首页 > 最新文献

International Journal of Network Management最新文献

英文 中文
Energy-Aware Controller Placement With Delay Guarantees for In-Band SDN 带内SDN具有延迟保证的能量感知控制器配置
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-14 DOI: 10.1002/nem.70036
Tomofumi Kondo, Luis Guillen, Satoru Izumi, Toru Abe, Takuo Suganuma

Software-defined networking (SDN) enables flexible, programmable networks, but in large deployments, poor controller placement can raise latency and energy use. This paper presents a practical in-band SDN model and an optimization method that jointly accounts for control-plane delay and device power consumption to place controllers and configure switches. We formulate the problem as a binary integer programming (BIP) that decides controller locations, which switches remain active, and port bit-rates and routes. Experiments on a large WAN topology (Janos-US) show the approach can cut total network energy by up to 15% while keeping control-plane delays within required bounds, offering network operators a straightforward way to trade responsiveness for energy savings.

软件定义网络(SDN)支持灵活的可编程网络,但在大型部署中,不良的控制器放置可能会增加延迟和能源使用。本文提出了一种实用的带内SDN模型和一种综合考虑控制平面时延和设备功耗的优化方法,用于控制器的放置和交换机的配置。我们将问题表述为二进制整数规划(BIP),它决定控制器位置,哪些交换机保持活动状态,以及端口比特率和路由。在大型广域网拓扑(Janos-US)上的实验表明,该方法可以将网络总能耗降低15%,同时将控制平面延迟保持在要求的范围内,为网络运营商提供了一种简单的方式来交换响应以节省能源。
{"title":"Energy-Aware Controller Placement With Delay Guarantees for In-Band SDN","authors":"Tomofumi Kondo,&nbsp;Luis Guillen,&nbsp;Satoru Izumi,&nbsp;Toru Abe,&nbsp;Takuo Suganuma","doi":"10.1002/nem.70036","DOIUrl":"https://doi.org/10.1002/nem.70036","url":null,"abstract":"<p>Software-defined networking (SDN) enables flexible, programmable networks, but in large deployments, poor controller placement can raise latency and energy use. This paper presents a practical in-band SDN model and an optimization method that jointly accounts for control-plane delay and device power consumption to place controllers and configure switches. We formulate the problem as a binary integer programming (BIP) that decides controller locations, which switches remain active, and port bit-rates and routes. Experiments on a large WAN topology (Janos-US) show the approach can cut total network energy by up to 15% while keeping control-plane delays within required bounds, offering network operators a straightforward way to trade responsiveness for energy savings.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"36 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2026-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.70036","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146002233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Load Balancing Based on Consistent Hashing in P4 Switches P4交换机中基于一致性哈希的负载均衡
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-30 DOI: 10.1002/nem.70033
Yu-An Shi, Kuan-Ting Liu, Li-Der Chou

In recent years, the emergence of new network architectures has seen substantial growth. Among these advancements, distributed server architectures and server load balancing have gradually become key areas of focus. This paper introduces a mechanism called consistent hashing with congestion awareness (CHCA), designed to optimize load balancing. CHCA enhances traditional algorithms by minimizing data migration when servers are added or removed. Additionally, this mechanism incorporates the least connections method to prevent certain servers from becoming overloaded due to persistent traffic, thereby mitigating server hotspots. Aiming to support this mechanism, two custom headers, the forward header and the MRI header, are introduced using P4 switches. The forward header allows P4 switches to make dynamic packet forwarding decisions based on optimal paths at runtime, eliminating the need for a static routing table. Meanwhile, the MRI header records the load information from all traversed P4 switches, enabling the load balancing forwarding strategy to adapt in real time based on current network conditions.

近年来,新的网络架构出现了大幅增长。在这些进步中,分布式服务器架构和服务器负载平衡逐渐成为重点关注的领域。本文介绍了一种称为具有拥塞感知的一致性哈希(CHCA)机制,旨在优化负载平衡。CHCA通过在添加或删除服务器时最小化数据迁移来增强传统算法。此外,该机制结合了最少连接方法,以防止某些服务器由于持久流量而过载,从而减轻服务器热点。为了支持这种机制,使用P4交换机引入了两个自定义报头,即转发报头和MRI报头。转发报头允许P4交换机在运行时根据最优路径做出动态数据包转发决策,从而消除了对静态路由表的需求。同时,MRI报头记录了所有经过的P4交换机的负载信息,使负载均衡转发策略能够根据当前网络情况实时适应。
{"title":"Load Balancing Based on Consistent Hashing in P4 Switches","authors":"Yu-An Shi,&nbsp;Kuan-Ting Liu,&nbsp;Li-Der Chou","doi":"10.1002/nem.70033","DOIUrl":"https://doi.org/10.1002/nem.70033","url":null,"abstract":"<div>\u0000 \u0000 <p>In recent years, the emergence of new network architectures has seen substantial growth. Among these advancements, distributed server architectures and server load balancing have gradually become key areas of focus. This paper introduces a mechanism called consistent hashing with congestion awareness (CHCA), designed to optimize load balancing. CHCA enhances traditional algorithms by minimizing data migration when servers are added or removed. Additionally, this mechanism incorporates the least connections method to prevent certain servers from becoming overloaded due to persistent traffic, thereby mitigating server hotspots. Aiming to support this mechanism, two custom headers, the forward header and the MRI header, are introduced using P4 switches. The forward header allows P4 switches to make dynamic packet forwarding decisions based on optimal paths at runtime, eliminating the need for a static routing table. Meanwhile, the MRI header records the load information from all traversed P4 switches, enabling the load balancing forwarding strategy to adapt in real time based on current network conditions.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"36 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2025-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145686436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting Arbitrage Occurrences With Machine Learning and Improved Decision Threshold Level in Live-Trading Crypto Environments 在实时交易加密环境中使用机器学习和改进的决策阈值水平预测套利事件
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-30 DOI: 10.1002/nem.70030
Kristína Okasová, Michal Géci, Kristián Košťál

Cryptocurrencies represent a significantly utilized class of digital assets, encompassing a diverse array of tokens and coins available for trading purposes. In this study, the integration of machine learning algorithms with an arbitrage trading strategy across cryptocurrency exchanges is explored. The objective is to scrutinize prominent cryptocurrency pairs characterized by high volatility, vulnerability to speculation, regulatory gaps, liquidity constraints, and heavy-tail distribution, with the intention of training the model to predict the potential for arbitrage. To differentiate from competitors who await rare arbitrage opportunities, a novel approach is introduced to enhance arbitrage profitability. The primary innovation of this study lies in demonstrating the capability to predict profitable arbitrage opportunities in discrete intervals in advance, by incorporating sophisticated confidence level metrics to initiate arbitrage trades only when the model's predictions demonstrate substantial certainty. The findings indicate that the profitability of the entire strategy exceeds 100% within a 1-week timeframe.

加密货币代表了一种被大量利用的数字资产类别,包括可用于交易目的的各种代币和硬币。在本研究中,探讨了机器学习算法与跨加密货币交易所套利交易策略的集成。目标是仔细研究具有高波动性、易受投机、监管缺口、流动性限制和重尾分布等特征的著名加密货币对,目的是训练模型来预测套利的潜力。为了区别于等待难得套利机会的竞争对手,引入了一种提高套利盈利能力的新方法。本研究的主要创新之处在于,通过纳入复杂的置信水平指标,只有当模型的预测显示出实质性的确定性时,才会启动套利交易,从而证明了在离散间隔内提前预测盈利套利机会的能力。研究结果表明,在一周的时间框架内,整个策略的盈利能力超过100%。
{"title":"Predicting Arbitrage Occurrences With Machine Learning and Improved Decision Threshold Level in Live-Trading Crypto Environments","authors":"Kristína Okasová,&nbsp;Michal Géci,&nbsp;Kristián Košťál","doi":"10.1002/nem.70030","DOIUrl":"https://doi.org/10.1002/nem.70030","url":null,"abstract":"<p>Cryptocurrencies represent a significantly utilized class of digital assets, encompassing a diverse array of tokens and coins available for trading purposes. In this study, the integration of machine learning algorithms with an arbitrage trading strategy across cryptocurrency exchanges is explored. The objective is to scrutinize prominent cryptocurrency pairs characterized by high volatility, vulnerability to speculation, regulatory gaps, liquidity constraints, and heavy-tail distribution, with the intention of training the model to predict the potential for arbitrage. To differentiate from competitors who await rare arbitrage opportunities, a novel approach is introduced to enhance arbitrage profitability. The primary innovation of this study lies in demonstrating the capability to predict profitable arbitrage opportunities in discrete intervals in advance, by incorporating sophisticated confidence level metrics to initiate arbitrage trades only when the model's predictions demonstrate substantial certainty. The findings indicate that the profitability of the entire strategy exceeds 100% within a 1-week timeframe.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"36 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2025-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.70030","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145686508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Literature Survey on Resource Allocation for Network Function Virtualization With and Without Machine Learning in Cloud Computing 云计算中有无机器学习网络功能虚拟化资源分配的文献综述
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-27 DOI: 10.1002/nem.70034
Khaled Gadouh, Hend Koubaa

The convergence of cloud computing, machine learning (ML), and network function virtualization (NFV) offers significant opportunities for advancing network infrastructure management by providing efficient, flexible, and scalable resource utilization. This study aims to provide a comprehensive review of the primary challenges and explores state-of-the-art solutions in cloud computing for resource allocation (RA) specific to NFV environments. The paper highlights the importance of adopting multifaceted strategies to optimize RA and enhance the efficiency, and adaptability of cloud systems that handle RA without ML, and with ML in NFV settings. In addition, gap identification is also discussed, emphasizing many needs: (1) the need for extending the NFV RA in the case of wireless networks; (2) the need for enhanced security protocols to fully harness the potential of ML within resource function virtualization (RFV) environments, ensuring that network infrastructures are not only efficient but also resilient and secure; and (3) the need to develop more efficient ML-based RA for NFV, considering the trade-off between performance and accuracy.

云计算、机器学习(ML)和网络功能虚拟化(NFV)的融合通过提供高效、灵活和可扩展的资源利用,为推进网络基础设施管理提供了重要机会。本研究旨在对主要挑战进行全面回顾,并探索针对NFV环境的云计算资源分配(RA)的最先进解决方案。本文强调了采用多方面策略来优化RA和提高效率的重要性,以及在NFV设置中使用ML和不使用ML处理RA的云系统的适应性。此外,还讨论了差距识别,强调了许多需求:(1)在无线网络的情况下扩展NFV RA的需求;(2)需要加强安全协议,以充分利用资源功能虚拟化(RFV)环境中机器学习的潜力,确保网络基础设施不仅高效,而且具有弹性和安全性;(3)考虑到性能和准确性之间的权衡,需要为NFV开发更高效的基于ml的RA。
{"title":"A Literature Survey on Resource Allocation for Network Function Virtualization With and Without Machine Learning in Cloud Computing","authors":"Khaled Gadouh,&nbsp;Hend Koubaa","doi":"10.1002/nem.70034","DOIUrl":"https://doi.org/10.1002/nem.70034","url":null,"abstract":"<div>\u0000 \u0000 <p>The convergence of cloud computing, machine learning (ML), and network function virtualization (NFV) offers significant opportunities for advancing network infrastructure management by providing efficient, flexible, and scalable resource utilization. This study aims to provide a comprehensive review of the primary challenges and explores state-of-the-art solutions in cloud computing for resource allocation (RA) specific to NFV environments. The paper highlights the importance of adopting multifaceted strategies to optimize RA and enhance the efficiency, and adaptability of cloud systems that handle RA without ML, and with ML in NFV settings. In addition, gap identification is also discussed, emphasizing many needs: (1) the need for extending the NFV RA in the case of wireless networks; (2) the need for enhanced security protocols to fully harness the potential of ML within resource function virtualization (RFV) environments, ensuring that network infrastructures are not only efficient but also resilient and secure; and (3) the need to develop more efficient ML-based RA for NFV, considering the trade-off between performance and accuracy.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"36 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2025-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145626206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Evolution of Network Management: From Manual Configurations to Intelligent Automation 网络管理的演变:从手工配置到智能自动化
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-24 DOI: 10.1002/nem.70031
Sneh Kanwar Singh Sidhu, Ankita Sharma

Automated and intelligent systems now manage networks, unlike in the past when static protocols and manual configuration dominated the field. This review looks at the transformations network management has undergone, starting from manual methods to evolving to Policy-Based Network Management (PBNM), Software-Defined Networking (SDN), and eventually Intent-Based Networking (IBN). It also analyzes the key enabling technologies, foundational architectures, and representative implementations of each network management system. By presenting the operational strategies, technological shifts, and motivations for each network management phase, the article articulates the reasons change happens in the approach taken to manage a network. This review also focuses on the advantages of SDN and IBN, especially concerning automation, threat management, policy enforcement, and scalability. Furthermore, the review explores emerging trends like AI-powered networks, Zero Trust security, integration of 5G–6G, blockchain uses, and the possibilities offered by quantum networking. By synthesizing technological insights and real-world adoption scenarios, the paper offers a comprehensive perspective on the future trajectory of intelligent and autonomous network management systems.

自动化和智能系统现在管理网络,不像过去静态协议和手动配置占主导地位。这篇综述着眼于网络管理所经历的转变,从手工方法到发展到基于策略的网络管理(PBNM)、软件定义网络(SDN),最后是基于意图的网络(IBN)。它还分析了每个网络管理系统的关键支持技术、基础架构和代表性实现。通过介绍每个网络管理阶段的操作策略、技术转变和动机,本文阐明了在网络管理方法中发生变化的原因。本文还重点介绍了SDN和IBN的优势,特别是在自动化、威胁管理、策略实施和可扩展性方面。此外,该报告还探讨了人工智能网络、零信任安全、5G-6G集成、区块链使用以及量子网络提供的可能性等新兴趋势。通过综合技术见解和现实世界的采用场景,本文提供了智能和自主网络管理系统未来发展轨迹的全面视角。
{"title":"The Evolution of Network Management: From Manual Configurations to Intelligent Automation","authors":"Sneh Kanwar Singh Sidhu,&nbsp;Ankita Sharma","doi":"10.1002/nem.70031","DOIUrl":"https://doi.org/10.1002/nem.70031","url":null,"abstract":"<div>\u0000 \u0000 <p>Automated and intelligent systems now manage networks, unlike in the past when static protocols and manual configuration dominated the field. This review looks at the transformations network management has undergone, starting from manual methods to evolving to Policy-Based Network Management (PBNM), Software-Defined Networking (SDN), and eventually Intent-Based Networking (IBN). It also analyzes the key enabling technologies, foundational architectures, and representative implementations of each network management system. By presenting the operational strategies, technological shifts, and motivations for each network management phase, the article articulates the reasons change happens in the approach taken to manage a network. This review also focuses on the advantages of SDN and IBN, especially concerning automation, threat management, policy enforcement, and scalability. Furthermore, the review explores emerging trends like AI-powered networks, Zero Trust security, integration of 5G–6G, blockchain uses, and the possibilities offered by quantum networking. By synthesizing technological insights and real-world adoption scenarios, the paper offers a comprehensive perspective on the future trajectory of intelligent and autonomous network management systems.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"36 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2025-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145581270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralized Anomaly Detection Using Deep Feed-Forward Neural Networks 基于深度前馈神经网络的分散异常检测
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-14 DOI: 10.1002/nem.70032
Christian Lübben, Marc-Oliver Pahl

The Internet of Things (IoT) requires sophisticated security due to heterogeneity and resource constraints. Current anomaly detection (AD) approaches address none of these challenges. Local AD models can account for device heterogeneity. However, existing approaches cannot run on constrained devices. This paper implements decentralized local AD models. Each model processes data from only one device. Simplifying the prediction task results in lightweight AD models. They provide an opportunity to address the resource constraints of devices. With less need for processing power, IoT devices can perform AD on their own. The novel approach improves the optimization metrics of detection performance, latency, bandwidth usage, privacy, and model complexity. Further optimization using model aggregation speeds up the creation of AD models. The evaluation uses the publicly available UNSW-NB15 dataset. It shows that models can be simplified to run on IoT devices. Measurements with a local model on a Raspberry PI show only a slight increase in training and processing time compared with central remote processing on a significantly more powerful desktop PC. While the accuracy remains > 98%, the F1 score increases from 0.64 to 0.89 in the decentralized approach. The time for the creation of models is reduced by more than 90%.

由于异构性和资源限制,物联网(IoT)需要复杂的安全性。当前的异常检测(AD)方法没有解决这些挑战。本地AD模型可以考虑设备的异构性。然而,现有的方法不能在受限的设备上运行。本文实现了分散的局部AD模型。每个模型只处理来自一个设备的数据。简化预测任务可以得到轻量级AD模型。它们提供了一个解决设备资源限制的机会。由于对处理能力的需求较少,物联网设备可以自行执行AD。这种新方法改进了检测性能、延迟、带宽使用、隐私和模型复杂性的优化指标。使用模型聚合的进一步优化加速了AD模型的创建。评估使用公开可用的UNSW-NB15数据集。这表明可以简化模型以在物联网设备上运行。在Raspberry PI上使用本地模型进行的测量显示,与功能强大得多的桌面PC上的中央远程处理相比,训练和处理时间仅略有增加。虽然准确率保持在98%,但分散式方法的F1分数从0.64增加到0.89。创建模型的时间减少了90%以上。
{"title":"Decentralized Anomaly Detection Using Deep Feed-Forward Neural Networks","authors":"Christian Lübben,&nbsp;Marc-Oliver Pahl","doi":"10.1002/nem.70032","DOIUrl":"https://doi.org/10.1002/nem.70032","url":null,"abstract":"<p>The Internet of Things (IoT) requires sophisticated security due to heterogeneity and resource constraints. Current anomaly detection (AD) approaches address none of these challenges. Local AD models can account for device heterogeneity. However, existing approaches cannot run on constrained devices. This paper implements decentralized local AD models. Each model processes data from only one device. Simplifying the prediction task results in lightweight AD models. They provide an opportunity to address the resource constraints of devices. With less need for processing power, IoT devices can perform AD on their own. The novel approach improves the optimization metrics of detection performance, latency, bandwidth usage, privacy, and model complexity. Further optimization using model aggregation speeds up the creation of AD models. The evaluation uses the publicly available UNSW-NB15 dataset. It shows that models can be simplified to run on IoT devices. Measurements with a local model on a Raspberry PI show only a slight increase in training and processing time compared with central remote processing on a significantly more powerful desktop PC. While the accuracy remains &gt; 98%, the F1 score increases from 0.64 to 0.89 in the decentralized approach. The time for the creation of models is reduced by more than 90%.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 6","pages":""},"PeriodicalIF":2.6,"publicationDate":"2025-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.70032","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145530075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Survey on LLM-Based Network Management and Operations 基于法学硕士的网络管理与运营综述
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-10 DOI: 10.1002/nem.70029
Jibum Hong, Nguyen Van Tu, James Won-Ki Hong

The growing demands for network capacity and the increasing complexities of modern network environments pose significant challenges for effective network management and operations. In response, network operators and administrators are moving beyond traditional manual and rule-based methods, adopting advanced artificial intelligence (AI)-driven paradigms (e.g., self-driving networks, autonomous networks, network automation). Recently, large language models (LLMs) have emerged as a promising AI technology with the potential to revolutionize network management and operations through natural language interaction. In this paper, we provide a comprehensive survey of LLM-based approaches in network management and compare those approaches with existing methods. We identify key advantages of LLM-based approaches, such as their ability to interpret intent and automate complex tasks, as well as limitations, which include hallucinations and domain adaptation challenges. Based on these insights, we outline open technical challenges and propose future research directions to guide the development of LLM-based network management.

对网络容量日益增长的需求和现代网络环境日益复杂,对有效的网络管理和运营提出了重大挑战。作为回应,网络运营商和管理员正在超越传统的手动和基于规则的方法,采用先进的人工智能(AI)驱动的范式(例如,自动驾驶网络、自主网络、网络自动化)。最近,大型语言模型(llm)已经成为一种有前途的人工智能技术,有可能通过自然语言交互彻底改变网络管理和运营。在本文中,我们对网络管理中基于法学硕士的方法进行了全面的调查,并将这些方法与现有方法进行了比较。我们确定了基于法学硕士的方法的主要优势,例如它们解释意图和自动执行复杂任务的能力,以及局限性,包括幻觉和领域适应挑战。基于这些见解,我们概述了开放的技术挑战,并提出了未来的研究方向,以指导基于法学硕士的网络管理的发展。
{"title":"A Comprehensive Survey on LLM-Based Network Management and Operations","authors":"Jibum Hong,&nbsp;Nguyen Van Tu,&nbsp;James Won-Ki Hong","doi":"10.1002/nem.70029","DOIUrl":"https://doi.org/10.1002/nem.70029","url":null,"abstract":"<p>The growing demands for network capacity and the increasing complexities of modern network environments pose significant challenges for effective network management and operations. In response, network operators and administrators are moving beyond traditional manual and rule-based methods, adopting advanced artificial intelligence (AI)-driven paradigms (e.g., self-driving networks, autonomous networks, network automation). Recently, large language models (LLMs) have emerged as a promising AI technology with the potential to revolutionize network management and operations through natural language interaction. In this paper, we provide a comprehensive survey of LLM-based approaches in network management and compare those approaches with existing methods. We identify key advantages of LLM-based approaches, such as their ability to interpret intent and automate complex tasks, as well as limitations, which include hallucinations and domain adaptation challenges. Based on these insights, we outline open technical challenges and propose future research directions to guide the development of LLM-based network management.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 6","pages":""},"PeriodicalIF":2.6,"publicationDate":"2025-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.70029","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145272929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
P4-QUPF: A P4-Based QoS Framework for 5G-UPF P4-QUPF:基于p4的5G-UPF QoS框架
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-25 DOI: 10.1002/nem.70028
Muhammad Shahid Iqbal, Muthuraman Elangovan, Chien Chen, Jyh-Cheng Chen

The demands of today's 5G mobile network, especially low latency and high bandwidth, are a big challenge for the 5G Core (5GC) provider. The most critical user data packet handler in the 5GC network function (NF) is the user plane function (UPF), which is responsible for moving data from the user equipment to the destination data network, and vice versa. Existing work mainly focuses on implementing UPF using the key technologies of high-speed data processing. In this paper, with a mobile core provider called free5GC for a stand-alone (SA) 5G network, we share our experience with the implementation of UPF by using a programmable hardware appliance, which can offer more Tbps compared with the implementation of software UPF that can offer only a few hundred Gbps. For that, we demonstrate how to build up a more flexible architecture of UPF by using the software-defined networking (SDN) concept due to the opacity of protocol specification. We split the UPF control signal implementation into a software application and user data packet processing into a programmable hardware appliance. We also show how to integrate a number of current UPF data plane free5GC implementations, such as Data Plane Development Kit (DPDK), Linux kernel module, and SmartNIC. Furthermore, we analyze and make use of microservices to support the specific features of the UPF data plane that cannot be implemented in a programmable hardware appliance. We tested our free5GC mobile network and the new UPF design architecture that can run on a real programmable hardware appliance from Accton CSP-7551. The evaluation results show that our programmable user plane can reach the line rate.

当今5G移动网络的需求,特别是低延迟和高带宽,对5G核心(5GC)提供商来说是一个巨大的挑战。5GC网络功能(NF)中最关键的用户数据包处理程序是用户平面功能(UPF),它负责将数据从用户设备移动到目标数据网络,反之亦然。现有的工作主要集中在利用高速数据处理的关键技术实现UPF。在本文中,我们与名为free5GC的移动核心提供商合作,为独立(SA) 5G网络提供服务,我们分享了通过使用可编程硬件设备实现UPF的经验,与只能提供几百Gbps的软件UPF实施相比,它可以提供更多的Tbps。为此,我们演示了由于协议规范的不透明性,如何利用软件定义网络(SDN)概念构建更灵活的UPF架构。我们将UPF控制信号的实现拆分为软件应用程序,将用户数据包处理拆分为可编程硬件设备。我们还展示了如何集成一些当前的UPF数据平面免费gc实现,如数据平面开发工具包(DPDK)、Linux内核模块和SmartNIC。此外,我们分析并利用微服务来支持UPF数据平面中无法在可编程硬件设备中实现的特定功能。我们测试了我们的免费5gc移动网络和新的UPF设计架构,该架构可以在Accton CSP-7551的真实可编程硬件设备上运行。评估结果表明,我们的可编程用户平面可以达到线路速率。
{"title":"P4-QUPF: A P4-Based QoS Framework for 5G-UPF","authors":"Muhammad Shahid Iqbal,&nbsp;Muthuraman Elangovan,&nbsp;Chien Chen,&nbsp;Jyh-Cheng Chen","doi":"10.1002/nem.70028","DOIUrl":"https://doi.org/10.1002/nem.70028","url":null,"abstract":"<p>The demands of today's 5G mobile network, especially low latency and high bandwidth, are a big challenge for the 5G Core (5GC) provider. The most critical user data packet handler in the 5GC network function (NF) is the user plane function (UPF), which is responsible for moving data from the user equipment to the destination data network, and vice versa. Existing work mainly focuses on implementing UPF using the key technologies of high-speed data processing. In this paper, with a mobile core provider called free5GC for a stand-alone (SA) 5G network, we share our experience with the implementation of UPF by using a programmable hardware appliance, which can offer more Tbps compared with the implementation of software UPF that can offer only a few hundred Gbps. For that, we demonstrate how to build up a more flexible architecture of UPF by using the software-defined networking (SDN) concept due to the opacity of protocol specification. We split the UPF control signal implementation into a software application and user data packet processing into a programmable hardware appliance. We also show how to integrate a number of current UPF data plane free5GC implementations, such as Data Plane Development Kit (DPDK), Linux kernel module, and SmartNIC. Furthermore, we analyze and make use of microservices to support the specific features of the UPF data plane that cannot be implemented in a programmable hardware appliance. We tested our free5GC mobile network and the new UPF design architecture that can run on a real programmable hardware appliance from Accton CSP-7551. The evaluation results show that our programmable user plane can reach the line rate.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 6","pages":""},"PeriodicalIF":2.6,"publicationDate":"2025-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.70028","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145146348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effects of Fractionalizing NFTS in the Art Market: An Empirical Study of Fractional Art NFTS在艺术品市场的分块效应:分块艺术品的实证研究
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-24 DOI: 10.1002/nem.70027
Jana Gómez Tabladillo, Miguel Ángel Sicilia Urbán, María Elena García Barriocanal

In 2014, the art world began using NFTs. Since then, the exponential increase in the price of some of these digital artworks has made them inaccessible to many small investors and private collectors. For this reason, various protocols such as Fractional.art have emerged to democratize the process, allowing users to fractionalize NFTs to make trading more fluid. The objective of this article is to analyze the NFTs fractionated into ERC-20 tokens using the Fractional.art protocol, with the aim of determining the contribution of fractionation to the liquidity of the assets, among others. The research method employed is an empirical analysis based on quantitative research to identify key characteristics and trends to support the initial hypothesis. This is combined with a qualitative approach to provide a deeper understanding. The results show that fragmentation has a positive effect on the liquidity of the NFT when the user decides to trade it. This means that fractionated NFTs can benefit from certain liquidity advantages of centralized investment markets, thereby facilitating trading. While NFTs have received increasing scholarly attention, most research on fractionalized NFTs has focused on the theoretical and technical design of fractionation protocols. Although recent studies have begun to empirically examine NFT market dynamics more broadly, there remains limited evidence on whether fractionalization effectively enhances liquidity. This article seeks to contribute to that emerging area by offering a focused, data-driven analysis of F-NFT liquidity and user behavior.

2014年,艺术界开始使用nft。从那时起,其中一些数字艺术品的价格呈指数级增长,使许多小投资者和私人收藏家无法接触到它们。由于这个原因,各种协议,如分数。艺术的出现使这一过程民主化,允许用户将nft分割,使交易更加流畅。本文的目的是分析使用Fractional将nft分割成ERC-20令牌的情况。Art协议,目的是确定分馏对资产流动性的贡献,等等。本文采用的研究方法是在定量研究的基础上进行实证分析,以确定关键特征和趋势来支持初始假设。这与定性方法相结合,以提供更深入的理解。结果表明,当用户决定交易时,碎片化对NFT的流动性有积极影响。这意味着分门别类nft可以从集中投资市场的一定流动性优势中受益,从而促进交易。虽然nft得到了越来越多的学术关注,但大多数关于分馏nft的研究都集中在分馏协议的理论和技术设计上。尽管最近的研究已经开始对NFT市场动态进行更广泛的实证研究,但关于分馏是否有效提高流动性的证据仍然有限。本文旨在通过对F-NFT流动性和用户行为进行集中、数据驱动的分析,为这一新兴领域做出贡献。
{"title":"Effects of Fractionalizing NFTS in the Art Market: An Empirical Study of Fractional Art","authors":"Jana Gómez Tabladillo,&nbsp;Miguel Ángel Sicilia Urbán,&nbsp;María Elena García Barriocanal","doi":"10.1002/nem.70027","DOIUrl":"https://doi.org/10.1002/nem.70027","url":null,"abstract":"<p>In 2014, the art world began using NFTs. Since then, the exponential increase in the price of some of these digital artworks has made them inaccessible to many small investors and private collectors. For this reason, various protocols such as Fractional.art have emerged to democratize the process, allowing users to fractionalize NFTs to make trading more fluid. The objective of this article is to analyze the NFTs fractionated into ERC-20 tokens using the Fractional.art protocol, with the aim of determining the contribution of fractionation to the liquidity of the assets, among others. The research method employed is an empirical analysis based on quantitative research to identify key characteristics and trends to support the initial hypothesis. This is combined with a qualitative approach to provide a deeper understanding. The results show that fragmentation has a positive effect on the liquidity of the NFT when the user decides to trade it. This means that fractionated NFTs can benefit from certain liquidity advantages of centralized investment markets, thereby facilitating trading. While NFTs have received increasing scholarly attention, most research on fractionalized NFTs has focused on the theoretical and technical design of fractionation protocols. Although recent studies have begun to empirically examine NFT market dynamics more broadly, there remains limited evidence on whether fractionalization effectively enhances liquidity. This article seeks to contribute to that emerging area by offering a focused, data-driven analysis of F-NFT liquidity and user behavior.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 6","pages":""},"PeriodicalIF":2.6,"publicationDate":"2025-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.70027","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145146556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey of IPv6 Active Address Discovery IPv6主动地址发现研究综述
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-17 DOI: 10.1002/nem.70026
Kun Wen, Luya Ju, Tao Chen, Jun Li, Hengji Qi, An Zhao

The core of IPv6 active address discovery lies in identifying operational network devices, which serve as the foundation for various network applications. However, the vast address space of IPv6 presents significant challenges to network discovery, including inefficiencies of traditional scanning tools (such as ZMap and Masscan), uncertainties arising from dynamic address allocation, sparsity in address distribution, and limitations of current discovery techniques in regions lacking seed addresses. To address these challenges, researchers have developed various address discovery methods aimed at maximizing the identification of active IPv6 addresses within constrained resource budgets. This paper summarizes and analyzes existing active address discovery methods and evaluates their performance in real-world environments. Our work includes classifying detection techniques and outlining the current research landscape for address discovery in regions without seed addresses. Through experiments conducted in real network environments, we evaluate and contrast different probing algorithms using four performance metrics: hit rate, hierarchical prefix coverage, aliased addresses, and address discovery rate. Furthermore, we discuss the challenges faced by current IPv6 active address discovery methods in practical applications. Despite numerous advancements, the field of IPv6 active address discovery still requires further research and exploration.

IPv6主动地址发现的核心是识别可运行的网络设备,它是各种网络应用的基础。然而,IPv6巨大的地址空间给网络发现带来了巨大的挑战,包括传统扫描工具(如ZMap和Masscan)的低效率,动态地址分配带来的不确定性,地址分布的稀疏性,以及当前发现技术在缺乏种子地址的地区的局限性。为了应对这些挑战,研究人员开发了各种地址发现方法,旨在在有限的资源预算内最大限度地识别活跃的IPv6地址。本文总结和分析了现有的主动地址发现方法,并对其在实际环境中的性能进行了评价。我们的工作包括对检测技术进行分类,并概述了在没有种子地址的地区进行地址发现的当前研究前景。通过在真实网络环境中进行的实验,我们使用四个性能指标来评估和对比不同的探测算法:命中率、分层前缀覆盖、别名地址和地址发现率。此外,我们还讨论了当前IPv6主动地址发现方法在实际应用中所面临的挑战。尽管IPv6主动地址发现领域取得了许多进步,但仍需要进一步的研究和探索。
{"title":"A Survey of IPv6 Active Address Discovery","authors":"Kun Wen,&nbsp;Luya Ju,&nbsp;Tao Chen,&nbsp;Jun Li,&nbsp;Hengji Qi,&nbsp;An Zhao","doi":"10.1002/nem.70026","DOIUrl":"https://doi.org/10.1002/nem.70026","url":null,"abstract":"<div>\u0000 \u0000 <p>The core of IPv6 active address discovery lies in identifying operational network devices, which serve as the foundation for various network applications. However, the vast address space of IPv6 presents significant challenges to network discovery, including inefficiencies of traditional scanning tools (such as ZMap and Masscan), uncertainties arising from dynamic address allocation, sparsity in address distribution, and limitations of current discovery techniques in regions lacking seed addresses. To address these challenges, researchers have developed various address discovery methods aimed at maximizing the identification of active IPv6 addresses within constrained resource budgets. This paper summarizes and analyzes existing active address discovery methods and evaluates their performance in real-world environments. Our work includes classifying detection techniques and outlining the current research landscape for address discovery in regions without seed addresses. Through experiments conducted in real network environments, we evaluate and contrast different probing algorithms using four performance metrics: hit rate, hierarchical prefix coverage, aliased addresses, and address discovery rate. Furthermore, we discuss the challenges faced by current IPv6 active address discovery methods in practical applications. Despite numerous advancements, the field of IPv6 active address discovery still requires further research and exploration.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 6","pages":""},"PeriodicalIF":2.6,"publicationDate":"2025-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145101497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Network Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1