TUTORIALS
Program at-a-glance
Monday
Morning |
T1:
Management Platforms and Service Management |
T2:
Management of Service Level Agreements |
T3:
Event Correlation Technologies Management |
T4:
Java Management Extensions (JMX) |
Monday
Afternoon |
T5:
Internet Management Protocols |
T6:
Policy Based Network and Security Management |
T7:
Designing for Effective Event Management |
|
Friday
Morning |
T8:
Architectures, Control, and Management of IP-over-Optical
Networks |
T9:
Common Information Management (CIM) |
T10:
Active Network Techniques in Network |
T11:
Shattered Security: A Clear View Through Glass Fortresses |
Friday
Afternoon |
T12:
Virtual Private Networks |
T13:
Directory Enabled Networks (DEN) |
T14:
Jini-based Management of Networks and Distributed Systems |
|
T1: Management Platforms and Service Management
Joseph Ghetie, Telcordia Technologies,
USA
This tutorial analyzes
the state of management platforms and their evolution from network
management to system management and service management. Service
management concepts, criteria, and metrics associated with Quality
of Services and Service Level Agreements are also discussed. The
tutorial explores the capabilities of the new generation of management
platforms in providing solutions and applications focused on service
management of enterprise-wide and telecommunications networks.
T2: Management of Service Level Agreements
Lundy Lewis, Aprisma Management Technologies,
USA
A current trend among
enterprises, service providers, and Telcos is the development of
service level agreements. SLAs are contracts between providers and
consumers -- replete with punishment and reward clauses relative
to the degree to which agreed services are met. However, vendor
support of SLA management is fragmented. Some vendors promote statistics
reporting as the essence of SLA management, while other vendors
promote application monitoring, service development, business process
re-engineering, supplier/consumer negotiation, or contract development
as the essence of SLA management. In this sort of situation, a general
definitive framework that subsumes piecemeal approaches does much
good. In this tutorial we provide a framework that serves as a baseline
against which one may situate, evaluate, and execute SLA programs.
We provide (i) definitions that lead to the broader concept of Service
Level Management (SLM), (ii) a general SLM process, (iii) an SLM
architecture, (iv) research challenges, (v) current tools and applications,
and (iv) case studies.
T3: Event Correlation Technologies Applied
to Advanced Network and Service Management
Gabriel Jacobson, Verizon Laboratories,
USA
This tutorial is targeted
to a wide audience of network management R&D personnel, network
operators, and vendors. The tutorial discusses the issues and solutions
of next generation event correlation systems, their applications
and enabling technologies. Event correlation is a widely accepted
technology for managing the complexity of modern telecommunication
and data networks. It has been mostly used for network fault detection
and root cause analysis; however, the most recent applications have
broadened the scope of event correlation including the network performance
and service quality management. The first part of the tutorial explains
the basic concepts of real-time event correlation, describes various
approaches to event correlation, including rule-, case-, and model-based
reasoning, finite state machines, and binary coding methods. We
will also discuss the architecture of distributed correlation services.
The second part reviews existing products of event correlation and
describes the process of development and deployment of event correlation
applications. The third part of the tutorial is devoted to the new
research issues and future trends in the application of event correlation
systems.
T4: Java Management Extensions (JMX)
Swee Lim, Sun Microsystems, USA
As Java moves from "cool"
to "critical," the need to manage Java based devices and applications
has become the latest challenge for the enterprise. Java Management
Extensions (JMX) provides the management instrumentation APIs that
are needed to create manageable applications of any class while
maintaining a short learning curve, low programming burden (as little
as a few lines of code!), and management system vendor independence.
JMX has been targeted to support embedded to enterprise Java resources.
In this tutorial we will briefly introduce application management
concepts and identify which management needs JMX is intended to
satisfy; provide a technical overview of JMX technologies, its compliance
levels, its components, and its future; review the JMX APIs and
class structure..
T5: Internet Management Protocols
Aiko Pras, University of Twente, The Netherlands
This tutorial presents
the state-of-the-art of Internet management protocols, as being
defined within the IETF. It discusses the history of such protocols,
and reviews the developments with respect to the Structure of Management
Information (SMI), Management Information Bases (MIBs) as well as
the Simple Network Management Protocol (SNMP). In particular it
discusses the differences between SMIv1 and SMIv2, the MIBs that
have been derived from the MIB-II, and the development from SNMPv1
via SNMPv2 to SNMPv3. Other topics that will be addressed are extensible
agent technology (AgentX) and distributed management (DisMan). The
tutorial concludes with a discussion of recent developments within
the IETF and IRTF management groups.
T6: Policy Based Network and Security Management
Morris Sloman, Emil Lupu, Imperial College,
UK
There is considerable
interest in how to specify policy for management of multi-service
networks, role based access control and trust for e-commerce. In
management systems, interpreting policy rather than coding it into
the management components provides a means of implementing dynamically
adaptive bandwidth allocation and Quality of Service (QoS) management.
Policies can be changed dynamically in order to change the management
strategy and behavior of the management system. Role Based Access
Control (RBAC) provides a flexible means of grouping permissions
relating to positions in the organization so that people can be
assigned to roles without changing policy. This half-day tutorial
will explain what is policy, why it is needed and will give an overview
of the policy work going on in both the network management and security
communities. This will include the RBAC, model, Trust Policy Language
(from IBM), and the Policy Definition Language from Lucent. The
tutorial will present in more detail the Ponder Policy Framework
(see http://www-dse.doc.ic.ac.uk/policies) which provides a declarative,
object-oriented language for specifying both security and management
policies. Ponder, supports a rich set of constructs for grouping
policies in roles, relationships and management structures. We will
cover the issues relating to refining high-level enterprise goals
into implementable policies; detecting and resolving conflicts and
how to specify semantic meta-policies or constraints on the permitted
policies within the system to cater for conflicts of duties etc.,
as well as issues relating to implementation and deployment of policies
in a distributed environment.
T7: Designing for Effective Event Management
David Thoenen, IBM Corporation, USA
It is commonly accepted
that the impact on the corporate bottom-line of IT business application
services is directly proportional to the up-front investment in
analysis of system requirements and development of detailed implementation
specifications. Experience now teaches that this is also true for
the implementation of event management systems. This tutorial will
present a step-by-step process for assessment of event processing
and correlation requirements and development of detailed specifications
for their implementation. The tutorial will draw upon examples collected
over the course of over fifty successful design projects. Steps
within this design process to be addressed include: ¥ Defining scope
of the design; why and how to focus upon specific business services.
¥ Developing enterprise policy for event processing; why and how
to use business principles as a foundation for technical decisions.
¥ Researching and documenting event repertoires; why the need for
comprehensive event analysis (and how to do it quickly). ¥ Applying
policy when making event filtering decisions; how to view event
filtering as a business exercise and achieve dramatic results in
event volume reduction. ¥ Utilizing systematic methodology for event
correlation analysis; why correlate, how to determine which events
require correlation and how to decipher their correlation requirements.
T8: Architectures, Control, and Management
of IP-over-Optical Networks
Chien-Chung Shen, University of Delaware,
USA
Driven by the demand
for network bandwidth (customer pull) and the advances in WDM technology
(technology push), the next generation Internet is expected to be
an IP-based optical WDM network, where the integration of gigabit/terabit
IP routers with WDM switching and transmission systems creates optimized
transport networks to support Internet's phenomenal growth. The
shift from a static point-to-point architecture towards a dynamic
IP over re-configurable WDM architecture raises new issues and demands
new techniques from the network control and management perspective,
The tutorial will begin with an introduction to IP and optical networking
technologies (gigabit/terabit IP routers and optical cross-connects),
and describe the interconnection models of IP over re-configurable
WDM network architecture. The tutorial will then discuss control
and management issues of IP over re-configurable WDM networks and
describe multi-protocol lambda switching for optical cross-connect,
configuration management and routing, fault management and restoration,
and performance management and traffic engineering. Recent research
on IP over Switched WDM (optical burst/label switching) will also
be described.
T9: Common Information Management (CIM)
Andrea Westerinen, Cisco Systems, USA
The Common Information
Model (CIM) from the Distributed Management Task Force (DMTF) has
undertaken an ambitious task - to describe the "managed environment,"
from computer systems and their devices, to software, users, networks
and policy. This tutorial overviews the design of CIM, its importance
to WBEM and DEN, and how to get started using CIM. Each of the component
models (such as Core, System, User and Network) are discussed at
a high level. Their design goals and scope are summarized.
T10: Active Network Techniques in Network
Management
Danny Raz, Technion, Israel, and Lucent
Technologies, USA
"Active networks" denotes
a framework where network elements, primarily routers and switches,
are programmable. Programs that are injected into the network are
executed by the network elements to achieve higher flexibility for
networking functions, and to present new capabilities for higher
layer functions by allowing data fusion in the network layer. In
this tutorial, the technology developed recently by the active network
research community will be surveyed. The tutorial will focus on
the various ways this technology can be used both to develop better
NM tools and to support fast development and deployment of value-added
services in the network. Relevant standards efforts for active networks
and programming interfaces (such as ANEP, and IEEE P1520) will be
summarized.
T11: Shattered Security: A Clear View Through
Glass Fortresses
Michael S. Greenberg, Sandstorm Enterprises
and Theophany Holding, USA
If there was an Information
War, and your network was part of the battlefield, would you know?
The answer is not encouraging. Based on the old information fortress
model, the current computer security paradigm is insufficient to
secure computers in the modern distributed and networked computing
environment. The current security situation is in crisis. Developing
technologies -- such as mobile agents, objects, and embedded macros
-- further strain automated security policies while faster and better
connectivity makes detection of security breaches more complex.
This tutorial will cover the fundamentals of the modern security
paradigm and how it fails in the current computing environment.
We will describe the existing computing environment, and the threats
and risks associated with it. We will survey the fundamental building
blocks of computer security, and how they are commonly integrated
to protect machines and networks. We will then go into depth on
techniques used to attempt to secure mobile agents and the hosts
they visit to expose the strengths and weaknesses of the current
security paradigm. We will investigate the reasons the current paradigm
is insufficient, analyze malicious programs and strategies, and
survey proposed solutions. To conclude, we will discuss the need
for a new paradigm in computer security and how security and network
management techniques may be used together to attempt to improve
the security situation.
T12: Virtual Private Networks: Architectures,
Design, Planning and Management
Raouf Boutaba, University of Waterloo,
Canada
This tutorial provides
a practical understanding of virtual private networks (VPNs) and
a foundation for evaluating them from the perspectives of business
benefits as well as technical requirements. Examples from real-world
experiences provide an insightful view of the advantages of this
technology and the pitfalls to avoid in choosing or designing a
VPN. The tutorial particularly emphasises the technical aspects
related to the planning, implementation, operation and administration
of VPNs.
T13: Directory Enabled Networks (DEN)
John Strassner, Cisco Systems, USA
This tutorial will provide
a brief overview of directories, and focus on how to map an information
model into a form that can be stored in a directory and manipulated
using the LDAPv3 access protocol. It will then briefly review the
DEN policy model and explain how that model can be mapped into a
directory. It will then provide a detailed example of how the model
can be used in practice. The tutorial will conclude with the overview
of how policy system can be implemented using CIM, DEN and Ponder
Policy Framework.
T14: Jini-Based Management of Networks
and Distributed Systems
Gerd Aschemann and Peer Hasselmeyer,
TU Darmstadt, Germany
Jini, a Java-based network
infrastructure from Sun Microsystems, seems to be very promising
- if used appropriately - to become a new enabling technology for
the management of networks, distributed systems, and distributed
applications. In the future there will be a huge market for small
and medium sized management solutions which need to integrate several
technologies and existing products. Much more automation of management
tasks, particularly integration of new entities (devices and services),
and configuration of managed systems will be required. Jini enhances
such integration and automation and has the ability to replace the
monolithic management platforms and huge management frameworks of
the past by a well-suited collection of small and adequate management
services (or at least to split them up accordingly). Even in the
field of large-sized management solutions, a new Jini-based standard
has recently been released: the Federated Management Architecture
(FMA). This tutorial will introduce Jini and related technologies,
e.g., Java Spaces and FMA, and investigate Jini from the viewpoint
of management, i.e., show how it could enhance typical management
tasks on the one hand, and on the other hand, show how federations
of Jini-enabled devices and services could be managed.
|