PROPOSA

Download as pdf or txt
Download as pdf or txt
You are on page 1of 24

MAKERERE UNIVERSITY BUSINESS SCHOOL

FACULTY OF COMPUTING AND INFORMATICS

DEVELOPMENT OF A MUBS NETWORK MONITORING SYSTEM


By

Name Reg Number Tel no.


MIREMBE BUSHIRAH 22/U/21587/EVE 256700872211
MUSULE JAMES 21/U/08324/PS 256740786207
AWEKO DEBORAH 21/U/06133/PS 256706654226
OWOMUHANGI LOVENCE 21/U/09677/PS 256789146639
KIMBOWA JOSEPH 21/U/08838/PS 256706416321

Supervised by;

DR. Abdul Male Ssentumbwe

MS. Arinda Ronnie

DEPARTMENT OF APPLIED COMPUTING AND INFORMATICS

A Research Proposal Submitted to Makerere University Business School in


Partial Fulfilment for the Award of the Degree of Bachelors of Business
Computing.

1
DECLARATION

We declare that this proposal is our original work piece with the best of our
knowledge and it has never been submitted to any university for any award.

Name Reg Number Signature


MIREMBE BUSHIRAH 22/U/21587/EVE
MUSULE JAMES 21/U/08324/PS
AWEKO DEBORAH 21/U/06133/PS
OWOMUHANGI LOVENCE 21/U/09677/PS
KIMBOWA JOSEPH 21/U/08838/PS

Date…………………………………

APPROVAL

This proposal has been submitted with my approval as supervisor and ready to
be awarded.

Signature……………………………. Date……………….

Dr. Abdul Male Ssentumbwe

Signature……………………………. Date……………….

Ms. Arinda Ronnie

2
ABSTRACT

The proposed Network Monitoring System for Makerere University Business


School and its surrounding community is a comprehensive solution designed to
enhance the efficiency, security, and reliability of the campus network
infrastructure. This system employs advanced technologies, including Simple
Network Management Protocol (SNMP), to provide Realtime monitoring of
network traffic, bandwidth utilization, and device connectivity. By analysing key
performance indicators and implementing proactive alert mechanisms, the
system ensures optimal network performance while identifying and mitigating
potential issues.

The system's content scope encompasses a wide range of functionalities,


including device connectivity tracking, security event logging, user authentication
monitoring, and policy enforcement for compliance. It facilitates historical data
storage and reporting, enabling administrators to make informed decisions based
on usage patterns and trends. The user-friendly interface and customizable
dashboards empower network administrators to visualize and analyse network
data effectively.

Furthermore, the system prioritizes scalability and flexibility, accommodating the


evolving network landscape and technological advancements. Through ongoing
maintenance, support, and comprehensive documentation, the Network
Monitoring System aims to empower the university's IT personnel with the tools
and insights necessary for efficient network management. Overall, the proposed
system not only addresses the immediate needs of Makerere University Business
School but also contributes to the broader connectivity and collaboration within
the surrounding community.

3
Table of Contents
1 INTRODUCTION AND BACKGROUND ................................................................................... i
1.0 Introduction ................................................................................................................................. i
1.1 Background of the study .......................................................................................................... i
1.2 Problem Statement ................................................................................................................ ii
1.3 Research objectives ................................................................................................................ ii
1.3.1 main objectives ............................................................................................................... ii
1.3.2 Specific Objectives .......................................................................................................... iii
1.4 Research questions ................................................................................................................ iii
1.4.1 Main research question .................................................................................................. iii
1.4.2 Specific research question .............................................................................................. iii
1.5 Significance of the study ........................................................................................................ iii
1.6 Scope ...................................................................................................................................... iv
1.6.1 Content scope ................................................................................................................ iv
1.6.2 Geograhical scope ......................................................................................................... vii
1.6.3 Time scope .................................................................................................................... vii
1.7 Chapter Summary.................................................................................................................. vii
2 LITERATURE REVIEW ................................................................................................................... viii
2.1 Introduction ......................................................................................................................... viii
2.2 Information Systems ........................................................................................................... viii
2.3 Types of the information to collected .................................................................................. ix
3 Introduction ................................................................................................................................. xiii
3.1 Research Design .................................................................................................................. xiii
3.1.1 Exploratory Research Design ...................................................................................... xiii
3.1.2 Input Design ................................................................................................................. xiii
3.1.3 Process Design ............................................................................................................. xiv
3.2 Data Collection Methods .................................................................................................... xiv
3.2.1 Questionnaire Method ................................................................................................ xiv
3.2.2 Interview Method ....................................................................................................... xiv
3.2.3 Observation Method ................................................................................................... xiv
3.2.4 Document Review Method ......................................................................................... xiv
3.3 Systems Development Methodology .................................................................................. xv
3.3.1 Systems Study and Feasibility Study............................................................................ xv
3.3.2 Systems Analysis and Design Methods........................................................................ xv
3.3.3 Requirement Collection Methods ................................................................................ xv

4
3.3.4 System Modelling and Design Methods ..................................................................... xvi
3.3.5 Systems implementation methods .............................................................................xvii
4 REFERENCES ................................................................................................................................ xviii

5
CHAPTER ONE
1 INTRODUCTION AND BACKGROUND

1.0 Introduction
The chapter describes the background and the problem that the researchers
intend to address (Problem Statement). It further discusses the purpose of the
study (general objective) as well as the specific objectives. Also discussed in this
chapter are the research questions and finally looks at the scope of the study and
the significance of the study

1.1 Background of the study


Effective network monitoring and management is critical for optimizing
performance and ensuring high availability of campus networks. As university
networks grow larger and more complex with increasing users, devices and
bandwidth intensive applications, manual monitoring becomes inadequate. This
necessitates robust systems that can provide administrators enhanced visibility
and controls.

The proposed network monitoring system aims to address the existing gap at
Makerere University Business School, where the current network lacks automated
performance monitoring and tracking capabilities. Presently, bandwidth usage
levels, device connectivity and traffic flows are verified sporadically through basic
tools like ping, traceroute and SNMP without detailed log reporting or monitoring.
This makes it difficult to pinpoint and resolve any issues proactively.

To mitigate this problem, we propose developing a comprehensive monitoring


system by deploying monitoring agents across network switches, routers, servers
and other devices. This would enable tracking key parameters like bandwidth
utilization, latency, error rates, device uptime/downtime through customizable
dashboards and alerts. Administrators can gain insight into traffic flows, identify
peaks and valleys, troubleshoot problems and assess infrastructure capacity
planning needs.

The monitoring system will rely on protocols like SNMP, ICMP, NetFlow along with
monitoring technologies such as PRTG, Observium, MRTG or custom tools. The
system will be tailored as per the network architecture and needs of the business
school across wired and wireless networks. We aim to design it to require low
maintenance while providing richness of historical reports.

i
1.2 Problem Statement
Makerere University Business School currently lacks a robust network monitoring
and management system leading to suboptimal utilization and control of its
campuswide network infrastructure.

The existing network environment encompasses wired and wireless connectivity


for thousands of students and staff across various departments, hostels,
computer labs, and administrative blocks. However, bandwidth usage, device
connectivity status, traffic flows and overall performance tracking is complex and
tedious with existing methods.

Currently, basic tools like ping, traceroute and SNMP provide only snapshot
manual checks making it impossible to identify historical trends, peaks and
valleys. Moreover, the lack of customizable alerts and reporting implies delays in
detecting and responding to network faults. This leads to increased downtimes
hampering productivity and user experience.

Inadequate monitoring has further resulted in capacity planning and


procurement decisions being made without precise data driven insights into
current utilization levels and user traffic profiles. The overall impact of the
described gaps is increased congestion, unsatisfactory network experiences and
inability to optimize infrastructure spending.

Therefore, the need of the hour is the ability to continuously collect granular
network performance statistics, analyse traffic patterns, and log data for historical
recall through an easy-to-use yet information rich monitoring system. This
proposal outlines developing a robust, scalable and flexible monitoring solution
customized to address the specific shortcomings for the Makerere University
Business School network scenario.

1.3 Research objectives


This section includes the objectives of the study both main and specific.

1.3.1 main objectives


The core objective of the proposed research is to develop an automated network
monitoring system that can address the current gaps in visibility and management
of the campuswide network at Makerere University Business School. Plus,
continuous collection of network traffic data and performance metrics like
bandwidth utilization, latency, uptime/downtime across wired and wireless
networks. This would provide granular historical statistics.

ii
In summary, the monitoring system aims to provide an efficient, sustainable and
scalable platform for proactively optimizing the campus network connectivity,
availability, visibility and security thereby benefiting staff productivity, student
experience and university administration.

1.3.2 Specific Objectives


The specific objectives of the study are:

• To custom alerts and notifications when defined thresholds are breached;


which facilitates prompt identification and isolation of faults. Reduces
network downtimes.
• To show a scalable solution designed to keep pace with the university's
network expansion plans for next 5 years in terms of size, complexity and
performance needs. Ensures smooth upgradability.
• To be a user-friendly management and configuration to customize
monitoring parameters as per evolving needs. Reduces reliance on external
expertise for day today operations.

1.4 Research questions


The following were the research questions that guided the research.

1.4.1 Main research question


How can a MUBS network monitoring system be designed?

1.4.2 Specific research question


• what are the strengths and weaknesses of the current system?
• What requirements are needed to design the proposed system?
• How can the proposed system be implemented, tested and validated?

1.5 Significance of the study


This study is significant in a number of ways:

Improved Network Performance:

The monitoring system allows Realtime tracking of network traffic and bandwidth
usage. This enables administrators to identify and address bottlenecks and
congestion promptly, ensuring optimal network performance for both academic
and administrative activities.

iii
To enhance Reliability and Availability.Continuous monitoring helps identify issues
that may lead to network downtime. Proactive measures can be taken to prevent
disruptions, ensuring that the network remains reliable and available for
students, faculty, and staff.

To improve resource Optimization.By analysing network usage patterns,


administrators can optimize resource allocation. This includes balancing
bandwidth distribution and ensuring that critical applications receive the
necessary resources, contributing to a more efficient and responsive network.

To increase Security Enhancement.The monitoring system can detect unusual or


suspicious network activity, indicating potential security threats. This enables
quick responses to security incidents, protecting sensitive data and ensuring the
confidentiality and integrity of the university's digital assets.

Effective Bandwidth Management.The system allows administrators to identify


bandwidth intensive applications or devices. This information can be used to
implement policies that prioritize critical traffic, ensuring that essential services
have the required bandwidth while preventing nonessential activities from
overwhelming the network.

Cost Savings.Efficient network management can lead to cost savings by avoiding


unnecessary upgrades or investments in additional bandwidth. It allows
administrators to make informed decisions based on actual usage patterns and
requirements.

1.6 Scope
This scope provided the boundary for the research in terms of content,
geographical and time scope.

1.6.1 Content scope


The system will have functions for students, staff, and all the people around MUBS.

Additionally, the system's architecture will verify that it complies with all
applicable rules and guidelines for data security and privacy. The system will
include the following:

a) Login management
b) User management
c) Network Traffic Monitoring:
d) Bandwidth Usage Analysis:
e) Device Connectivity Tracking
f) Performance Metrics Monitoring:

iv
g) Alerts and Notifications
h) Security Event Logging

v
vi
1.6.2 Geograhical scope
The study will be carried out at the MUBs LABs, located in Nakawa, Kampala
district, Uganda.

1.6.3 Time scope


The study is to be carried for period of five months (November 2023 –late March
2024).

1.7 Chapter Summary


The chapter has discussed the background of the study, problem statement. It
has also looked at the significances of the study, the objectives of the study, the
subject scope, time scope, the significance

vii
CHAPTER TWO
2 LITERATURE REVIEW

2.1 Introduction

This chapter provides an overview of information systems, delineates various


types of information systems, explores their functions, and conducts a literature
review on Network Monitoring System. Additionally, the review extends to insights
from other authors, an examination of the existing system, and a discussion of
the proposed Network Monitoring System.

2.2 Information Systems

Information systems encompass a spectrum of information technology tools,


including computers, software, databases, communication systems, the internet,
and devices. These tools are strategically employed by organizations to collect,
transfer, organize, and store data. The dynamic business landscape has witnessed
the integration of advanced technologies into various processes, ushering in
automation, efficiency, and timeliness across diverse business activities.

As Harold (1984) asserts, information systems are composed of people,


processes, and tools orchestrated to gather, store, retrieve, and display
information. These systems play a pivotal role in meeting corporate information
needs, organizing information services, and providing user-friendly platforms. In
the context of the proposed Network Monitoring System, the literature review will
align the understanding of information systems with the specific goals of
monitoring network traffic, bandwidth usage, and device connectivity.

It is crucial to recognize that the integration of information systems into business


processes triggers a chain reaction, optimizing interrelated activities and
contributing to increased profits, reduced costs, and streamlined operations. With
a focus on the unique attributes of the Network Monitoring System, we will
explore how information systems can be tailored to address the challenges and
opportunities associated with overseeing a campus network.

viii
Moreover, the literature will delve into the adaptability of information systems in
problem-solving, emphasizing the importance of utilizing information effectively
within the context of network management. As we transition from the general
understanding of information systems to their application in the proposed
Network Monitoring System, the subsequent sections of this literature review will
examine existing studies on online hotel booking and management systems,
insights from other scholars, and a critical analysis of the current and proposed
network monitoring approaches.
monitoring tool will provide much needed visibility to optimize network
infrastructure, devices and traffic flows as per evolving needs at Makerere
University Business School. The system will help improve network planning and
management while enhancing connectivity and services for end-users.

2.3 Types of the information to collected


Network Traffic Monitoring:
Realtime monitoring of incoming and outgoing network traffic
Identification and analysis of traffic patterns, protocols, and data flows

Bandwidth Usage Analysis:


Measurement and analysis of bandwidth consumption across different network
segments
Identification of bandwidth intensive applications, devices, or users

Device Connectivity Tracking:


Monitoring the status and connectivity of devices on the network
Detection of new devices connecting to the network and tracking their activities

Performance Metrics Monitoring:


Collection and analysis of key performance indicators (KPIs) such as latency,
packet loss, and jitter
Trend analysis to identify performance issues and potential bottlenecks
Alerts and Notifications:
Implementation of alert mechanisms for abnormal network behaviour, security
threats, or performance degradation
Customizable alert thresholds and notification channels for administrators

Security Event Logging:


Logging and monitoring of security events, including intrusion attempts, malware
activity, and unauthorized access
Integration with security information and event management (SIEM) systems if
applicable

ix
Resource Utilization Analysis:
Tracking the utilization of network resources such as routers, switches, and
servers
Capacity planning based on resource usage trends

User and Device Authentication Monitoring:


Monitoring user logins and authentication events
Identification of unauthorized access or unusual login patterns

Policy Enforcement and Compliance:


Implementation of network usage policies and monitoring for policy violations
Generation of compliance reports for auditing purposes

Historical Data Storage and Reporting:


Storage of historical network performance and usage data
Generation of regular and ad hoc reports for performance analysis, capacity
planning, and trend identification

Integration with SNMP and Other Protocols:


Utilization of SNMP and other relevant protocols for gathering network data
Integration with existing network infrastructure and management tools

User Interface and Dashboards:


Development of a user-friendly interface for administrators to visualize network
data
Customizable dashboards for different user roles with relevant metrics and
information

Scalability and Flexibility:


Designing the system to scale with the growing network infrastructure
Flexibility to adapt to changes in technology, network architecture, and
organizational requirements

Training and Documentation:


Development of user guides and documentation for administrators
Training sessions for network administrators and relevant staff on system usage
and best practices

Ongoing Maintenance and Support:


Establishment of a maintenance schedule for updates, patches, and system
enhancements
Provision of ongoing support and troubleshooting services

x
Advantages of MUBS Monitoring system

The Network Monitoring System proposed for Makerere University Business


School and its surrounding community offers numerous advantages, enhancing
the overall efficiency, security, and performance of the campus network Here are
key advantages of implementing this system:

Realtime Visibility: Provides real-time visibility into network traffic, bandwidth


utilization, and device connectivity, enabling administrators to promptly identify
and address issues as they arise

Proactive Issue Identification: Proactively identifies potential network bottlenecks,


security threats, or performance issues, allowing administrators to take
preventive measures before they impact the user experience

Optimized Network Performance: Enables optimization of network performance


by identifying and resolving bandwidth intensive applications, ensuring that
critical services have the necessary resources

Enhanced Security: Improves overall network security by monitoring for unusual


or suspicious activities, unauthorized access, and potential security threats,
leading to a more robust and secure network infrastructure

Resource Allocation and Planning: Facilitates informed decision-making regarding


resource allocation and capacity planning based on historical data and usage
patterns, preventing unnecessary investments and optimizing resource utilization

Improved User Experience: Contributes to an improved user experience for


students, faculty, and staff by minimizing downtime, reducing latency, and
ensuring reliable access to network resources

Cost Savings: Helps in cost savings by avoiding unnecessary infrastructure


upgrades and optimizing resource usage, resulting in a more cost-effective and
efficient network operation

Compliance Management: Assists in enforcing network usage policies and


meeting regulatory compliance requirements through detailed reporting and
monitoring capabilities

xi
Educational Opportunities: Provides educational opportunities for students
studying network management or related fields, offering a practical and hands-
on learning experience in a real-world network environment

Community Connectivity: Extends the benefits of a well monitored network to the


surrounding community, fostering collaboration, connectivity, and contributing to
the overall development of the community

Efficient Troubleshooting: Streamlines the troubleshooting process by providing


detailed insights into network issues, reducing the time taken to identify and
resolve problems

Scalability and Adaptability: Adapts to the evolving network landscape, ensuring


scalability and flexibility to accommodate changes in technology, network
architecture, and organizational requirements

Customizable Alerts and Notifications: Offers customizable alert mechanisms,


allowing administrators to set thresholds for specific events and receive
notifications, ensuring a proactive response to potential issues

Data driven Decision-making: Empowers administrators with data driven


decision-making capabilities, allowing them to make informed choices based on
comprehensive network performance and usage data

Long-term Performance Monitoring: Facilitates long-term performance


monitoring and analysis, supporting strategic planning and continuous
improvement of the network infrastructure

xii
CHAPTER THREE
METHODOLOGY
3 Introduction

This chapter outlines the methodology employed in the development of the


Network Monitoring System for Makerere University Business School and its
surrounding community. The methodology encompasses the research design,
database structure and development, input and process design, and the chosen
systems development methodology.

3.1 Research Design

The research design adopted for this project is exploratory, descriptive, and
quantitative in nature. Following the principles outlined by Creswell & Plano Clark
(2007), this design involves collecting, analysing, interpreting, and reporting data
to address the research questions. The system development lifecycle (SDLC) is
utilized in the design and implementation of the system on a Windows platform.

3.1.1 Exploratory Research Design

An exploratory research design is employed to gain a deeper understanding of


the specific requirements and challenges related to monitoring network traffic,
bandwidth usage, and device connectivity. Interviews with key stakeholders,
including network administrators, provide valuable insights into the current state
of the campus network.

3.1.2 Input Design

The input design focuses on streamlining data entry, error detection, and
ensuring a user-friendly interface for efficient interaction with the monitoring
system. The system captures data related to network assets, bandwidth usage,
and device connectivity. Verification/validation checks are implemented to
enhance data accuracy, and error detection mechanisms raise flags for prompt
correction.

xiii
3.1.3 Process Design

Process design is essential for understanding the workflow and interactions within
the system. Data Flow Diagrams (DFD) are employed to represent the logical flow
of information within the network monitoring system. Circles denote processes,
while squares represent sources and destinations of data. Arrows indicate data
flow, providing a visual representation of the system's functionality.

3.2 Data Collection Methods

To gather relevant information for system development, various data collection


methods are employed.

3.2.1 Questionnaire Method

Questionnaires are utilized to gather responses from network users, specifically


focusing on their experiences and preferences related to network usage,
connectivity, and performance.

3.2.2 Interview Method

Key stakeholders, including network administrators, are interviewed to gain


firsthand insights into the current network infrastructure, challenges faced, and
expectations from the proposed Network Monitoring System.

3.2.3 Observation Method

Observation is employed to understand the overall network processes, including


device connectivity, network traffic, and bandwidth usage. Direct observation of
network operations aids in identifying potential areas for improvement.

3.2.4 Document Review Method

Existing documents, such as network records and logs, are reviewed to extract
historical data and gain a comprehensive understanding of past network
performance and issues.

xiv
3.3 Systems Development Methodology

The chosen systems development methodology is the waterfall model. This


sequential design process guides the development of the Network Monitoring
System through phases of conception, initiation, analysis, design, construction,
testing, production/implementation, and maintenance. The emphasis on
completing and documenting each phase before progressing ensures a
systematic and well-documented approach.

3.3.1 Systems Study and Feasibility Study

The systems study involves a detailed analysis of the current network


infrastructure, identifying strengths and weaknesses. The feasibility study
assesses the technical, operational, and economic feasibility of implementing the
Network Monitoring System.

3.3.2 Systems Analysis and Design Methods

Analysis of the Problem/Need

System analysis is conducted to collect realistic data, understand business


requirements, and create a logical model of the proposed system. The analysis
phase addresses questions related to what, how, who, when, and why.

3.3.2.1 System Design

The design phase builds upon the analysis, translating system requirements into
an architectural plan. The entity-relationship diagram is utilized to design the
database, establishing entities, attributes, and relationships.

3.3.3 Requirement Collection Methods

Various methods, including interviews, observation, and document review, are


employed to collect requirements for the Network Monitoring System. These
methods ensure a comprehensive understanding of user needs and system
functionalities.

xv
3.3.4 System Modelling and Design Methods

3.3.4.1 System Design Using Entity Relationship Diagram

The entity-relationship diagram is utilized to model the relationships between


tables in the database. Cardinality and modality are considered to define the
number of occurrences and the necessity of relationships.

3.3.4.2 Systems Contextual Diagram

System contextual diagrams provide a visual representation of the interactions


between the Network Monitoring System and external factors. This aids in
understanding the broader context in which the system will operate.

In conclusion, the chosen methodology ensures a systematic, comprehensive, and


well-documented approach to the development of the Network Monitoring

xvi
System, addressing the specific needs of Makerere University Business School and
its surrounding community's network infrastructure.

3.3.5 Systems implementation methods


System implementation phase transforms the theoretical design into a functional
system and offers consumers confidence that the new system will function
successfully and efficiently. It entails thorough planning, examination of the
current system and its implementation limitations, design of transitional methods,
and assessment of the transitional methods. The user education and training
process is one of the main preparation steps for implementation, in addition to
planning. Making a plan to implement the system is the first step in the
implementation process. In accordance with this plan, the tasks must be
completed, equipment and resource conversations must be held, and new system
implementation requires the purchase of additional equipment.

There is no need for additional resources in a network backup solution. The last
and most crucial stage is implementation. Giving users the assurance that the new
system will operate as intended is the step that is most important for success.

xvii
4 REFERENCES

Kurose, J. F., & Ross, K. W. (2017). Computer networking: A top-down approach


(7th ed.). Pearson.

Tanenbaum, A. S., & Wetherall, D. J. (2011). Computer networks (5th ed.). Pearson.

Forouzan, B. A. (2012). Data communications and networking (5th ed.). McGraw-


Hill.

Stevens, W. R., Fenner, B., & Rudoff, A. M. (2004). UNIX network programming (3rd
ed.). Addison-Wesley.

Donahoo, M. J., & Calvert, K. L. (2009). TCP/IP sockets in C: Practical guide for
programmers (2nd ed.). Morgan Kaufmann.

Beej, B. H. (2012). Beej's guide to network programming: Using Internet sockets.


Self-published.

Stevens, W. R., & Wright, G. R. (2020). TCP/IP illustrated, volume 1: The protocols
(2nd ed.). Addison-Wesley.

Comer, D. E. (2016). Computer networks and internets (6th ed.). Pearson.

Peterson, L. L., & Davie, B. S. (2011). Computer networks: A systems approach (5th
ed.). Morgan Kaufmann.

Subramanian, M. (2020). Network management: Principles and practice (2nd ed.).


Pearson.

Stallings, W. (2017). Network security essentials: Applications and standards (7th


ed.). Pearson.

Ligus, S. (2017). Effective monitoring and alerting: For web operations. O'Reilly
Media.

Turnbull, J., Mesnil, J., & Caune, P. (2021). The art of monitoring. Pragmatic
Bookshelf.

xviii
Oden, P. W. (2019). Pro SNMP and SNMPv3: How to install, configure, and manage
SNMP to solve real-world problems (2nd ed.). Apress.

Murphy, N. R., Beyer, B., Jones, C., Petoff, J., & Niemoller, C. (2020). Site reliability
engineering: How Google runs production systems. O'Reilly Media.

Kim, G., Behr, K., & Spafford, G. (2013). The phoenix project: A novel about IT,
DevOps, and helping your business win. IT Revolution Press.

Humble, J., & Farley, D. (2010). Continuous delivery: Reliable software releases
through build, test, and deployment automation. Addison-Wesley.

Hu, Y. C., & Pattipati, K. R. (2022). Autonomic network management principles:


From concepts to applications. Academic Press.

Wang, C., Wei, G., Chen, M., & Wan, J. (2020). Deep reinforcement learning for
network management and security. Springer.

Luo, S., Yu, F. R., Ji, H., & Leung, V. C. M. (2020). Cognitive mobile virtual network
operator games. Springer.

Sun, Y., Peng, M., Zhou, X., Huang, J., & Mao, S. (2020). Management and security
technologies for cloud computing, IoT and big data. Springer.

Tang, S., Zheng, J., Zhang, X., Sandrasegaran, K., Kong, X., Wu, C., ... & Lin, C. (2021).
Wireless AI: Algorithms for intelligent wireless networks. Springer.

Detti, A., Boutaba, R., Alfouzan, F., Shahriar, N., Yamada, S., & Moreira, W. (2022).
Network management in beyond 5G mobile networks. Springer.

Xu, A., & Daras, P. (Eds.). (2022). Intelligent systems and applications. Springer.

Casalicchio, E., & Galli, E. (Eds.). (2021). AUTOMATIC: Autonomous infrastructures.


Springer.

Dobre, C., & Xhafa, F. (Eds.). (2021). Intelligent data-centric systems. Academic
Press.

xix

You might also like