Abstract
Network administration and management tasks play an integral role in Information Technology (IT) operations; which are utilized across a diverse set of organizations. The reliability of networks is therefore of crucial importance for ensuring effective business processes. All IT networks are administered and managed by human administrators. As the process of administration becomes increasingly complex, human limitations can amplify challenges to network reliability and security. Despite researchers’ agreement that the human factor becomes increasingly significant as the network becomes more reliable, efforts to design reliability measures have remained largely separate from considerations of the human component. We examined the question of whether joint consideration of these two components would be useful in designing reliability of enterprise networks. We interviewed and surveyed networking professionals to understand their impact on network reliability. The result is a discussion of specific demographic, organizational, and technical factors that contribute to network reliability issues. For demographic factors, academic background was a notable factor associated with network instability. For organizational factors, a notable factor was the number of devices assigned per administrator. Finally, for technical factors, a notable factor was misconfiguration of networking devices, which contributed significantly to the unreliability of the studied networks. Based on this research, we concluded that the future of network reliability engineering will benefit substantially from actively addressing the human role in network administration and management.








Similar content being viewed by others
Notes
This is equivalent to community college associate degree in USA.
References
Leiner, B.M., Cerf, V.G., Clark, D.D., Kahn, R.E., Kleinrock, L., Lynch, D.C., Postel, J., Roberts, L.G., Wolff, S.: A brief history of the internet. SIGCOMM Comput. Commun. Rev. (2009). https://doi.org/10.1145/1629607.1629613
Loomis, D.G., Taylor, L.D.: Forecasting the Internet: Understanding the Explosive Growth of Data Communications (Topics in Regulatory Economics and Policy). Springer, New York (2002)
Javvin Technologies Inc. Network Protocols Handbook. http://bkarak.wizhut.com/www/lectures/networks-07/NetworkProtocolsHandbook.pdf (2004). Accessed 05 Jan 2016
U.S DOL–Bureau of Labor Statistics: Occupational Outlook Handbook: Network and Computer Systems Administrators. http://www.bls.gov/ooh/computer-and-information-technology/network-and-computer-systems-administrators.htm (2014). Accessed 17 July 2017
Sezer, S., Scott-Hayward, S., Chouhan, P.K., Fraser, B., Lake, D., Finnegan, J., Viljoen, N., Miller, M., Rao, N.: Are we ready for SDN? implementation challenges for software-defined networks. Commun. Mag. IEEE (2013). https://doi.org/10.1109/MCOM.2013.6553676
Feamster, N., Balakrishnan, H.: Detecting BGP configuration faults with static analysis. Symp. Netw. Syst. Des. Implement. 2, 43–56 (2005)
Le, F., Lee, S., Wong, T., Kim, H., Newcomb, D.: Detecting network-wide and router-specific misconfigurations through data mining. IEEE/ACM Trans. Netw. (2009). https://doi.org/10.1109/TNET.2008.925631
Reason, J.: Managing the Risks of Organizational Accidents. Ashgate, Farnham (1997)
Mushi, M., Murphy-Hill, E., Dutta, R.: The human factor: a challenge for network reliability design. In: 11th international conference on the design of reliable communication networks. https://doi.org/10.1109/DRCN.2015.7149000 (2015)
Gallagher, S.: How an Indonesian ISP took down the mighty Google for 30 minutes. http://arstechnica.com/information-technology/2012/11/how-an-indonesian-isp-took-down-the-mighty-google-for-30-minutes/ (2012). Accessed 20 Apr 2014
Lee, M.: LinkedIn just one of thousands of sites hit by DNS issue: Cisco. http://www.zdnet.com/article/linkedin-just-one-of-thousands-of-sites-hit-by-dns-issue-cisco/ (2013). Accessed 20 Apr 2014
CBCNews: Rogers cellphone outage highlights 911 vulnerability. http://www.cbc.ca/news/canada/rogers-cellphone-outage-highlights-911-vulnerability-1.1959393 (2013). Accessed 20 Apr 2014
Brown, A., Patterson, D.A.: Embracing failure: a case for recovery-oriented computing (ROC). High Perform. Trans. Process. Symp. (2001). http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.25.137
Gray, J.: Why do computers stop and what can be done about it? Tandem Comput. (1985). http://citeseer.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.6561
Kantowitz, B.H., Sorkin, R.D.: Human Factors: Understanding People-System Relationships. Wiley, New Jersey (1983)
Rasmussen, J., Rouse, W.B.: Human Detection and Diagnosis of System Failures. Springer, New York (2012)
Alin, B.J., Popescu, C., Underwood, T.: Anatomy of a leak: AS9121. NANOG34 Meeting. http://research.dyn.com/content/uploads/2013/05/renesys-nanog34.pdf (2005). Accessed 12 Jan 2014
Misel S.A.: Wow, AS7007! NANOG mail archives. http://www.merit.edu/mail.archives/nanog/1997-04/msg00340.html (1997). Accessed 12 Jan 2014
Farrar, J.A.: C&W routing instability. NANOG mail archives. http://www.merit.edu/mail.archives/nanog/2001-04/msg00209.html (2001). Accessed 12 Jan 2014
Wool, A.: A quantitative study of firewall configuration errors. IEEE Comput. Soc. (2004). https://doi.org/10.1109/MC.2004.2
Mahajan, R., Wetherall, D., Anderson, T.: Understanding BGP misconfiguration. ACM SIGCOMM (2002). https://doi.org/10.1145/964725.633027
Turner, D., Levchencko, K., Mogul, J., Savage, S., Snoeren, A.: On failure in managed enterprise networks, HP Labs Technical Report (2012)
Bailis, P., Kingsbury, K.: An informal survey of real-world communications failures. ACM Queue 12(7), 20–32 (2014). https://doi.org/10.1145/2639988.2639988
Zeng, H., Kazemian, P., Varghese, G., McKeown, N.: A survey on network troubleshooting. Stanford HPNG Technical Report TR12-HPNG-061012. Stanford University (2012)
Macwan, A.: Approach for identification and analysis of human vulnerabilities in protecting telecommunications infrastructure. Bell Labs Tech. J. 9(2), 85–89 (2004). https://doi.org/10.1002/bltj.20027
Buchmann, D.: Verified network configuration: improving network reliability. http://ethesis.unifr.ch/theses/BuchmannD.pdf?file=BuchmannD.pdf (2008). Accessed 06 June 2015
Colwill, C., Chen, A.: Human factors in improving operations reliability. In: Annual IEEE CQR international workshop (2009)
Yuan, L., Mai, J., Su, Z.: FIREMAN: a toolkit for FIREwall modeling and analysis. IEEE Symp. Secur. Priv. (2006). https://doi.org/10.1109/SP.2006.16
Feldmann, A., Rexford, J.: IP network configuration for intradomain traffic engineering. IEEE Netw. Mag. 15(5), 46–57 (2001). https://doi.org/10.1109/65.953233
Caldwell, D., Gilbert, A., Gottlieb, J., Greenberg, A., Hjalmtysson, G., Rexford, J.: The cutting EDGE of IP router configuration. The SIGCOMM Comput. Commun. Rev. (2004). https://doi.org/10.1145/972374.972379
Kraemer, S., Carayon, P.: Human errors and violations in computer and information security: the viewpoint of network administrators and security specialists. J. Appl. Ergon. (2007). https://doi.org/10.1016/j.apergo.2006.03.010
Kraemer, S., Carayon, P., Clem, J.: Human and organizational factors in computer and information security: pathways to vulnerabilities. J. Comput. Secur. (2009). https://doi.org/10.1016/j.cose.2009.04.006
Baskerville, R., Pries-Heje, J.: Grounded action research: a method for understanding IT in practice. J. Account. Manag. Inf. Technol. 9, 1–23 (2005)
Denzin, N.K., Lincoln, Y.S.: Handbook of Qualitative Research. Sage Publications, New York (1994)
Lund Research Ltd.: Non-probability sampling. http://dissertation.laerd.com/non-probability-sampling.php (2012). Accessed 16 Feb 2016
McGill University: Qualizer: qualitative data analysis software. http://qualyzer.bitbucket.org/ (2001) Accessed 05 July 2015
Qualtrics Online Survey Software & Insight Platform. http://oirp.ncsu.edu/srvy/qltrx/access-qualtrics (2002). Accessed 05 July 2015
Duffy, J.: Cisco’s top 10 rivals—Cisco battling Juniper, IBM, HP and more across the enterprise network market. http://www.networkworld.com/article/2191771/data-center/cisco-s-top-10-rivals.html (2010). Accessed 05 July 2015
Cisco Inc.: Configuration management: best practices white paper. http://www.cisco.com/c/en/us/support/docs/availability/high-availability/15111-configmgmt.html (2006). Accessed 23 Mar 2016
Halamka, J.: The caregroup network outage. http://geekdoctor.blogspot.com/2008/03/caregroup-network-outage.html (2008). Accessed 05 July 2015
Cisco Inc.: Cisco IOS password encryption facts. http://www.cisco.com/c/en/us/support/docs/security-vpn/remote-authentication-dial-user-service-radius/107614-64.html (2008). Accessed 05 July 2015
Thomas, W.H., Daniel, C.F.: How broadly does education contribute to job performance? J. Pers. Psychol. 62, 89–134 (2009)
Computer Economics Inc.: Spending and staffing for networks. http://www.computereconomics.com/article.cfm?id=1274 (2006). Accessed 05 July 2015
Gowen, L.D.: Predicting staff sizes to maintain networks. J. Def. Softw. Eng. 14(11), 22–26 (2001). http://www.crosstalkonline.org/storage/issue-archives/2001/200111/200111-0-Issue.pdf. Accessed 2 Feb 2015
Acknowledgements
We are very grateful to Dr. Emerson Murphy-Hill, Department of Computer Science, North Carolina State University, for extensive helpful discussion and guidance related to background on Grounded Theory, as well as survey interpretation and data collection. We gratefully acknowledge the support and generosity of our interviewees, survey respondents, and their organizations, without which the present study could not have been completed.
Author information
Authors and Affiliations
Corresponding author
Appendix I: Semi-Structured Interview with Network Engineers/Analysts
Appendix I: Semi-Structured Interview with Network Engineers/Analysts


Rights and permissions
About this article
Cite this article
Mushi, M., Dutta, R. Human Factors in Network Reliability Engineering. J Netw Syst Manage 26, 686–722 (2018). https://doi.org/10.1007/s10922-017-9440-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10922-017-9440-1