Abstract
Current interest in ad hoc and peer-to-peer networking technologies prompts a re-examin-ation of models for configuration management, within these frameworks. In the future, network management methods may have to scale to millions of nodes within a single organization, with complex social constraints. In this paper, we discuss whether it is possible to manage the configuration of large numbers of network devices using well-known and no-so-well-known configuration models, and we discuss how the special characteristics of ad hoc and peer-to-peer networks are reflected in this problem.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35674-7_66
Chapter PDF
Similar content being viewed by others
References
H. Abdu, H. Lutfiya, and M. Bauer. A model for adaptive monitoring configurations. Proceedings of the VI IFIP/IEEE IM conference on network management, page 371, 1999.
M. Burgess. A site configuration engine. Computing systems (MIT Press: Cambridge MA), 8: 309, 1995.
M. Burgess. On the theory of system administration. Submitted to J. ACM., 2000.
M. Burgess. Cfengine’s immunity model of evolving configuration management. Submitted to IEEE Transactions on Software Engineering, 2002.
M. Burgess. System administration as communication over a noisy channel. Proceedings of the 3nd international system administration and networking conference (SANE2002), 2002.
J. Case, M. Fedor, M. Schoffstall, and J. Davin. The simple network management protocol. RFC1155, STD 16, 1990.
A.L. Couch. Chaos out of order: a simple, scalable file distribution facility for intentionally heterogeneous networks. Proceedings of the Eleventh Systems Administration Conference (LISA XI) (USENIX Association: Berkeley, CA),page 169, 1997.
N. Damianou, N. Dulay, E.C. Lupu, and M. Sloman. Ponder: a language for specifying security and management policies for distributed systems. Imperial College Research Report DoC 2000/1, 2000.
P. Gupta and P.R. Kumar. The capacity of wireless networks. IEEE Trans. Info. Theory,46(2):388404, 2000.
J. Li, C. Blake, D.S.J. DeCouto, H.I. Lee, and R. Morris. Capacity of ad hoc wireless networks. Proc. 7th ACM Intl. Conf. on Mobile Computing and Networking, pages 61–69, 2001.
J.P. Martin-Flatin. Push vs. pull in web-based network management. Proceedings of the VI IFIP/IEEE IM conference on network management, page 3, 1999.
M. Matsushita. Telecommunication management network. NTT Review, 3: 117–122, 1991.
R. Osterlund. Pikt: Problem informant/killer tool. Proceedings of the Fourteenth Systems Administration Conference (LISA XIV) (USENIX Association: Berkeley, CA),page 147, 2000.
D.B: West. Introduction to Graph Theory (2nd Edition). ( Prenctice Hall, Upper Saddle River ), 2001.
M. Zapf, K. Herrmann, K. Geihs, and J. Wolfang. Decentralized snmp management with mobile agents. Proceedings of the VI IFIP/IEEE IM conference on network management, page 623, 1999.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Burgess, M., Canright, G. (2003). Scalability of Peer Configuration Management in Partially Reliable and Ad Hoc Networks. In: Goldszmidt, G., Schönwälder, J. (eds) Integrated Network Management VIII. IM 2003. IFIP — The International Federation for Information Processing, vol 118. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35674-7_32
Download citation
DOI: https://doi.org/10.1007/978-0-387-35674-7_32
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-5521-3
Online ISBN: 978-0-387-35674-7
eBook Packages: Springer Book Archive