Abstract
What are network-embedded applications? What is the difference between network-embedded and network-attached concepts? This chapter provides an overview of central network management strategies and compares them with distributed management, network-attached appliances, and a holistic approach of network-embedded applications. Concrete scenarios explain the benefit of network-embedded applications. In addition, industry initiatives that address network-embedded solutions are described. The business aspect is provided as well, describing the impact of network-embedded solutions. Technical challenges and future opportunities conclude this chapter.
Keywords
- Cloud Computing
- Network Element
- Domain Name System
- European Telecommunication Standard Institute
- Network Automation
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cabuk S, Dalton CI, Ramasamy H, Schunter M (2007) Towards automated provisioning of secure virtualized networks. In: Proceedings of the 14th ACM conference on computer and communications security, CCS’07, ACM, New York
McKeown N, Anderson T, Balakrishnan H, Parulkar G, Peterson L, Rexford J, Shenker S, Turner J (2008) Openflow: enabling innovation in college networks. ACM SIGCOMM Comput Commun Rev 38(2):69–74
Martin-Flatin JP, Znaty S, Hubaux J-P (1999) A survey of distributed enterprise network and systems management paradigms. J Network Syst Manage 7(1):9–26
RFC 3304 – middlebox communications (midcom) protocol requirements
Aggarwal V, Feldmann A, Scheideler C (2007) Can ISPs and P2P systems co-operate for improved performance? ACM SIGCOMM Comput Commun Rev 37(3):29–40
McGuiness S, Tjong J, Bettadapur P (2011) Challenges and experiences in transitioning management instrumentation from command-oriented to model-driven. Advances in network-embedded management and applications. In: Proceedings from the 1st workshop on network embedded management and applications 2010, Springer Press
Strijkers R, Cristea M, de Laat C, Meijer R (2011) Application framework for programmable network control. Advances in network-embedded management and applications. In: Proceedings from the 1st workshop on network embedded management and applications 2010, Springer Press
Dudkowski D, Brunner M, Nunzi G, Mingardi C, Foley C, de Leon MP, Meirosu C, Engberg S (2009) Integrated network management. In: IM ‘09. IFIP/IEEE international symposium, Hofstra University, Long Islan, NY, USA
Hu Y, Chiu D-M, Lui JCS (2009) Entropy based adaptive flow aggregation. IEEE/ACM Trans Network 17(3):698–711
RFC 4915: multi-topology routing in OSPF
Menth M, Martin R (2005) Network resilience through multi-topology routing. In: Proceedings of the design of reliable communication networks (DRNC) workshop, Island of Ischia
Gjessing S (2006) Implementation of two resilience mechanisms using multi topology routing and stub routers. In: Proceedings of the advanced int’l conference on telecommunications and int’l conference on internet and web applications and services, AICT-ICIW ’06, Island of Ischia, Italy
Kvalbein A, Lysne O (2007) How can multi-topology routing be used for intradomain traffic engineering? In: Proceedings of the 2007 SIGCOMM workshop on Internet network management Kyoto, Japan
Zhang L, White B (2007) Anomaly detection for application level network attacks using payload keywords. In: Proceedings of the 2007 IEEE symposium on computational intelligence in security and defense applications, Honolulu, Hawaii, USA (CISDA 2007), pp 178–185
Zanero S (2005) Analyzing TCP traffic patterns using self organizing maps. In: Image analysis and processing, ICIAP 2005, ser. LNCS, Cagliari, Italy 2005, pp 83–90
GPP TR 36.902 V9.2.0 (2010-06)
Feng ES (2008) Self-organising networks (SON) in 3GPP long term evolution. Nomor Research GmbH, Munich. http://www.nomor.de/uploads/gc/TQ/gcTQfDWApo9osPfQwQoBzw/SelfOrganisingNetworksInLTE_2008-05.pdf. Accessed on 20 May 2008
GPP TS 32.511: telecommunication management; Automatic Neighbour Relation (ANR) management; concepts and requirements
GPP TR 36.902: Evolved Universal Terrestrial Radio Access Network (E-UTRAN); self-configuring and self-optimizing network (SON) use cases and solutions
EU Directive 95/46 on the protection of Individuals with regard to the processing of personal data. http://ec.europa.eu/justice/policies/privacy/law/implementation_en.htm. Accessed on 13 Dec 1995
Sandvine’s spring 2011 report. http://www.sandvine.com/news/global_broadband_trends.asp. Accessed on 17 May 2011
Cisco visual networking index forecast. http://ciscovni.com/vni_forecast/index.htm. Accessed on June 2011
Fioreze T, Wolbers OM, van de Meent R, Pras A (2007) Finding elephant flows for optical networks. Application session proceeding of the 10th IFIP/IEEE international symposium on integrated network management (IM 2007), pp 627–640. IEEE computer society. ISBN 1-4244-0799-0
Internet world stats. http://www.internetworldstats.com/stats.htm. Accessed on 31 Dec 2011
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this chapter
Cite this chapter
Wolter, R. (2013). Motivation: The Dawn of the Age of Network-Embedded Applications. In: Clemm, A., Wolter, R. (eds) Network-Embedded Management and Applications. Springer, New York, NY. https://doi.org/10.1007/978-1-4419-6769-5_1
Download citation
DOI: https://doi.org/10.1007/978-1-4419-6769-5_1
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4419-6768-8
Online ISBN: 978-1-4419-6769-5
eBook Packages: EngineeringEngineering (R0)