Administrative Domain (administrative + domain)

Distribution by Scientific Domains


Selected Abstracts


Measuring the edge-to-edge available bandwidth in a DiffServ domain

INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, Issue 5 2008
N. Blefari-Melazzi
The new Internet will be deployed with a number of tools for network management and quality of service control. To this end, we focus on a single administrative domain based on the Differentiated Services architectural model, and we recognize the need for two main functions for each supported traffic class: an admission control procedure, and a monitoring of the edge-to-edge bandwidth availability. In this work, we specifically focus on the second issue. To preserve scalability and thus to be compliant with Differentiated Services architecture, we propose stateless and distributed procedures based on traffic measurements. Our technique tests network resources by means of ,special' probing packets, which have the task of implicitly conveying the network status to its edges. We show by means of simulations the effectiveness of our solutions, in spite of a very low overhead. Copyright © 2007 John Wiley & Sons, Ltd. [source]


Rules, Red Tape, and Paperwork: The Archeology of State Control over Migrants

JOURNAL OF HISTORICAL SOCIOLOGY, Issue 1 2008
DAVID COOK MARTÍN
How and with what consequences did state control over migration become acceptable and possible after the Great War? Existing studies have centered on core countries of immigration and thus underestimate the degree to which legitimate state capacities have developed in a political field spanning sending and receiving countries with similar designs on the same international migrants. Relying on archival research, and an examination of the migratory field constituted by two quintessential emigration countries (Italy and Spain), and a traditional immigration country (Argentina) since the mid-nineteenth century, this article argues that widespread acceptance of migration control as an administrative domain rightfully under states' purview, and the development of attendant capacities have derived from legal, organizational, and administrative mechanisms crafted by state actors in response to the challenges posed by mass migration. Concretely, these countries codified migration and nationality laws, built, took over, and revamped migration-related organizations, and administratively encaged mobile people through official paperwork. The nature of efforts to evade official checks on mobility implicitly signaled the acceptance of migration control as a bona fide administrative domain. In more routine migration management, states legitimate capacity has had unforeseen intermediate- and long-term consequences such as the subjection of migrants (and, because of ius sanguinis nationality laws, sometimes their descendants) to other states' administrative influence and the generation of conditions for dual citizenship. Study findings challenge scholarship that implicitly views states as constant factors conditioning migration flows, rather than as developing institutions with historically variable regulatory abilities and legitimacy. It extends current work by specifying mechanism used by state actors to establish migration as an accepted administrative domain. [source]


The Grid Resource Broker workflow engine

CONCURRENCY AND COMPUTATION: PRACTICE & EXPERIENCE, Issue 15 2008
M. Cafaro
Abstract Increasingly, complex scientific applications are structured in terms of workflows. These applications are usually computationally and/or data intensive and thus are well suited for execution in grid environments. Distributed, geographically spread computing and storage resources are made available to scientists belonging to virtual organizations sharing resources across multiple administrative domains through established service-level agreements. Grids provide an unprecedented opportunity for distributed workflow execution; indeed, many applications are well beyond the capabilities of a single computer, and partitioning the overall computation on different components whose execution may benefit from runs on different architectures could provide better performances. In this paper we describe the design and implementation of the Grid Resource Broker (GRB) workflow engine. Copyright © 2008 John Wiley & Sons, Ltd. [source]


Tunable scheduling in a GridRPC framework

CONCURRENCY AND COMPUTATION: PRACTICE & EXPERIENCE, Issue 9 2008
A. Amar
Abstract Among existing grid middleware approaches, one simple, powerful, and flexible approach consists of using servers available in different administrative domains through the classic client,server or remote procedure call paradigm. Network Enabled Servers (NES) implement this model, also called GridRPC. Clients submit computation requests to a scheduler, whose goal is to find a server available on the grid using some performance metric. The aim of this paper is to give an overview of a NES middleware developed in the GRAAL team called distributed interactive engineering toolbox (DIET) and to describe recent developments around plug-in schedulers, workflow management, and tools. DIET is a hierarchical set of components used for the development of applications based on computational servers on the grid. Copyright © 2007 John Wiley & Sons, Ltd. [source]


Providing and verifying advanced IP services in hierarchical DiffServ networks-the case of GEANT

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, Issue 4 2004
Athanassios Liakopoulos
Abstract The differentiated services (DiffServ) framework is widely proposed as an efficient method for providing advanced IP services to large-scale networks, with QoS requirements. However, the provisioning of such services in production networks has proved to be more difficult than initially expected, in defining, setting and verifying appropriate Service Level Agreements (SLAs). GEANT, the Gigabit core pan-European research network, on a pilot basis introduced ,Premium IP' service, offering bounded delay and negligible packet loss to the European National Research & Education Networks (NRENs) that it interconnects. However, large scale provisioning of this new service requires the definition of efficient interaction procedures between administrative domains involved and methods for SLA monitoring. This paper focuses on these issues and presents the experience acquired from the early experiments in GEANT, as an example of hierarchical Gigabit multi-domain environment, enabled with QoS provisioning to its constituent NRENs. This model scales more efficiently than the common peering Internet Service provider (ISP) commercial paradigm. Finally, we outline other options that promise QoS, such as Layer 2 VPNs in MPLS backbones, with non-standard (yet) mechanisms. Copyright © 2004 John Wiley & Sons, Ltd. [source]