The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the today's the rapid developing of wireless mobile networks, various types of mobile devices have emerged and a variety of applications have been developed. People's desire for more convenient life and more efficient collaboration may be coming true in this era. Meanwhile there are lots of security challenges in wireless mobile networks. To resist conventional attacks and obtain stronger securities...
In this paper, we propose a planning mechanism based on telecom user behavior to choose locations of telecom operator's service halls. Telecom service hall network consists of service requirements nodes (RNs) and telecom service hall sites (TSs). Telecom service hall location selection problem mainly focuses on choosing locations of TSs from RNs. With analysis of base station data, we formulate a...
The uncertainty of change and low-utilization of human resource make change management more difficult to implement in today's competitive IT management environment. To fill this gap, in this paper a novel strategy is proposed for scheduling human resource to change activities concerning both runtime and business impact. Strategy is heuristic-based to obtain (1) ordering of human operators by mining...
Existing network link estimation methods generally assume that the network link status in the measurement is stationary, but this assumption is not always true in the real network. Thus they cannot provide desired estimation accuracies. To address the problem, in this paper, we propose a new methodology, which can accurately infer the packet loss rates of all links in the network and locate the non-stationary...
We address the problem of inferring link loss rates from unicast end-to-end measurements. Different from previous tomographic techniques, we provide a method to partition all links in the network into several subsets-loss inferences can be performed independently among each subset. We also design a approach, based on the independence of links, to infer the loss rates of individual links in each subset...
As one solution to the gradual ossification of the existing networks, network virtualization enables multiple service providers (SPs) to coexist on a shared infrastructure, and it is considered as an integral part of next generation architecture. During the run time, SPs have exclusive rights for the allocated bandwidth resources, which may result in poor performance of bandwidth utilization. In this...
Coalition formation is an essential component for in wireless sensor network (WSN). Most of current coalition formation algorithms have focused on disjoint coalitions. We develop an improved ant colony algorithm to solve the overlapping coalition formation(OCF) problem in multiple coalitions in WSN domain. In this improved ant colony algorithm, we bring in mutation operation and elite strategy from...
Cell outage compensation is the key technology of self-managed network, which aims to automatically mitigate outages that occur in radio networks due to unexpected failures. However, there are few detailed mechanisms to automatically compensate the coverage hole of the outage cell. In this paper, an adjusting pilot power based mechanism of compensation in wireless access network is presented. It compensates...
The cooperation among sensor nodes is a significant issue in large-scale, complicated Wireless Sensor Networks(WSN). Target tracking is a canonical application of WSN. The dynamic coalition mechanism in WSN for target detection is an important method to improve the tracking quality which saves much energy. An energy efficient coalition formation algorithm is needed because the energy resource of WSN...
A major challenge of network virtualization is the virtual network resource allocation problem that deals with efficient mapping of virtual nodes and virtual links onto the substrate network resources. However, existing algorithms are almost concentrated on the randomly small-scale network topology, which is not suitable for practical large-scale network environments, because more time is spent on...
In the open MANETs, nodes with different goals expect to benefit from others, but are unwilling to share their own resources. These selfish behaviors have posed increasing research challenges for cooperation. Negotiation as a key form of interaction for two or more parties enables nodes to announce their contradictory demands and seek to an agreement by concession. In the paper, the Service Negotiation...
Identifying and classifying different network applications is very important for trend analysis, dynamic access control, network security and traffic engineering, while traffic classification is able to classify applications effectively. Current popular methods of traffic classification mainly include machine learning algorithm based on supervised or unsupervised and the method based load. In practical...
Virtual networks have emerged as a powerful and flexible platform for future network. The dependability of virtual services relies on the network's capabilities to effectively diagnose and recover faults. But the flexible characteristics of virtual networks bring to virtualization fault diagnosis new challenges, such as network scalability, inaccessible substrate network fault information, incomplete...
Overlay network monitoring is one of the most important issues in the design and operation of overlay networks. It faced with increasing demand for better throughput and response time performance. Given an overlay network with n end hosts, existing systems either require O (n2) measurements, and thus lack scalability, or can only estimate the latency but not failures or congestion. We propose a scalable...
Nowadays the overlay network has greatly improved the performance of the Internet. The overlay network flexibly selects its communication paths and targets and thus can benefit from estimation of end-to-end network performances. For an overlay network with n end hosts, most of the existing systems have to send O (n2) probes into the network and then they calculate the performances of all links. Although...
Future Long Term Evolution (LTE) Radio Access Network (RAN) will benefit from a significant degree of self-organization. Autonomic Load Balancing (ALB) is considered as an important self-organizing function in LTE RAN. In this work, distributed ALB is achieved by Autonomic Network Management (ANM). Load conditions of eNBs (E-UTRAN NodeB) can be detected. Sizes and shapes of cellular coverage can be...
The characteristics of a standard ICT service catalogue representation method are summarized, and a general ICT service catalogue representation is proposed. Based on the template of representation, the database of ICT service catalogue prototype system is designed. The correctness and effectiveness of ICT service catalogue representation method are validated by management functions of the prototype...
Fault detection of wireless sensor networks has been studied intensively in recent years under the assumption that manager nodes are default probe stations. However, some additional fault detection tasks will make so busy the manager node to be failed more quickly. Moreover, at the first beginning period most sensor networks are working normally without any dead nodes and the probing work are actually...
Network monitoring is essential for assessing performance issues, identifying and locating problems. There is increasing interest in passive monitoring of flows at multiple locations within a distributed network. In order to figure out how to place monitors under cost-effective and budget constraints within the network, a new approach is presented in this paper, which solves the problem of monitoring...
In a clustering-based MANETs, task allocation has posed increasing research challenges because the needs of management and coordination are accentuated by complicated demands of cluster members. A self-adaptive method of task allocation is designed to facilitate self-planning and self-negotiation for nodes during tasks being distributed and executed. The method is composed of two parts: for one part,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.