Knowledge of the largest trac flows in a network is im- portant for many network management appli... more Knowledge of the largest trac flows in a network is im- portant for many network management applications. The problem of finding these flows is known as the heavy-hitter problem and has been the subject of many studies in the past years. One of the most ecient and well-known algo- rithms for finding heavy hitters is lossy counting (29). In this work we introduce probabilistic lossy counting (PLC), which enhances lossy counting in computing network traf- fic heavy hitters. PLC uses on a tighter error bound on the estimated sizes of trac flows and provides probabilistic rather than deterministic guarantees on its accuracy. The probabilistic-based error bound substantially improves the memory consumption of the algorithm. In addition, PLC reduces the rate of false positives of lossy counting and achieves a low estimation error, although slightly higher than that of lossy counting. We compare PLC with state-of-the-art algorithms for find- ing heavy hitters. Our experiments using real tr...
TINA '99. 1999 Telecommunications Information Networking Architecture Conference Proceedings (Cat. No.99EX368), 1999
ABSTRACT This paper introduces a mobile agent based implementation of a modified TINA access sess... more ABSTRACT This paper introduces a mobile agent based implementation of a modified TINA access session to support personal mobility and retailer selection. The presented design allows users to access services according to their personal profiles even though they are visiting a foreign domain. The market of retailers, content and connectivity providers is envisioned to be open and competitive to the extent that the user is able to choose the service offer suiting his needs in the most optimal way in each session. The key innovations are the implementation of specialized user agents and the extension of access sessions with retailer selection sequences. Within the design, the TINA user agent is replaced by several specialized mobile agents
2010 International Conference on Network and Service Management, 2010
ABSTRACT Associating business information with information about IT resources is important. Organ... more ABSTRACT Associating business information with information about IT resources is important. Organizations need to understand the business relevance of resources to answer questions such as which business applications are affected in case of a server outage, and to understand the resource footprint of business applications. Maintaining this relationship over the life cycles of resources and business applications is difficult because data on business applications and IT configuration information are maintained very differently. Business application information is maintained by employees in the course of a management process, whereas IT configuration information can be maintained more vigorously by scanning IT resources and storing the results in a Configuration Management Database (CMDB), where this actual configuration information can be reconciled with an authorized configuration. This paper proposes an approach to associate business application information with configuration information by “watermarking” IT resources with references to information on the business purpose they serve. This enables the establishment of a relationship between automatically detected and manually managed information in a consistent, reliable, and cost-effective way as well as the identification of inconsistencies that may develop over time.
Knowledge of the largest trac flows in a network is im- portant for many network management appli... more Knowledge of the largest trac flows in a network is im- portant for many network management applications. The problem of finding these flows is known as the heavy-hitter problem and has been the subject of many studies in the past years. One of the most ecient and well-known algo- rithms for finding heavy hitters is lossy counting (29). In this
Abstract Today's known and widely used active queue man-agement (AQM) schemes do not differ... more Abstract Today's known and widely used active queue man-agement (AQM) schemes do not differentiate between packets from responsive (eg, TCP sessions) and non-responsive traffic (eg, UDP). This results in further widening the gap of unfair advantage already inherent to ...
Knowledge of the largest trac flows in a network is im- portant for many network management appli... more Knowledge of the largest trac flows in a network is im- portant for many network management applications. The problem of finding these flows is known as the heavy-hitter problem and has been the subject of many studies in the past years. One of the most ecient and well-known algo- rithms for finding heavy hitters is lossy counting (29). In this work we introduce probabilistic lossy counting (PLC), which enhances lossy counting in computing network traf- fic heavy hitters. PLC uses on a tighter error bound on the estimated sizes of trac flows and provides probabilistic rather than deterministic guarantees on its accuracy. The probabilistic-based error bound substantially improves the memory consumption of the algorithm. In addition, PLC reduces the rate of false positives of lossy counting and achieves a low estimation error, although slightly higher than that of lossy counting. We compare PLC with state-of-the-art algorithms for find- ing heavy hitters. Our experiments using real tr...
TINA '99. 1999 Telecommunications Information Networking Architecture Conference Proceedings (Cat. No.99EX368), 1999
ABSTRACT This paper introduces a mobile agent based implementation of a modified TINA access sess... more ABSTRACT This paper introduces a mobile agent based implementation of a modified TINA access session to support personal mobility and retailer selection. The presented design allows users to access services according to their personal profiles even though they are visiting a foreign domain. The market of retailers, content and connectivity providers is envisioned to be open and competitive to the extent that the user is able to choose the service offer suiting his needs in the most optimal way in each session. The key innovations are the implementation of specialized user agents and the extension of access sessions with retailer selection sequences. Within the design, the TINA user agent is replaced by several specialized mobile agents
2010 International Conference on Network and Service Management, 2010
ABSTRACT Associating business information with information about IT resources is important. Organ... more ABSTRACT Associating business information with information about IT resources is important. Organizations need to understand the business relevance of resources to answer questions such as which business applications are affected in case of a server outage, and to understand the resource footprint of business applications. Maintaining this relationship over the life cycles of resources and business applications is difficult because data on business applications and IT configuration information are maintained very differently. Business application information is maintained by employees in the course of a management process, whereas IT configuration information can be maintained more vigorously by scanning IT resources and storing the results in a Configuration Management Database (CMDB), where this actual configuration information can be reconciled with an authorized configuration. This paper proposes an approach to associate business application information with configuration information by “watermarking” IT resources with references to information on the business purpose they serve. This enables the establishment of a relationship between automatically detected and manually managed information in a consistent, reliable, and cost-effective way as well as the identification of inconsistencies that may develop over time.
Knowledge of the largest trac flows in a network is im- portant for many network management appli... more Knowledge of the largest trac flows in a network is im- portant for many network management applications. The problem of finding these flows is known as the heavy-hitter problem and has been the subject of many studies in the past years. One of the most ecient and well-known algo- rithms for finding heavy hitters is lossy counting (29). In this
Abstract Today's known and widely used active queue man-agement (AQM) schemes do not differ... more Abstract Today's known and widely used active queue man-agement (AQM) schemes do not differentiate between packets from responsive (eg, TCP sessions) and non-responsive traffic (eg, UDP). This results in further widening the gap of unfair advantage already inherent to ...
Uploads
Papers by Andreas Kind