scispace - formally typeset
Search or ask a question

Showing papers on "Network management published in 2013"


Journal ArticleDOI
TL;DR: Three problems in network management are identified: enabling frequent changes to network conditions and state, providing support for network configuration in a highlevel language, and providing better visibility and control over tasks for performing network diagnosis and troubleshooting.
Abstract: Network management is challenging. To operate, maintain, and secure a communication network, network operators must grapple with low-level vendor-specific configuration to implement complex high-level network policies. Despite many previous proposals to make networks easier to manage, many solutions to network management problems amount to stop-gap solutions because of the difficulty of changing the underlying infrastructure. The rigidity of the underlying infrastructure presents few possibilities for innovation or improvement, since network devices have generally been closed, proprietary, and vertically integrated. A new paradigm in networking, software defined networking (SDN), advocates separating the data plane and the control plane, making network switches in the data plane simple packet forwarding devices and leaving a logically centralized software program to control the behavior of the entire network. SDN introduces new possibilities for network management and configuration methods. In this article, we identify problems with the current state-of-the-art network configuration and management mechanisms and introduce mechanisms to improve various aspects of network management. We focus on three problems in network management: enabling frequent changes to network conditions and state, providing support for network configuration in a highlevel language, and providing better visibility and control over tasks for performing network diagnosis and troubleshooting. The technologies we describe enable network operators to implement a wide range of network policies in a high-level policy language and easily determine sources of performance problems. In addition to the systems themselves, we describe various prototype deployments in campus and home networks that demonstrate how SDN can improve common network management tasks.

1,122 citations


Proceedings ArticleDOI
16 Aug 2013
TL;DR: This paper describes several threat vectors that may enable the exploit of SDN vulnerabilities and sketches the design of a secure and dependable SDN control platform as a materialization of the concept here advocated.
Abstract: Software-defined networking empowers network operators with more flexibility to program their networks. With SDN, network management moves from codifying functionality in terms of low-level device configurations to building software that facilitates network management and debugging. By separating the complexity of state distribution from network specification, SDN provides new ways to solve long-standing problems in networking --- routing, for instance --- while simultaneously allowing the use of security and dependability techniques, such as access control or multi-path.However, the security and dependability of the SDN itself is still an open issue. In this position paper we argue for the need to build secure and dependable SDNs by design. As a first step in this direction we describe several threat vectors that may enable the exploit of SDN vulnerabilities. We then sketch the design of a secure and dependable SDN control platform as a materialization of the concept here advocated. We hope that this paper will trigger discussions in the SDN community around these issues and serve as a catalyser to join efforts from the networking and security & dependability communities in the ultimate goal of building resilient control planes.

667 citations


Proceedings Article
02 Apr 2013
TL;DR: This work proposes a software defined traffic measurement architecture OpenSketch, which separates the measurement data plane from the control plane and provides a measurement library that automatically configures the pipeline and allocates resources for different measurement tasks.
Abstract: Most network management tasks in software-defined networks (SDN) involve two stages: measurement and control. While many efforts have been focused on network control APIs for SDN, little attention goes into measurement. The key challenge of designing a new measurement API is to strike a careful balance between generality (supporting a wide variety of measurement tasks) and efficiency (enabling high link speed and low cost). We propose a software defined traffic measurement architecture OpenSketch, which separates the measurement data plane from the control plane. In the data plane, OpenSketch provides a simple three-stage pipeline (hashing, filtering, and counting), which can be implemented with commodity switch components and support many measurement tasks. In the control plane, OpenSketch provides a measurement library that automatically configures the pipeline and allocates resources for different measurement tasks. Our evaluations of real-world packet traces, our prototype on NetFPGA, and the implementation of five measurement tasks on top of OpenSketch, demonstrate that OpenSketch is general, efficient and easily programmable.

587 citations


Patent
31 Jul 2013
TL;DR: In this paper, the authors present a system for the registration and management of active grid elements, where grid elements are transformed into active grid element following initial registration of each grid element with the system, preferably through network-based communication between grid elements and a coordinator, either in coordination with or outside of an IP-based communications network router.
Abstract: Systems, methods, and apparatus embodiments for electric power grid and network registration and management of active grid elements. Grid elements are transformed into active grid elements following initial registration of each grid element with the system, preferably through network-based communication between the grid elements and a coordinator, either in coordination with or outside of an IP-based communications network router. A multiplicity of active grid elements function in the grid for supply capacity, supply and/or load curtailment as supply or capacity. Also preferably, messaging is managed through a network by a Coordinator using IP messaging for communication with the grid elements, with the energy management system (EMS), and with the utilities, market participants, and/or grid operators.

278 citations


Journal ArticleDOI
TL;DR: This work proposes a load-balanced clustering algorithm for WSNs on the basis of their distance and density distribution, making it essentially different from the previous clustering algorithms.
Abstract: Wireless sensor networks (WSNs) are composed of a large number of inexpensive power-constrained wireless sensor nodes, which detect and monitor physical parameters around them through self-organization. Utilizing clustering algorithms to form a hierarchical network topology is a common method of implementing network management and data aggregation in WSNs. Assuming that the residual energy of nodes follows the random distribution, we propose a load-balanced clustering algorithm for WSNs on the basis of their distance and density distribution, making it essentially different from the previous clustering algorithms. Simulated tests indicate that the new algorithm can build more balanceable clustering structure and enhance the network life cycle.

268 citations


Journal ArticleDOI
TL;DR: It is found that an orchestrator builds the capacity to assemble a network over time through the accumulation of resources and specialized expertise, however, as the network develops, an orchestra faces an evolving set of dilemmas arising from the need to demonstrate value for various members and audiences.
Abstract: Using longitudinal qualitative and network data capturing five years of evolution of an interorganizational network, this paper explores network orchestration – the process of assembling and developing an interorganizational network. In particular, we analyze shifts in the network orchestrator’s actions and the network’s structure and composition. We find that an orchestrator builds the capacity to assemble a network over time through the accumulation of resources and specialized expertise. However, as the network develops, an orchestrator faces an evolving set of dilemmas arising from the need to demonstrate value for various members and audiences. To resolve these dilemmas, orchestrators may shift their actions, moving from initially encouraging serendipitous encounters between network members (“blind dates”) to increasingly selecting members and more closely influencing their interactions (“arranging marriages”). We discuss implications of our findings for a processual understanding of orchestrated net...

198 citations


Proceedings ArticleDOI
14 Apr 2013
TL;DR: A novel technique for automatically generating network profiles for identifying Android apps in the HTTP traffic and a novel UI fuzzing technique for running the app such that different execution paths are exercised, which is necessary to build a comprehensive network profile.
Abstract: Network operators need to have a clear visibility into the applications running in their network. This is critical for both security and network management. Recent years have seen an exponential growth in the number of smart phone apps which has complicated this task. Traditional methods of traffic classification are no longer sufficient as the majority of this smart phone app traffic is carried over HTTP/HTTPS. Keeping up with the new applications that come up everyday is very challenging and time-consuming. We present a novel technique for automatically generating network profiles for identifying Android apps in the HTTP traffic. A network profile consists of fingerprints, i.e., unique characteristics of network behavior, that can be used to identify an app. To profile an Android app, we run the app automatically in an emulator and collect the network traces. We have developed a novel UI fuzzing technique for running the app such that different execution paths are exercised, which is necessary to build a comprehensive network profile. We have also developed a light-weight technique, for extracting fingerprints, that is based on identifying invariants in the generated traces. We used our technique to generate network profiles for thousands of apps. Using our network profiles we were able to detect the presence of these apps in real-world network traffic logs from a cellular provider.

193 citations


Journal ArticleDOI
TL;DR: The Frenetic project is designing simple and intuitive abstractions for programming the three main stages of network management: monitoring network traffic, specifying and composing packet forwarding policies, and updating policies in a consistent way to reach SDNs full potential.
Abstract: Modern computer networks perform a bewildering array of tasks, from routing and traffic monitoring, to access control and server load balancing. However, managing these networks is unnecessarily complicated and error-prone, due to a heterogeneous mix of devices (e.g., routers, switches, firewalls, and middleboxes) with closed and proprietary configuration interfaces. Softwaredefined networks are poised to change this by offering a clean and open interface between networking devices and the software that controls them. In particular, many commercial switches support the OpenFlow protocol, and a number of campus, data center, and backbone networks have deployed the new technology. However, while SDNs make it possible to program the network, they does not make it easy. Today's OpenFlow controllers offer low-level APIs that mimic the underlying switch hardware. To reach SDNs full potential, we need to identify the right higher-level abstractions for creating (and composing) applications. In the Frenetic project, we are designing simple and intuitive abstractions for programming the three main stages of network management: monitoring network traffic, specifying and composing packet forwarding policies, and updating policies in a consistent way. Overall, these abstractions make it dramatically easier for programmers to write and reason about SDN applications.

190 citations


Proceedings ArticleDOI
Ying Zhang1
09 Dec 2013
TL;DR: A novel method that performs adaptive zooming in the aggregation of flows to be measured that can detect anomalies more accurately with less overhead and a prediction based algorithm that dynamically change the granularity of measurement along both the spatial and the temporal dimensions is proposed.
Abstract: The accuracy and granularity of network flow measurement play a critical role in many network management tasks, especially for anomaly detection. Despite its important, traffic monitoring often introduces overhead to the network, thus, operators have to employ sampling and aggregation to avoid overloading the infrastructure. However, such sampled and aggregated information may affect the accuracy of traffic anomaly detection. In this work, we propose a novel method that performs adaptive zooming in the aggregation of flows to be measured. In order to better balance the monitoring overhead and the anomaly detection accuracy, we propose a prediction based algorithm that dynamically change the granularity of measurement along both the spatial and the temporal dimensions. To control the load on each individual switch, we carefully delegate monitoring rules in the network wide. Using real-world data and three simple anomaly detectors, we show that the adaptive based counting can detect anomalies more accurately with less overhead.

187 citations


Journal ArticleDOI
TL;DR: A survey on intelligent techniques for feature selection and classification for intrusion detection in networks based on intelligent software agents, neural networks, genetic algorithms, neuro-genetic algorithms, fuzzy techniques, rough sets, and particle swarm intelligence is proposed.
Abstract: Rapid growth in the Internet usage and diverse military applications have led researchers to think of intelligent systems that can assist the users and applications in getting the services by delivering required quality of service in networks. Some kinds of intelligent techniques are appropriate for providing security in communication pertaining to distributed environments such as mobile computing, e-commerce, telecommunication, and network management. In this paper, a survey on intelligent techniques for feature selection and classification for intrusion detection in networks based on intelligent software agents, neural networks, genetic algorithms, neuro-genetic algorithms, fuzzy techniques, rough sets, and particle swarm intelligence has been proposed. These techniques have been useful for effectively identifying and preventing network intrusions in order to provide security to the Internet and to enhance the quality of service. In addition to the survey on existing intelligent techniques for intrusion detection systems, two new algorithms namely intelligent rule-based attribute selection algorithm for effective feature selection and intelligent rule-based enhanced multiclass support vector machine have been proposed in this paper.

170 citations


Proceedings ArticleDOI
01 Nov 2013
TL;DR: The design of PolicyCop is presented, an open, flexible, and vendor agnostic QoS policy management framework targeted towards OpenFlow based SDN that provides an interface for specifying QoS SLAs and then exploits the control plane's API to enforce them.
Abstract: Network management is becoming increasingly challenging with the relentless growth in network size, traffic volume, and the diversity in QoS requirements. Traditionally, the concept of predefined Service Level Agreements (SLAs) has been utilized to establish QoS parameters. However, most state-of-the-art technologies in this area are both proprietary and inflexible. To this end, Software Defined Networking (SDN) has the potential to make network management tasks flexible, scalable, and an open platform to encourage innovation. In this paper, we present the design of PolicyCop, an open, flexible, and vendor agnostic QoS policy management framework targeted towards OpenFlow based SDN. PolicyCop provides an interface for specifying QoS SLAs and then exploits the control plane's API to enforce them. PolicyCop also monitors the network and autonomically readjusts network parameters to meet customer SLAs. We present experimental results to demonstrate PolicyCop's effectiveness in ensuring throughput, latency, and reliability guarantees.

01 Jan 2013
TL;DR: Since the accuracy of data is important to the whole system's performance, detecting nodes with faulty readings is an essenti al issue in network management and removal from a system or replacing them with good ones improve the wholesystem's performance and at the same time prolong the lifetime of the network.
Abstract: Since the accuracy of data is important to the whole system's performance, detecting nodes with faulty readings is an essenti al issue in network management. Removing nodes with faulty readings from a system or replacing them with good ones improve the whole system's performance and at the same time prolong the lifetime of the network. In general, wireless sensor nodes may experience two types of faults that would lead to the degradation of performance. One type is function fault, which typically results in the crash of individual nodes, packet loss, routing failure or network partition. The other type of error is data fault, in which a node behaves normally in all aspects except for its sensing results, leading to either significant biased or random errors.

Proceedings ArticleDOI
19 Dec 2013
TL;DR: It is proposed that software-defined networking can alleviate many of today's problems and create a network which can evolve with changing technologies and needs and how this architecture enables substation networks to easily evolve with the rapid evolution of the smart grid.
Abstract: Energy communication networks (ECNs) play an integral role in electrical substations. Substations host many Intelligent Electronic Devices (IEDs) that monitor the state of the electricity infrastructure. This critical data is packaged and transmitted between multiple IEDs for proper system monitoring and control. The modern network that interconnects IEDs, while a significant improvement over the historic serial interconnection, has many challenges which have yet to be addressed - ranging from setup complexity to security policies. In this paper we propose that software-defined networking can alleviate many of today's problems and create a network which can evolve with changing technologies and needs. We demonstrate an auto-configuring substation network which eliminates many substation network management issues. Our prototype is built using a Ryu-based, software-defined network controller and tested with actual IEDs used in substations. We also discuss how our software-defined energy communication network (SDECN) architecture not only solves problems of today, but enables substation networks to easily evolve with the rapid evolution of the smart grid.

Journal ArticleDOI
TL;DR: In this paper, the authors explore how Born Global networks develop as the firm's internal resources grow and explore the benefits that Born Globals gain from this development, and make empirical contributions to Born Global and Networks research in the context of Business-to-Business firms.

Posted Content
TL;DR: This article uses fuzzy set qualitative comparative analysis – a relatively new approach in public administration research – to systematically compare the decision-making processes and outcomes of 14 Dutch spatial planning projects and points to three combinations that result in stakeholder satisfaction.
Abstract: Many studies have been conducted to determine the conditions that contribute to the satisfactory outcome of decision-making processes in governance networks. In this article, we explore how the interaction of three such conditions – network complexity, network management, and stakeholder involvement – results in stakeholder satisfaction. We use fuzzy set qualitative comparative analysis – a relatively new approach in public administration research – to systematically compare the decision-making processes and outcomes of 14 Dutch spatial planning projects. Our analysis points to three combinations that result in stakeholder satisfaction: network complexity combined with adaptive management; stakeholder involvement combined with adaptive management; and low complexity combined with both limited stakeholder involvement and closed network management.

Journal ArticleDOI
TL;DR: In this article, the authors explore how the interaction of three such conditions (network complexity, network management, and stakeholder involvement) results in stakeholder satisfaction, and they use fuzzy set qualitative comparative analysis to compare the decision-making processes and outcomes of 14 Dutch spatial planning projects.
Abstract: Many studies have been conducted to determine the conditions that contribute to the satisfactory outcome of decision-making processes in governance networks. In this article, we explore how the interaction of three such conditions – network complexity, network management, and stakeholder involvement – results in stakeholder satisfaction. We use fuzzy set qualitative comparative analysis – a relatively new approach in public administration research – to systematically compare the decision-making processes and outcomes of 14 Dutch spatial planning projects. Our analysis points to three combinations that result in stakeholder satisfaction: network complexity combined with adaptive management; stakeholder involvement combined with adaptive management; and low complexity combined with both limited stakeholder involvement and closed network management.

Proceedings Article
02 Apr 2013
TL;DR: The system, NetSieve, combines statistical natural language processing (NLP), knowledge representation, and ontology modeling to achieve these goals and achieves 89%-100% accuracy and its inference output is useful to learn global problem trends.
Abstract: This paper presents NetSieve, a system that aims to do automated problem inference from network trouble tickets Network trouble tickets are diaries comprising fixed fields and free-form text written by operators to document the steps while troubleshooting a problem Unfortunately, while tickets carry valuable information for network management, analyzing them to do problem inference is extremely difficult--fixed fields are often inaccurate or incomplete, and the free-form text is mostly written in natural language This paper takes a practical step towards automatically analyzing natural language text in network tickets to infer the problem symptoms, troubleshooting activities and resolution actions Our system, NetSieve, combines statistical natural language processing (NLP), knowledge representation, and ontology modeling to achieve these goals To cope with ambiguity in free-form text, NetSieve leverages learning from human guidance to improve its inference accuracy We evaluate NetSieve on 10K+ tickets from a large cloud provider, and compare its accuracy using (a) an expert review, (b) a study with operators, and (c) vendor data that tracks device replacement and repairs Our results show that NetSieve achieves 89%-100% accuracy and its inference output is useful to learn global problem trends We have used NetSieve in several key network operations: analyzing device failure trends, understanding why network redundancy fails, and identifying device problem symptoms

Proceedings ArticleDOI
21 Nov 2013
TL;DR: Merlin simplifies the task of network administration by providing high-level abstractions for directly specifying network policy and providing mechanisms for delegating management of sub-policies to tenants.
Abstract: This paper presents the Merlin network management framework. With Merlin, administrators express network policy using programs in a declarative language based on logical predicates and regular expressions. The Merlin compiler automatically partitions these programs into components that can be placed on a variety of devices including switches, middleboxes, and end hosts. It uses a constraint solver and parameterizable heuristics to allocate resources such as paths and bandwidth. To ease the administration of federated networks, Merlin provides mechanisms for delegating management of sub-policies to tenants, along with tools for verifying that delegated sub-policies do not violate global constraints. Overall, Merlin simplifies the task of network administration by providing high-level abstractions for directly specifying network policy.

Proceedings Article
01 Jan 2013
TL;DR: FlowComb predicts application network transfers, sometimes before they start, by using software agents installed on application servers and while remaining completely transparent to the application.
Abstract: We introduce FlowComb, a network management framework that helps Big Data processing applications, such as Hadoop, achieve high utilization and low data processing times. FlowComb predicts application network transfers, sometimes before they start, by using software agents installed on application servers and while remaining completely transparent to the application. A centralized decision engine collects data movement information from agents and schedules upcoming flows on paths such that the network does not become congested. Results on our lab testbed show that FlowComb is able to reduce the time to sort 10GB of randomly generated data by 35% while changing paths for only 6% of the transfers.

Journal ArticleDOI
TL;DR: A novel approach for automatic reverse engineering application-layer network protocols by extracting protocol keywords from network traces based on their support rates and variances of positions, reconstruct message formats, and infer protocol state machines is presented.

Proceedings ArticleDOI
21 Nov 2013
TL;DR: The Corybantic design supports modular composition of independent controller modules, which manage different aspects of the network while competing for resources, in order to maximize the overall value delivered by the controllers' decisions, while still achieving modularity.
Abstract: Software-Defined Networking (SDN) promises to enable vigorous innovation, through separation of the control plane from the data plane, and to enable novel forms of network management, through a controller that uses a global view to make globally-valid decisions. The design of SDN controllers creates novel challenges; much previous work has focused on making them scalable, reliable, and efficient.However, prior work has ignored the problem that multiple controller functions may be competing for resources (e.g., link bandwidth or switch table slots). Our Corybantic design supports modular composition of independent controller modules, which manage different aspects of the network while competing for resources. Each module tries to optimize one or more objective functions; we address the challenge of how to coordinate between these modules to maximize the overall value delivered by the controllers' decisions, while still achieving modularity.

Proceedings ArticleDOI
01 Oct 2013
TL;DR: A new formal method for a new tool, Atomic Predicates (AP) Verifier, which is much more time and space efficient than existing tools, given a set of predicates representing packet filters, is presented.
Abstract: Network management will benefit from automated tools based upon formal methods. Several such tools have been published in the literature. We present a new formal method for a new tool, Atomic Predicates (AP) Verifier, which is much more time and space efficient than existing tools. Given a set of predicates representing packet filters, AP Verifier computes a set of atomic predicates, which is minimum and unique. The use of atomic predicates dramatically speeds up computation of network reachability. We evaluated the performance of AP Verifier using forwarding tables and ACLs from three large real networks. The atomic predicate sets of these networks were computed very quickly and their sizes are surprisingly small. Real networks are subject to dynamic state changes over time as a result of rule insertion and deletion by protocols and operators, failure and recovery of links and boxes, etc. In a software-defined network, the network state can be observed in real time and thus may be controlled in real time. AP Verifier includes algorithms to process such events and check compliance with network policies and properties in real time. We compare time and space costs of AP Verifier with NetPlumber using datasets from the real networks.

Journal ArticleDOI
TL;DR: In this article, the authors investigated the relationship between the connective style of network management and outcomes of governance processes and explained differences and developments in managerial styles in complex governance networks in relation to outcomes.
Abstract: This article investigates the relationship between the connective style of network management and outcomes of governance processes and explains differences and developments in managerial styles in complex governance networks in relation to outcomes. We found that a strong connective style of network management is related to good outcomes. We also found that discontinuity in management has a negative impact on outcomes. Moreover, we found that the background of managers and their connective management style are related: Network managers with a governmental background proved to have a less connective orientation than professional external managers.

Patent
21 Aug 2013
TL;DR: In this article, multiple mobile cellular network (MCN) communication systems can be networked together to form a network of MCN communication systems (NOM), where each MCN communications system within the NOM can operate as an independent cellular network to provide communications between user equipment within a covered area.
Abstract: Multiple mobile cellular network (MCN) communication systems can be networked together to form a network of MCN communication systems (NOM). Each MCN communication system within the NOM can operate as an independent cellular network to provide communications between user equipment within a covered area. The MCN can be managed by a network management control center (NMCC). The NMCC can be configured generate coverage maps of the NOM and NMC system coverage areas.

Journal ArticleDOI
Cathryn Peoples1, Gerard Parr1, Sally McClean1, Bryan Scotney1, Philip Morrow1 
TL;DR: Operational efficiency from the perspective of activities in data centres which support the internet of things is explored, including evaluation of the effectiveness of mechanisms integrated into the e-CAB framework, an algorithm proposed by the authors to manage next generation data centres with green objectives.

Journal ArticleDOI
TL;DR: A secure protocol for spontaneous wireless ad hoc networks which uses an hybrid symmetric/asymmetric scheme and the trust between users in order to exchange the initial data and the secret keys that will be used to encrypt the data is presented.
Abstract: This paper presents a secure protocol for spontaneous wireless ad hoc networks which uses an hybrid symmetric/asymmetric scheme and the trust between users in order to exchange the initial data and to exchange the secret keys that will be used to encrypt the data. Trust is based on the first visual contact between users. Our proposal is a complete self-configured secure protocol that is able to create the network and share secure services without any infrastructure. The network allows sharing resources and offering new services among users in a secure environment. The protocol includes all functions needed to operate without any external support. We have designed and developed it in devices with limited resources. Network creation stages are detailed and the communication, protocol messages, and network management are explained. Our proposal has been implemented in order to test the protocol procedure and performance. Finally, we compare the protocol with other spontaneous ad hoc network protocols in order to highlight its features and we provide a security analysis of the system.

Proceedings ArticleDOI
09 Dec 2013
TL;DR: This paper describes the experience in the design of HybNET a framework for automated network management of a hybrid network infrastructure (both SDN and legacy network infrastructure) and provides a best-effort solution in providing compatibility between legacy and SDN switches while retaining some of the advantages and flexibility of SDN enabled switches.
Abstract: The emergence of Software-Defined Networking(SDN) has led to a paradigm shift in network management. SDN has the capability to provide clear and easy management of complex operational challenges in large scale networks. However, most of the existing work in SDN network management assumes a full deployment of SDN enabled network switches. Due to both practical and financial limitation real implementations are likely to transition through a partial deployment. In this paper, we describe our experience in the design of HybNET a framework for automated network management of a hybrid network infrastructure (both SDN and legacy network infrastructure). We discuss some of the challenges we encountered, and provide a best-effort solution in providing compatibility between legacy and SDN switches while retaining some of the advantages and flexibility of SDN enabled switches. We have tested our tool on small hybrid network infrastructure, and applied it to manage the OpenStack Neutron interface a well known open-source IaaS provider.

Patent
04 Apr 2013
TL;DR: In this article, a method of managing Wi-Fi access points using a WiFi network manager is described. But the authors focus on the measurement data received from a plurality of access points via a control interface.
Abstract: A method of managing Wi-Fi access points using a Wi-Fi network manager is disclosed. Measurement data is received from a plurality of Wi-Fi access points via a control interface. Optimized adjustments to one or more Wi-Fi parameters associated with one or more of the plurality of access points are searched based at least in part on a set of network optimization goals and the measurement data received from the plurality of access points. At least some of the optimized adjustments to the one or more Wi-Fi parameters are transmitted to the one or more of the plurality of access points using the control interface.

Patent
07 Jan 2013
TL;DR: In this paper, the authors present systems and methods for managing an entity's social graph including integration between advertising network management, social customer relationship management (CRM), and social media management.
Abstract: Provided are systems and methods for managing an entity's social graph including integration between advertising network management, social customer relationship management (CRM), and social media management. The system can include a social engagement engine for analyzing data from both CRM systems and advertising monitoring and management systems. The social engagement engine can be configured to segment the received data and discover insights into the social graph describing the entity's contacts. Insights developed from advertising, CRM data, and third party data can then be used to optimize advertising strategies. In some examples, the insights into an entity's connections can be used to optimize CRM strategies. CRM strategies can be employed to strengthen ties to existing customers, identify valuable customers, and recapture lost customers by delivering offers and/or opportunities to customers.

Patent
15 Mar 2013
TL;DR: In this article, the authors propose a network architecture system that provides application identification and usage data by user, by device and network location using dynamic traffic mirroring to identify computer applications running on the network.
Abstract: A network architecture system that expands the control network administrators have on existing networks The system provides application identification and usage data by user, by device and network location Dynamic traffic mirroring of the system allows for the efficient use of a tool to identify computer applications running on the network The system includes the ability to embed the tool where needed rather than pervasively based on the use of the dynamic mirroring to bring the packets to the tool The architecture implemented functions allow the ability to start small with a single application identification tool added to a network management server, examine flows from throughout the network (via mirroring) and upgrade policy control based on real application identification data and usage, then grow to pervasive deployment where virtually all new flows could be identified and controlled via policy This architecture enables substantially complete application visibility and control