216,133 research outputs found
Creating the N-Form Corporation as a Managerial Competence
This paper discusses key properties of the N-form corporation or internal network forms of organizing from three mutually related perspectives: structure, knowledge flows and management processes. To operationalize knowledge flows, a key property of N-forms, the paper suggests a new measure, the H/V ratio, to empirically assess the configuration of knowledge flows. The argument is illustrated by a case study of a firm showing that top management's perception about having an internal network contradicts with reality as vertical knowledge flows appear to dominate the horizontal ones. The managerial competence required for creating internal networks aimed at knowledge creation and sharing will be discussed.internal networks;knowledge flows;N-form Corporation;Organizational forms;managerial competence
Gas flows through shallow T-junctions and parallel microchannel networks
We apply a recent extension of the Hele-Shaw scheme to analyze steady compressible viscous flows
through micro T-junctions. The linearity of the problem in terms of an appropriately defined
quadratic form of the pressure facilitates the definition of the viscous resistance of the configuration,
relating the gas mass-flow rate to entrance and exit conditions. Furthermore, under rather mild
restrictions, the performance of complex microchannel networks may be estimated through
superposition of the contributions of multiple basic junction elements. This procedure is applied to
an optimization model problem of a parallel microchannel network. The analysis and results are
readily adaptable to incompressible flows
Performance of active multicast congestion control
This paper aims to provide insight into the behavior of congestion control mechanisms for reliable multicast protocols. A multicast congestion control based on active networks has been proposed and simulated using ns-2 over a network topology obtained using the Tiers tool. The congestion control mechanism has been simulated under different network conditions and with different settings of its configuration parameters. The objective is to analyze its performance and the impact of the different configuration parameters on its behavior. The simulation results show that the performance of the protocol is good in terms of delay and bandwidth utilization. The compatibility of the protocol with TCP flows has not been demonstrated, but the simulations performed show that by altering the parameter settings, the proportion of total bandwidth taken up by the two types of flow, multicast and TCP, may be modified.Publicad
A Survey of Network Optimization Techniques for Traffic Engineering
TCP/IP represents the reference standard for the implementation of interoperable communication networks. Nevertheless, the layering principle at the basis of interoperability severely limits the performance of data communication networks, thus requiring proper configuration and management in order to provide effective management of traffic flows. This paper presents a brief survey related to network optimization using Traffic Engineering algorithms, aiming at providing additional insight to the different alternatives available in the scientific literature
A network-based view of regional growth
The need to better understand the mechanisms underlying regional growth patterns is widely recognised. This paper argues that regional growth is partly a function of the value created through inter-organisational flows of knowledge within and across regions. It is proposed that investment in calculative networks by organisations to access knowledge is a form of capital, termed network capital, which should be incorporated into regional growth models. The paper seeks to develop a framework to capture the value of network capital within these models based on the spatial configuration and the nature of the knowledge flowing through networks
Know Your Enemy: Stealth Configuration-Information Gathering in SDN
Software Defined Networking (SDN) is a network architecture that aims at
providing high flexibility through the separation of the network logic from the
forwarding functions. The industry has already widely adopted SDN and
researchers thoroughly analyzed its vulnerabilities, proposing solutions to
improve its security. However, we believe important security aspects of SDN are
still left uninvestigated. In this paper, we raise the concern of the
possibility for an attacker to obtain knowledge about an SDN network. In
particular, we introduce a novel attack, named Know Your Enemy (KYE), by means
of which an attacker can gather vital information about the configuration of
the network. This information ranges from the configuration of security tools,
such as attack detection thresholds for network scanning, to general network
policies like QoS and network virtualization. Additionally, we show that an
attacker can perform a KYE attack in a stealthy fashion, i.e., without the risk
of being detected. We underline that the vulnerability exploited by the KYE
attack is proper of SDN and is not present in legacy networks. To address the
KYE attack, we also propose an active defense countermeasure based on network
flows obfuscation, which considerably increases the complexity for a successful
attack. Our solution offers provable security guarantees that can be tailored
to the needs of the specific network under consideratio
Security Automation using Traffic Flow Modeling
The growing trend towards network “softwarization” allows the creation and deployment of even complex network environments in a few minutes or seconds, rather than days or weeks as required by traditional methods. This revolutionary approach made it necessary to seek automatic processes to solve network security problems. One of the main issues in the automation of network security concerns the proper and efficient modeling of network traffic. In this paper, we describe two optimized Traffic Flows representation models, called Atomic Flows and Maximal Flows. In addition to the description, we have validated and evaluated the proposed models to solve two key network security problems - security verification and automatic configuration - showing the advantages and limitations of each solution
- …