Self-* and P2P for Network Management


Book Description

The network management community has been pushed towards the design of alternative management approaches able to support heterogeneity, scalability, reliability, and minor human intervention. The employment of self-* properties and Peer-To-Peer (P2P) are seen as promising alternatives, able to provide the sophisticated solutions required. Despite being developed in parallel, and with minor direct connections perceived between them, self-* properties and P2P can be used concurrently. In Self-* and P2P for Network Management: Design Principles and Case Studies, the authors explore the issues behind the joint use of self-* properties and P2P, and present: a survey relating autonomic computing and self-* properties, P2P, and network and service management; the design of solutions that explore parallel and cooperative behavior of management peers; the change in angle of network management solution development from APIs, protocols, architectures, and frameworks to the design of management algorithms.




Handbook of Peer-to-Peer Networking


Book Description

Peer-to-peer networking is a disruptive technology for large scale distributed app- cations that has recently gained wide interest due to the successes of peer-to-peer (P2P) content sharing, media streaming, and telephony applications. There are a large range of other applications under development or being proposed. The - derlying architectures share features such as decentralizaton, sharing of end system resources, autonomy, virtualization, and self-organization. These features constitute the P2P paradigm. This handbook broadly addresses a large cross-section of c- rent research and state-of-the-art reports on the nature of this paradigm from a large number of experts in the ?eld. Several trends in information and network technology such as increased perf- mance and deployment of broadband networking, wireless networking, and mobile devices are synergistic with and reinforcing the capabilities of the P2P paradigm. There is general expectation in the technical community that P2P networking will continue to be an important tool for networked applications and impact the evo- tion of the Internet. A large amount of research activity has resulted in a relatively short time, and a growing community of researchers has developed. The Handbook of Peer-to-Peer Networking is dedicated to discussions on P2P networks and their applications. This is a comprehensive book on P2P computing.




Handbook of Peer-to-Peer Networking


Book Description

Peer-to-peer networking is a disruptive technology for large scale distributed app- cations that has recently gained wide interest due to the successes of peer-to-peer (P2P) content sharing, media streaming, and telephony applications. There are a large range of other applications under development or being proposed. The - derlying architectures share features such as decentralizaton, sharing of end system resources, autonomy, virtualization, and self-organization. These features constitute the P2P paradigm. This handbook broadly addresses a large cross-section of c- rent research and state-of-the-art reports on the nature of this paradigm from a large number of experts in the ?eld. Several trends in information and network technology such as increased perf- mance and deployment of broadband networking, wireless networking, and mobile devices are synergistic with and reinforcing the capabilities of the P2P paradigm. There is general expectation in the technical community that P2P networking will continue to be an important tool for networked applications and impact the evo- tion of the Internet. A large amount of research activity has resulted in a relatively short time, and a growing community of researchers has developed. The Handbook of Peer-to-Peer Networking is dedicated to discussions on P2P networks and their applications. This is a comprehensive book on P2P computing.




Handbook of Peer-to-Peer Networking


Book Description

Peer-to-peer networking is a disruptive technology for large scale distributed app- cations that has recently gained wide interest due to the successes of peer-to-peer (P2P) content sharing, media streaming, and telephony applications. There are a large range of other applications under development or being proposed. The - derlying architectures share features such as decentralizaton, sharing of end system resources, autonomy, virtualization, and self-organization. These features constitute the P2P paradigm. This handbook broadly addresses a large cross-section of c- rent research and state-of-the-art reports on the nature of this paradigm from a large number of experts in the ?eld. Several trends in information and network technology such as increased perf- mance and deployment of broadband networking, wireless networking, and mobile devices are synergistic with and reinforcing the capabilities of the P2P paradigm. There is general expectation in the technical community that P2P networking will continue to be an important tool for networked applications and impact the evo- tion of the Internet. A large amount of research activity has resulted in a relatively short time, and a growing community of researchers has developed. The Handbook of Peer-to-Peer Networking is dedicated to discussions on P2P networks and their applications. This is a comprehensive book on P2P computing.




Policy-Based Network Management


Book Description

A real-world approach to describing the fundamental operation of Policy-Based Network Management (PBNM) that enables practitioners to develop and implement PBNM systems.




Advances in Network Management


Book Description

Over the past two decades, business volume of hardware and software in the U.S has decreased by about seventy percent, while the cost of management and support has grown from $20 billion to $140 billion. With close to seventy percent of this growing figure being spent on the management of legacy systems and only thirty percent on new systems, improvements in the development of self-managing systems have become a cost-saving priority for many corporations and an issue of strategic importance for many economies. Investigating the latest theories, methods, and technologies, Advances in Network Management provides the insight of a recognized expert into the fundamental concepts and contemporary challenges in network management. From basic concepts to research-level material, it details the evolution of network management solutions in network management paradigms, protocols, and techniques. The book also addresses dependencies between network management and application-level service management. This forward-looking resource investigates advanced networks and network services including—autonomic computing, context-aware systems management, and automatic techniques aiming at self-management (self-configuration, self-healing, self-optimization, and self-protection). With its breadth and depth of coverage in theoretical, technical, and research topics, this book provides time-tested guidance for dealing with the growing complexity of network services while improving cost efficiencies in your IT department.




Active Networks and Active Network Management


Book Description

Active networking is an exciting new paradigm in digital networking that has the potential to revolutionize the manner in which communication takes place. It is an emerging technology, one in which new ideas are constantly being formulated and new topics of research are springing up even as this book is being written. This technology is very likely to appeal to a broad spectrum of users from academia and industry. Therefore, this book was written in a way that enables all these groups to understand the impact of active networking in their sphere of interest. Information services managers, network administrators, and e-commerce developers would like to know the potential benefits of the new technology to their businesses, networks, and applications. The book introduces the basic active networking paradigm and its potential impacts on the future of information handling in general and on communications in particular. This is useful for forward-looking businesses that wish to actively participate in the development of active networks and ensure a head start in the integration of the technology in their future products, be they applications or networks. Areas in which active networking is likely to make significant impact are identified, and the reader is pointed to any related ongoing research efforts in the area. The book also provides a deeper insight into the active networking model for students and researchers, who seek challenging topics that define or extend frontiers of the technology. It describes basic components of the model, explains some of the terms used by the active networking community, and provides the reader with taxonomy of the research being conducted at the time this book was written. Current efforts are classified based on typical research areas such as mobility, security, and management. The intent is to introduce the serious reader to the background regarding some of the models adopted by the community, to outline outstanding issues concerning active networking, and to provide a snapshot of the fast-changing landscape in active networking research. Management is a very important issue in active networks because of its open nature. The latter half of the book explains the architectural concepts of a model for managing active networks and the motivation for a reference model that addresses limitations of the current network management framework by leveraging the powerful features of active networking to develop an integrated framework. It also describes a novel application enabled by active network technology called the Active Virtual Network Management Prediction (AVNMP) algorithm. AVNMP is a pro-active management system; in other words, it provides the ability to solve a potential problem before it impacts the system by modeling network devices within the network itself and running that model ahead of real time.




Integrated Management of Systems, Services, Processes and People in IT


Book Description

This volume of the Lecture Notes in Computer Science series contains all papers accepted for presentation at the 20th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management (DSOM 2009), which was held in Venice, Italy, during October 27-28, 2009. DSOM 2009 was the 20th event in a series of annual workshops. It followed in the footsteps of previous successful meetings, the most recent of which were held on Samos, Greece (DSOM 2008), San Jos ́ e, California, USA (DSOM 2007), Dublin, Ireland (DSOM 2006), Barcelona, Spain (DSOM 2005), and Davis, C- ifornia, USA (DSOM 2004). The goal of the DSOM workshops is to bring - gether researchersfromindustry andacademia workingin the areasofnetworks, systems, and service management, to discuss recent advances and foster future growth. In contrast to the larger management conferences, such as IM (Inter- tional Symposium on Integrated Network Management) and NOMS (Network OperationsandManagementSymposium),DSOMworkshopshaveasingle-track program in order to stimulate more intense interaction among participants.




Managing Trust in Cyberspace


Book Description

Researchers and practitioners in fields such as distributed computing, Internet technologies, networked systems, information systems, human computer interaction, human behavior modeling, and intelligent informatics especially benefit from a discussion of future trust management research directions including pervasive and ubiquitous computing, wireless ad-hoc and sensor networks, cloud computing, social networks, e-services, P2P networks, near-field communications (NFC), electronic knowledge management, and nano-communication networks. Managing Trust in Cyberspace addresses fundamental issues underpinning computational trust models and covers trust management processes for dynamic open systems and applications in a tutorial style that aids in understanding. Topics include trust in autonomic and self-organized networks, cloud computing, embedded computing, multi-agent systems, digital rights management, security and quality issues in trusting e-government service delivery, and context-aware e-commerce applications. The book also presents a walk-through of online identity management and examines using trust and argumentation in recommender systems. It concludes with a comprehensive survey of anti-forensics for network security and a review of password security and protection. The role of trust management is to maximize trust between the parties and thereby provide a basis for cooperation to develop.