Skip to main content

Motivation: The Dawn of the Age of Network-Embedded Applications

  • Chapter
  • First Online:
Network-Embedded Management and Applications

Abstract

What are network-embedded applications? What is the difference between network-embedded and network-attached concepts? This chapter provides an overview of central network management strategies and compares them with distributed management, network-attached appliances, and a holistic approach of network-embedded applications. Concrete scenarios explain the benefit of network-embedded applications. In addition, industry initiatives that address network-embedded solutions are described. The business aspect is provided as well, describing the impact of network-embedded solutions. Technical challenges and future opportunities conclude this chapter.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cabuk S, Dalton CI, Ramasamy H, Schunter M (2007) Towards automated provisioning of secure virtualized networks. In: Proceedings of the 14th ACM conference on computer and communications security, CCS’07, ACM, New York

    Google Scholar 

  2. McKeown N, Anderson T, Balakrishnan H, Parulkar G, Peterson L, Rexford J, Shenker S, Turner J (2008) Openflow: enabling innovation in college networks. ACM SIGCOMM Comput Commun Rev 38(2):69–74

    Article  Google Scholar 

  3. Martin-Flatin JP, Znaty S, Hubaux J-P (1999) A survey of distributed enterprise network and systems management paradigms. J Network Syst Manage 7(1):9–26

    Article  MATH  Google Scholar 

  4. http://datatracker.ietf.org/wg/midcom/charter/

  5. RFC 3304 – middlebox communications (midcom) protocol requirements

    Google Scholar 

  6. http://atlas.ripe.net/

  7. Aggarwal V, Feldmann A, Scheideler C (2007) Can ISPs and P2P systems co-operate for improved performance? ACM SIGCOMM Comput Commun Rev 37(3):29–40

    Article  Google Scholar 

  8. McGuiness S, Tjong J, Bettadapur P (2011) Challenges and experiences in transitioning management instrumentation from command-oriented to model-driven. Advances in network-embedded management and applications. In: Proceedings from the 1st workshop on network embedded management and applications 2010, Springer Press

    Google Scholar 

  9. Strijkers R, Cristea M, de Laat C, Meijer R (2011) Application framework for programmable network control. Advances in network-embedded management and applications. In: Proceedings from the 1st workshop on network embedded management and applications 2010, Springer Press

    Google Scholar 

  10. Dudkowski D, Brunner M, Nunzi G, Mingardi C, Foley C, de Leon MP, Meirosu C, Engberg S (2009) Integrated network management. In: IM ‘09. IFIP/IEEE international symposium, Hofstra University, Long Islan, NY, USA

    Google Scholar 

  11. Hu Y, Chiu D-M, Lui JCS (2009) Entropy based adaptive flow aggregation. IEEE/ACM Trans Network 17(3):698–711

    Article  Google Scholar 

  12. RFC 4915: multi-topology routing in OSPF

    Google Scholar 

  13. Menth M, Martin R (2005) Network resilience through multi-topology routing. In: Proceedings of the design of reliable communication networks (DRNC) workshop, Island of Ischia

    Google Scholar 

  14. Gjessing S (2006) Implementation of two resilience mechanisms using multi topology routing and stub routers. In: Proceedings of the advanced int’l conference on telecommunications and int’l conference on internet and web applications and services, AICT-ICIW ’06, Island of Ischia, Italy

    Google Scholar 

  15. Kvalbein A, Lysne O (2007) How can multi-topology routing be used for intradomain traffic engineering? In: Proceedings of the 2007 SIGCOMM workshop on Internet network management Kyoto, Japan

    Google Scholar 

  16. Zhang L, White B (2007) Anomaly detection for application level network attacks using payload keywords. In: Proceedings of the 2007 IEEE symposium on computational intelligence in security and defense applications, Honolulu, Hawaii, USA (CISDA 2007), pp 178–185

    Google Scholar 

  17. Zanero S (2005) Analyzing TCP traffic patterns using self organizing maps. In: Image analysis and processing, ICIAP 2005, ser. LNCS, Cagliari, Italy 2005, pp 83–90

    Google Scholar 

  18. GPP TR 36.902 V9.2.0 (2010-06)

    Google Scholar 

  19. Feng ES (2008) Self-organising networks (SON) in 3GPP long term evolution. Nomor Research GmbH, Munich. http://www.nomor.de/uploads/gc/TQ/gcTQfDWApo9osPfQwQoBzw/SelfOrganisingNetworksInLTE_2008-05.pdf. Accessed on 20 May 2008

  20. GPP TS 32.511: telecommunication management; Automatic Neighbour Relation (ANR) management; concepts and requirements

    Google Scholar 

  21. GPP TR 36.902: Evolved Universal Terrestrial Radio Access Network (E-UTRAN); self-configuring and self-optimizing network (SON) use cases and solutions

    Google Scholar 

  22. EU Directive 95/46 on the protection of Individuals with regard to the processing of personal data. http://ec.europa.eu/justice/policies/privacy/law/implementation_en.htm. Accessed on 13 Dec 1995

  23. Sandvine’s spring 2011 report. http://www.sandvine.com/news/global_broadband_trends.asp. Accessed on 17 May 2011

  24. Cisco visual networking index forecast. http://ciscovni.com/vni_forecast/index.htm. Accessed on June 2011

  25. Fioreze T, Wolbers OM, van de Meent R, Pras A (2007) Finding elephant flows for optical networks. Application session proceeding of the 10th IFIP/IEEE international symposium on integrated network management (IM 2007), pp 627–640. IEEE computer society. ISBN 1-4244-0799-0

    Google Scholar 

  26. Internet world stats. http://www.internetworldstats.com/stats.htm. Accessed on 31 Dec 2011

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ralf Wolter .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this chapter

Cite this chapter

Wolter, R. (2013). Motivation: The Dawn of the Age of Network-Embedded Applications. In: Clemm, A., Wolter, R. (eds) Network-Embedded Management and Applications. Springer, New York, NY. https://doi.org/10.1007/978-1-4419-6769-5_1

Download citation

  • DOI: https://doi.org/10.1007/978-1-4419-6769-5_1

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4419-6768-8

  • Online ISBN: 978-1-4419-6769-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics