International Journal of Network Management
© John Wiley & Sons Ltd
Edited By: James Won-Ki Hong
Impact Factor: 0.283
ISI Journal Citation Reports © Ranking: 2014: 73/77 (Telecommunications); 132/139 (Computer Science Information Systems)
Online ISSN: 1099-1190
Recently Published Issues
Current Issue:January/February 2016
Volume 26, Issue 1
Special Issue: Software-Defined Networking and Net...
Volume 25, Issue 6
Volume 25, Issue 5
Special Issue: Measure, Detect and Mitigate - Chal...
Volume 25, Issue 4
Special Issue: Advances in Management of Multimedi...
Volume 25, Issue 3
International Journal of Network Management
Modern computer networks and communication systems are increasing in size, scope, and heterogeneity. The promise of a single end-to-end technology has not been realized and likely never will occur. The decreasing cost of bandwidth is increasing the possible applications of computer networks and communication systems to entirely new domains. Problems in integrating heterogeneous wired and wireless technologies, ensuring security and quality of service, and reliably operating large-scale systems including the inclusion of cloud computing have all emerged as important topics.
Recently Published Articles
- Novel intrusion prediction mechanism based on honeypot log similarity
Ci-Bin Jiang, I-Hsien Liu, Yao-Nien Chung and Jung-Shian Li
Article first published online: 12 JAN 2016 | DOI: 10.1002/nem.1923
The proposed intrusion detection mechanism applies an association rule mining algorithm to extract suspicious events from the prediction list, which frees previously required human effort and time. All procedures from data collection to suspicious event prediction are completed automatically. This approach results in at least a 30% reduction of false alerts, which includes both false positives and false negatives, and demonstrates that the proposed mechanism can identify the malicious events efficiently.
- Optimal layer division for low latency in DHT-based hierarchical P2P network
Jun Li, Cuilian Li, Zhaoxi Fang, Haoyun Wang and Yaohui Wu
Article first published online: 11 JAN 2016 | DOI: 10.1002/nem.1922
This paper first formulates search delay model for the DHT-based layered P2P architecture, taking account of two main sources of latency: DHT routing and queuing delay at the super node. Then the optimal ratio between super nodes and ordinary nodes is found with the analytical model. Simulation and numerical results show that the obtained solution can improve the performance of two-layer P2P system in terms of lookup latency.
- You have free access to this contentInter-function anomaly analysis for correct SDN/NFV deployment (pages 25–43)
Cataldo Basile, Daniele Canavese, Antonio Lioy, Christian Pitscheider and Fulvio Valenza
Article first published online: 18 DEC 2015 | DOI: 10.1002/nem.1917
Inter-function anomaly analysis refers to the detection of interferences between two or more functions deployed in the same network. The policy analyseris a new component added to the network function virtualization (NFV) architecture that implements a formal model for detecting inter-function anomalies. It takes as input the virtual network function configurations and network service descriptors and returns the anomalies identified. The result of the analysis can be used directly by the NFV orchestrator or by the network administrator to reduce incoherences and service problems.
- You have free access to this contentHow can a mobile service provider reduce costs with software-defined networking? (pages 56–72)
Bram Naudts, Mario Kind, Sofie Verbrugge, Didier Colle and Mario Pickavet
Article first published online: 8 DEC 2015 | DOI: 10.1002/nem.1919
This article proposes a multi-layer modular architecture for carrier networks based on SDN and NFV principles and quantifies the potential cost savings that can be reached in an IP/MPLS-based transport service with SDN capabilities that interconnects the key functional elements in a mobile network Our findings show savings of 12% which could be attributed to the lower expenditures on equipment for CapEx and lower expenditures for service provisioning and service management for OpEx.
- LISP controller: a centralized LISP management system for ISP networks (pages 507–525)
Taeyeol Jeong, Jian Li, Jonghwan Hyun, Jae-Hyoung Yoo and James Won-Ki Hong
Article first published online: 25 NOV 2015 | DOI: 10.1002/nem.1921