International Journal of Network Management

Cover image for Vol. 26 Issue 1

Edited By: James Won-Ki Hong

Impact Factor: 0.283

ISI Journal Citation Reports © Ranking: 2014: 73/77 (Telecommunications); 132/139 (Computer Science Information Systems)

Online ISSN: 1099-1190

Recently Published Issues

See all

International Journal of Network Management

Modern computer networks and communication systems are increasing in size, scope, and heterogeneity. The promise of a single end-to-end technology has not been realized and likely never will occur. The decreasing cost of bandwidth is increasing the possible applications of computer networks and communication systems to entirely new domains. Problems in integrating heterogeneous wired and wireless technologies, ensuring security and quality of service, and reliably operating large-scale systems including the inclusion of cloud computing have all emerged as important topics.

Click here to read more about this journal.

Recently Published Articles

  1. Novel intrusion prediction mechanism based on honeypot log similarity

    Ci-Bin Jiang, I-Hsien Liu, Yao-Nien Chung and Jung-Shian Li

    Article first published online: 12 JAN 2016 | DOI: 10.1002/nem.1923

    Thumbnail image of graphical abstract

    The proposed intrusion detection mechanism applies an association rule mining algorithm to extract suspicious events from the prediction list, which frees previously required human effort and time. All procedures from data collection to suspicious event prediction are completed automatically. This approach results in at least a 30% reduction of false alerts, which includes both false positives and false negatives, and demonstrates that the proposed mechanism can identify the malicious events efficiently.

  2. Optimal layer division for low latency in DHT-based hierarchical P2P network

    Jun Li, Cuilian Li, Zhaoxi Fang, Haoyun Wang and Yaohui Wu

    Article first published online: 11 JAN 2016 | DOI: 10.1002/nem.1922

    Thumbnail image of graphical abstract

    This paper first formulates search delay model for the DHT-based layered P2P architecture, taking account of two main sources of latency: DHT routing and queuing delay at the super node. Then the optimal ratio between super nodes and ordinary nodes is found with the analytical model. Simulation and numerical results show that the obtained solution can improve the performance of two-layer P2P system in terms of lookup latency.

  3. You have free access to this content
    Inter-function anomaly analysis for correct SDN/NFV deployment (pages 25–43)

    Cataldo Basile, Daniele Canavese, Antonio Lioy, Christian Pitscheider and Fulvio Valenza

    Article first published online: 18 DEC 2015 | DOI: 10.1002/nem.1917

    Thumbnail image of graphical abstract

    Inter-function anomaly analysis refers to the detection of interferences between two or more functions deployed in the same network. The policy analyseris a new component added to the network function virtualization (NFV) architecture that implements a formal model for detecting inter-function anomalies. It takes as input the virtual network function configurations and network service descriptors and returns the anomalies identified. The result of the analysis can be used directly by the NFV orchestrator or by the network administrator to reduce incoherences and service problems.

  4. You have free access to this content
    How can a mobile service provider reduce costs with software-defined networking? (pages 56–72)

    Bram Naudts, Mario Kind, Sofie Verbrugge, Didier Colle and Mario Pickavet

    Article first published online: 8 DEC 2015 | DOI: 10.1002/nem.1919

    Thumbnail image of graphical abstract

    This article proposes a multi-layer modular architecture for carrier networks based on SDN and NFV principles and quantifies the potential cost savings that can be reached in an IP/MPLS-based transport service with SDN capabilities that interconnects the key functional elements in a mobile network Our findings show savings of 12% which could be attributed to the lower expenditures on equipment for CapEx and lower expenditures for service provisioning and service management for OpEx.

  5. LISP controller: a centralized LISP management system for ISP networks (pages 507–525)

    Taeyeol Jeong, Jian Li, Jonghwan Hyun, Jae-Hyoung Yoo and James Won-Ki Hong

    Article first published online: 25 NOV 2015 | DOI: 10.1002/nem.1921

SEARCH

SEARCH BY CITATION