Information Technology Network Management

By | April 6, 2023

Information Technology Network Management – Open Access Policy Institutional Open Access Program Specific Guidelines Publication Management Research and Publication Ethics Guidelines Award Fee Process Evidence

All articles published by me are immediately available worldwide under an open access license. No special permission is required to reproduce an article or part thereof, including images and tables, published by . For articles published under the Creative Commons CC BY open source license, any part of the article may be reused without permission, as long as the original article is clearly cited. For more information, go to https:///openaccess.

Information Technology Network Management

Information Technology Network Management

Feature papers represent the most advanced research with the greatest potential for significant impact in the field. A Feature Paper should be a large original article that includes a variety of methods or approaches, provides an overview of future research directions, and describes possible research applications.

Computer Icons Computer Network Management, Community, Computer Network, Data Png

Papers in the section are submitted by individual invitation or recommendation of the scientific editors and must receive positive comments from the reviewers.

Editor’s Choice articles are based on the recommendations of scientific journal editors from around the world. The editors select a small number of recently published articles in the journal in an area of ​​research that they believe will be of particular interest or relevance to readers. The goal is to provide a snapshot of some of the best work published in the journal’s various research areas.

Authors: Delphin Raj K. M 1 , Jinyoung Lee 2 , Eunbi Ko 3 , Soo-Young Shin 2 , Jung-Il Namgung 4 , Sun-Ho Yum 1 and Soo-Hyun Park 3, *

Received: May 15, 2020 / Updated: July 3, 2020 / Accepted: July 9, 2020 / Published: July 14, 2020

Network Management Best Practices And Tools To Use [guide]

As the oceans cover most of the earth’s surface, it is becoming inevitable that Internet of Things (IoT) concepts will extend to the oceans, thus paving the way for new developments in the digital world, the Underwater Internet of Things (IoUT). The main goal of IoUT is to create a network of various intelligent underwater objects, connecting water areas using devices such as autonomous underwater vehicles. Because the traditional concepts of IoT cannot be extended only to underwater, due to the difference in environmental characteristics, this creates different problems for scientists to work with IoUT, and it is a challenge for network management and IoT. This paper provides an overview of (1) an underwater network system (U-NMS) using acoustic communication in IoUT; (2) U-NMS challenges and benefits and use cases; (3) fault, configuration, responsibility, performance, security and prevention management (FCAPSC) U-NMS functions and (4) comparison between IoT network management system and U-NMS system IoT. In addition, this paper demonstrates the design and implementation of the U-NMS prototype in a laboratory environment using lightweight machine-to-machine (LWM2M) and acoustic communication technology for IoUT. This paper will greatly contribute to the efforts of researchers and industry players to discover the critical areas of the Underwater Internet of Things.

Internet of Things (IoT); Underwater Internet of Things (IoUT); network management system (NMS), underwater network management system (U-NMS); error, configuration, accounting, performance, security and limited management (FCAPSC); underwater management information base (U-MIB)

Existing Internet of Things (IoT) systems address various devices embedded in hardware and software [1, 2, 3, 4]. Due to the continuous growth in the number and diversity of network components, the complexity of the network management task is becoming more and more intense. In such a situation, a network management system (NMS) becomes mandatory to monitor and manage devices in different networks [5]. Most important network management system technologies must have the following characteristics: (1) be independent and regularly monitor global network activities; (2) should immediately report the problem to the network management station; (3) must be intelligent enough to handle all devices on the Internet; (4) must be intelligent enough to identify the exact location of the fault in the network; (5) network changes should be followed to find the source of the problem [6]. In wireless sensor networks, supporting effective and efficient network management is essential. Fault management, configuration and performance management are controlled with the help of WSN Management [7]. NMS is a way to monitor and manage all network activities to ensure that components are working and provide reliable information to the management system [8, 9, 10]. In the 1990s, FCAPS, a framework created by ISO, divides network management operations into five different categories, such as fault management (F), configuration level management (C ), accounting level system (A), performance. status system (P) and security level system (S) [11]. Here, Simple Network Management Protocol (SNMP) is used for communication between IoT devices. In IoT, network management is divided into two steps: (1) device management and (2) network management; for resource management and network management, many protocols are developed [12]. The components of NMS such as management station, manager, agent, management protocol and management information base (MIB) are well described in Figure 1 [13].

Information Technology Network Management

IoT network control system plays an important role in the industry. Many researchers in the past have discussed many ideas for designing and developing a global NMS, such as network management platform, resource management protocol, network management protocol -rang, etc., [14] and other modified NMS and IoT systems are reviewed below. .

Database Analytics Icons Flat Stock Vector

The Simple Network Management Protocol (SNMP) [15, 16, 17] is used in the global network to identify and resolve faults or network failures. SNMP was developed by the Internet Engineering Task Force (IETF). Abstract Syntax Notation (ASN.1) [18] is the language used to describe the basic information system in the network management system. User Datagram Protocol (UDP) is a supporting protocol, and OpenNMS, OpenDayLight and Zabbix are the management platforms used in SNMP. The Network Configuration Protocol (NETCONF) [19] was developed primarily for network configuration and global network system management. However, Next Generation (YANG) is the modeling language used by NETCONF and Extensible Markup Language (XML); JavaScript Object Notation (JSON) is a language that supports NETCONF [20, 21]. The Common Information Management Protocol (CMIP) [22, 23] was developed by the International Organization for Standardization (ISO), which is used to manage communication networks. Guide to the Definition of Managed Objects (GDMO) is the modeling language used to define managed objects (MOs) in CMIP. Transmission Control Protocol (TCP)/ User Datagram Protocol (UDP) are protocols that support CMIP. The LoWPAN Network Management Protocol (LNMP) [24, 25, 26] is a suitable management architecture for Internet Protocol (IPv6) and wireless personal area networks. LNMP used the adaptation layer protocol and SNMP to manage network resources. Message translation is possible in LNMP. UDP is a helper protocol and OpenNMS is the LNMP management platform. The IETF has developed a network configuration protocol (RESTCONF) [27, 28]. RESTCONF is an extension of NETCONF, adding a simple rest communication interface. YANG is the data modeling language used in RESTCONF. The Open vSwitch Database (OVSDB) [29, 30, 31] was developed by the IETF to work with software-defined networking (SDN). It has Open Database Server (OVSDB) and Open Virtualization Server (OVS) for fast transfer. OVSDV supports easy user creation of interfaces.

Open Mobile Alliance Lightweight M2M (OMA-LwM2M), is used as a resource management protocol in the M2M network [32, 33, 34]. XML, JSON is the language used for modeling and uses CoAP methods such as GET, PUT, POST and DELETE to connect OMA-LwM2M. The OMA Device Management (OMA-DM) [35, 36, 37] functions are used to provide communication between the server and clients through the devices through the device management tree. It is the best solution for remote management of connected devices. The XML format is used for communication. The Constrained Application Protocol (CoAP) [38, 39, 40] was developed by the IETF. CoAP was specifically designed for limited applications that use low-level protocols, but is fully compatible with UDP/Internet Protocol version 6 (IPv6). It is mainly focused on finding inaccessible resources. A Universal Resource Identifier (URI) is a method used to identify resources. Datagram Transport Layer Security (DTLS) is a protocol used for high-level security in CoAP. The Things Management Protocol (TMP) [41] uses a get/set function, like the SNMP function, to interface and communicate between things in the application and things. Web Service Definition Language (WSDL) is the language that supports TMP. Web API is TMP’s protocol. The network management characteristics and resource management protocols in the terrestrial Internet of Things (IoT) environment are presented in Table 1.

To access network traffic information, multi-router traffic graph (MRTG) is widely used in IoT based networks [42]. [43] In the reference, it is intended to perform NMS for wide area networks (WSNMS).