IFIP TC6 Open Digital Library

CNSM 2013: Zurich, Switzerland

CNSM is the successor of MANWEEK which included DSOM, MMNS, and IPOM

Proceedings of the 9th International Conference on Network and Service Management, CNSM 2013, Zurich, Switzerland, October 14-18, 2013

IEEE



Contents

9th International Conference on Network and Service Management (CNSM 2013)

Resource Management I

A scalable approach for structuring large-scale hierarchical cloud management systems.

Hendrik Moens, Filip De Turck

 1-8

Network aware virtual machine and image placement in a cloud.

David Breitgand, Amir Epstein, Alex Glikson, Assaf Israel, Danny Raz

 9-17

Dynamic Controller Provisioning in Software Defined Networks.

Md. Faizul Bari, Arup Raton Roy, Shihabur Rahman Chowdhury, Qi Zhang, Mohamed Faten Zhani, Reaz Ahmed, Raouf Boutaba

 18-25

Performance Management

More control over network resources: An ISP caching perspective.

Daphné Tuncer, Marinos Charalambides, Raul Landa, George Pavlou

 26-33

Network performance improvement through evaluation of bicriteria routing methods in transport networks.

Lúcia Martins, Joao Lopes, José M. F. Craveirinha, João C. N. Clímaco, Ricardo Cadime, Catarina Monica

 34-41

Characterizing the impact of network substrate topologies on virtual network embedding.

Marcelo Caggiani Luizelli, Leonardo Richter Bays, Luciana Salete Buriol, Marinho P. Barcellos, Luciano Paschoal Gaspary

 42-50

Resource Management II

A formal approach for virtual machine migration planning.

Saeed Al-Haj, Ehab Al-Shaer

 51-58

Classifying server behavior and predicting impact of modernization actions.

Jasmina Bogojeska, David Lanyi, Ioana Giurgiu, George Stark, Dorothea Wiesmann

 59-66

Real-time adaptive algorithm for resource monitoring.

Mauro Andreolini, Michele Colajanni, Marcello Pietri, Stefania Tosi

 67-74

Quality Management

Pazl: A mobile crowdsensing based indoor WiFi monitoring system.

Valentin Radu, Lito Kriara, Mahesh K. Marina

 75-83

Leveraging attention scarcity to improve the overall user experience of Cloud services.

Marco Aurélio Stelmar Netto, Marcos D. Assuncao, Silvia Bianchi

 84-91

Update aware replica placement.

Assaf Rappaport, Danny Raz

 92-99

Poster Session

OnTimeSecure: Secure middleware for federated Network Performance Monitoring.

Prasad Calyam, Shweta Kulkarni, Alex Berryman, Kunpeng Zhu, Mukundan Sridharan, Rajiv Ramnath, Gordon Springer

 100-104

Automated source code extension for debugging of OpenFlow based networks.

Stefan Hommes, Frank Hermann 0001, Radu State, Thomas Engel

 105-108

Guaranteeing consistency between large replicated writable disk images.

Sean Rooney, Luis Garcés-Erice

 109-113

Optimizing crowd based monitoring in large scale mobile networks.

Jan Groenendijk, Yangcheng Huang

 114-117

A design and implementation of dual-stack aware authentication system for enterprise captive portal.

Surasak Sanguanpong, Kasom Koht-Arsa

 118-121

Monitoring latency with OpenFlow.

Kevin Phemius, Mathieu Bouet

 122-125

Impact of rare alarms on event correlation.

Anne Bouillard, Aurore Junier, Benoit Ronot

 126-129

Measuring TCP connection establishment times of dual-stacked web services.

Vaibhav Bajpai, Jürgen Schönwälder

 130-133

Towards a trust computing architecture for RPL in Cyber Physical Systems.

Sebastian Seeber, Anuj Sehgal, Björn Stelte, Gabi Dreo Rodosek, Jürgen Schönwälder

 134-137

Gravitational networks: Self-organizing network topologies into hierarchically structured domains.

Martin Johnsson, Brendan Jennings

 138-142

Identifying missed monitoring alerts based on unstructured incident tickets.

Liang Tang, Tao Li, Larisa Shwartz, Genady Grabarnik

 143-146

Volume is not enough: SVC-aware server allocation for peer-assisted streaming.

Julius Rückert, Osama Abboud, Martin Kluge, David Hausheer

 147-151

Lightweight link dimensioning using sFlow sampling.

Ricardo de Oliveira Schmidt, Ramin Sadre, Anna Sperotto, Aiko Pras

 152-155

Choreographing configuration changes.

Herry Herry, Paul Anderson, Michael Rovatsos

 156-160

Joint optimization for the delivery of multiple video channels in Telco-CDN.

Fen Zhou, Jiayi Liu, Gwendal Simon, Raouf Boutaba

 161-165

A distributed approach to dynamic VM management.

Michael Tighe, Gastón Keller, Michael Bauer, Hanan Lutfiyya

 166-170

Detecting anomalies in cellular networks using an ensemble method.

Gabriela F. Ciocarlie, Ulf Lindqvist, Szabolcs Nováczki, Henning Sanneck

 171-174

Assessment and event based analysis of dynamic wireless networks.

Denis Carvin, Guillaume Kremer, Philippe Owezarski, Pascal Berthou

 175-179

A cloud monitoring framework for self-configured monitoring slices based on multiple tools.

Marcio Barbosa de Carvalho, Rafael Pereira Esteves, Guilherme da Cunha Rodrigues, Lisandro Zambenedetti Granville, Liane Margarida Rockenbach Tarouco

 180-184

SLA impact modeling for service engagement.

Yixin Diao, Linh Lam, Larisa Shwartz, David M. Northcutt

 185-188

Reliability estimation in mobile ad hoc networks.

Ritu Chadha, Alexander Poylisher, Constantin Serban

 189-192

Dynamic multi-stage Energy-Saving Management mechanism based on Base Station cooperation.

Peng Yu, Wenjing Li, Yulin Su, Xuesong Qiu

 193-197

Efficient probing method for active diagnosis in large scale network.

Lu Guan, Ying Wang, Wenjing Li, Congxian Yan

 198-202

Wireless Sensor Networks

Adaptive network management for countering selective capture in wireless sensor networks.

Hamid Al-Hamadi, Ing-Ray Chen

 203-210

CoMaDa: An adaptive framework with graphical support for Configuration, Management, and Data handling tasks for wireless sensor networks.

Corinna Schmitt, Andre Freitag, Georg Carle

 211-218

Thwarting attacks on ZigBee - Removal of the KillerBee stinger.

Björn Stelte, Gabi Dreo Rodosek

 219-226

Security Management

Towards real-time intrusion detection for NetFlow and IPFIX.

Rick Hofstede, Václav Bartos, Anna Sperotto, Aiko Pras

 227-234

A probabilistic cost-efficient approach for mobile security assessment.

Martín Barrère, Gaetan Hurel, Remi Badonnel, Olivier Festor

 235-242

Refactoring multi-layered access control policies through (De)composition.

Matteo Maria Casalino, Romuald Thion

 243-250

Monitoring

Scalable matching and ranking for network search.

Misbah Uddin, Rolf Stadler, Alexander Clemm

 251-259

Analysis of YouTube user experience from passive measurements.

Giorgos Dimopoulos, Pere Barlet-Ros, Josep Sanjuàs-Cuxart

 260-267

Efficient distributed monitoring in 6LoWPAN networks.

Abdelkader Lahmadi, Alexandre Boeglin, Olivier Festor

 268-276

Inter-Domain Quality-of-Service

SLA learning from past failures, a Multi-Armed Bandit approach.

Lise Rodier, David Auger, Johanne Cohen, Hélia Pouyllau

 277-283

Auction-type framework for selling inter-domain paths.

Xavier Misseri, Jean-Louis Rougier, Stefano Moretti

 284-291

On the manipulability of voting systems: application to multi-operator networks.

François Durand, Fabien Mathieu, Ludovic Noirie

 292-297

Charging Strategies for Content Delivery and Internet Access

The trouble with choice: An empirical study to investigate the influence of charging strategies and content selection on QoE.

Andreas Sackl, Patrick Zwickl, Peter Reichl

 298-303

When free riding is the best choice: The case of network charges for content providers.

Maurizio Naldi, Giuseppe D'Acquisto

 304-309

Incentivizing efficient load repartition in heterogeneous wireless networks with selfish delay-sensitive users.

Vladimir Fux, Patrick Maillé

 310-316

7th International DMTF Academic Alliance Workshop on Systems and Virtualization Management – Standards and the Cloud (SVM)

SESSION 2

OpenSAF and VMware from the perspective of high availability.

Ali Nikzad, Ferhat Khendek, Maria Toeroe

 324-331

Integrating VM selection criteria in distributed dynamic VM consolidation using Fuzzy Q-Learning.

Seyed Saeid Masoumzadeh, Helmut Hlavacs

 332-338

Integrating an online configuration checker with existing management systems: Application to CIM/WBEM environments.

Ludi Akue, Emmanuel Lavinal, Thierry Desprats, Michelle Sibilla

 339-344

SESSION 3

An approach for knowledge-based IT management of air traffic control systems.

Fabian Meyer, Reinhold Kröger, Ralf Heidger, Morris Milekovic

 345-349

Who decides migration? A migration lock mechanism for virtual machines.

Xiaolin Wang, Yingwei Luo, Zhenlin Wang

 350-354

SESSION 4

Adapting applications to exploit virtualization management knowledge.

Vitalian A. Danciu, Alexander Knapp

 355-363

Towards an improved data centre simulation with DCSim.

Michael Tighe, Gastón Keller, Jamil Shamy, Michael Bauer, Hanan Lutfiyya

 364-372

Workshop on Social-aware Economic Traffic Management for Overlay and Cloud Applications (SETM 2013)

Video Delivery

Multi-source cooperative adaptation for QoE-aware video multicast rate-control.

Kaliappa Ravindran

 373-381

Determining leaders and clusters in video consumption.

Danny De Vleeschauwer, Chris Hawinkel, Yannick Le Louédec

 382-385

Video delivery over next generation cellular networks.

Manos Dramitinos, Nan Zhang, Miroslaw Kantor, José Costa-Requena, Ioanna Papafili

 386-393

Network Traffic Management

Networking solutions in the federation of clouds.

Roman Lapacz, Blazej Pietrzak

 394-397

Dynamic traffic management mechanism for active optimization of ISP costs.

Zbigniew Duliñski, Rafal Stankiewicz

 398-401

User Involved Approaches

HORST - Home router sharing based on trust.

Michael Seufert, Valentin Burger, Tobias Hoßfeld

 402-405

Reciprocity with virtual nodes: Supporting mobile peers in Peer-to-Peer content distribution.

Matthias Wichtlhuber, Peter Heise, Bjorn Scheurich, David Hausheer

 406-409