Hierarchical management architecture for multi-access networks

Dzmitry Kliazovich, Tiia Sutinen, Heli Kokkoniemi-Tarkkanen, Jukka Mäkelä, Seppo Horsmanheimo

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

4 Citations (Scopus)


Future Internet will be highly heterogeneous supporting a multitude of access technologies with overlapping coverages. The automation and optimization of network operations like resource, mobility or QoS management in such a multi-access and multi-operator environment becomes a very challenging but vital task in order to ensure smooth network operation and user satisfaction. Cognitive network management is seen as the solution for this. However, any self* mechanism designed for small-scale networks and requiring an accurate view of the whole network status for decision-making will not be able to meet the future needs. In this paper, we propose a novel multi-access network management architecture targeted for large heterogeneous multi-access and multi-operator networks. The architecture introduces hierarchy to network management to ensure scalability. We also present results obtained from a case example of the proposed decision-making solution implemented to our cognitive network testbed
Original languageEnglish
Title of host publicationProceedings
Subtitle of host publicationIEEE Global Telecommunications Conference, GLOBECOM 2011
PublisherIEEE Institute of Electrical and Electronic Engineers
Number of pages6
ISBN (Electronic)978-1-4244-9268-8
ISBN (Print)978-1-4244-9266-4
Publication statusPublished - 2011
MoE publication typeA4 Article in a conference publication
EventIEEE Global Communications Conference, Globecom 2011 - Kathmandu, Nepal
Duration: 5 Dec 20119 Dec 2011


ConferenceIEEE Global Communications Conference, Globecom 2011
Abbreviated titleGlobecom 2011


  • Network Expert System
  • cognitive network management
  • policy-based
  • handovers

Fingerprint Dive into the research topics of 'Hierarchical management architecture for multi-access networks'. Together they form a unique fingerprint.

Cite this