<p>This book consitutes the refereed proceedings of the 5th International Conference on Intelligence in Services and Networks, IS&N'98 in Antwerp, Belgium, in May 1998. IS&N'98 was devoted to Technology for Ubiquitous Telecom Services. The 40 revised full papers presented in a homogeneous style and
Intelligence in Services and Networks: Technology for Ubiquitous Telecom Services: 5th International Conference on Intelligence in Services and ... (Lecture Notes in Computer Science, 1430)
β Scribed by Sebastiano Trigila (editor), Al Mullery (editor), Mario Campolargo (editor), Hans Vanderstraeten (editor), Marcel Mampaey (editor)
- Publisher
- Springer
- Year
- 1998
- Tongue
- English
- Leaves
- 1099
- Edition
- 1998
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This book consitutes the refereed proceedings of the 5th International Conference on Intelligence in Services and Networks, IS&N'98 in Antwerp, Belgium, in May 1998. IS&N'98 was devoted to Technology for Ubiquitous Telecom Services. The 40 revised full papers presented in a homogeneous style and editing were selected from more than 80 submissions. The book is divided in sections on quality of service, service management, agent technology and applications, architechtures, mobility, platforms, electronic commerce, service creation, network management, gateways to CORBA, and security.
β¦ Table of Contents
Front matter
Chapter 1
Chapter 2
Chapter 3
Chapter 4
1 Introduction
2 The MISA Management System
3 Routing in Multi-domain Networks
4 Two Approaches to Routing
4.1 The On-Demand Routing Model
The Inter Domain Routing Approach
The Intra-Domain Routing Approach
4.2 The Pre-calculation Routing Model
The Intra-Domain Routing Approach
The Inter-domain Routing Approach
4.3 Pros and Cons of the Two Routing Approaches
5 Acknowledgements and Conclusions
6 References
7 Abbreviations
Chapter 5
Chapter 6
Chapter 7
Chapter 8
Chapter 9
Chapter 10
Chapter 11
Chapter 12
Chapter 13
Chapter 14
Chapter 15
Chapter 16
Chapter 17
Chapter 18
Chapter 19
Chapter 20
1 Introduction
2 An Outline of the Design Methodology
3 System Model and Problem Formulation
4 Examples
5 Conclusions
References
Chapter 21
Chapter 22
Chapter 23
Chapter 24
Chapter 25
Chapter 26
Chapter 27
Chapter 28
Chapter 29
Chapter 30
Chapter 31
Chapter 32
Chapter 33
Chapter 34
Chapter 35
1 Introduction
2 Current Telecommunication World
3 SISTINA Solution
4 SISTINA Architecture
5 SISTINA Service Features
5.1 Provision of Guaranteed QoS
5.2 SISTINA Integrated Billing
5.3 Confidence
6 Internet End Users Enjoy Accountable and Guaranteed Services
7 Conclusions
Acknowledgements
List of Acronyms
References
Chapter 36
Chapter 37
Chapter 38
Chapter 39
Chapter 40
Chapter 41
Chapter 42
Chapter 43
Chapter 44
Chapter 45
Chapter 46
Chapter 47
Chapter 48
1 Introduction
2 The IN Queueing Model
3 Estimation of Queue Arrival Rates and Loads
4 Call Weights
5 The IN Congestion Control Strategy
6 Facilitation of FDOC
7 Equations for the Decomposition Method
8 Results
8.1 Scenario 1: Stationary Case
8.2 Scenario 2: Overload of one or more SSPs
8.3 Scenario 3: SCP Overload
8.4 Scenario 4: General Overload
8.5 Scenario 5: Overload due to Bursty Traffic
9 Conclusion
References
Chapter 49
Chapter 50
Chapter 51
Chapter 52
Chapter 53
Chapter 54
Chapter 55
Chapter 56
Chapter 57
Chapter 58
1 Introduction
1.1 Charging and Billing Aspects
2 Charging System Issues
2.1 Reference Model
2.2 Connection Phase, Connection and Call Detail Records
Connection Phase
Connection Detail Record
Call Detail Record
3 Measurement Points
3.1 Definition and classification
3.2 Physical/Functional Location
4 Usage Metering Parameters
4.1 Usage Metering Components
Fixed component
Call Characteristics Component
5 PNO-PNO Interface
5.1 Measured Parameters
5.2 Transferred Parameters
5.3 Transfer Mechanisms
Network Element Level
Network Management Level
5.4 Security Aspects
6 Demands For Network Elements
6.1 Measuring of QoS
6.2 Charging Record Generation and Storage
7 Conclusions
Acknowledgments
References
Chapter 59
1 Introduction
2 Preliminary Results of P610.
2.1 Identification of Requirements for the Management of Multimedia Services
2.2 State of the Art Analysis
2.3 Common Terms of Reference
3 Framework
3.1 Scope and Definitions
3.2 Overall Principles
3.3 Reference Models
3.3.1 Business Model
3.3.2 The Service Life-Cycle Model
3.3.3 Naming/Directory Model
3.3.4 Layered Model
3.4 Requirements
4 Architecture
4.1 Notation
4.2 Root Architecture
5 Methodology
6 Case Studies
7 Conclusions
References
Chapter 60
1 Introduction
1.1 Concept of mobility
1.3 Concept of role mobility
1.4 Objectives
2 Enterprise aspects
3 Information aspects
4 Computational aspects
5 Deploying role mobility
6 Conclusions
7 Further work
Acknowledgements
References
Chapter 61
1 Introduction
2 Integration of TMN and CORBA
2.1 Traditional TMN Approach:- Pros and Cons
2.2 Opening the Management Application
OMG CORBA.
The CORBA way.
CORBA Wrapping of a TMN agent.
3 Designing the Open Interface
3.1 A Practical Implementation Example
3.2 Designing an CORBA Manager- Use Cases
Domain Use Case.
3.3 Making a Corba Manager
Generating IDL from the GDMO/ASN.1 Specification
Generating the CORBA Gateway
4 Web Enabled Front End Manager
5 Implementation Experiences
6 Conclusions
7 References
Chapter 62
Chapter 63
1 Introduction
1.1 The Need for a Unified Network Management System
1.2 Intelligent Agents & Multi-Agent Systems
1.3 Requirements on an Architecture for a Multi-Agent System
2 ASL - Open Agent Architecture
2.1 Agent Management
2.2 Extending the ASL
3 Applications of the ASL to Unifying Network and Service Management
3.1 Application Areas
3.2 Network Management
3.3 Service Management
3.4 Service Delivery
3.5 Legacy Systems Integration / Wrapping
4 Conclusions
4.1 Use of Agent Technology as a Unifying Approach to Network and Service Management
4.2 Future Work
References
Chapter 64
1 Introduction
2 A Brief Overview of Agent Technology
3 EURESCOM Project βIntelligent and Mobile Agen
3.1 Approach
3.2 Workplan
4 Case Studies
4.1 Configuration Case Study
4.2 Maintenance Case Study
4.3 Experiments
5 Summary and Future Work
Acknowledgements
Disclaimer
References
Chapter 65
1 Introduction
2 Introducing ANTS
2.1 Hierarchical Grouping of Switches
2.2 An Agentβs Internal Structure
2.3 The Database Model
2.4 Data Types
3 Advantages of ANTS in Network Management
3.1 Connection Setup
3.2 Adapting the PNNI Bootstrap Procedures
3.4 Error Recovery Using a Limited Flooding Algorithm
3.5 Dynamic Renegotiation of Traffic Contracts
3.6 Higher Level Services
4 Conclusion
References
Chapter 66
Chapter 67
1 Introduction
2 Architecture of the User Interface Component
3 Integration of Input / Output Devices
4 Unified Design and Rule-Based Adaptation
5 Adaptation Mechanism
5.1 Adaptability
5.2 Adaptivity
6 Discussion and Future Work
7 Acknowledgements
8 References
Chapter 68
1 Introduction
2 Background and Motivation
2.1 Integrating Java Clients and ATM Transport in a TINA-C Service Architecture
2.2 Extending the Existing Java.net API
2.3 A Native ATM API for Java
3 Design and Implementation
3.1 Endpoint
4 Implementation of Java Native Methods
4.1 Linux Environment
4.2 Windows Environment
4.3 Loading Dynamic Libraries
4.4 Size of Code and Executables
5 Conclusions
5.1 Applications for Extensions of Java.net API
5.2 Applications for Native ATM API
5.3 Relationship of Native ATM API to TINA-C Architecture
5.4 Ongoing Work
References
Chapter 69
1. Introduction
2. The TINA Business Model in an Open Services Market
3. TINA and Internet-Related Network Architectures
4. Example: A Composite Tele-education Service
5. Discussion
6. Conclusion
7. Acknowledgments
References
Chapter 70
1 Introduction
2 The NMF Peer-to-Peer Service Configuration Team
3 Object-Oriented Analysis, Design and Information Model
3.1 Modelling Approach
3.2 Information Model
4 Experiences with Protocol and Technology Independent Modelling
5 Conclusions
References
Chapter 71
1. Objectives of the VITAL Project
2. The VITAL Open Distributed Telecommunications Architecture
3. The VITALv2 Terminal Architecture
4. The VITALv2 Services
4.1 End-User Applications and Services
4.2 Operator Services
5. Trial Conclusions
6. Conclusions
References
Chapter 72
Introduction and Motivation
Business Relations in TINA
Service Federation Requirements and Principles
Context Negotiation and Service Transactions
Supporting Service Architecture Concepts
Information Viewpoint
Computational Viewpoint
Scenarios
Future work
Conclusions
Chapter 73
Chapter 74
Chapter 75
Introduction
Architecture Description
Application Description
Distributed Processing Environment (DPE)
Native Computing and Communications Environment (NCCE)
Location Transparency Applied to Terminal Mobility
The Paging Procedure.
NCCE Level Paging
DPE Level Paging
Application Level Paging
Conclusion
References
List of Acronyms
Chapter 76
1 Introduction
2 Business Vision
3 An Advanced Hypermedia Information Browsing
3.1 The Gateway Approach
3.2 Full OSAM Approach
4 Summary
References
Chapter 77
Chapter 78
1 Introduction
2 Basic Capabilities of Mobile Agent Platforms
3 Integrating Mobile Agent Technology and CORBA
4 Concepts of a Generic CORBA Based Mobile Agent Platform
5 MA Based "IN Service" Provision in PSTN Environments
6 Summary
Acknowledgement
References
Chapter 79
Chapter 80
1 Introduction
2 TMN and Transactions
2.1 Architectural Context and Analysis
2.1.1 The TMN Architecture
2.1.2 Functional Areas
2.1.3 TMN Entities
2.1.4 Generic Interaction Model
2.2 The Frame and Transactions
3 Transaction Services
3.1 Transactional Processing
4 TINA and Transactions
4.1 Introduction to the TINA Concepts
4.2 Use of Transactions in a TINA Architecture
5 Nested Connections Setups
5.1 Nested Connection Setups Computational Viewpoint
5.2 Nested Connection Setups Transactional Viewpoint
5.2.1 LTPs Consistency and Connection Establishment Performance
5.2.2 Failure Containement and OMG OTS Performance
6 News-on-Demand Connection
6.1 NoD Overall Architecture
6.2 NoD Transactional Viewpoint
6.2.1 Choice of the Transaction Root
6.2.2 EML Performances and Reliability
7 Conclusion
References
Chapter 81
Chapter 82
1 Introduction
2 The Enterprise Modelling Approach
3 Brokerage
4 Broker-Customer Relationships
5 Alternative Market Scenarios
6 Transaction and Post-transaction Management
6.1 Transactions for Physical Goods Brokerage
6.2 Transactions for Information and Content Brokerage
6.3 Transactions for Service Brokerage
7 Conclusions
Acknowledgements
References
Chapter 83
1 Introduction
1.1 Developments in Electronic Trading
1.2 Outline of Paper
2 Electronic Markets and Trading
2.1 The Business Need for Dynamic Provisioning of Services
2.2 Classification Of Trading Models
2.3 The Technical Need for Dynamic Provisioning of Services
3 Agent-based Chambers of Commerce
4 Agent-based Architecture for Service Provisioning
4.1 Overall Architecture
4.2 Agent Internal Architecture
5 Related Work
6 Results and Conclusions to Date
7 References
Chapter 84
1 Introduction
2 The Brokerage Service in the Context of the Electronic Marketplace
3 The ABS Brokerage Service Enterprise Model
4 The ABS Brokerage Service Information Model
5 The ABS Brokerage Service Computational Model
5.1 The Broker System
5.2 The Access and User Systems
6 Conclusions and Future Work
References
Chapter 85
1 Introduction
1.1 Electronic Commerce and Brokerage
1.2 General Capabilities for Electronic Commerce
1.3 Multimedia Applications Categories
1.4 Service Levels
2 Searching Brokerage Service Level (Level 1)
2.1 Profile (Interchange)
2.2 Contract
2.3 Service Management
2.4 Browser
2.5 Catalogue
2.6 Brokerage
3 Products Brokerage Service Level (Level 2)
3.1 Electronic Payment
3.2 Contract
3.3 Browser
3.4 Catalogue
3.5 Intellectual Property Rights Management
3.6 Application
4 Services Brokerage Service Level (Level 3)
4.1 Contract
4.2 Service Management
4.3 Browser
4.4 Application
5 Complex Brokerage Service Level (Level 4)
5.1 Profile (Interchange)
5.2 Selection / Negotiation
5.3 Catalogue
5.4 Agency
5.5 Application
6 Service Levels Summary
7 Application of Service Levels to a Specific Scenario
7.1 The MULTIMEDIATOR System
7.2 Service Levels
8 Conclusions
9 References
Chapter 86
Chapter 87
1 Introduction
2 Specification Methodology
2.1 Software Development Phases
2.2 Identification of Requirements for Management Systems
2.3 Deriving the Object Model of the Management System
2.4 SDLβ92 TMN Design Model
3 Implementation of SDL-Designed TMN Applications
3.1 Inclusion of ASN.1 in SDLβ92
3.2 Connecting CMIP Based Management APIs to SDL Based Implementations
4 SDL Tool Requirements
5 Conclusion and Future Work
References
Chapter 88
1 Introduction
2 The DOLMEN Trajectory
2.1 Description
2.2 Specification and Validation
2.3 Implementation and Testing
3 Access Session Specification and Validation
3.1 OSAM Component Specification
3.2 Access Session Specification
3.3 Access Session Validation
4 Access Session Implementation and Testing
4.1 Access Session Implementation
4.2 Access Session Testing
5 Application Example
5.1 IA Specification and Validation
5.2 IA Implementation and Testing
6 Conclusions
Acknowledgements
References
Appendix
Chapter 89
1 Introduction
2 Conformance Testing in the TOSCA Approach for TINA Service Creation
3 Related Work
4 Test Objectives for TINA Service Components
5 The TINA ODL to TTCN Mapping
6 An Example - Test Cases for the Service Access Session
7 The TTCN/CORBA Gateway
8 Conclusions
9 References
Chapter 90
1 Introduction
2 TINA-oriented Service Creation
3 Service Composition and Federation in TINA
4 Engineering Support for Service Composition and Federation
4.1 Analysis
4.2 Design
5 Application Example: TINA Chat Service
5.1 Description of the TINA Chat Service
5.2 Engineering Support for Composition and Federation in the Context of the TINA Chat Service
6 Conclusions
References
Chapter 91
Chapter 92
1 Introduction
2 Background
3 Scheduled Connections
3.1 Introduction
3.2 Schedules for Network Resources
4 Implementation Issues
4.1 An Example of a Scheduled Network Resource
4.2 Other Implementation Issues
5 Conclusions
6 Acknowledgments
References
Appendix: ASN.1 Schedule Type Definitions
Chapter 93
1 Introduction
2 Performance Management in Switched ATM Networks
2.1 A Policy-based Performance Management Service
2.2 A General Model for Performance Monitoring in Switched ATM Networks
2.3 Interaction between the Management Plane and the Control Plane
3 Service Platforms and Performance Management
4 An Infrastructure for In-Service Monitoring of the ATM Layer
4.1 In-Service Methods
4.2 Monitoring of the Cell Loss Process
4.3 Interaction with Signalling
4.4 General Management Cells
5 Conclusions
References
Chapter 94
1 Introduction
2 CNM Services Concept
3 System Architecture
3.1 Configuration
3.2 Customer Network Management System (CNMS)
3.3 Management Interfaces Specified by ATM Forum
3.3.1 M3 CNM Interface Model6]
3.3.2 M4 Network Model9]
4 Implementation
4.1 Requirements
4.2 Maintaining Data Consistency
4.2.1 MIB Acquisition
4.2.2 Evaluation
4.3 Sophisticated MIB Mapping
4.3.1 Object Mapping between M3 and M4 Models
4.3.2 Designated Object Concept
4.3.3 Application of Designated Objects
5 Conclusion
Acknowledgements
References
Chapter 95
1 Background
2 Session Overview
Chapter 96
1 Introduction
2 Overview of Intelligent Network
3 Overview of CORBA
4 What IN Functional Entities to CORBAise ?
5 The IN/CORBA IWF; Design Choices and Issues
5.1 What Protocol Layer and Dynamic or Static Gateway?
5.2 Thin or Thick IWF?
6 The IN/CORBA IWF
7 Conclusions
References
Chapter 97
1 Introduction
2 Context
3 Architectural Overview
4 Basic Adapter Object Services
5 Composite Objects
6 TMN Event Manager
7 TMN Log Manager
8 TMN Query Manager
9 Implementation Experiences
10 Summary
References
Chapter 98
1 Introduction
2 Initiatives
2.1 TMN
2.2 TINA
2.3 XoJIDM [6]
2.4 Eurescom P508 [3]
3 Relationship between TMN/TINA
4 DPE Support for Management
4.1 Adapter Service or Integrated Approach ?
4.2 Adapter Service Approach
4.3 Integrated Approach
4.3.1 CMISE/IDL
4.3.2 GDMO/IDL
5 VITAL-GSP Integration
5.1 In Terms of Chosen Language Mapping
5.1.1 GDMO/IDL and CMISE/IDL Mapping
5.1.2 CMISE/IDL Mapping
5.1.3 Direct Mapping
5.2 In Terms of Architecture Interfaces
5.2.1 CC Level
5.2.2 LNC Level
5.2.3 CP Level
5.2.4 CP/LNC Mixing (Different Layer Networks)
5.2.5 Solution
6 Results
6.1 Comparison with a GDMO/ IDL Gateway
6.2 Comparison with a TMN++ API Gateway
7 Conclusion
8 References
Chapter 99
Chapter 100
1 Secure Orders over the Internet using Digital Signatures
2 Trojan Horses
3 Assignment of Risks
4 Secure, Portable Computers
5 A Suggestion for Risk Allocation
6 How Could the Distribution of Secure Devices Take Place?
6.1 Costs
6.2 Willingness to Pay for Secure Hardware
7 Dealing with the Remaining Risk
8 Alternatives to the Use of Secure User I/O
9 Conclusion
References
Chapter 101
1 Introduction
2 The Need for a Security Infrastructure
2.1 Introduction
2.2 Public Key Infrastructure
3 TRUMPET Public Key Infrastructure
4 Naming Rules
4.1 Authentication of Entities in TRUMPET
4.2 CA Identities
4.3 Subject Identities
5 Format of Certificates and CRLs
5.1 X.509v3 Certificate Fields and Extensions
5.2 CRLv2 Fields and Extensions
6 Verification Procedure for X.509v3 and CRLv2
7 Security and Privacy Requirements
7.1 CA Security and Privacy
7.2 Subject Security and Privacy
8 Certificate Management
8.1 Certification of CAs
8.2 Certification of Subjects
8.3 Certificate Distribution
9 CRL Management
9.1 Introduction
9.2 Certificate Revocation Requests
9.3 CRL Issuing and Distribution
10 Key Escrow Issues
10.1 Legislation
10.2 The Royal Holloway Protocol
10.3 Technical Impact
11 Conclusion
References
Chapter 102
1 Introduction
2 Mobile Information Services
3 Certification Infrastructure
4 Requirements On Charging Schemes
5 Micropayments
6 Charging Model
7 Charging Protocol
7.1 Authentication And Initialisation Of Charge Ticks Protocol
7.2 Charge Ticks Protocol
7.3 Composition of Billing Information by VASP
8 Demonstrations and Trials
8.1 Selection of Algorithms and Parameters
One Way Functions Functions h1-h3 are implemented using RIPEMD-128 [14, 15] and h4 is implemented using RIPEMD-160 [14, 15], where the output is truncated to 40 and 64 bits for functions h2 and h4 respectively.
Exponentiation Exponentiation is conducted in an elliptic curve cryptosystem, whose default parameter values are specified in ISO/IEC 14888-3 [4].
Signature Systems The user uses an elliptic curve based AMV-signature system, as specified in ISO/IEC 14888-3 [4], in order to generate signatures. The TTP may use both an AMV-signature system, as specified in ISO/IEC 14888-3 [4], and an RSA-signature sy
Encryption Systems The symmetric encryption system used in the trial is DES in CBC mode [16, 17].
Parameter T The parameter T represents the maximum number of micropayment tokens which can be transferred with respect to a given signed commitment. The default value for T is 210.
8.2 The ASPeCT Secure Billing Trial
9 Conclusions
References
Back matter
π SIMILAR VOLUMES
<p><B>Intelligence in Services and Networks</B> focuses on exploring how best the inherent intelligence in networks may be employed and enhanced to provide, firstly, flexibility and open competition in the provision of communications-based services and, secondly, the means for managing and administe
<p>Paving the Way for an Open Service Market We live in an age when powerful communications technology is becoming available to everyone. From our home we can send and receive not only analogue voice, but also growing volumes of digital information and even intelligence in the form of agents. We are
<p>Paving the Way for an Open Service Market We live in an age when powerful communications technology is becoming available to everyone. From our home we can send and receive not only analogue voice, but also growing volumes of digital information and even intelligence in the form of agents. We are
<p><span>The aim of the book βInnovative Mobile and Internet Services in Ubiquitous Computingβ is to provide latest research findings, methods and development techniques, challenges and solutions from both theoretical and practical perspectives related to UPC with an emphasis on innovative, mobile a
<span>This volume of the Lecture Notes in Computer Science series contains all the papersaccepted forpresentation atthe 11thIFIP/IEEEInternationalWorkshop on Distributed Systems: Operations & Management (DSOM 2000), which was held at the Thompson Conference Center, The University of Texas, Austi