{"title":"Traffic Engineering Optimization in Hybrid Software-Defined Networks: A Mixed Integer Non-Linear Programming Model and Heuristic Algorithm","authors":"Samiullah Mehraban, Rajesh K. Yadav","doi":"10.1002/nem.70017","DOIUrl":"https://doi.org/10.1002/nem.70017","url":null,"abstract":"<div>\u0000 \u0000 <p>In contemporary networking infrastructure, the integration of software-defined networking (SDN) concepts with traditional networking methodologies has given rise to hybrid software-defined networking (HSDN); as the current network infrastructure evolves, it combines the programmability of SDN with the established protocols of traditional network infrastructure. This paradigm shift introduces novel opportunities and challenges in traffic engineering (TE), necessitating innovative solutions to enhance network performance, resource utilization, and efficiency. In this study, we examined the challenges associated with TE in a hybrid SDN environment, where traditional network devices coexist alongside SDN nodes; we investigated the routing optimization of traffic engineering in a migrated hybrid network and formulated the problem as a mixed integer non-linear programming model. We proposed a heuristic algorithm (H-STE) that optimizes both the OSPF weight setting and the splitting ratio of SDN nodes in the hybrid environment. Extensive evaluations were conducted using real network topologies to validate our method. The results demonstrate that a 30% deployment ratio of SDN nodes significantly improves traffic engineering performance. Specifically, the Maximum Link Utilization (MLU) stabilizes at this ratio, indicating near-optimal network efficiency. This research provides valuable insights for researchers, practitioners, and network architects navigating SDN, hybrid SDN, and traffic engineering optimization.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 3","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143883799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Giancarlo O. dos Santos, Cristina K. Dominicini, Gilmar L. Vassoler, Rafael S. Guimarães, Isis Oliveira, Domingos Jose P. Paraiso, Rodolfo S. Villaça
{"title":"MTS-PolKA: Weighted Multipath Traffic Splitting With Source Routing for Elephant and Mice Flows","authors":"Giancarlo O. dos Santos, Cristina K. Dominicini, Gilmar L. Vassoler, Rafael S. Guimarães, Isis Oliveira, Domingos Jose P. Paraiso, Rodolfo S. Villaça","doi":"10.1002/nem.70016","DOIUrl":"https://doi.org/10.1002/nem.70016","url":null,"abstract":"<p>Modern datacenter networks rely on multi-root tree topologies, to ensure efficient and reliable connectivity. However, traditional traffic engineering solutions like equal cost multiple path (ECMP) and weighted-cost multipath (WCMP) often fall short in addressing dynamic and heterogeneous traffic conditions. Specifically, these approaches struggle with asymmetric topologies and the allocation of elephant flows, which require more granular and agile traffic management. This paper introduces MTS-PolKA (<i>Multipath Traffic Split Polynomial Key-based Architecture</i>), a novel traffic splitting mechanism designed to enhance traffic engineering in datacenter networks. MTS-PolKA enables packet-level traffic distribution across multiple paths by embedding a source routing label in the packet header that dictates the per-flow traffic division profile. Unlike existing methods that require reconfiguring network tables at each switch, MTS-PolKA enables dynamic adjustments across all switches in the path through simple packet header modifications, significantly enhancing the agility and efficiency of traffic management. The implementation of MTS-PolKA on programmable switches using the P4 language, along with the residue number system (RNS) and M-PolKA architecture, showcases its potential through experiments conducted in the Mininet emulator. The results highlight the ability of MTS-PolKA to maintain flow stability, explore network multipaths, and enable rapid reconfigurations of traffic division profiles, enhancing the performance and efficiency of modern datacenter networks.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 3","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.70016","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143840790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Development of a Trust Mechanism to Enhance Security Protection in SDN-Based IoT Network","authors":"Pang-Wei Tsai, Chao-Wei Lee, Ting-Wen Wang","doi":"10.1002/nem.70015","DOIUrl":"https://doi.org/10.1002/nem.70015","url":null,"abstract":"<div>\u0000 \u0000 <p>A reliable and trustworthy network is essential for ensuring efficient data transmission, particularly because the widespread adoption of the Internet of Things (IoT) requires management of a large and diverse set of smart devices. In addition, privacy and security concerns in IoT systems, such as access authentication, authorization, and accounting, have become increasingly important. Software-defined networking (SDN) offers a flexible and adaptive approach to network management and is a promising solution for addressing these challenges. Hence, this paper proposes a security mechanism that leverages the operational behaviors and characteristics of IoT devices to analyze their traffic flows using an SDN controller, thereby enhancing the overall security of IoT networks. The proposed architecture integrates a two-factor authentication process to prevent unauthorized access while utilizing SDN-based traffic monitoring to enforce fine-grained access control. Experimental results show that the implemented solution assists the SDN controller in detecting abnormal behaviors and triggering mitigation measures, thereby minimizing disruptions to normal traffic flows in testing scenarios.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 3","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143809511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Arthur Vinícius Cunha Camargo, Lisandro Granville, Leandro M. Bertholdo
{"title":"Beyond Size: Investigating the Impact of Scaled-Down Network Telescopes on Threat Detection","authors":"Arthur Vinícius Cunha Camargo, Lisandro Granville, Leandro M. Bertholdo","doi":"10.1002/nem.70014","DOIUrl":"https://doi.org/10.1002/nem.70014","url":null,"abstract":"<div>\u0000 \u0000 <p>Cyber threat intelligence relies on network telescopes to detect attacks and emerging threats, traditionally utilizing a substantial portion of the IPv4 address space. However, the escalating scarcity and value of this resource force companies and research centers to grapple with the challenge of repurposing their address spaces, potentially impacting cybersecurity effectiveness and hindering research efforts. In this article, we first investigate the historical usage of IPv4 address space in network telescopes and the current reduction trend in several initiatives. Then, we examine the impact of reducing the allocated space on the ability of these systems to identify attackers and attack campaigns. We explore two network telescopes with the intention of assessing the impact of this reduction by quantifying the losses in several ways. Our findings reveal that even halving the allocated space for a network telescope may still permit the detection of 80% of unique cyberattack sources and the address allocation schema has little to no influence on this detection. We also found that most of the proportions and patterns remain present, albeit with reduced intensity.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 3","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143688932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fabiano Bhering, Debora Oliveira, Célio Albuquerque, Diego Passos, Katia Obraczka
{"title":"An Adaptive Routing Architecture for IoT Multipath Video Transmission","authors":"Fabiano Bhering, Debora Oliveira, Célio Albuquerque, Diego Passos, Katia Obraczka","doi":"10.1002/nem.70013","DOIUrl":"https://doi.org/10.1002/nem.70013","url":null,"abstract":"<p>Video applications in wireless multihop Internet of Things (IoT) scenarios can benefit from multipath routing strategies to meet their often stringent quality of service (QoS) requirements. However, the dynamics of the underlying network and video service requirements call for a multipath routing fabric that can dynamically adapt to changing conditions. In this paper, we present a wireless multipath routing architecture that is able to adapt to varying network topology conditions and video traffic characteristics by finding new paths dynamically, resulting in enhanced end user's quality of experience. Additionally, we provide an overview of the IoT wireless video application landscape and a taxonomy of the state-of-the-art in route selection mechanisms for multipath routing.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.70013","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Brand Design Data Security and Privacy Protection Under 6G Network Slicing Architecture","authors":"Peng Li, Jianing Du","doi":"10.1002/nem.70009","DOIUrl":"https://doi.org/10.1002/nem.70009","url":null,"abstract":"<div>\u0000 \u0000 <p>The rapid growth of networking technology has generated several situations and issues in the field of safeguarding critical brand design data in the present hyper connected context, particularly with the arrival of the 6<sup>th</sup> Generation (6G). As brand development relies more on cloud-based services, protecting client data and intellectual property (IP) is essential. By using 6G network slicing architecture, which contains dedicated, secure network sections for brand design services, improved encryption, and anomaly detection systems, the research suggested a solution to such issues. The data includes features such as network performance, security measurements, and user data privacy measures. The methodology entails pre-processing brand design data with Z-score normalization to standardize feature distributions, followed by Principal Component Analysis (PCA) for a decrease of dimensions. The proposed method uses a Fully Homomorphic Encryption Driven Quantum Support Vector Machine (FHE-QSVM) to detect anomalies in real time while assuring safe and efficient resource allocation in dedicated slices. FHE-QSVM anomaly detection model produced significant metrics, with accuracy (98%), recall (96%), precision (97%), and F1-score (96%) data by accurately categorizing threats while maintaining data confidentiality. The finding shows the FHE-QSVM enhances both the security and privacy of brand design data by accurately categorizing threats while maintaining data confidentiality. Overall, this strategy offers a scalable solution for secure AI-powered brand design services, highlighting the importance of creative encryption, real-time monitoring, and 6G network slicing to meet contemporary data security standards.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143513823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of Intelligent Digital Media Interaction System Based on 6G Network Slicing","authors":"Na Liu","doi":"10.1002/nem.70011","DOIUrl":"https://doi.org/10.1002/nem.70011","url":null,"abstract":"<div>\u0000 \u0000 <p>Rapid growth in intelligent digital media interaction systems (IDMIS) has created new difficulties in controlling and optimizing content distribution and engagement, especially with the impending 6G networks. The purpose of the investigate is to create an intelligent system that uses 6G network slicing to increase digital media communication and user experience through seamless connectivity, dynamic content distribution, and real-time engagement. The structure includes a dynamic, multilayered architecture for IDMIS, and network capital is allocated through 6G network slicing based on user demand and content type. The system includes machine learning (ML) algorithms that predict user behavior and optimize media delivery in real time. To correctly predict user behavior, the research gathers data that capture users' performance and preference (historical interaction data, demographics, contextual data, and user feedback). Once collected, data are processed to reduce dimensionality using principal component analysis (PCA). Refined Support Vector Machine Integrated with Flying Fox Optimization (RSVM-FFO) predicts user behavior and optimizes media delivery in real time. Metrics are used to evaluate the RSVM-FFO approach, such as F1-score (98.12%), accuracy (98.59%), precision (98.57%), and recall (98.17%). The results reveal that the suggested systems considerably improve media interaction effectiveness by reducing latency and bandwidth usage while providing a highly responsive user experience. Finally, advancement in the delivery of high-performance, customized media services is the combination of an IDMIS with 6G network slicing.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143513824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computationally Efficient Approach for 6G-AI-IoT Network Slicing and Error-Free Transmission","authors":"Yunxiang Qi","doi":"10.1002/nem.70007","DOIUrl":"https://doi.org/10.1002/nem.70007","url":null,"abstract":"<div>\u0000 \u0000 <p>Many smart gadgets are connecting to the Internet, and Internet-of-Things (IoT) technologies are enabling a variety of applications. Artificial intelligence (AI) of Things (AIoT) devices are anticipated to possess human-like decision-making, reasoning, perception, and other capacities with the combination of AI and IoT. AIoT gadgets are expected to be extensively utilized across several domains, as anticipated by 6G networks. With AI's steady advancements in speech recognition, computer vision, and natural language processing—not to mention its ability to analyze large amounts of data—semantic communication is now feasible. A new paradigm in wireless communication is opened by semantic communication, which seeks to explore the meaning behind the bits and only transmits the information that may be used, as opposed to attaining error-free transmission. The combination of IoT with AI provides prominent features to overcome various important issues in cloud computing networks. However, there is bottleneck of delay and precision. Therefore, this paper proposed a new method to overcome this problem. First, the network slicing feature maps were extracted by convolutional neural networks. Next, the processing delay is reduced by semantic compression. Simulation results show that the proposed approach makes 99.2% reduction in communication complexity and an 80% reduction in transmission delay as compared with traditional methods. Taking the Resnet18 network as an example, the running time of the semantic communication method is only 0.8% of the traditional method.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143475443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Option Contracts in the DeFi Ecosystem: Opportunities, Solutions, and Technical Challenges","authors":"Srisht Fateh Singh, Vladyslav Nekriach, Panagiotis Michalopoulos, Andreas Veneris, Jeffrey Klinck","doi":"10.1002/nem.70005","DOIUrl":"https://doi.org/10.1002/nem.70005","url":null,"abstract":"<p>This paper investigates the current landscape of option trading platforms for cryptocurrencies, encompassing both centralized and decentralized exchanges. Option contracts in cryptocurrency markets offer functionalities akin to traditional markets, providing investors with tools to mitigate risks, particularly those arising from price volatility, while also allowing them to capitalize on future volatility trends. The paper discusses these applications of option contracts in the context of decentralized finance (DeFi), emphasizing their utility in managing market uncertainties. Despite a recent surge in the trading volume of options contracts on cryptocurrencies, decentralized platforms account for less than 1<i>%</i> of this total volume. Hence, this paper takes a closer look by examining the design choices of these platforms to understand the challenges hindering their growth and adoption. It identifies technical, financial, and adoption-related challenges that decentralized exchanges face and provides commentary on existing platform responses. Subsequently, the paper analyzes the impact of absent options markets on the inefficiencies of automated market maker liquidity. It examines historical on-chain data for 14 ERC20 token pairs on Ethereum. The analysis shows 1143 instances in which deeper liquidity levels, as high as <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mo>×</mo>\u0000 <mn>6</mn>\u0000 </mrow>\u0000 <annotation>$$ times 6 $$</annotation>\u0000 </semantics></math> more, could have been achieved by establishing an options market.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.70005","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143424218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jaime Galán-Jiménez, Mohamed Faten Zhani, José Gómez-delaHiz, John Kaippallimalil
{"title":"Transport Assistants to Enhance TCP Connections: Investigating the Placement Problem","authors":"Jaime Galán-Jiménez, Mohamed Faten Zhani, José Gómez-delaHiz, John Kaippallimalil","doi":"10.1002/nem.70006","DOIUrl":"https://doi.org/10.1002/nem.70006","url":null,"abstract":"<p>As of today, transport control protocol (TCP) remains the de-facto transport protocol in the Internet. However, TCP may incur high delays, especially when retransmitting lost packets as they have to be retransmitted only by the source and after a timeout that is roughly equal to a round trip time. To reduce such delay, recent work proposed to deploy a special network function, called transport assistant (TA), that is able to detect and retransmit lost TCP packets from inside the network rather than the source and thereby reduces retransmission delays. Unfortunately, there is no study on the impact of the placement of the TA on its performance benefits in terms of packet delivery delay. In this paper, we focus on the TA placement problem. We discuss the trade-offs and parameters to be considered to select the best placement for the TA. We first mathematically model the TCP packet delivery delay, that is, the time needed to deliver TCP packets, when the TA is deployed. We also formulate, as an integer linear program (ILP), the problem of placing multiple TAs in order to reduce TCP packet delivery delays while minimizing their deployment costs. We consider use-cases, one where a TA could handle a single flow and another where a TA could handle multiple flows. We then propose two heuristics to solve the problem with minimal execution time. Through experiments, we demonstrated that the deployment of TAs could reduce TCP packet delivery delays by up to 30% and could be leveraged to guide routing and load balancing. Moreover, we show that using the proposed heuristics for placing TAs could lead to performance that is close to the optimal solutions obtained with the ILP but with lower execution time.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.70006","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143424217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}