The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As the growth of digital home application, more and more Customer Premises Equipments (CPEs) will be managed by TR-069 CPE remote management protocol. It is important to monitor the device status and analyze the statistics information of CPEs in a regular interval. A data collection mechanism is to transfer the system information from the CPE to a data collector. The data collector is used to receive...
As the network scale expands, operation support system (OSS) will need to handle more data queries and much larger quantities of data. Distributed data storage is a key OSS technology that makes OSS highly scalable and provides high performance. Many data allocation methods have been proposed to achieve load-balancing of servers and a short response time. Consistent hashing is one effective method...
Reducing the number of active nodes is an natural and effective method in energy saving for large scale cloud datacenters. However, the traditional way of consolidating VMs by migration may lead to the impacts on performance as well as costs on power consumption and migration. In this paper, we propose an algorithm named DRAMDT to deploy VMs to servers without the use of migration, which groups VM...
Since many components comprising large scale cloud datacenters have a great number of configuration parameters (e.g. hostnames, languages, and time zones), it is difficult to keep consistencies in the configuration parameters. In such cases, misconfigured parameters can cause service failures. For this reason, we propose a misconfiguration detection method for large-scale cloud datacenters, which...
Because of the unique feature of platform-independent and the advantages of easy-to-develop and easy-to-deploy, Java-based applications are widely adopted by large-scale software-intensive information systems, and the monitoring-related functions in such environments are becoming more and more important. One single Application Server can deploy multiple instances of applications in Java EE environments,...
This paper applies Tesseract-OCR, optical character recognition software, to image spam mail filters. Tesseract-OCR can be specific to a certain language and this paper makes Tesseract-OCR specific to spam words. This specialization decreases times and CPU power that it takes to check whether images of mails include spam words. This paper examines the ability of the spam mail filter of Tesseract-OCR...
Cloud Service is a major project that CHT currently initiated to promote. It aims to provide services to users anytime and anywhere. To achieve that, we need robust cloud technology. This paper takes FMS (Fraud Management System) as an example to depict the system migration process into the cloud service. We propose solutions to problems we encountered, software licensing issues, and other related...
IT (Information Technology) is known as one of the best solution to slow down the global warming by various industry sectors. IT equipments are responsible of 2% of GHG emission of total. Especially, Concentrate Energy Consuming Facilities such as Data Centers are to blame most as increasing sources of global warming caused by energy consumption by IT network equipments. This paper shows how to manage...
Global roaming and high-quality wireless communication, is now becoming a reality. This is mainly due to recent technological advances in wireless communications which consist of a wide range of technologies and applications to fulfill the particular needs of end-users in different deployment scenarios (Bluetooth, Wi-Fi, WiMAX, and 3G/4G cellular systems). In such a heterogeneous wireless environment,...
Computer network security is one of the important issues in the Internet age. Network administrators of organizations such as companies or universities filter IP packets at network equipment such as Layer 3 switch or firewall between their organizations and the Internet to keep the security of the computer networks. One of the expressions of the filtering rules of IP packets is access control list...
Fast fault restoration is essential in carrier-grade transport network for QoS-guaranteed service provisioning and efficient traffic engineering. The performances of multi-layered protection switching with control-forwarding separation, however, have not been studied in detail. In this paper, we propose a fast fault restoration in multi-layered network with Control-Forwarding separation. The proposed...
Today, Internet services are utilized as major service platforms to provide business services. Web-based Internet applications that follow the multi-tier architecture are a well-accepted computation model when providing Internet services. Such a model suffers from interruption caused by software failures, hardware errors or software maintenance. The interruption may incur significant financial loss...
The exponential traffic growth and the increasing complexity of WDM networks demand a more sophisticated control protocol that will provide a more efficient use of optical network capacity. Many researchers propose to extend GMPLS protocol suite to activate WDM networks, such as by enhancing OSPF-TE, RSVP-TE, etc., the decentralization of control functions is also an inevitable trend of developing...
The usage of the mobile phone becomes more diversified, as smart phone users increase and data transmission speed becomes faster by LTE. It is difficult to monitor the network service and maintain stable service quality with the NE-focused monitoring OSS (Operation Support System). In this paper, we show the concept and required functions of the service quality monitoring for mobile networks. Additionally,...
In Japan, major earthquakes are predicted to occur in the metropolitan area. In the time of such a disaster, communication systems will play an important role to transfer mitigation information such as instruction for people to move the evacuate area and for contractors to recover city functions. However, mitigation information may be unable to transfer smoothly, because of telecom infrastructure...
In a network management with huge numbers of nodes, network topology is usually displayed in a manner that sub-network is organized as a group and each group is displayed respectively by itself. However, we can't see nodes in plural groups and connections between them simultaneously in this model. To solve the problem, we proposed a hierarchical layout model that expands groups on demand in the same...
With the increase in the bandwidth needs of network service, the customer requirements for Quality of Service (QoS) are also higher. Although the QoS guarantees can be offered by signing the Service Level Agreement (SLA), the costs of infrastructures are increased as well. This paper proposes a shortest path algorithm based on SLA, combined with the resource allocation for virtual networks (VNs)....
Recently, network services based on distributed components that provide services by using components running on remote nodes have attracted much attention. Advanced services can be provided at a lower cost by using existing components. We have previously proposed a method that ensures a stable QoS for each service by allocating components dynamically according to changes in access frequency. In that...
3rd Generation Partnership Project (3GPP) proposes relay architecture to extend the coverage and enhance the system capacity of Long Term Evolution Advanced (LTE-A). In the relay architecture, the header compression mechanism called RObust Header Compression (ROHC) is introduced to eliminate packet overhead and provide better spectral efficiency for IP packet transmission over the radio. However,...
Memory leaks generated by a running program may exhaust memory resources and degrade system performance. It is hard to reproduce these kinds of leaks, let alone to identify and fix them early in the development phase. Thus online memory leak detection is required. In this paper we propose a two-phase approach to the online memory leak detection problem for Java programs. In phase one (offline analysis),...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.