You are on page 1of 4

Journal Analysis

Nayantara Aerupula

Dr. P.J. Moore

EAP 506 Years of publication April 2004

May 10th, 2017 Who is the publisher IEEE Explore Digital

Library

Stated purpose To Advance the state-of-

the-art and practical

applications of network

and service management


Number of issues per 1 or 2 Issues per year
The Journal IEEE Transactions
year
on Network And Service

Management [1] mainly focuses on


Impact factor Network Security and
the development that could be made
data management
in big data analytics
development
management. The journal discusses various techniques and trends such as machine learning and

statistical analysis that have been currently implemented and previous techniques that have been

used to improve the operations in management in the Information technology [1]. This special

journal TNSM focuses on emerging approaches and technical solutions that can make full use of

Big Data and analytics in management solutions [1]. The editorial chief of this journal is Rolf

Stadler Department of Network and Systems Engineering at KTH royal institute of technology

[1].
This Journal has two issues in the first volume. The first issue [1] Modeling and

Management of Firewall Policies was published in the year 2008 [1] by Ehab Al-Shaer he has

been an associate professor and the director of the Multimedia Networking Research Laboratory

(MNLAB) in the School of Computer Science, Hazem Hamed is a Ph.D. candidate in the

School of Computer Science, Telecommunications and Information Systems at DePaul

University [1]. This paper discuses designing firewall rules, managing firewall rules for

enterprise, since developing accurate rules for network protection had become prominent [1]

Hence this paper discuses techniques and algorithms that provides automatic discovery of

firewall policy anomalies to reveal rule conflicts and potential problems in legacy firewall.

This article is useful to understand the management of the network security which clearly

integrates the journal issue. These applications are useful for students and network security

background developers. This application is useful because it is a future scope because it redu

Their wide applicability [9] can also be seen from the pervasive use of flow records for a number

of different network analysis applications

In the volume 2, November 2005, Five articles were published on Delay Based

Congestion Detection and carrier controlled IP Networks, determining various , Objective and

subjective evaluation of QOAS video streaming over broadband networks, packet loss

prediction techniques. These all articles focus on process for bringing out qualitative outcomes.
The most recent article is [1] Network Flow Query LanguageDesign, Implementation,

Performance, and Applications published on 01 December 2016. This is most advanced article

which discusses about the development of Network Flow Query Language, this language is

used for the detection unreceived data from sender to receiver . This article helps to determine

performance evaluation that shows that nfql has comparable execution times to SiLK and flow-

tools (see Section V) with absolute filters. This means the functionality and the tools used in

proposed language NFQL is more reliable than the existing SiLK. This paper provides research

which is very useful to the data analytics field, because it introduces solutions for IPFIX flows

in nfql. This paper also revisited NFQL queries that identify application signatures for current

versions of applications. Furthermore, this paper presents a new application of NFQL to

identify SSH compromise detection attacks, which is why this application is very useful,

because intrusion attacks are very common in Data Analytics field.

Almost all the articles are structured in order where the introduction consists of operations,

the classifications and rules of the issue, further evaluations of the techniques for solving the

issues in data analytics, also it gives the procedures to solve the problem by introducing

algorithms for evaluations and implementations. Besides that these articles proposed future

scope for their research and all are peer reviewed. Every volume has around one or more issues,

and every issue has more than five to around twenty articles published by the assistance

professor, PhD degree holders, big data business managers, data scientists. This journal is a

scope for current research students as well as developers,

Overall the issues published are mostly related to error recovery, congestion recognition,

and predictions techniques. This Articles harness the vast operational data and advanced data

analysis algorithms to drive management decisions in networks, data centers, and clouds, this
is very useful in data analytics field. This study helped me understand the emerging technologies

and techniques to resolve various problems that arise in management and development of data.

The journal gives a brief understandings on various technical issues Management Models

Architectures and Frameworks, Service Provisioning, Reliability and Quality Assurance,

Management Functions, Enabling Technologies, Information and Communication Models,

Policies, standards etc [1]. This knowledge helps me understand in-depth issues and error that

could occur and innovative techniques to implement them in Data Analytics field.

Bibliography

[1] I. Xplore, "IEEE Transactions On Network And Service Management," IEEE Transactions

On Network And Service Management, Vols. 1 - 13, no. 1, 2, April 2004.

You might also like