Information Technology Reference
In-Depth Information
ple scenario might look artificial, it shows that community concerns taken locally and
opportunistically may yield improvements to community fitness.
4 Conclusions
Design of autonomic communication systems and their elements is complicated by a
large number of interdependencies between different concerns and requirements. The
real challenge is not to attempt to solve associated problems at system design phase
but to embed such features into a system that will facilitate solutions at run-time. We
demonstrate this with soft-boot, run-time, local and context sensitive etiquette refine-
ment approaches. Autonomic network elements will likely to be much more flexible
than current hosts and routers in cross-layer interactions between entities of their
protocol stack; we try to capture this feature by the notion of a workflow — chromo-
some characterisation of node's behaviour — the payload of proposed etiquette com-
munication.
Etiquette is a mechanism for community building and community self-
management that is achieved through locally perceived and processed community
state under the governance of community fitness. We select trust establishment in ad
hoc networking as an example of non-functional requirement to be able to demon-
strate throughout the paper abstract concepts with examples; despite this demonstra-
tion purpose the future work will address more realistic scenarios for trust and intru-
sion detection based on the principles of autonomic communication.
References
1. Autonomic Computing Overview, IBM, on line at http://www.research.ibm.com/
autonomic/overview/elements.html
2. Autonomic Communication: Research Agenda for a New Communication Paradigm,
white paper, Fraunhofer FOKUS on-line at http://www.autonomiccommunication.org/
publications/doc/WP_v02.pdf (2003)
3. Blumenthal, M.S., Clark, D. D.: Rethinking the design of the Internet: The end to end ar-
guments vs.the brave new world, ACM Transactions on Internet Technology 1(1) (2001)
4. Kempf, J., Austein, R. (Eds.): The Rise of the Middle and the Future of End-to-End: Re-
flections on the Evolution of the Internet Architecture, IAB. http://www.ietf.org/
rfc/rfc3724.txt (2004)
5. Sekar, V., Xie, Y. Maltz, D., Reiter, M., Zhang, H.: Toward a Framework for Internet Fo-
rensic Analysis, HotNets-III (2004)
6. Rexford, J., Greenberg,A., Hjalmtysson,G., Maltz,D., Myers,A., Xie,G., Zhan,J., Zhang,
H.: Network-Wide Decision Making: Toward A Wafer-Thin Control Plane, HotNets-III
(2004)
7. Afek, Y., Bremler-Barr, A., Har-Peled, S.: Routing with a Clue, Proceedings of ACM
SIGCOMM'99 (1999)
8. ATIS Telecom Glossary 2000. T1.523-2001, ATIS Committee T1A1 Performance and
Signal Processing, on-line at http://www.atis.org/tg2k/ (2000)
9. Kroeselberg, D.: SIP security requirements from 3G wireless networks, Internet Engineer-
ing Task Force, work in progress <draft-kroeselberg-sip-3g-security-req-00.txt> (2001)
Search WWH ::




Custom Search