Skip to main content

Network Management

  • Chapter
  • First Online:
The NICE Cyber Security Framework
  • 1092 Accesses

Abstract

In today’s technology dominated world, people everywhere enjoy the benefits of ease of access to networks in office buildings, coffee shops, and even hospitals. Similar to the complicated plumbing systems in many of these places, networks are vast and intricate systems that can span cities and even across countries. Such networks require management in order to operate twenty-four hours a day all year long. Network managers no longer limit themselves to simply assigning email addresses to new employees; their scope has exponentially grown over the last twenty years. From small home offices to small business technology, the intricacies of network management have become ever apparent. From dealing with inexpensive consumer friendly routers to Cisco cores as big as small refrigerators that can cost thousands of dollars. Keeping all of it secure from intrusion and even natural disaster is not only the common expectation but also the golden standard in network management. But with all management come challenges, network administration is not exempt. We will explore this topic and related trends and challenges facing network management.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 99.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abeck, S. (2009). Network management know it all. Morgan Kaufmann.

    Google Scholar 

  2. Hashish, Sonia, & Tawalbeh, Hala. (2017). Quality of service requirements and challenges in generic WSN infrastructures. Procedia Computer Science, 109, 1116–1121.

    Article  Google Scholar 

  3. Farrel, A. (2008). Network quality of service know it all. Elsevier.

    Google Scholar 

  4. Ding, J. (2016). Advances in network management. Auerbach Publications.

    Google Scholar 

  5. Saldamli, G., Mishra, H., Ravi, N., Kodati, R. R., Kuntamukkala, S. A., & Tawalbeh, L. (2019). Improving link failure recovery and congestion control in SDNs. In 2019 10th International Conference on Information and Communication Systems (ICICS), pp. 30–35. IEEE.

    Google Scholar 

  6. Clemm, A. (2006). Network management fundamentals. Cisco Press.

    Google Scholar 

  7. Claise, B., & Wolter, R. (2006). Network management: Accounting and performance strategies. Cisco Press.

    Google Scholar 

  8. Khan, R., Khan, S. U., Zaheer, R., & Babar, M. I. (2013). An efficient network monitoring and management system. International Journal of Information and Electronics Engineering, 3(1), 122.

    Google Scholar 

  9. Bhatt, S., Lo’ai, A. T., Chhetri, P., & Bhatt, P. (2019). Authorizations in cloud-based internet of things: Current trends and use cases. In 2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC), pp. 241–246. IEEE.

    Google Scholar 

  10. Kim, Hyojoon, & Feamster, Nick. (2013). Improving network management with software defined networking. IEEE Communications Magazine, 51(2), 114–119.

    Article  Google Scholar 

  11. Curtis, A. R., Mogul, J. C., Tourrilhes, J., Yalagandula, P., Sharma, P., & Banerjee, S. (2011). DevoFlow: Scaling flow management for high-performance networks. In ACM SIGCOMM Computer Communication Review, 41, no. 4, pp. 254–265. ACM.

    Google Scholar 

  12. Jararweh, Y., Bany Salameh, H. A., Alturani, A., Tawalbeh, L., & Song, H. (2018). Anomaly-based framework for detecting dynamic spectrum access attacks in cognitive radio networks. Telecommunication Systems, 67(2), 217–229.

    Google Scholar 

  13. Tawalbeh, L., Al-Qassas, R. S., Darwazeh, N. S., Jararweh, Y., & AlDosari, F. (2015). Secure and efficient cloud computing framework. In 2015 International Conference on Cloud and Autonomic Computing, pp. 291–295. IEEE.

    Google Scholar 

  14. Affandi, A., Riyanto, D., Pratomo, I., & Kusrahardjo, G. (2015). Design and implementation fast response system monitoring server using Simple Network Management Protocol (SNMP). In 2015 International Seminar on Intelligent Technology and Its Applications (ISITIA), pp. 385–390. IEEE.

    Google Scholar 

  15. Guimarães, V. T., dos Santos, G. L., da Cunha Rodrigues, G., Granville, L. Z., & Tarouco, L. M. R. (2014). A collaborative solution for SNMP traces visualization. In The International Conference on Information Networking 2014 (ICOIN2014), pp. 458–463. IEEE.

    Google Scholar 

  16. Zitello, T., Williams, D., & Weber, P. (2003). HP openview system administration handbook: Network node manager, customer views, service information portal, openview operations. Prentice Hall PTR.

    Google Scholar 

  17. Rao, Umesh Hodeghatta. (2011). Challenges of implementing network management solution. International Journal of Distributed and Parallel Systems, 2(5), 67.

    Article  Google Scholar 

  18. Hong, J. W. K., Kong, J. Y., Yun, T. H., Kim, J. S., Park, J. T., & Baek, J. W. (1997). Web-based intranet services and network management. IEEE Communications Magazine, 35(10), 100–110.

    Google Scholar 

  19. Jararweh, Yaser, Ababneh, Huda, Alhammouri, Mohammad, & Tawalbeh, Lo’ai. (2015). Energy efficient multi-level network resources management in cloud computing data centers. Journal of Networks, 10(5), 273.

    Article  Google Scholar 

  20. Bahwaireth, K., & Tawalbeh, L. (2016). Cooperative models in cloud and mobile cloud computing. In 2016 23rd International Conference on Telecommunications (ICT), pp. 1–4. IEEE.

    Google Scholar 

  21. Lo’ai, A. T., & Saldamli. (2019). Reconsidering big data security and privacy in cloud and mobile cloud systems. Journal of King Saud University-Computer and Information Sciences.

    Google Scholar 

  22. Sharma, S., Goyal, S. B., Shandliya, R., Samadhiya, D. (2012). Towards XML interoperability. In Advances in Computer Science, Engineering & Applications, pp. 1035–1043. Springer, Berlin, Heidelberg.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Tawalbeh, L. (2020). Network Management. In: The NICE Cyber Security Framework. Springer, Cham. https://doi.org/10.1007/978-3-030-41987-5_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-41987-5_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-41986-8

  • Online ISBN: 978-3-030-41987-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics