@inproceedings {211239, author = {Li Chen and Jiacheng Xia and Bairen Yi and Kai Chen}, title = {PowerMan: An Out-of-Band Management Network for Datacenters Using Power Line Communication}, booktitle = {15th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 18)}, year = {2018}, isbn = {978-1-939133-01-4}, address = {Renton, WA}, pages = {561--578}, url = {https://www.usenix.org/conference/nsdi18/presentation/chen-li}, publisher = {{USENIX} Association}, month = apr, } @article{emmert_out--band_2015, title = {Out-of-{Band} {Network} {Management}}, volume = {69}, url = {https://doi.org/10.2313/NET-2015-03-1_10}, doi = {10.2313/NET-2015-03-1_10}, journal = {Network Architectures and Services}, author = {Emmert, Felix}, collaborator = {Gasser, Oliver}, month = mar, year = {2015}, pages = {69--75} } @article{pruett_bladecenter_2005, title = {{BladeCenter} systems management software}, volume = {49}, issn = {00188646}, url = {https://search-proquest-com.ezproxy.bcu.ac.uk/docview/220687956}, language = {English}, number = {6}, journal = {IBM Journal of Research and Development}, author = {Pruett, G. and Abbondanzio, A. and Bielski, J. and Fadale, T. D. and Merkin, A. E. and Rafalovich, Z. and Riedle, L. A. and Simpson, J. W.}, month = nov, year = {2005}, note = {tex.isbn: 00188646}, pages = {963--975} } @inproceedings{7027493, address = {London, UK}, title = {The continuity of out-of-band remote management across virtual machine migration in clouds}, isbn = {978-1-4799-7881-6}, url = {https://ieeexplore-ieee-org.ezproxy.bcu.ac.uk/document/7027493}, doi = {10.1109/UCC.2014.26}, urldate = {11 March 2020}, booktitle = {2014 {IEEE}/{ACM} 7th international conference on utility and cloud computing}, publisher = {IEEE}, author = {Kawahara, S. and Kourai, K.}, month = dec, year = {2014}, pages = {176--185} } @misc{outpost_sentinel_band_2004, type = {Blog}, title = {In {Band} / {Out} of {Band} {Network} {Access}}, url = {http://www.outpostsentinel.com/inband.shtml}, urldate = {30 November 2019}, journal = {Outpost Sentinel}, author = {{Outpost Sentinel}}, month = feb, year = {2004} } @misc{educba_c_2018, type = {Blog}, title = {C++ vs {Java} - {Know} {The} {Top} 8 {Most} {Important} {Differences}}, url = {https://www.educba.com/c-plus-plus-vs-java/}, abstract = {In this article C++ vs Java  , we will look after their meaning, head to head comparisons, Key differences, conclusion in a relatively easy and simple ways}, language = {en-US}, urldate = {28 November 2019}, journal = {EDUCBA}, author = {{EDUCBA}}, month = jun, year = {2018}, note = {Library Catalog: www.educba.com Section: Top Differences Tutorial} } @misc{mcafee_what_2014, type = {Blog}, title = {What is {Wardriving}?}, url = {https://securingtomorrow.mcafee.com/blogs/consumer/identity-protection/wardriving}, language = {en-US}, urldate = {28 November 2019}, journal = {McAfee Blogs}, author = {{McAfee}}, month = jun, year = {2014}, } @inproceedings{386580, title = {Network management's impact on managed networks}, url = {https://ieeexplore-ieee-org.ezproxy.bcu.ac.uk/document/386580}, doi = {10.1109/LCN.1994.386580}, booktitle = {Proceedings of 19th conference on local computer networks}, author = {Amley, C.}, month = oct, year = {1994}, pages = {404-410} } @misc{lonergan_agile_2016, type = {Blog}, title = {Agile versus {Waterfall}: pros and cons \& difference between them}, shorttitle = {Agile versus {Waterfall}}, url = {https://www.pmis-consulting.com/agile-versus-waterfall/}, language = {en-GB}, urldate = {22 November 2019}, journal = {Agile versus Waterfall: pros and cons \& difference between them}, author = {Lonergan, Kevin}, month = may, year = {2016}, } @article{ieee-5975176, title = {What do we know about the effectiveness of software design patterns?}, volume = {38}, issn = {2326-3881}, doi = {10.1109/TSE.2011.79}, number = {5}, journal = {IEEE Transactions on Software Engineering}, author = {Zhang, Cheng and Budgen, David}, month = sep, year = {2012}, pages = {1213-1231} } @article{gonccales2019comparison, title = {Comparison of software design models: {An} extended systematic mapping study}, volume = {52}, issn = {0360-0300}, url = {https://doi.org/10.1145/3313801}, doi = {10.1145/3313801}, number = {3}, journal = {ACM Computing Surveys (CSUR)}, author = {Gonçales, Lucian José and Farias, Kleinner and Oliveira, Toacy Cavalcante De and Scholl, Murilo}, month = jul, year = {2019}, note = {tex.publisher: ACM New York, NY, USA}, pages = {1-41} } @book{budgen2003software, address = {Essex, UK}, edition = {2}, title = {Software {Design}}, isbn = {0-201-72219-4}, publisher = {Pearson Education}, author = {Budgen, David}, year = {2003} } @incollection{sep-physics-experiment, edition = {Winter 2019}, title = {Experiment in {Physics}}, url = {https://plato.stanford.edu/archives/win2019/entries/physics-experiment}, booktitle = {The {Stanford} {Encyclopedia} of {Philosophy}}, publisher = {Metaphysics Research Lab, Stanford University}, author = {Franklin, Allan and Perovic, Slobodan}, editor = {Zalta, Edward N.}, year = {2019} } @inproceedings{1274255, address = {Penang, Malaysia}, title = {Transport layer security protocol in {Telnet}}, volume = {3}, url = {https://ieeexplore.ieee.org/abstract/document/1274255}, doi = {10.1109/APCC.2003.1274255}, publisher = {IEEE}, author = {Haslina Binti Mahmood}, month = {September}, year = {2003}, pages = {1033--1037}, booktitle = {9th Asia-Pacific Conference on Communications}, } @techreport{cisco-ha, title = {How {Cisco} {IT}-{LAN}-{SJ} achieved high availability}, url = {https://www.cisco.com/c/dam/en_us/about/ciscoitatwork/downloads/ciscoitatwork/pdf/cisco_it_high_availability.pdf}, urldate = {09 November 2019}, institution = {Cisco Systems}, author = {{Cisco IT}}, year = {2003} } @misc{stormboard_your_2018, type = {Blog}, title = {Your {Guide} to {Using} {Stormboard} {For} {Kanban}}, url = {https://stormboard.com/blog-archive/your-guide-to-using-stormboard-for-kanban}, urldate = {08 November 2019}, journal = {Stormboard Blog}, author = {{Stormboard}}, month = sep, year = {2018} } @article{eweek_cyclades_2005, title = {Cyclades {Extends} {Out}-of-{Band} {Management} to {Remote} {Offices}}, issn = {15306283}, url = {https://link.gale.com/apps/doc/A132116999/AONE?u=uce&sid=AONE&xid=3ca148f9}, language = {English}, urldate = {06 November 2019}, journal = {eWeek}, author = {{eWeek}}, month = may, year = {2005}, keywords = {Cyclades Corp., Remote access software, Software industry} } @article{202829608, title = {{MRV} {DEBUTS} {OUT}-{OF}-{BAND} {MANAGEMENT} {SYSTEM} {WITH} {SECURITY}}, volume = {19}, url = {https://search-proquest-com.ezproxy.bcu.ac.uk/docview/202829608}, language = {English}, number = {8}, journal = {Computer Protocols}, author = {{MRV Communications}}, month = aug, year = {2006}, note = {tex.isbn: 0899126X}, keywords = {Computers}, pages = {N/A} } @article{194355400, title = {Managing out-of-band management}, volume = {27}, url = {https://search-proquest-com.ezproxy.bcu.ac.uk/docview/194355400}, language = {English}, number = {50}, journal = {InfoWorld}, author = {Chee, Brian}, month = dec, year = {2005}, note = {tex.isbn: 01996649}, pages = {14} } @article{informationweek_out--band_2005, title = {Out-{Of}-{Band} {Systems} {Management} {Helps} {Businesses} {Expand}; {Uplogix} introduces a new version of its network management software for centralized and remote management that makes use of out-of-band techniques to gain access to servers and other {IT} systems that have crashed, lost power, or have faulty network connections}, issn = {87506874}, url = {https://link.gale.com/apps/doc/A137823043/AONE?u=uce&sid=AONE&xid=e8820255}, language = {English}, urldate = {06 November 2019}, journal = {InformationWeek}, author = {{InformationWeek}}, month = oct, year = {2005}, } @inproceedings{1606042, address = {Atlantic City, NJ}, title = {Enhancing network survivability with out of band}, volume = {4}, doi = {10.1109/MILCOM.2005.1606042}, booktitle = {{MILCOM} 2005 - 2005 {IEEE} military communications conference}, publisher = {IEEE}, author = {Brenkosh, J. P. and Witzke, E. L. and Kellogg, B. R. and Olsberg, R. R.}, month = oct, year = {2005}, note = {ISSN: 2155-7586}, pages = {2494--2498} } @article{kolaks2003securing, title = {Securing out-of-band device management}, volume = {21}, url = {https://www.sans.org/reading-room/whitepapers/networkdevs/securing-out-of-band-device-management-906}, journal = {SANS Institute}, author = {Kolaks, Marc S}, year = {2003}, urldate = {11 November 2019} } @inproceedings{10.1145/2591971.2592009, author = {Suneja, Sahil and Isci, Canturk and Bala, Vasanth and de Lara, Eyal and Mummert, Todd}, title = {Non-Intrusive, out-of-Band and out-of-the-Box Systems Monitoring in the Cloud}, year = {2014}, isbn = {9781450327893}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, url = {https://doi.org/10.1145/2591971.2592009}, doi = {10.1145/2591971.2592009}, booktitle = {The 2014 ACM International Conference on Measurement and Modeling of Computer Systems}, pages = {249–261}, numpages = {13}, keywords = {cloud, analytics, mon- itoring, data center, virtualization, vmi, virtual machine, agentless}, location = {Austin, Texas, USA}, series = {SIGMETRICS ’14} } @INPROCEEDINGS{ieee-4753503, author={Bruce Bennett and Shane Transue}, booktitle={MILCOM 2008 - 2008 IEEE Military Communications Conference}, title={Remote IP SATCOM monitoring and management}, year={2008}, volume={}, number={}, pages={1-5}, doi={10.1109/MILCOM.2008.4753503}, ISSN={2155-7586}, month={Nov}, } @techreport{geant-bpd-101, title = {Network Monitoring and Management Recommendations}, author = {Ivan Ivanović and Esad Saitović}, url = {https://services.geant.net/sites/cbp/Knowledge_Base/Network_Monitoring/Documents/gn3-na3-t4-abpd101.pdf}, urldate = {09 November 2019}, institution = {GÉANT}, year = {2011}, month = {February}, } @article{auvik-oobm-network, title = {Out-of-Band Management}, url = {https://www.auvik.com/franklymsp/blog/out-of-band-management}, urldate = {06 April 2020}, journal = {Auvik Frankly MSP Blog}, author = {Kevin Dooley}, month = {May 12}, year = {2014}, } @article{plixer-vrf, title = {What is VRF: Virtual Routing and Forwarding}, url = {https://www.plixer.com/blog/what-is-vrf-virtual-routing-and-forwarding/}, urldate = {09 November 2019}, journal = {Plixer}, author = {Plixer}, month = {December 10}, year = {2009}, } @manual{multitech-dev-rs232, title = {MTAC-MFSER Usage}, author = {{Multi-Tech Systems}}, organization = {Multi-Tech Systems}, month = {September 4}, year = {2019}, urldate = {11 February 2020}, url = {http://www.multitech.net/developer/software/mlinux/using-mlinux/mlinux-using-accessory-cards/mtac-mfser-usage} } @manual{multitech-dev-osupgrade, title = {Upgrading mLinux}, author = {{Multi-Tech Systems}}, organization = {Multi-Tech Systems}, month = {September 3}, year = {2019}, urldate = {9 February 2020}, url = {http://www.multitech.net/developer/software/mlinux/upgrading-mlinux} } @misc{multitech-mfser, author = {{Multi-Tech Systems}}, title = {MTAC-MFSER}, howpublished = {online}, month = {March 18}, year = {2019}, urldate = {12 April 2020}, url = {http://www.multitech.net/developer/products/multiconnect-conduit-platform/accessory-cards/mtac-mfser} }