scispace - formally typeset
Search or ask a question
Topic

Network management

About: Network management is a research topic. Over the lifetime, 17859 publications have been published within this topic receiving 234520 citations. The topic is also known as: computer network management & NM.


Papers
More filters
Journal ArticleDOI
TL;DR: This research aims to create a robust and efficient network partitioning algorithm, where distinct MFD properties exist for each respective partition, utilizing the concept of lambda-connectedness and the technique of region growing and can work with partial traffic data.
Abstract: The existence of a macroscopic fundamental diagram (MFD) in a network/subnetwork allows one to formulate hierarchical traffic management strategies. In order to achieve this, a robust and efficient network partitioning algorithm is needed. This research aims to create such an algorithm, where distinct MFD properties exist for each respective partition. The proposed four-step network partition approach utilizes the concept of lambda-connectedness and the technique of region growing and, unlike prior studies, can work with partial traffic data. This research brings forth the following contributions: 1) an algorithmic approach that allows for incomplete traffic datasets as an input and 2) an approach that does not require the user to arbitrarily pre-determine the number of necessary subnetworks. The proposed algorithmic approach can intuitively decide on the number of partitions based on the network connectivity and traffic congestion patterns. The proposed approach was implemented and tested on the regional planning network of Tucson/Pima County Arizona, USA. The MFD related statistics for each subnetwork are presented and discussed. Numerical analysis on lambda choice and algorithm sensitivity regarding different data missing ratios were also performed and elaborated.

60 citations

Journal ArticleDOI
TL;DR: This paper proposes CyberPulse, a novel effective countermeasure, underpinning a machine learning-based classifier to alleviate LFA in SDN, and demonstrates the vulnerability of the SDN control layer to LFA and how the attack strategy differs when targeting traditional networks.
Abstract: Software-defined networking (SDN) offers a novel paradigm for effective network management by decoupling the control plane from the data plane thereby allowing a high level of manageability and programmability. However, the notion of a centralized controller becomes a bottleneck by opening up a host of vulnerabilities to various types of attacks. One of the most harmful, stealthy, and easy to launch attacks against networked systems is the link flooding attack (LFA). In this paper, we demonstrate the vulnerability of the SDN control layer to LFA and how the attack strategy differs when targeting traditional networks which primarily involves attacking the links directly. In LFA, the attacker employs bots to surreptitiously send low rate legitimate traffic on the control channel which ultimately results in disconnecting control plane from the data plane. Mitigating LFA on the control channel remains a challenge in the network security paradigm with the use of network traffic filtering only. To address this challenge, we propose CyberPulse, a novel effective countermeasure, underpinning a machine learning-based classifier to alleviate LFA in SDN. CyberPulse performs network surveillance by classifying network traffic using deep learning techniques and is implemented as an extension module in the Floodlight controller. CyberPulse was evaluated for its accuracy, false positive rate, and effectiveness as compared to competing approaches on realistic networks generated using Mininet. The results show that CyberPulse can classify malicious flows with high accuracy and mitigate them effectively.

60 citations

Journal ArticleDOI
TL;DR: In this paper, the authors proposed a hybrid game framework in an association problem in a network composed of HSDPA and 3G LTE system that serve streaming and elastic flows, where the wireless users are assisted in their decisions by the network that broadcasts aggregated load information.
Abstract: Distributing Radio Resource Management (RRM) in heterogeneous wireless networks is an important research and development axis that aims at reducing network complexity. In this context, RRM decision making can be delegated to mobiles by incorporating cognitive capabilities into mobile handsets, resulting in the reduction of signalling and processing burden. This may however result in inefficiencies (such as those known as the "tragedy of commons") that are inherent to equilibria in non-cooperative games. Due to the concern for efficiency, centralized network architectures and protocols keep being considered and being compared to decentralized ones. From the point of view of the network architecture, this implies the co-existence of network-centric and terminal-centric RRM schemes. Instead of taking part within the debate among the supporters of each solution, we propose in this paper hybrid schemes where the wireless users are assisted in their decisions by the network that broadcasts aggregated load information. At some system's states, the network manager may impose his decisions on the network users. In other states the mobiles may take autonomous actions in reaction to information sent by the network. In order to improve the performance of the non-cooperative scenario, we investigate the properties of an alternative solution concept named Stackelberg game, in which the network tries to control the users' behavior by broadcasting appropriate information, expected to maximize its utility, while individual users maximize their own utility. We derive analytically the utilities related to the Quality of Service (QoS) perceived by mobile users and develop a Bayesian framework to obtain the equilibria. Numerical results illustrate the advantages of using our hybrid game framework in an association problem in a network composed of HSDPA and 3G LTE system that serve streaming and elastic flows.

60 citations

Patent
28 Oct 2004
TL;DR: In this paper, a method and system for managing resources in telecommunications services and networks is presented, which is characterized by setting target data including goals on processes and constraints on resource utilization to be met by the system, and collecting performance data representative of resource utilization and process execution.
Abstract: A method and system for managing resources in telecommunications services and networks. The method and system regard execution of processes by distributed agents on processing machines to perform predetermined tasks on the network, and are characterized by setting target data including goals on processes and constraints on resource utilization to be met by the system; monitoring computational resources utilization and processes execution by agents, and collecting performance data representative of resource utilization and process execution; comparing the collected performance data with the set data, a penalty being established when performance data do not fulfill target data; and re-allocating resources for process execution by agents so as to minimize the penalty determined on the basis of the comparison.

60 citations

Patent
04 Aug 2000
TL;DR: In this article, a method for managing telecommunications networks through user profiles that establish management capabilities and lists of network devices capable of being managed through each user profile is presented, where users may be given controlled access to configure network devices, provision services or simply view the network devices or portions thereof.
Abstract: The present invention provides a method for managing telecommunications networks through user profiles that establish management capabilities and lists of network devices capable of being managed through each user profile. Through profiles, users may be given controlled access to configure network devices, provision services or simply view the network devices, services or portions thereof. For example, customers may be enabled to view services dedicated to their particular networks while being simultaneously prevented from viewing services particular to other customer's networks. This provides security while enabling controlled customer network management. In addition, profiles may be used to limit the management capabilities of network managers to only those network devices and capabilities for which each network manager is responsible and authorized. This controlled access again provides security and may prevent network outages due to inexperienced network management errors as well as simplify network management for each level of network manager. The user profiles may also be used to customize the user interface each user accesses to improve efficiency and ease of network management. Profiles may also be used to establish local network connections and set up appropriate network communication channels to improve the efficiency of user access.

60 citations


Network Information
Related Topics (5)
Network packet
159.7K papers, 2.2M citations
90% related
Wireless network
122.5K papers, 2.1M citations
89% related
Wireless ad hoc network
49K papers, 1.1M citations
88% related
Server
79.5K papers, 1.4M citations
88% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
88% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202348
2022147
2021446
2020649
2019774
2018842