Network Management Research Classification Network Management Research Classification Aiko Pras, University of Twente Lisandro Zambenedetti Granville,

Slides:



Advertisements
Similar presentations
1.Data categorization 2.Information 3.Knowledge 4.Wisdom 5.Social understanding Which of the following requires a firm to expend resources to organize.
Advertisements

Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
1 What's happening in Networking Research Today? Prasad Calyam, OARnet OARTech Presentation, Dec 8 th, 2004.
1 Sensor Networks and Networked Societies of Artifacts Jose Rolim University of Geneva.
A Survey and Comparison of Overlay Multicast Ching-Feng Li.
”Distributed Corks” A Research Byte Bob Kinicki. Research Byte October 22, Peer-to-Peer Web Server Host B Host.
ToNC workshop Next generation architecture H. Balakrishnan, A. Goel, D. Johnson, S. Muthukrishnan, S.Tekinay, T. Wolf DAY 2, Feb
Communication Networks A Second Course Jean Walrand Department of EECS University of California at Berkeley.
OMICS Group Contact us at: OMICS Group International through its Open Access Initiative is committed to make genuine and.
Laboratory of Modelling and Optimizing Information Communication Networks and Services University of Zagreb Faculty of Transport and Traffic Sciences.
POLITECNICO DI TORINO TRIBUTE and DIMMER. DIMMER - The context One of the major challenges in today’s economy concerns the reduction in energy usage and.
Chapter 11 Managing Knowledge. Dimensions of Knowledge.
ADVANCE MOBILE TECHNOLOGY & NETWORKING Course Content.
Chapter 14 Network Management Business Aspects Architectures Technology.
Choosing a Research Topic Patrice Koehl Computer Science, UC Davis.
Chapter 14 Managerial issues in networking. Overview Network design Network management – Hardware – Software Technology standards Role of government and.
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
12/28/2003CNSF Workshop Localized Algorithms and Their Applications in Ad Hoc Wireless Networks Jie Wu Dept. of Computer Science & Engineering Florida.
CONTI’2008, 5-6 June 2008, TIMISOARA 1 Towards a digital content management system Gheorghe Sebestyen-Pal, Tünde Bálint, Bogdan Moscaliuc, Agnes Sebestyen-Pal.
Fast Webpage classification using URL features Authors: Min-Yen Kan Hoang and Oanh Nguyen Thi Conference: ICIKM 2005 Reporter: Yi-Ren Yeh.
SMUCSE 8344 Term Paper Topics (Always Incomplete).
An Introduction Table Of Context Sensor Network PreviewRouting in Sensor NetworksMobility in Sensor Networks Structure and characteristics of nodes and.
Advanced Computer Networks by Behzad Akbari Spring 2011 In the Name of the Most High.
Mobile Networking Challenges1 5.6 Mobile Ad Hoc Networks  Ad hoc network does not have any preexisting centralized server nodes to perform packet routing,
Presented by: Chaitanya K. Sambhara Paper by: Karl Mayer and Wolfgang Fritsche IABG mbH Germany - Instructor : Dr Yingshu Li.
Committee on Network Operations and Management – IEEE CNOM Meeting IEEE GLOBECOM, December 2014 Austin, Texas, USA.
Lecture 0 Anish Arora CSE 6333 Introduction to Distributed Computing.
Information-Centric Networking Proposed IRTF RG IRTF Open Meeting at IETF-81 1IRTF Open IETF-81.
C11- Managing Knowledge.
Doc.: IEEE /137r2 Submission June 2000 Tim Godfrey, IntersilSlide 1 TGe Requirements Version r2 8 June 2000.
CprE D.Q.1 Random Thoughts on MobiCom 2004.
Integrated Management Solutions for Network Access Control and IPAM RT Com USA 10 Millpond Dr., Unit #2 Lafayette, NJ Phone: Fax:
Deeply Embedded Large Scale Networks Specify and Control Emerging Behavior.
Service - Oriented Middleware for Distributed Data Mining on the Grid ,劉妘鑏 Antonio C., Domenico T., and Paolo T. Journal of Parallel and Distributed.
5 PR Praktikum aus Informatik Gabriele Kotsis Summer Term 2009.
INFSCI 2935: Introduction to Computer Security1 Project Implementation Implementation  Reasonable sophistication  Up to 3 people maximum Survey type.
Summary and Review. Course Objectives The main objectives of the course are to –introduce different concepts in operating system theory and implementation;
Wireless communications and mobile computing conference, p.p , July 2011.
NGCWE Expert Group EU-ESA Experts Group's vision Prof. Juan Quemada NGCWE Expert Group IST Call 5 Preparatory Workshop on CWEs 13th.
An Event-Based Robotic Sensors and Actuators Collection API from A Computer Science Perspective – An implementation in Mindstorms NXT Brick Li-Ren Chien.
DHS/NCS Priority Services By An Nguyen. Introduction: National Security/Emergency Preparedness (NS/EP) users rely heavily on public telecommunications.
Network design Topic 1 Business goals. Agenda Network life cycle Network design process Business goals Scope Constraints.
Networking: Applications and Services Antonia Ghiselli, INFN Stu Loken, LBNL Chairs.
Secure middleware patterns E.B.Fernandez. Middleware security Architectures have been studied and several patterns exist Security aspects have not been.
1 Large-scale (Campus) Lan design (Part II)  VLANs  Hierarchical LAN design.
Sensor Networks (Spring 2004) Instructor: Instructor:Dr. Damla Turgut Office: Office:450 ENGR 1 Bldg Office Phone: Office Phone:(407)
WP5: Dynamic Analysis Presented by Pierpaolo Degano Dipartimento di Informatica Università di Pisa at the Final review of DEGAS, 6 April 2005.
Indian Institute of Technology Bombay 1 Communication Networks Prof. D. Manjunath
What is Multimedia Anyway? David Millard and Paul Lewis.
For more course tutorials visit NTC 406 Entire Course NTC 406 Week 1 Individual Assignment Network Requirements Analysis Paper NTC 406.
Presented by Edith Ngai MPhil Term 3 Presentation
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CLOUD COMPUTING
Large-scale (Campus) Lan design (Part II)
Mobile Ad hoc Networks (Spring 2003)
Weikuan Yu, Hui Cao, and Vineet Mittal The Ohio State University
Wireless Sensor Network (WSN)
Future Technologies FTC 2016 Future Technologies Conference December 2016 San Francisco, United States.
Aziz Nasridinov and Young-Ho Park*
#01 Client/Server Computing
Data Warehousing and Data Mining
Topics Covered in COSC 6340 Data models (ER, Relational, XML)
DATA RETRIEVAL IN ADHOC NETWORKS
Chapter 4 Network Management Standards and Models
Chapter 4 Network Management Standards and Models
CSE 4340/5349 Mobile Systems Engineering
ANIMA recharter IETF 103 Bangkok
#01 Client/Server Computing
O&M Area Working Group WG
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Distributed Systems and Algorithms
Presentation transcript:

Network Management Research Classification Network Management Research Classification Aiko Pras, University of Twente Lisandro Zambenedetti Granville, UFRGS Juergen Schoenwaelder, Jacobs University Bremen Presentation: Georgios Karagiannis, University of Twente

Goal  Define a taxonomy that organizes the network and systems management research topics in order to: –Classify/characterize the research efforts (in academia and industry) using a stable list of appropriate tags (topics) –Identify appropriate reviewers, in the management community, for conference papers and journal articles review –Track the interest of authors and reviewers in regards to the several topics of the area 2

Traditional Approach  Traditionally, topics of interest are defined by TPC chairs and Editors per single conference/journal  There is not a “stable-across” events list of topics that could be used by authors and reviewers (e.g., NOMS, IM, DSOM) –Typically, only a flat list of topics is employed –For each new event, authors and reviewers need to express their interests again 3

New Approach  Define a more stable, two-level hierarchy of topics that defines the scope of the area –First-level topics cover different dimensions of management What should be managed (e.g., networks, services) Which aspects should be managed (e.g., security, accounting) How it should be managed (e.g., distributed, centralized) How to implement it (e.g., which protocols?) Which techniques should be used (e.g., simulation) –Second-level topics specialize the first-level topics 4

First-Level Topics 1.Network Management 2.Service Management 3.Business Management 4.Functional Areas 5.Management Approaches 6.Technologies 7.Methods 5

Second-Level Topics 1.Network Management 2.Service Management 3.Business Management 4.Functional Areas 5.Management Approaches 6.Technologies 7.Methods Ad hoc networks 1.2.Wireless & mobile networks 1.3.IP networks 1.4.LANs 1.5.Optical Networks 1.6.Sensor Networks 1.7.Overlay Networks

Second-Level Topics 1.Network Management 2.Service Management 3.Business Management 4.Functional Areas 5.Management Approaches 6.Technologies 7.Methods Multimedia service management (e.g., voice, video) 2.2. Data service management (e.g., , web) 2.3. Hosting (virtual machines) 2.4. Grids

Second-Level Topics 1.Network Management 2.Service Management 3.Business Management 4.Functional Areas 5.Management Approaches 6.Technologies 7.Methods Legal & ethical issues 3.2.Process management

Second-Level Topics 1.Network Management 2.Service Management 3.Business Management 4.Functional Areas 5.Management Approaches 6.Technologies 7.Methods Fault management 4.2.Configuration management 4.3.Accounting management 4.4.Performance management 4.5.Security management 4.6.SLA management 4.7.Event management

Second-Level Topics 1.Network Management 2.Service Management 3.Business Management 4.Functional Areas 5.Management Approaches 6.Technologies 7.Methods Centralized management 5.2.Distributed management 5.3.Autonomic and self management 5.4.Policy-based management

Second-Level Topics 1.Network Management 2.Service Management 3.Business Management 4.Functional Areas 5.Management Approaches 6.Technologies 7.Methods Protocols 6.2.Middleware 6.3.Mobile agents 6.4.P2P 6.5.Grid 6.6.Data, information, and semantic modeling

Second-Level Topics 1.Network Management 2.Service Management 3.Business Management 4.Functional Areas 5.Management Approaches 6.Technologies 7.Methods Control theories 7.2.Optimization theories 7.3.Economic theories 7.4.Machine learning and genetic algorithms 7.5.Logics 7.6Probabilistic, stochastic processes, queuing theory 7.7.Simulation 7.8.Experimental approach 7.9.Design

Next Steps  Incorporate the taxonomy support in JEMS (Journal and Event Management System)  Employ the taxonomy in next management-related conferences (e.g., NOMS, IM, DSOM,…)  Use the taxonomy in research efforts (including IRTF activities) to classify/characterize them  Collect results and review the taxonomy 13

Questions  Do you believe this classification will be helpful to classify research papers?  Do you believe changes are needed?  Do you believe this classification can also be useful for IRTF/IETF work? Examples: –Classify MIBs modules according to this scheme? –Does this scheme help to find the right 'expert' for a given task? 14