Skip to main content

Advertisement

Log in

Human Factors in Network Reliability Engineering

  • Published:
Journal of Network and Systems Management Aims and scope Submit manuscript

Abstract

Network administration and management tasks play an integral role in Information Technology (IT) operations; which are utilized across a diverse set of organizations. The reliability of networks is therefore of crucial importance for ensuring effective business processes. All IT networks are administered and managed by human administrators. As the process of administration becomes increasingly complex, human limitations can amplify challenges to network reliability and security. Despite researchers’ agreement that the human factor becomes increasingly significant as the network becomes more reliable, efforts to design reliability measures have remained largely separate from considerations of the human component. We examined the question of whether joint consideration of these two components would be useful in designing reliability of enterprise networks. We interviewed and surveyed networking professionals to understand their impact on network reliability. The result is a discussion of specific demographic, organizational, and technical factors that contribute to network reliability issues. For demographic factors, academic background was a notable factor associated with network instability. For organizational factors, a notable factor was the number of devices assigned per administrator. Finally, for technical factors, a notable factor was misconfiguration of networking devices, which contributed significantly to the unreliability of the studied networks. Based on this research, we concluded that the future of network reliability engineering will benefit substantially from actively addressing the human role in network administration and management.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Notes

  1. This is equivalent to community college associate degree in USA.

References

  1. Leiner, B.M., Cerf, V.G., Clark, D.D., Kahn, R.E., Kleinrock, L., Lynch, D.C., Postel, J., Roberts, L.G., Wolff, S.: A brief history of the internet. SIGCOMM Comput. Commun. Rev. (2009). https://doi.org/10.1145/1629607.1629613

    Google Scholar 

  2. Loomis, D.G., Taylor, L.D.: Forecasting the Internet: Understanding the Explosive Growth of Data Communications (Topics in Regulatory Economics and Policy). Springer, New York (2002)

    Book  Google Scholar 

  3. Javvin Technologies Inc. Network Protocols Handbook. http://bkarak.wizhut.com/www/lectures/networks-07/NetworkProtocolsHandbook.pdf (2004). Accessed 05 Jan 2016

  4. U.S DOL–Bureau of Labor Statistics: Occupational Outlook Handbook: Network and Computer Systems Administrators. http://www.bls.gov/ooh/computer-and-information-technology/network-and-computer-systems-administrators.htm (2014). Accessed 17 July 2017

  5. Sezer, S., Scott-Hayward, S., Chouhan, P.K., Fraser, B., Lake, D., Finnegan, J., Viljoen, N., Miller, M., Rao, N.: Are we ready for SDN? implementation challenges for software-defined networks. Commun. Mag. IEEE (2013). https://doi.org/10.1109/MCOM.2013.6553676

    Google Scholar 

  6. Feamster, N., Balakrishnan, H.: Detecting BGP configuration faults with static analysis. Symp. Netw. Syst. Des. Implement. 2, 43–56 (2005)

    Google Scholar 

  7. Le, F., Lee, S., Wong, T., Kim, H., Newcomb, D.: Detecting network-wide and router-specific misconfigurations through data mining. IEEE/ACM Trans. Netw. (2009). https://doi.org/10.1109/TNET.2008.925631

    Google Scholar 

  8. Reason, J.: Managing the Risks of Organizational Accidents. Ashgate, Farnham (1997)

    Google Scholar 

  9. Mushi, M., Murphy-Hill, E., Dutta, R.: The human factor: a challenge for network reliability design. In: 11th international conference on the design of reliable communication networks. https://doi.org/10.1109/DRCN.2015.7149000 (2015)

  10. Gallagher, S.: How an Indonesian ISP took down the mighty Google for 30 minutes. http://arstechnica.com/information-technology/2012/11/how-an-indonesian-isp-took-down-the-mighty-google-for-30-minutes/ (2012). Accessed 20 Apr 2014

  11. Lee, M.: LinkedIn just one of thousands of sites hit by DNS issue: Cisco. http://www.zdnet.com/article/linkedin-just-one-of-thousands-of-sites-hit-by-dns-issue-cisco/ (2013). Accessed 20 Apr 2014

  12. CBCNews: Rogers cellphone outage highlights 911 vulnerability. http://www.cbc.ca/news/canada/rogers-cellphone-outage-highlights-911-vulnerability-1.1959393 (2013). Accessed 20 Apr 2014

  13. Brown, A., Patterson, D.A.: Embracing failure: a case for recovery-oriented computing (ROC). High Perform. Trans. Process. Symp. (2001). http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.25.137

  14. Gray, J.: Why do computers stop and what can be done about it? Tandem Comput. (1985). http://citeseer.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.6561

  15. Kantowitz, B.H., Sorkin, R.D.: Human Factors: Understanding People-System Relationships. Wiley, New Jersey (1983)

    Google Scholar 

  16. Rasmussen, J., Rouse, W.B.: Human Detection and Diagnosis of System Failures. Springer, New York (2012)

    Google Scholar 

  17. Alin, B.J., Popescu, C., Underwood, T.: Anatomy of a leak: AS9121. NANOG34 Meeting. http://research.dyn.com/content/uploads/2013/05/renesys-nanog34.pdf (2005). Accessed 12 Jan 2014

  18. Misel S.A.: Wow, AS7007! NANOG mail archives. http://www.merit.edu/mail.archives/nanog/1997-04/msg00340.html (1997). Accessed 12 Jan 2014

  19. Farrar, J.A.: C&W routing instability. NANOG mail archives. http://www.merit.edu/mail.archives/nanog/2001-04/msg00209.html (2001). Accessed 12 Jan 2014

  20. Wool, A.: A quantitative study of firewall configuration errors. IEEE Comput. Soc. (2004). https://doi.org/10.1109/MC.2004.2

    Google Scholar 

  21. Mahajan, R., Wetherall, D., Anderson, T.: Understanding BGP misconfiguration. ACM SIGCOMM (2002). https://doi.org/10.1145/964725.633027

    Google Scholar 

  22. Turner, D., Levchencko, K., Mogul, J., Savage, S., Snoeren, A.: On failure in managed enterprise networks, HP Labs Technical Report (2012)

  23. Bailis, P., Kingsbury, K.: An informal survey of real-world communications failures. ACM Queue 12(7), 20–32 (2014). https://doi.org/10.1145/2639988.2639988

  24. Zeng, H., Kazemian, P., Varghese, G., McKeown, N.: A survey on network troubleshooting. Stanford HPNG Technical Report TR12-HPNG-061012. Stanford University (2012)

  25. Macwan, A.: Approach for identification and analysis of human vulnerabilities in protecting telecommunications infrastructure. Bell Labs Tech. J. 9(2), 85–89 (2004). https://doi.org/10.1002/bltj.20027

    Article  Google Scholar 

  26. Buchmann, D.: Verified network configuration: improving network reliability. http://ethesis.unifr.ch/theses/BuchmannD.pdf?file=BuchmannD.pdf (2008). Accessed 06 June 2015

  27. Colwill, C., Chen, A.: Human factors in improving operations reliability. In: Annual IEEE CQR international workshop (2009)

  28. Yuan, L., Mai, J., Su, Z.: FIREMAN: a toolkit for FIREwall modeling and analysis. IEEE Symp. Secur. Priv. (2006). https://doi.org/10.1109/SP.2006.16

    Google Scholar 

  29. Feldmann, A., Rexford, J.: IP network configuration for intradomain traffic engineering. IEEE Netw. Mag. 15(5), 46–57 (2001). https://doi.org/10.1109/65.953233

  30. Caldwell, D., Gilbert, A., Gottlieb, J., Greenberg, A., Hjalmtysson, G., Rexford, J.: The cutting EDGE of IP router configuration. The SIGCOMM Comput. Commun. Rev. (2004). https://doi.org/10.1145/972374.972379

    Google Scholar 

  31. Kraemer, S., Carayon, P.: Human errors and violations in computer and information security: the viewpoint of network administrators and security specialists. J. Appl. Ergon. (2007). https://doi.org/10.1016/j.apergo.2006.03.010

    Google Scholar 

  32. Kraemer, S., Carayon, P., Clem, J.: Human and organizational factors in computer and information security: pathways to vulnerabilities. J. Comput. Secur. (2009). https://doi.org/10.1016/j.cose.2009.04.006

    Google Scholar 

  33. Baskerville, R., Pries-Heje, J.: Grounded action research: a method for understanding IT in practice. J. Account. Manag. Inf. Technol. 9, 1–23 (2005)

    Google Scholar 

  34. Denzin, N.K., Lincoln, Y.S.: Handbook of Qualitative Research. Sage Publications, New York (1994)

    Google Scholar 

  35. Lund Research Ltd.: Non-probability sampling. http://dissertation.laerd.com/non-probability-sampling.php (2012). Accessed 16 Feb 2016

  36. McGill University: Qualizer: qualitative data analysis software. http://qualyzer.bitbucket.org/ (2001) Accessed 05 July 2015

  37. Qualtrics Online Survey Software & Insight Platform. http://oirp.ncsu.edu/srvy/qltrx/access-qualtrics (2002). Accessed 05 July 2015

  38. Duffy, J.: Cisco’s top 10 rivals—Cisco battling Juniper, IBM, HP and more across the enterprise network market. http://www.networkworld.com/article/2191771/data-center/cisco-s-top-10-rivals.html (2010). Accessed 05 July 2015

  39. Cisco Inc.: Configuration management: best practices white paper. http://www.cisco.com/c/en/us/support/docs/availability/high-availability/15111-configmgmt.html (2006). Accessed 23 Mar 2016

  40. Halamka, J.: The caregroup network outage. http://geekdoctor.blogspot.com/2008/03/caregroup-network-outage.html (2008). Accessed 05 July 2015

  41. Cisco Inc.: Cisco IOS password encryption facts. http://www.cisco.com/c/en/us/support/docs/security-vpn/remote-authentication-dial-user-service-radius/107614-64.html (2008). Accessed 05 July 2015

  42. Thomas, W.H., Daniel, C.F.: How broadly does education contribute to job performance? J. Pers. Psychol. 62, 89–134 (2009)

    Article  Google Scholar 

  43. Computer Economics Inc.: Spending and staffing for networks. http://www.computereconomics.com/article.cfm?id=1274 (2006). Accessed 05 July 2015

  44. Gowen, L.D.: Predicting staff sizes to maintain networks. J. Def. Softw. Eng. 14(11), 22–26 (2001). http://www.crosstalkonline.org/storage/issue-archives/2001/200111/200111-0-Issue.pdf. Accessed 2 Feb 2015

Download references

Acknowledgements

We are very grateful to Dr. Emerson Murphy-Hill, Department of Computer Science, North Carolina State University, for extensive helpful discussion and guidance related to background on Grounded Theory, as well as survey interpretation and data collection. We gratefully acknowledge the support and generosity of our interviewees, survey respondents, and their organizations, without which the present study could not have been completed.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Magreth Mushi.

Appendix I: Semi-Structured Interview with Network Engineers/Analysts

Appendix I: Semi-Structured Interview with Network Engineers/Analysts

figure a
figure b

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mushi, M., Dutta, R. Human Factors in Network Reliability Engineering. J Netw Syst Manage 26, 686–722 (2018). https://doi.org/10.1007/s10922-017-9440-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10922-017-9440-1

Keywords

Navigation