Self-* and P2P for Network ManagementCase Study I: Reliability of Monitoring Platforms
Self-* and P2P for Network Management: Case Study I: Reliability of Monitoring Platforms
Marquezan, Clarissa Cassales; Granville, Lisandro Zambenedetti
2012-07-11 00:00:00
[Monitoring is essential in modern network management to identify problems in underlying communication infrastructures of modern organizations. However, current monitoring systems are unable to recover their internal faulty entities forcing the network administrator to manually fix the occasionally broken monitoring solution. This case study, therefore, address this issue by introducing a self-healing monitoring solution following the principles of Self-* P2P design. The proposed solution combines the availability and communication transparency provided by P2P-based overlays with self-healing properties following the principles proposed for the self-* P2P design. The solution here presented considers a scenario of a monitoring system for a Network Access Control (NAC) installation.]
http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.pnghttp://www.deepdyve.com/lp/springer-journals/self-and-p2p-for-network-management-case-study-i-reliability-of-5IflBo9FT0
Self-* and P2P for Network ManagementCase Study I: Reliability of Monitoring Platforms
[Monitoring is essential in modern network management to identify problems in underlying communication infrastructures of modern organizations. However, current monitoring systems are unable to recover their internal faulty entities forcing the network administrator to manually fix the occasionally broken monitoring solution. This case study, therefore, address this issue by introducing a self-healing monitoring solution following the principles of Self-* P2P design. The proposed solution combines the availability and communication transparency provided by P2P-based overlays with self-healing properties following the principles proposed for the self-* P2P design. The solution here presented considers a scenario of a monitoring system for a Network Access Control (NAC) installation.]
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.