Abstract |
|
ix | |
Preface |
|
xi | |
|
|
1 | (16) |
|
|
2 | (1) |
|
Advanced IP Network Services |
|
|
2 | (9) |
|
Internet-based Virtual Private Network (VPN) |
|
|
3 | (2) |
|
The Security Architecture for the Internet Protocol |
|
|
5 | (5) |
|
Differentiated Services (DiffServ) |
|
|
10 | (1) |
|
|
11 | (1) |
|
Network and Service Management |
|
|
12 | (2) |
|
The Problem and the Proposed Approach |
|
|
14 | (1) |
|
|
14 | (3) |
|
A Service Monitoring Architecture |
|
|
17 | (12) |
|
Introduction and Motivation |
|
|
17 | (2) |
|
Mobility and Service Monitoring |
|
|
19 | (2) |
|
|
19 | (1) |
|
Advantages of Service Monitoring with Mobile Agents |
|
|
20 | (1) |
|
|
21 | (4) |
|
Location of the Control Points |
|
|
21 | (1) |
|
|
22 | (2) |
|
Authorization and Filtering |
|
|
24 | (1) |
|
|
25 | (1) |
|
Mobility Models and Agent Forwarding |
|
|
25 | (2) |
|
Supported Mobility Models |
|
|
25 | (1) |
|
|
26 | (1) |
|
|
27 | (2) |
|
Advanced Infrastructure Support |
|
|
27 | (2) |
|
|
29 | (40) |
|
|
31 | (6) |
|
|
31 | (1) |
|
Internet Communication with Java |
|
|
31 | (2) |
|
Layering of the CSM Protocol |
|
|
33 | (1) |
|
|
33 | (1) |
|
|
34 | (3) |
|
CSM Message Exchange Sequences |
|
|
37 | (1) |
|
The T-Component and the Raw Packet Protocol |
|
|
37 | (4) |
|
T-Component Implementations |
|
|
39 | (1) |
|
The Interaction between the Node and the T-component |
|
|
39 | (2) |
|
Other Options for T-components |
|
|
41 | (1) |
|
|
41 | (10) |
|
|
42 | (1) |
|
Welcome Procedure for an Agent |
|
|
42 | (2) |
|
The Execution Environment |
|
|
44 | (1) |
|
|
45 | (4) |
|
User Profiles and Policies |
|
|
49 | (2) |
|
|
51 | (2) |
|
Security and Resource Control |
|
|
53 | (3) |
|
|
53 | (1) |
|
Security Layers of the Node |
|
|
53 | (1) |
|
|
54 | (2) |
|
|
56 | (1) |
|
|
56 | (7) |
|
|
57 | (1) |
|
The Transmission of a Request to the Node |
|
|
58 | (2) |
|
|
60 | (2) |
|
Generic Views of the Agent Results |
|
|
62 | (1) |
|
CSM Internetworking Support |
|
|
63 | (4) |
|
Name and Topology Information |
|
|
65 | (1) |
|
|
66 | (1) |
|
Organization of the Source Code |
|
|
67 | (2) |
|
Applications of Service Monitoring Agents |
|
|
69 | (36) |
|
Monitoring a Virtual Private Network Service |
|
|
69 | (8) |
|
Functionality of a VPN Control Agent |
|
|
70 | (2) |
|
Statistical Tests on Cryptographic Algorithms |
|
|
72 | (5) |
|
Service Level Agreement Monitoring |
|
|
77 | (2) |
|
Agents for Measuring QoS Parameters |
|
|
79 | (12) |
|
|
79 | (4) |
|
Coordination of Distributed Measurements |
|
|
83 | (1) |
|
One-Way Delay Measurements |
|
|
84 | (2) |
|
|
86 | (5) |
|
|
91 | (9) |
|
Classification of Attacks |
|
|
94 | (1) |
|
The Semantics of the Agent |
|
|
95 | (3) |
|
Attacks on the Input of the Agent |
|
|
98 | (1) |
|
Evaluation of the Threat Situation |
|
|
99 | (1) |
|
Extended Application Scenarios |
|
|
100 | (5) |
|
Further Applications Independent of New Node Services |
|
|
100 | (2) |
|
|
102 | (3) |
|
|
105 | (18) |
|
Performance of the Node Environment |
|
|
105 | (8) |
|
Throughput of the Execution Environment |
|
|
106 | (6) |
|
Node Throughput Including the TCP Receiver |
|
|
112 | (1) |
|
|
113 | (1) |
|
Communication Performance of the CSM System |
|
|
113 | (6) |
|
|
119 | (2) |
|
Discussion and Improvements |
|
|
121 | (2) |
|
Comparison with Related Work |
|
|
123 | (14) |
|
The Internet2 Initiative and the QBone |
|
|
123 | (2) |
|
|
124 | (1) |
|
|
124 | (1) |
|
Comparison to our Approach |
|
|
125 | (1) |
|
Network Measurements and Monitoring |
|
|
125 | (7) |
|
IP Measurement Methodology |
|
|
126 | (1) |
|
The Simple Network Management Architecture |
|
|
127 | (3) |
|
|
130 | (2) |
|
Mobile Agents for Management and Monitoring |
|
|
132 | (3) |
|
Network Management with Mobile Agents |
|
|
132 | (1) |
|
|
133 | (1) |
|
Network Management with Active Networks |
|
|
134 | (1) |
|
|
135 | (2) |
|
Collaboration of Monitoring Agents |
|
|
135 | (1) |
|
|
136 | (1) |
|
|
136 | (1) |
|
|
137 | (6) |
List of Figures |
|
143 | (2) |
List of Tables |
|
145 | (2) |
List of Abbreviations |
|
147 | (4) |
Bibliography |
|
151 | |