216,133 research outputs found

    Creating the N-Form Corporation as a Managerial Competence

    Get PDF
    This paper discusses key properties of the N-form corporation or internal network forms of organizing from three mutually related perspectives: structure, knowledge flows and management processes. To operationalize knowledge flows, a key property of N-forms, the paper suggests a new measure, the H/V ratio, to empirically assess the configuration of knowledge flows. The argument is illustrated by a case study of a firm showing that top management's perception about having an internal network contradicts with reality as vertical knowledge flows appear to dominate the horizontal ones. The managerial competence required for creating internal networks aimed at knowledge creation and sharing will be discussed.internal networks;knowledge flows;N-form Corporation;Organizational forms;managerial competence

    Gas flows through shallow T-junctions and parallel microchannel networks

    Get PDF
    We apply a recent extension of the Hele-Shaw scheme to analyze steady compressible viscous flows through micro T-junctions. The linearity of the problem in terms of an appropriately defined quadratic form of the pressure facilitates the definition of the viscous resistance of the configuration, relating the gas mass-flow rate to entrance and exit conditions. Furthermore, under rather mild restrictions, the performance of complex microchannel networks may be estimated through superposition of the contributions of multiple basic junction elements. This procedure is applied to an optimization model problem of a parallel microchannel network. The analysis and results are readily adaptable to incompressible flows

    Performance of active multicast congestion control

    Get PDF
    This paper aims to provide insight into the behavior of congestion control mechanisms for reliable multicast protocols. A multicast congestion control based on active networks has been proposed and simulated using ns-2 over a network topology obtained using the Tiers tool. The congestion control mechanism has been simulated under different network conditions and with different settings of its configuration parameters. The objective is to analyze its performance and the impact of the different configuration parameters on its behavior. The simulation results show that the performance of the protocol is good in terms of delay and bandwidth utilization. The compatibility of the protocol with TCP flows has not been demonstrated, but the simulations performed show that by altering the parameter settings, the proportion of total bandwidth taken up by the two types of flow, multicast and TCP, may be modified.Publicad

    A Survey of Network Optimization Techniques for Traffic Engineering

    Get PDF
    TCP/IP represents the reference standard for the implementation of interoperable communication networks. Nevertheless, the layering principle at the basis of interoperability severely limits the performance of data communication networks, thus requiring proper configuration and management in order to provide effective management of traffic flows. This paper presents a brief survey related to network optimization using Traffic Engineering algorithms, aiming at providing additional insight to the different alternatives available in the scientific literature

    A network-based view of regional growth

    Get PDF
    The need to better understand the mechanisms underlying regional growth patterns is widely recognised. This paper argues that regional growth is partly a function of the value created through inter-organisational flows of knowledge within and across regions. It is proposed that investment in calculative networks by organisations to access knowledge is a form of capital, termed network capital, which should be incorporated into regional growth models. The paper seeks to develop a framework to capture the value of network capital within these models based on the spatial configuration and the nature of the knowledge flowing through networks

    Know Your Enemy: Stealth Configuration-Information Gathering in SDN

    Full text link
    Software Defined Networking (SDN) is a network architecture that aims at providing high flexibility through the separation of the network logic from the forwarding functions. The industry has already widely adopted SDN and researchers thoroughly analyzed its vulnerabilities, proposing solutions to improve its security. However, we believe important security aspects of SDN are still left uninvestigated. In this paper, we raise the concern of the possibility for an attacker to obtain knowledge about an SDN network. In particular, we introduce a novel attack, named Know Your Enemy (KYE), by means of which an attacker can gather vital information about the configuration of the network. This information ranges from the configuration of security tools, such as attack detection thresholds for network scanning, to general network policies like QoS and network virtualization. Additionally, we show that an attacker can perform a KYE attack in a stealthy fashion, i.e., without the risk of being detected. We underline that the vulnerability exploited by the KYE attack is proper of SDN and is not present in legacy networks. To address the KYE attack, we also propose an active defense countermeasure based on network flows obfuscation, which considerably increases the complexity for a successful attack. Our solution offers provable security guarantees that can be tailored to the needs of the specific network under consideratio

    Security Automation using Traffic Flow Modeling

    Get PDF
    The growing trend towards network “softwarization” allows the creation and deployment of even complex network environments in a few minutes or seconds, rather than days or weeks as required by traditional methods. This revolutionary approach made it necessary to seek automatic processes to solve network security problems. One of the main issues in the automation of network security concerns the proper and efficient modeling of network traffic. In this paper, we describe two optimized Traffic Flows representation models, called Atomic Flows and Maximal Flows. In addition to the description, we have validated and evaluated the proposed models to solve two key network security problems - security verification and automatic configuration - showing the advantages and limitations of each solution
    corecore