scispace - formally typeset
Search or ask a question
Topic

Network management

About: Network management is a research topic. Over the lifetime, 17859 publications have been published within this topic receiving 234520 citations. The topic is also known as: computer network management & NM.


Papers
More filters
Proceedings ArticleDOI
03 Oct 2008
TL;DR: This paper focuses on issues relating to realization of the medium access layer and the network manager, which are essential in creating a successful WirelessHART network for specific applications.
Abstract: As a newly released industrial communication standard, WirelessHART complements the ever so successful HART field devices by providing the possible means for communicating via wireless channels. The WirelessHART standard is designed to offer simple configuration, flexible installation and easy access of instrument data, and at the same time, ensure robust and reliable communications. In this paper, we first look closely into the specifications and present a comprehensive overview of the standard by summarizing the main functions of the various protocol layers. We then survey the literature and identify amongst the existing methods and algorithms, which ones can be effectively adopted in implementing the standard. More specifically, we set our focus on issues relating to realization of the medium access layer and the network manager, which are essential in creating a successful WirelessHART network for specific applications.

171 citations

Patent
16 Mar 2008
TL;DR: In this article, a system and method for enhancing the revenue and/or efficiency of a network service is disclosed, which constructs a graph of a social network in which users are capable of two-way communication with other users, the network service provider, or other entities such as advertisers.
Abstract: A system and method for enhancing the revenue and/or efficiency of a network service is disclosed. The system constructs a graph of a social network in which users are capable of two-way communication with other users, the network service provider, or other entities such as advertisers. Using such methods as social VIP ranking, the system is capable of performing a variety of analyses, the results of which provide the network service provider insights on how to best perform such tasks as monitoring and enhancing campaign effectiveness, identify fraud, optimize resource allocation and ensure the quality of network management.

171 citations

Patent
28 Jun 2001
TL;DR: In this paper, a plurality of network devices on a network are managed, including detecting an address assignment message sent from an address server over the network to a network device, sending an information request message, in response to the detection of the assignment message, from the network management device to the network device.
Abstract: Managing a plurality of network devices on a network, including detecting an address assignment message sent from an address server over the network to a network device, the address assignment message containing an assigned address corresponding to the network device, sending an information request message, in response to the detection of the address assignment message, over the network from the network management device to the network device, the information request message containing the assigned address corresponding to the network device, receiving information, in response to the information request message, from the network device, and creating an entry corresponding to the network device in a device management directory, the entry containing the assigned address corresponding to the network device and the information received from the network device.

170 citations

Journal ArticleDOI
TL;DR: A survey on intelligent techniques for feature selection and classification for intrusion detection in networks based on intelligent software agents, neural networks, genetic algorithms, neuro-genetic algorithms, fuzzy techniques, rough sets, and particle swarm intelligence is proposed.
Abstract: Rapid growth in the Internet usage and diverse military applications have led researchers to think of intelligent systems that can assist the users and applications in getting the services by delivering required quality of service in networks. Some kinds of intelligent techniques are appropriate for providing security in communication pertaining to distributed environments such as mobile computing, e-commerce, telecommunication, and network management. In this paper, a survey on intelligent techniques for feature selection and classification for intrusion detection in networks based on intelligent software agents, neural networks, genetic algorithms, neuro-genetic algorithms, fuzzy techniques, rough sets, and particle swarm intelligence has been proposed. These techniques have been useful for effectively identifying and preventing network intrusions in order to provide security to the Internet and to enhance the quality of service. In addition to the survey on existing intelligent techniques for intrusion detection systems, two new algorithms namely intelligent rule-based attribute selection algorithm for effective feature selection and intelligent rule-based enhanced multiclass support vector machine have been proposed in this paper.

170 citations

Journal ArticleDOI
TL;DR: An analysis of self-organized network management, with an end-to-end perspective of the network, to survey how network management can significantly benefit from ML solutions.

170 citations


Network Information
Related Topics (5)
Network packet
159.7K papers, 2.2M citations
90% related
Wireless network
122.5K papers, 2.1M citations
89% related
Wireless ad hoc network
49K papers, 1.1M citations
88% related
Server
79.5K papers, 1.4M citations
88% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
88% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202348
2022147
2021446
2020649
2019774
2018842