scispace - formally typeset
Search or ask a question
Topic

Network management

About: Network management is a research topic. Over the lifetime, 17859 publications have been published within this topic receiving 234520 citations. The topic is also known as: computer network management & NM.


Papers
More filters
Journal ArticleDOI
TL;DR: The investigation reveals a guideline for efficient fault-diagnosis schemes: Each probe should provide approximately 1 bit of information, and the total number of probes required is approximately equal to the entropy of the state of the network.
Abstract: This paper investigates the fault-diagnosis problem for all-optical wavelength-division-multiplexing (WDM) networks. A family of failure-localization algorithms that exploit the unique properties of all-optical networks is proposed. Optical probe signals are sequentially sent along a set of designed lightpaths, and the network state is inferred from the result of this set of end-to-end measurements. The design objective is to minimize the diagnosis effort (e.g., the average number of probes) to locate failures. By establishing a mathematical equivalence between the fault-diagnosis problem and the source-coding problem in information theory, we obtain a tight lower bound for the minimum average number of probes per edge (of the network modeled as a graph) as H/sub b/(p), the entropy of the individual edges. Using the rich set of results from coding theory to solve the fault-diagnosis problem, it is shown that the "2/sup m/-splitting" probing scheme is optimum for the special case of single failure over a linear network. A class of near-optimum run-length probing schemes that have low computation complexity is then developed. Analytical and numerical results suggest that the average number of probes per edge for the run-length probing scheme is uniformly bounded above by (1+/spl epsiv/)H/sub b/(p) and converges to the entropy lower bound as the failure probability decreases. From an information-theoretic perspective, it is shown that the run-length probing scheme outperforms the greedy probing scheme of the same computational complexity. The investigation reveals a guideline for efficient fault-diagnosis schemes: Each probe should provide approximately 1 bit of information, and the total number of probes required is approximately equal to the entropy of the state of the network. This result provides an insightful guideline to reduce the overhead cost of fault management for all-optical networks and can further the understanding of the relationship between information entropy and network management. Several practical issues are also addressed in the implementation of run-length probing schemes over all-optical WDM networks.

104 citations

Journal ArticleDOI
TL;DR: In this paper, the authors explore how Born Global networks develop as the firm's internal resources grow and explore the benefits that Born Globals gain from this development, and make empirical contributions to Born Global and Networks research in the context of Business-to-Business firms.

104 citations

Patent
10 Feb 2014
TL;DR: In this article, the authors present a virtual network abstraction for multi-tenant datacenters, where a request for resources received at a datacenter from a tenant comprises a number of virtual machines and a performance requirement, such as a bandwidth requirement, specified by the tenant.
Abstract: Methods of offering network performance guarantees in multi-tenant datacenters are described. In an embodiment, a request for resources received at a datacenter from a tenant comprises a number of virtual machines and a performance requirement, such as a bandwidth requirement, specified by the tenant. A network manager within the datacenter maps the request onto the datacenter topology and allocates virtual machines within the datacenter based on the available slots for virtual machines within the topology and such that the performance requirement is satisfied. Following allocation, stored residual capacity values for elements within the topology are updated according to the new allocation and this updated stored data is used in mapping subsequent requests onto the datacenter. The allocated virtual machines form part of a virtual network within the datacenter which is allocated in response to the request and two virtual network abstractions are described: virtual clusters and virtual oversubscribed clusters.

104 citations

Patent
25 Mar 2004
TL;DR: In this paper, a network management system, and a method of centrally provisioning a full transport LSP mesh and a full targeted LDP signaling session mesh in support of VPN services provisioning are provided.
Abstract: A network management system, and a method of, centrally provisioning a full transport LSP mesh and a full targeted LDP signaling session mesh in support of VPN services provisioning are provided. A network management system repository tracks Provider Edge nodes (PE) having label switch router functionality, transport LSP meshes and targeted LDP session meshes. The method includes selecting PE nodes for inclusion in a node group, identifying PE node pairs, and issuing commands to paired PE nodes to commission managed transport LSPs and targeted LDP signaling sessions. The advantages are derived from the full mesh LSP content transport provisioning and targeted LDP signaling session provisioning effected in a centralized network management context enabling service providers to: assure network resiliency, assure service quality, and provide accounting, in respect of Layer-2 and Layer-3 VPN services irrespective of client side deployed infrastructure while leveraging installed infrastructure in the service provider communications network core. Additional advantages are derived from increased operations management personnel productivity while reducing the probability of human error compared to manual provisioning thereof enabling wide availability of VPN services.

104 citations

Journal ArticleDOI
Weili Han1, Chang Lei1
TL;DR: Current works are investigated, the key issues are discussed, and the future work of policy languages are outlined, especially for the network and security management.

103 citations


Network Information
Related Topics (5)
Network packet
159.7K papers, 2.2M citations
90% related
Wireless network
122.5K papers, 2.1M citations
89% related
Wireless ad hoc network
49K papers, 1.1M citations
88% related
Server
79.5K papers, 1.4M citations
88% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
88% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202348
2022147
2021446
2020649
2019774
2018842