The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to plan the network construction reasonable and ensure the quality of network service, it is important to measure the Link-bandwidth utilization and get the flow information. One of the methods to monitor network efficiently is based on flow-conservation, and the problem of searching a solution for this method could be deduced to solving weak vertex cover problem, which has been proved NP-hard...
The policy and charging control function is defined as PCC (policy and charging control) by 3GPP and SBBC (service based bearer control) by 3GPP2. It is valuable to establish an experimental testbed for PCC and SBBC to improve and verify the related performance. At present, we can make use of open source IMS (OSIMS) and UCT PCF to simulate 3GPP PCC, but there is no testbed for the policy control function...
Currently those algorithms to mine the alarm association rules are limited to the minimal support, so that they can only obtain the association rules among the frequently occurring alarm events, furthermore, the rules couldn't be visual display. This paper provides a novel mining alarm correlation visualization algorithm based on the non-linear reduced-feature mapping. The algorithm firstly projects...
In this paper, BGP-Update based monitoring method is proposed to effectively alleviate bandwidth tension and link congestion, and eventually resolve the problem of update message flooding when routing anomalies. Such monitoring method tracks routings and dynamically displays the alternations of selected routings and its updating quantities by analyzing collected BGP-Update messages. With the help...
In terrestrial military networks quality of service (QoS) is a stochastic variable subject to the tyranny of the local environment. Thousands of man-years of effort have been expended in attempts to design more robust and reliable networks and to efficiently manage scarce spectrum resources. Software defined radio (SDR) and directional antennas are two key enabling technologies for improving radio...
Exclusion Basis Systems (EBS) is a combinatorial formulation of the group key management problem in wireless sensor networks. A simple method for optimizing key assignment based on EBS is presented, which significantly reduce the time overhead by avoiding the back tracing process. The proposed method requires O(n) time complexity to find an optimal key assignment while the earlier schemes of different...
Recently, Pour et al. proposed a group key management scheme for secure multicast, where each member is privately assigned a member secret, and the algebraic inverse element of this secret is assigned to others but not the member himself. The scheme is claimed to be efficient in that the inverse element of a leaving member can be mathematically employed for updating the group key locally, which would...
Currently, most network management systems operate on SNMP. This protocol use the management station that provides a user interface to the network manager and interacts with agents that manage remote access to the Management Information base. In certain circumstances (e.g. at times of network stress), this interaction generates significant traffic that overloads the management station. A distributed...
Knowledge of topology in wireless sensor networks is significant for network management and maintenance. In this paper, a conditional probability of data loss theorem is proposed for wireless sensor networks based on the data aggregation paradigm.al probability of data loss theorem. It reveals the relationship between conditional probabilities of sensor data loss given different conditions. Based...
Monitoring and analysis is very important for the development, test and maintenance of terrestrial trunked radio (TETRA) base stations (BSs). In this paper, we present an approach using protocol analysis technology with packet data sent by BSs. Packet data will be captured and examined by an open-source network analyzer, Wireshark. Three Wireshark dissectors, TMV-SAP dissector, AZ interface dissector...
The telecommunication network has a large scale and an intense complexity. Agents distributed over diverse network elements have collected an immense number of KPI data, the key indicators of network performance. These time series data can have mutual impact. This paper puts forward an improved algorithm named AFP-Growth to mine association rules of inter-transaction time series in the telecommunication...
Internet is becoming an indispensible infrastructure of essential media, which makes a great burden for ISP's security and traffic management. Especially the situation will be much more serious in NGI (the Next-Generation Internet) because of its innumerable users, mobile device, information appliances (IA) and networked sensors etc with 128-bit IPv6 address. For the reason of lacking scalability,...
Recent work on failure independent path-protecting p-cycles (FIPP) has revealed some new, relatively simple and possibly cost-effective approaches for FIPP p-cycle network design. The first step of the proposed strategy consists of solving a more general path-protecting p-cycle (GPP) problem in which the constraint of failure independence is relaxed. The second step consists of imposing the failure...
Free-rider problem greatly influences the performance of unstructured networks (like ad-hoc or peer-to-peer networks). To solve such problem, we focus on trust management framework, which is intended to stimulate nodes to cooperate with each other. Currently, the existing trust management framework can be classified into trust establishment framework and reputation-based framework. However, none of...
Traffic engineering (TE) has become a challenging task for network management and resources optimization due to traffic uncertainty and to the difficulty to predict traffic variations. To address this uncertainty in a robust and efficient way, two almost antagonist approaches have emerged during the last years: robust routing and dynamic load-balancing. The former copes with traffic uncertainty in...
Network reliability, specifically k-terminal reliability, gives the probability that k specified nodes in a network are connected. Multi-terminal network resilience measures the average k-terminal reliability over all node sets of size k. This is the expectation that a randomly chosen set of k nodes is connected. One may also ask for the probability that any k nodes are connected. This leads to three...
This paper expands on the demand-wise shared protection model in order to capacitate a network that achieves pre-defined minimum availability requirements. By enabling DSP to take into consideration minimum availability, a network can be capacitated to meet user's requirements of the network. This provides a way to customize the level of protection throughout the network that matches the needs of...
The fast development of communication technologies brings a heterogeneous network environment, which makes it more complicated to guarantee end to end quality of service (QoS). As a result, an open QoS control and management framework is crucial for the service providers. In this paper, we propose a novel pricing-based end to end QoS control and management architecture, with some key functional blocks...
The cognitive network, which is based on the theory of cognitive radio, is undergoing rapid growth. But the research on QoS provisioning for cognitive heterogeneous networks is scarce. In this paper, an end-to-end QoS provisioning model is proposed withthe cognitive process. QoS mapping of different cognitive QoS domains in SLSs and the related resource provisioning signaling are also expounded. The...
In WSN-based surveillance systems power conservation is an important issue but one must also ensure that the application's objectives are met. In this paper, we jointly address the problem of coverage, disambigation and adaptive scheduling of sensor node's activity to extend the network lifetime while fulfilling a critical surveillance application needs. We first present a distributed algorithm that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.