Motivation: The Dawn of the Age of Network-Embedded Applications

  • Ralf Wolter


What are network-embedded applications? What is the difference between network-embedded and network-attached concepts? This chapter provides an overview of central network management strategies and compares them with distributed management, network-attached appliances, and a holistic approach of network-embedded applications. Concrete scenarios explain the benefit of network-embedded applications. In addition, industry initiatives that address network-embedded solutions are described. The business aspect is provided as well, describing the impact of network-embedded solutions. Technical challenges and future opportunities conclude this chapter.


Cloud Computing Network Element Domain Name System European Telecommunication Standard Institute Network Automation 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Cabuk S, Dalton CI, Ramasamy H, Schunter M (2007) Towards automated provisioning of secure virtualized networks. In: Proceedings of the 14th ACM conference on computer and communications security, CCS’07, ACM, New YorkGoogle Scholar
  2. 2.
    McKeown N, Anderson T, Balakrishnan H, Parulkar G, Peterson L, Rexford J, Shenker S, Turner J (2008) Openflow: enabling innovation in college networks. ACM SIGCOMM Comput Commun Rev 38(2):69–74CrossRefGoogle Scholar
  3. 3.
    Martin-Flatin JP, Znaty S, Hubaux J-P (1999) A survey of distributed enterprise network and systems management paradigms. J Network Syst Manage 7(1):9–26MATHCrossRefGoogle Scholar
  4. 4.
  5. 5.
    RFC 3304 – middlebox communications (midcom) protocol requirementsGoogle Scholar
  6. 6.
  7. 7.
    Aggarwal V, Feldmann A, Scheideler C (2007) Can ISPs and P2P systems co-operate for improved performance? ACM SIGCOMM Comput Commun Rev 37(3):29–40CrossRefGoogle Scholar
  8. 8.
    McGuiness S, Tjong J, Bettadapur P (2011) Challenges and experiences in transitioning management instrumentation from command-oriented to model-driven. Advances in network-embedded management and applications. In: Proceedings from the 1st workshop on network embedded management and applications 2010, Springer PressGoogle Scholar
  9. 9.
    Strijkers R, Cristea M, de Laat C, Meijer R (2011) Application framework for programmable network control. Advances in network-embedded management and applications. In: Proceedings from the 1st workshop on network embedded management and applications 2010, Springer PressGoogle Scholar
  10. 10.
    Dudkowski D, Brunner M, Nunzi G, Mingardi C, Foley C, de Leon MP, Meirosu C, Engberg S (2009) Integrated network management. In: IM ‘09. IFIP/IEEE international symposium, Hofstra University, Long Islan, NY, USAGoogle Scholar
  11. 11.
    Hu Y, Chiu D-M, Lui JCS (2009) Entropy based adaptive flow aggregation. IEEE/ACM Trans Network 17(3):698–711CrossRefGoogle Scholar
  12. 12.
    RFC 4915: multi-topology routing in OSPFGoogle Scholar
  13. 13.
    Menth M, Martin R (2005) Network resilience through multi-topology routing. In: Proceedings of the design of reliable communication networks (DRNC) workshop, Island of IschiaGoogle Scholar
  14. 14.
    Gjessing S (2006) Implementation of two resilience mechanisms using multi topology routing and stub routers. In: Proceedings of the advanced int’l conference on telecommunications and int’l conference on internet and web applications and services, AICT-ICIW ’06, Island of Ischia, ItalyGoogle Scholar
  15. 15.
    Kvalbein A, Lysne O (2007) How can multi-topology routing be used for intradomain traffic engineering? In: Proceedings of the 2007 SIGCOMM workshop on Internet network management Kyoto, JapanGoogle Scholar
  16. 16.
    Zhang L, White B (2007) Anomaly detection for application level network attacks using payload keywords. In: Proceedings of the 2007 IEEE symposium on computational intelligence in security and defense applications, Honolulu, Hawaii, USA (CISDA 2007), pp 178–185Google Scholar
  17. 17.
    Zanero S (2005) Analyzing TCP traffic patterns using self organizing maps. In: Image analysis and processing, ICIAP 2005, ser. LNCS, Cagliari, Italy 2005, pp 83–90Google Scholar
  18. 18.
    GPP TR 36.902 V9.2.0 (2010-06)Google Scholar
  19. 19.
    Feng ES (2008) Self-organising networks (SON) in 3GPP long term evolution. Nomor Research GmbH, Munich. Accessed on 20 May 2008
  20. 20.
    GPP TS 32.511: telecommunication management; Automatic Neighbour Relation (ANR) management; concepts and requirementsGoogle Scholar
  21. 21.
    GPP TR 36.902: Evolved Universal Terrestrial Radio Access Network (E-UTRAN); self-configuring and self-optimizing network (SON) use cases and solutionsGoogle Scholar
  22. 22.
    EU Directive 95/46 on the protection of Individuals with regard to the processing of personal data. Accessed on 13 Dec 1995
  23. 23.
    Sandvine’s spring 2011 report. Accessed on 17 May 2011
  24. 24.
    Cisco visual networking index forecast. Accessed on June 2011
  25. 25.
    Fioreze T, Wolbers OM, van de Meent R, Pras A (2007) Finding elephant flows for optical networks. Application session proceeding of the 10th IFIP/IEEE international symposium on integrated network management (IM 2007), pp 627–640. IEEE computer society. ISBN 1-4244-0799-0Google Scholar
  26. 26.
    Internet world stats. Accessed on 31 Dec 2011

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  1. 1.HPCGHildenGermany

Personalised recommendations