2008
DOI: 10.1002/nem.679
|View full text |Cite
|
Sign up to set email alerts
|

A situatedness‐based Knowledge Plane for autonomic networking

Abstract: SUMMARYIP networks, and particularly the Internet, were proposed to be a simple and robust support for homogeneous communications. This implies that only basic control mechanisms have to be performed by network elements. Communication management has to be performed by the terminals. However, the integration of new services and the increasing need for QoS require the network to be increasingly more fl exible and adaptive. New algorithms and protocols have been proposed by many research teams to address these is… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2008
2008
2014
2014

Publication Types

Select...
3
3
3

Relationship

3
6

Authors

Journals

citations
Cited by 32 publications
(17 citation statements)
references
References 11 publications
0
17
0
Order By: Relevance
“…In opposition to the global schemes where global aggregates are computed over the entire network, situated view approaches like [9,12,3] propose to reduce the costs of aggregation by limiting the knowledge of a node to a bounded neighborhood. Thus, apart its own local information each node collects data from its direct neighbors or a subset of the network nodes to compute a partial aggregate representing its view.…”
Section: Situated Viewmentioning
confidence: 99%
“…In opposition to the global schemes where global aggregates are computed over the entire network, situated view approaches like [9,12,3] propose to reduce the costs of aggregation by limiting the knowledge of a node to a bounded neighborhood. Thus, apart its own local information each node collects data from its direct neighbors or a subset of the network nodes to compute a partial aggregate representing its view.…”
Section: Situated Viewmentioning
confidence: 99%
“…During flooding of these packets to arbitrary ports makes the server response ‗Unreachable Destination' through large number of ICMP packets continuously. This makes the genuine service which is trying to access the attacked system is averted [1], [6].…”
Section: Bmentioning
confidence: 99%
“…It is to be noted that IP spoofing is done here in such a way that spoofed source IP address is the targeted host. Due to miscofiguration of routers all the ping requests are transferred to broadcast address of network which results all the present hosts in the network will receive this request and give echo replies to the spoofed address of the victim [6]. If network is quite large then this will ultimately consume all the bandwidth of victim whose address has been spoofed for echo request purpose.…”
Section: Ping Of Deathmentioning
confidence: 99%
“…It stores the data used by an agent in an homogeneous and structured way and provides diffusion mechanisms of this knowledge between the agents. -Situated View:It is the partial view that an agent has of its environment [2].…”
Section: Ginkgo Multi Agent Systemmentioning
confidence: 99%