPDR framework and reference code.
    Download Collect
1 2 3 4

Contact

If you have any feedback, Please follow the official account to submit feedback.

Turn on your phone and scan

Submit Feedback