Dinesh Verma

Dinesh Verma
  • Department of African studies Delhi University

About

72
Publications
7,145
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,151
Citations
Current institution
Department of African studies Delhi University

Publications

Publications (72)
Conference Paper
The ability to incorporate intelligence in even small devices and to make use of contextual information from widely deployed sensors has already begun to change management paradigms. As edge computing and IoT become more prevalent, systems will increasingly consist of cooperating, heterogeneous, distributed, autonomous elements. Architectures for c...
Patent
Full-text available
The present disclosure relates generally to the field of proactive data object replication in named data networks. In various examples, proactive data object replication may be implemented in one or more named data networks in the form of systems, methods and/or algorithms.
Patent
Full-text available
A method of transmitting information to a receiving computer systems includes determining in a processing unit of a computer whether a receiving computer system can receive the information without converting a local format of the information into a canonical format of the information, if it is determined that the receiving computer system cannot re...
Patent
Full-text available
Methods and apparatus are provided for performing byte caching using a chunk size based on the object type of the object being cached. Byte caching is performed by receiving at least one data packet from at least one network node; extracting at least one data object from the at least one data packet; identifying an object type associated with the a...
Patent
Full-text available
One or more embodiments perform byte caching. At least one data packet is received from at least one network node. At least one data object is received from the at least one data packet. An object type associated with the at least one data object is identified. The at least one data object is divided into a plurality of byte sequences based on the...
Patent
Full-text available
A network system includes multiple network resource information handling systems (IHSs) for managing applications and application communications. An IHS operating system initializes an application optimizer to provide application acceleration capability to application optimizers, such as application delivery controllers (ADCs) and wide area network...
Patent
Full-text available
A heat potential value for each of a set of available server locations is calculated via a data center controller based upon at least one active server in a data center. A minimal calculated heat potential value for the set of available server locations is identified. An available server location associated with the identified minimal calculated he...
Patent
Full-text available
Embodiments of the present invention address deficiencies of the art in respect to e2e SLA support in a network of both manageable and unmanageable portions and provide a method, system and computer program product for e2e SLA compliance across both managed and unmanaged network segments. In one embodiment of the invention, a method for e2e SLA com...
Article
A key goal of information analytics is to identify patterns of anomalous behavior. Such identification of anomalies is required in a variety of applications such as systems management, sensor networks, and security. However, most of the current state of the art on anomaly detection relies on using a predefined knowledge base. This knowledge base ma...
Conference Paper
Full-text available
Service modeling and composition is a fundamental method for offering advanced functionality by combining a set of primitive services provided by the system. Unlike in the case of web services for which there is an abundance of reliable resources, in sensor networks, the resources are constrained and communication among nodes is error-prone and unr...
Article
Full-text available
The vitality and utility of a network are affected significantly by the network management system (NMS) that is used to administer and monitor the network. However, models that can characterize the quality of a NMS are generally missing in the literature. In this paper, we introduce the concept of quality of monitoring (QoM), provide a mathematical...
Article
Full-text available
Sensor networks face a number of challenges when deployed in unpredictable environments under dynamic, quickly changeable demands, and when shared by many partners, which is often the case in military and security applications. To partially address these challenges, we present a novel target tracking algorithm that can be deployed on various sensor...
Conference Paper
Morphogenesis is the process that gives shapes to organisms from an embryonic stage through a sequence of cell divisions. Starting from a simple embryonic cell, the controlled division and transformation of the cells into different types leads to the creation of a complex organism. The growth of complex organisms is completely autonomic, and is one...
Article
In the last few decades biologically inspired communications has caught the attention of a large number of computer scientists and engineers as a field with the potential to have a pervasive influence on current and future technology. Given that molecular biology and neuroscience are key research topics in this century, there is a growth of interes...
Article
Full-text available
The seven papers in this special section focus on autonomic network computing.
Chapter
The goal of systems management is to try to keep computer systems and network running properly and flawlessly. In order to do so, computer systems must be accessible to the people who are authorized to use them, and not be accessible to anyone who are not authorized to use them. An unauthorized person can cause several problems in the operation of...
Chapter
Before any operational management of a computer system can be done, applications at the operations center must become aware of the different components of the computer system and the configuration of the different components. Without good discovery mechanisms, the operations center staff will not be able to manage the computing environment effectiv...
Chapter
The performance of a computer system is a measurement of how well the system is able to respond to the workload that is being put onto it. The performance management of a system is the set of tasks that ensures that the system performance is satisfactory for its intended purpose.
Chapter
A computer system consists of many components including hardware devices such as servers, routers, switches, and firewalls and software systems such as the operating system and applications. Each such component allows the operator to change its settings to customize its behavior.
Chapter
A fault in the computer system is the failure of a component which prevents the computer systems from operating normally. As the computer system operates, it may experience faults due to a variety of reasons. Each fault would generate some type of alerts or error messages to be reported in the monitoring infrastructure. These monitored alert messag...
Chapter
The operational life cycle is the longest life stage in the life cycle of a computer system and also the most important from the perspective of systems management. The job of systems management is to keep the system running smoothly without problems during this life stage.
Chapter
Computer systems planning and implementation are an essential ingredient for smooth and efficient operation of any computer system . Planning is a required prerequisite when installing a new computer system or upgrading an existing computer system to address new requirements. Planning marks the first stage of the life cycle of computer systems. In...
Chapter
There are several subjects that are related to systems management which a student of the subject ought to be aware of, because they are closely related, or advanced subjects in systems management. In this chapter, we provide a brief review of those subjects.
Article
Full-text available
Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher, its distribution outside of IBM prior to publication should be limited to peer communications and specific requests. After outside publication, requests should be filled only by reprints or legally obtained copies of the article (e.g. , pa...
Book
Principles of Computer Systems and Network Management presents the algorithms, architectures, and design techniques for different aspects of system management. The focus of the material is on showing the design principles underlying systems management tools and how concepts from various mathematical domains are applied to better manage computer sys...
Chapter
After all the elements of a computer system have been discovered, they need to be monitored. Monitoring of a computer system is defined as the process of obtaining the status and configuration information of the various elements of a computer system and consolidating that information. Information consolidation may involve the tasks of preparing rep...
Chapter
Computer systems and networks are an indispensable component of the modern industry. Regardless of the size of the business, be it a small shop operated by a single family or a large international conglomerate, the profitability of any business operation has a critical dependency upon proper functioning of the computer systems supporting that busin...
Conference Paper
Full-text available
Because of their importance in military and other applications, Mobile Ad-Hoc Wireless Networks or MANETs have attracted significant attention in the research community. However, almost virtually all of the literature has focused on analyzing MANETs in an asymptotic case with a very large number of nodes under varying assumptions on node density an...
Article
Full-text available
Exponential growth in storage requirements and an increasing number of heterogeneous devices and application policies are making enterprise storage management a nightmare for administrators. Back-of-the-envelope calculations, rules of thumb, and manual correlation of individual device data are too error prone for the day-to-day administrative tasks...
Conference Paper
Scenarios play an important role in driving the research agenda for programs focused on improving effectiveness in network centric operations. Several excellent scenarios such as Binni (www.binni.org) have played a key role in motivating research projects. However, as the geopolitical situation in the world has evolved, several new factors have bec...
Conference Paper
One of the challenges in a military wireless sensor network is the determination of an information collection infrastructure which minimizes battery power consumption. The problem of determining the right information collection infrastructure can be viewed as a variation of the network design problem, with the additional constraints related to batt...
Conference Paper
Full-text available
In this paper, we present a novel policy middleware architecture for managing IT systems and applications that span multiple networks and administrative domains. The proposed policy middleware provides a standard infrastructure for the creation, storage, distribution, and execution of policies, and helps in reducing the cost of making IT systems po...
Chapter
This chapter describes a peer-to-peer approach for managing data backup and recovery in an enterprise environment. Data management systems in enterprises constitute a significant portion of the total cost of management of data in enterprise systems. Maintaining data with a high degree of availability and reliability is typically done by having a ce...
Article
This paper provides an overview of service level agreements (SLAs) in IP networks. It looks at the typical components of an SLA and identifies three common approaches that are used to satisfy SLAs in IP networks. The implications of using the approaches in the context of a network service provider, a hosting service provider, and an enterprise are...
Chapter
Chapter 5 discusses the use of peer-to-peer networks to build file storage services on the Internet. Peer-to-peer computing can be used to provide storage systems that are capable of providing ubiquitous access to files of a user from any location. The techniques and mechanisms needed to build file storage systems are described in this chapter.
Chapter
Chapter 10 discusses some of the topics that are related to peer-to-peer technology. It includes a discussion of peer-to-peer applications that were developed before file-sharing propelled peer-to-peer technology into the evening news, as well as Grid computing which has many similarities with peer-to-peer systems.
Chapter
Chapter 6 discusses how peer-to-peer networks can be used to build a data backup service without requiring expensive backup servers or a large amount of disk-space. The assumptions under which such a service works well are also discussed in that chapter.
Chapter
Chapter 8 will discuss how peer-to-peer systems can be used to build publish-subscribe middleware, which is commonly used in many enterprises to create different types of distributed applications. The advantages and disadvantages of a peer-to-peer implementation versus a traditional client-server implementation are discussed.
Chapter
Chapter 4 will provide a brief overview of the ubiquitous application driving many peer-to-peer systems: the sharing of files on the peer to peer network. It would discuss the technology used for such applications, and describe the different techniques that can be used to improve the efficiency and security of file sharing applications. It also dis...
Chapter
Chapter 2 discusses how the different nodes in a peer to peer networks can be connected together to create an overlay network connecting the participants over the Internet. It also discusses how the nodes discover each other in order to create such an overlay.
Chapter
Chapter 3 discusses a common building block that supports many of the applications that are run on peer-to-peer systems, namely the ability to multicast messages to a number of participants without relying on any capabilities of the underlying network. This type of multicast communication performed at the application layer is essential for the oper...
Chapter
Half TitleTitleCopyrightDedicationContentsPreface
Chapter
Chapter 9 discusses a variety of different applications that can be built on top of the different middleware and systems that are described in the earlier chapters. It includes examples of peer-to-peer instant messaging, peer-to-peer IP telephony, collaborative databases, collaborative hosting of content, and anonymous web-surfing, all applications...
Chapter
Chapter 7 will discuss how a directory service can be improved by using a peer-to-peer infrastructure. The directory service on peer-to-peer infrastructure can provide more scalable solutions when distributed administration domains are involved in managing different portions of the directory.
Conference Paper
Developers of policy enabled systems need a common set of basic functionality regardless of their areas of application. This is most conveniently provided in terms of a toolkit from which they can choose those components that are needed for their particular implementations. IBM T J Watson Research Center is developing such a policy toolkit in Java....
Chapter
This chapter describes a peer-to-peer approach for managing data backup and recovery in an enterprise environment. Data management systems in enterprises constitute a significant portion of the total cost of management of data in enterprise systems. Maintaining data with a high degree of availability and reliability is typically done by having a ce...
Article
Full-text available
Mirroring and replication are common techniques for ensuring fault-tolerance and resiliency of client-server applications. Because such mirroring and replication procedures are not usually automated, they tend to be cumbersome. In this paper, we present an architecture in which the identification of sites for replicated servers, and the generation...
Conference Paper
We consider the problem of ooading secure access-controlled content from central origin servers to distributed caches so clients can access a proximal cache rather than the origin servers. Our security archi- tecture enforces the access-control policies of the origin server without replicating the access-control databases to each of the caches. We...
Article
The management of network infrastructure in an enterprise is a complex and. daunting affair. In an era of increasing technical cornplexity, it is becoming difficult to find trained personnel who can manage the new features introduced into the various servers, routers, and switches. Policy-based network management provides a means by which the admin...
Article
Full-text available
We present a policy-based architecture for the control and management of content distribution networks that form an overlay of caching proxies over an underlying physical network. The architecture extends the policy framework used for controlling network quality of service (QoS) and security to content distribution networks. The fundamental advanta...
Chapter
Chapter 8 discusses standards related to content distribution and examines application layer ad-hoc content distribution networks like Napster and Gnutella
Chapter
Chapter 2 provides an overview of the techniques that can be employed to use more than one machine to improve the scalability of a single site complex hosting networked applications and supporting large numbers of users. These techniques include use of a front-end load balancer, broadcast and filtering, specialized directory services, smart selecti...
Chapter
Chapter 1 provides an overview of content distribution networks (CDNs) and compares CDNs to other approaches for managing the performance of web-based applications. The chapter starts with a description of factors that impact performance of networked applications. Network capacity planning and quality of service schemes, including reservation schem...
Chapter
Chapter 3 provides an overview of the different technologies that can be used to direct clients to different sites within a content distribution network (CDN). These techniques include use of a modified directory server to route clients to different sites within a CDN, triangular routing schemes, network anycast communication schemes, and modificat...
Chapter
Chapter 4 provides an overview of the performance monitoring that needs to be done in order to determine which of the sites in a content distribution network (CDN) is most suitable for a specific client. The chapter introduces active schemes that will monitor the system to determine the right site when a request arrives, as well as passive schemes...
Chapter
Half-title pageTitle pageCopyright pageDedicationContentsPrefaceIndex
Chapter
Chapter 6 discusses the different types of inter-connection arrangements that can be created between the different sites that make up a content distribution network (CDN). Issues that arise in using a secondary private network to connect different CDN sites, as well as optimizations that can enable CDN sites to communicate efficiently on a shared n...
Chapter
Chapter 7 identifies several applications whose performance can be improved by deploying them on a content distribution network (CDN). These applications range from delivery of static web pages and streaming multimedia to content adaptation and transcoding. The nature of these applications, as well as the nature of applications not likely to benefi...
Chapter
Chapter 5 provides an overview of the different techniques that can be used to share data among the different sites in a content distribution network (CDN), including transparent remote access, replication, and caching. Ensuring the consistency of shared data through periodic synchronization, asynchronous update notification, and schemes to get tra...
Conference Paper
Full-text available
The Differentiated Services Architecture defines the mechanisms that are needed to offer multiple classes of services in an IP network. While this model offers significant scaling advantages over the signaling-oriented approach of Integrated Services, the management of a differentiated services network remains a complex problem. Since the operation...
Conference Paper
Full-text available
This paper describes a tool for validating the proper configuration of the IPSEC protocol suite including IKE. The tool validates that two hosts are able to communicate (normal ping functionality) and that this communication is occurring using the proper authentication/encryption transformations as required by IPSEC. IPSEC configuration is very com...
Conference Paper
The IP multicast model allows scalable and efficient multi-party communication, particularly for groups of large size. However, deployment of IP multicast requires substantial infrastructure modifications and is hampered by a host of unresolved open problems. To circum- vent this situation, we have designed and implemented ALMI, an application leve...

Network

Cited By