The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The format and applications of NetFlow data are introduced here, and a NetFlow data acquisition programming module based on Linux is also designed. This programming module can collect NetFlow data through routers in network, and sent them to database for storage after processing them. These data can provide data support for all kinds of network application programming, such as network monitoring,...
It is necessary to monitor and control remotely the devices in scattered unattended machine rooms. The remote monitoring and controlling system are designed based on SNMP and TCP/IP, which uses mainly existing intranet. Following the introductions of SNMP and TCP/IP, overview design and software design of the system are presented. The system may achieve the management of unattended machine rooms and...
In this paper, we present a Failure Prediction System (FPS) using a novel algorithm that extracts frequent anomalous behaviors based on multi-scale trend analysis of multiple network parameters. The proposed Correlation Analysis Across Parameters algorithm (CAAP) utilizes multiple levels of timescale analysis to reveal the frequent anomalous behaviors. The CAAP philosophy is that failures usually...
In this paper, we present a novel algorithm that extracts frequent anomalous behaviors based on multi-scale trend analysis of individual network parameters. The proposed Frequent Anomalous Behavior Mining (FABM) algorithm utilizes multiple levels of time-scale analysis to reveal the frequent anomalous behaviors. This makes the proposed algorithm robust to unreliable, redundant, incomplete and contradictory...
With the development of wireless mesh network (WMN) and its expansion of the scale, it is important to provide an efficient mechanism to convenient the network administrators. Network fault diagnosis is the key part of network management, which can support effective and reliable network operation. However, one of the problems is how to select useful information from a large scale network performance...
We propose a method that uses long term information on the use of primary channels to select the most auspicious ones to be sensed and exploited by cognitive radios at the requesting time. These channels are investigated in more detail over the short term. Sensing results are stored in the short term database and used to predict which channels are best for data transmission. The method makes the operation...
IETF proposed Hierarchical Mobile IPv6 (HMIPv6) to support host mobility and mobility management involves signaling costs at various mobility entities of the network. Widespread use of IP-enabled mobile devices have resulted in increase in number of mobile users and the signaling cost on underlying mobility entities have increased significantly, which will result in their performance degradation....
Cognitive radio has been a research hotspot because of its promise to improve the utilization of the assigned but unused radio spectrum. The complexity of current networks has been a main drawback of network development, and so will the problem of cognitive radio networks. To solve the complexity problem, autonomic computing has been proposed to enable the network self-management. This paper puts...
The heterogeneity and the complexity of the communication network in current use are great difficulties in building the actual information dissemination management (IDM) systems. These difficulties bring big technical challenges to IDM for communications resource management, transmission control, information catalogue/search and transmitting. A generic information dissemination management method based...
The Network Management System of IPv4/IPv6 based IP-3DTV is one integrating LDAP server, SNMP server, StreamMedia server and ManagementSystem server. Different from the traditional IPTV management system, a function designed for the management of 3DTV has been added to all of the servers in IP-3DTV. Moreover, SNMP network management technology, together with LDAP directory access technology, provides...
Network Virtualization is a promising way to overcome the weaknesses of the current Internet. However, how to solve the problem of the management and control of the virtual resources to obtain efficient resource utilization faces great challenges. In this paper, we propose a management framework of multi-domain and hierarchy to reduce the complexity and improve the efficiency of virtual resources...
Environment condition monitoring is important to human life. A variety of monitoring technologies have long been used to monitor environment condition. In this paper, we describe the design method of a remote monitoring system based on the Internet and CDMA (code division multiple access) network, and discuss how to program in Java to implement the system in detail, especially the methods of communication...
The complexity of modern networked information systems, as well as all the defense-in-depth best practices, require distributed intrusion detection architectures relying on the cooperation of multiple components. Similar solutions cause a multiplication of alerts, thus increasing the time needed for alert management and hiding the few critical alerts as needles in a hay stack. We propose an innovative...
This paper describes a solution for implementing the Media Independent Information Service, later referred to as MIIS, described in IEEE 802.21 standard. First we present the previous work towards defining a complete system capable of realizing a vertical handover according to the standard. Next we detail the MIIS general architecture, the information gathering procedures and considerations about...
RFID innovative application dairy happened. In the study, we propose a RFID-enabled gym management system. By the system, the manager of gym can track and trace the exercise status of member. For the purpose of gym, it can apply an exercise prescription for each member when they come in fitness. The system not only can reduce the waste of human resources and enhance the efficiency of management levels,...
There are some strategies regarding SS7 network configuration for the users identification, for example using the local database or the zonal database infrastructure. This paper investigates the both assumptions and concludes that the initial condition can determine the final configuration as mixing solution for the global infrastructure. The four simulation scenarios were generated for a better understanding...
For the purpose of monitoring and knowing the extent of use of objects in the network, generally each network operation is stored for subsequent analysis to determine which objects and how often are they accessed and modified. The self-organization of such multi-state operations is used in this work to help clustering of relationships amongst users or between users and network objects; and enhance...
Aiming at the challenges encountered by the traditional network management protocol SNMP when applies to SaaS service, this paper researches on the design of a remote monitoring wireless router system based on SaaS model. And this page mainly introduced the third party open source firmware DDWRT, intelligent middleware, remote background system, as well as a general router GUI based on internet browser...
With the rapid changes taking place in the network operation environment, ISPs today face a challenge. Networks are becoming more complex with the inclusion of diverse types of devices. New services such as IPTV and VoIP make the jobs of network administrators more difficult, by requiring new equipment, with new protocols and new technologies. As well, ISPs are forced to reduce the costs of network...
Recent FCC rules allowing unlicensed use on a secondary basis of the Television White Spaces (TVWS) promise a whole new set of possible applications. The first step towards realizing these applications is the creation and adoption of industry standards. In this paper we present the first such standard for personal/portable devices in the TVWS that complies fully with the existing FCC rules while retaining...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.