3rd International Summer School on Network and Service Management (ISSNSM 2009)

The 3rd summer school on network and service management takes place July 13-17 2009 in Munich, Germany. This school combines class room lectures with hands on lab sessions and primarily targets PhD students working in the area of network and service management. It is organized by Gabi Dreo Rodosek, Björn Stelte, and Iris Hochstatter (EMANICS members).

July 13-17, 2009, Universität der Bundeswehr München, Germany

Scope

The EMANICS summer school will provide classes on a comprehensive suite of advanced topics in network management. The courses will be accompanied with practical hands-on labs in order to combine the theoretical background with some operational experience. The instructors are well known members of the academic and industrial community.

Overview

Courses and associated practical labs will be organized by instructors who are well known experts. The courses introduce technologies, which are later further studied by the students in a series of exercises of lab experiments.

The labs will assume working experience with Unix/Linux systems and there might be further lab specific prerequisites. If participants bring personal notebooks (preferably with a CD-ROM), they are expected to know how to install software and how to administrate their system. We will also provide machines for the use in the practical excersises. More details will be provided by each lab instructor.

Download ISSNSM 2009 overview here (pdf format)

Abstracts

ISO/IEC 20000 - International Standard for IT Service Management

ISO/IEC 20000 is an international standard for IT Service Management (ITSM). First published in 2005, it is experiencing increasing attention and acceptance by IT service providers, as well as developers of ITSM tools, products and systems. For IT service providers, being able to demonstrate ITSM capabilities through an ISO/IEC 20000 certificate is fast becoming a crucial factor for winning new contracts - or renewing old ones.

Background: Many of the most pressing challenges faced by IT service providers increasing the availability and reliability of IT services, optimizing the responsiveness of IT support, improving the perception of IT by the business cannot be adequately addressed by network and systems management alone. Realizing that organizational aspects play a vital role in IT service management, many IT managers have turned to ITSM process frameworks like ITIL, Cobit or eTOM for guidance. Some of these ITSM frameworks are perceived as de-facto standards, but ISO/IEC 20000 is the first international standard for ITSM, offering IT service providers the opportunity to provide evidence of their IT service management capabilities through an internationally accepted certification. ISO/IEC 20000 shares some concepts and terminology with ITIL, but is not dependent on ITIL or any other ITSM framework. Where ITIL covers possible solutions to a very broad variety of possible ITSM-related issues in a general, non-binding form, ISO/IEC 20000 concentrates on defining concise, auditable requirements for addressing the Must-haves of ITSM.

This tutorial will provide an introduction to ISO/IEC 20000, at which the McKinley airport simulation will accompany theoretical aspects of the framework. It will explain the purpose and structure of ISO/IEC 20000, cover all sections of the standard and outline the most important requirements specified by it. At the end of the tutorial, attendees will understand the fundamentals of ISO/IEC 20000, its role in the context of IT Service Management, and the similarities and differences between ISO/IEC 20000 and ITIL. They will be familiar with the process framework of ISO/IEC 20000, its definition of an ITSM system, and have gained insights into how these concepts can be applied in an IT service provider organization. In addition, the course serves as a preparation for later personal certification (taking the ISO/IEC 20000 Foundation level exam is possible at various testing centers worldwide).

The tutorial requires no specific prior knowledge, though a basic knowledge of ITIL will likely be advantageous when discussing some advanced concepts and the relationship between ISO/IEC 20000 and ITIL.

Self-Properties

Distributed systems have become more complex in recent years, due to the increased performance and capabilities of hardware and software which allows to form new structures like peer-to-peer overlays, ad-hoc networks, or to coordinate autonomous components to reach a common goal, as known from Grid technologies or software agents. Exploiting these new possibilities, however, also shows a downside: system designers, maintainers, and users gradually lose track on the activities and interactions within the system, and it becomes increasingly difficult to build stable systems of multiple, active, heterogeneous parts which shall cooperate in a given way.

Many approaches have been researched to cope with this dilemma, making use of the concept of self-organisation. Here, the structure and behaviour of a large group of individual autonomous components is created and maintained by internal rules, removing the human user from the control loop. That way, the user is relieved from the burden of keeping the complex system running and may concentrate on the actual task. Besides self-organisation, we can identify similar concepts like self-management which targets at maintaining the functionality of a system by itself, self-optimization which entails self-observation and reconfiguration, or self-healing where systems detect failures by themselves and commit repair activities. All these and similar terms may be subsumed as "self-properties".

In this course we will give an introduction and overview on the current research on self-properties, featuring:

  • Concepts and examples of self-properties
  • Research and industrial initiatives
  • Emergence Engineering
  • Self-optimization in Service-oriented Architectures
  • Planning in a self-organising team of soccer robots
including demonstrations and exercises for the participants for selected topics. We intend to offer hands-on exercises for different skill levels of the participants.

Malware detection with Machine Learning Methods

Course topics:

  • Operating mode of viruses
  • Theoretical detection methods of antivirus scanners
  • Machine learning methods (Support Vector Machines, Bayes, Neural Networks) for malware detection
Anonymity: Tor and I2P

Tor and I2P are two protocols to protect against traffic analysis. Tor was initially developed at the US Naval Research Lab and has a strict design (Design, new proposals). I2P is developed by private persons which try to stay anonymous themselves. There is no formal specification, but the projects website as well as the source code has lots of documentation.

This workshop will give you an introduction into Tor and I2P. It will present you how both protocols work, where specific weaknesses are and what attacks exist. After you learned the theoretical part we will build our own anonymity network using the Tor software.

We will use a GNU/Linux based system. So it will be helpful, if you have basic knowledge how to use it and if you can edit files with vim/emacs.

Instructors

Michael Brenner (Leibniz Supercomputing Centre)

Michael Brenner received the Diploma (M.Sc.) degree and the Ph.D. degree in Informatics from the Ludwig-Maximilians-Universität, Munich, Germany. Until 2007 he was a research associate at the Ludwig-Maximilians-Universität Munich. He is currently employed at the Leibniz Supercomputing Centre of the Bavarian Academy of Sciences and Humanities where he chairs the working group for IT Service Management. He is a member of the MNM team and has authored or co-authored various publications on topics related to IT Service Management. Dr. Brenner is an active instructor for various IT Service frameworks (ITIL, MOF, ISO/IEC 20000) and holds several advanced certifications in this field. He is a member of the Committee for the IT Certification of Persons as per ISO/IEC 20000 which defines a new (soon to be ISO 17024 accredited) training and personal certification scheme of IT Service Management according to ISO/IEC 20000. He also co-authors, with Thomas Schaaf, the official training materials for several courses of this qualification scheme.

Thomas Schaaf (Ludwig-Maximilians-Universität)

Thomas Schaaf received the Diploma (M.Sc.) degree in Informatics from the Ludwig-Maximilians-Universität, Munich, Germany. He is currently a research associate at the LMU, specializing in Service Level Management issues, and pursuing his Ph.D. degree in Informatics. He is a member of the MNM team and has authored or co-authored several publications on topics related to IT Service Management. He is an experienced instructor for IT Service Management according to ITIL and ISO/IEC 20000 and holds various related advanced certifications. Together with Michael Brenner he is responsible for the development of training materials for various courses within the training and qualification scheme for IT Service Management according to ISO/IEC 20000.

Michael Zapf (Universität Kassel)

Michael Zapf is a postdoctoral assistant at Universität Kassel since December 2004. He earned his Ph.D. degree at the University of Frankfurt in 2001 for his research on type systems for autonomous software agents, specifically in the area of mobile agents. His current interests are model-driven concepts for software engineering in complex systems of autonomous components. Dr. Zapf holds lectures at Universität Kassel on Internet services and technologies and autonomous software agents and has published articles on self-organisation concepts for engineering complex systems, engineering of system behaviour using Genetic Programming, and application of self-properties to web services.

Thomas Stibor (TU München)

Thomas Stibor studied computer science at the Johann Wolfgang Goethe University in Frankfurt and afterwards received his PhD from the Technical University Darmstadt in the field of artificial immune systems and IT security. During his thesis he stayed at the University of Kent at Canterbury, England, for half a year. As a postdoc, he did research at the University of California at Davis, USA. Today, he is a researcher and teaches at the Technical University Munich, chair for security in computer science.

Jens Kubieziel

Jens Kubieziel worked in the banking business and was responsible for treasury management and currency trading as well as training internal and external clients. Since 2000 he works in the IT-sector. First he trained customers of INTERSHOP Communications AG in using and extending its e-commerce software. From 2003 he holds lectures in different areas of system administrations, data protection and security. Kubieziel has written articles for german computer magazines and is the author of the book "Anonym im Netz -- Techniken der digitalen Bewegungsfreiheit".

Location

ISSNSM 2009 will take place at the campus of the

Universität der Bundeswehr München
Werner-Heisenberg-Weg 39
85579 Neubiberg
Germany

Please follow this link for further travel information.

Schedule

The summer school will start on Monday morning and close on Friday noon. From Monday to Thursday we will have a lunch break from 12:30 to 14:00 on campus. In addition, coffee breaks in the morning (10:30 - 11:00) and in the afternoon (15:30 - 16:00) take place close to the seminar room.

Registration

The number of participants is limited to 30, preference will be given to PhD students.

Registration fee:

  • Early bird rate (until June 15th): 170.- Euro
  • Normal rate (after June 15th): 200.- Euro

Local Infrastructure

  • WLAN access will be provided on site, together with the necessary directions.
  • Coffee breaks will be held locally. Lunches will be taken in the Officer Club, which can be reached in about 5 minutes (in another building on the campus).

Organizers

Registered Participants

  • Anna Sperotto, University of Twente, Netherlands
  • Cristian Morariu, University of Zurich, Switzerland
  • Dalibor Peric, University of Zurich, Switzerland
  • Fabio Hecht, University of Zurich, Switzerland
  • Giovane C. M. Moura, University of Twente, Netherlands
  • Guilherme Sperb Machado, University of Zurich, Switzerland
  • Idilio Drago, University of Twente, Netherlands
  • Jörg Czanderle, Universität der Bundeswehr München, Germany
  • Kamran Soltani, Politecnico di Milano, Italy
  • Karim Torkmen, Scuola Superiore Sant'Anna di Pisa, Italy
  • Marc-Oliver Pahl, TU München, Germany
  • Martin Metzker, MNM Team, LMU München, Germany
  • Martin Waldburger, University of Zurich, Switzerland
  • Molka Gharbaoui, Scuola Superiore Sant'Anna di Pisa, Italy
  • Oliver Jetter, Universität Karlsruhe (TH), Germany
  • Ralf König, MNM Team, LMU München, Germany
  • Robert Szuman, Poznan Supercomputing and Networking Center, Poland
  • Seyed Reza Jalalinia, Chalmers University of Technology, Sweden
  • Shaonan Wang, University of Luxembourg, Luxembourg
  • Tobias Bandh, TU München, Germany
  • Volker Eiseler, Universität der Bundeswehr München, Germany
  • Wiktor Procyk, Poznan Supercomputing and Networking Center, Poland