Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
This paper presents a study on power management optimisation over a sensor network. We have proposed a set of management rules which are executed by each sensor of the network. These rules adapt themselves to sensors depending on their energy status and on the network energy. Periodically, each sensor computes its rules and decides how to behave (sleeping during a long period or not). An experimentation...
A kind of management model in the mobile transmission resource management system (short for TRMS) is presented . With this model, the efficiency, expansibility of managing the transmission resource can be improved and the complexity can be reduced.
This paper investigates topology management of large wireless sensor networks. Due to their random deployment, nodes have to organize themselves as energy efficient as possible to avoid redundant sensing and transceiving tasks while maintaining complete sensor coverage and connectivity as long as possible. In this work, we present a clustering algorithm for redundancy detection. With few local rules,...
Networks have become a critical infrastructure, and performance requirements for network-based applications are becoming increasingly stringent. This trend challenges service providers to raise the bar on the performance and reliability of network services. To achieve this, new network and service management systems are needed that enable providers to continually improve performance, identify issues...
Recently, new solutions for automatized management in optical networks promise to allow customers to specify on-demand the terms of the service level agreement (SLA) to be guaranteed by the service provider (SP). For a WDM mesh network that provides shared-path-protection we exploit the knowledge, among the other service level specifications (SLS), of the connection holding time to dynamically manage...
Network risk assessment is an important method to monitor and forecast the security status of the network. The risk calculation is the key step and the result is the direct reference of the risk assessment. This paper prompts a service-based risk quantitative calculation method - SRQC of NGN. SRQC method includes a service-based layered risk calculation model, the quantitative process of assets, vulnerabilities...
The quality of service management-QoSM is a new conception from NGN service layer. To evaluate QoSM efficiently, it is necessary and elementary to define an evaluation metrics and find an evaluation method. First, the evaluation metrics for QoSM based on SLA service management contents is proposed. Then a fuzzy evaluating method to evaluate QoSM based on SLA-oriented service management metrics is...
Wireless sensor networks (WSN) are affected by underlying environments in which sensors are deployed randomly. Inevitably, there are many irregular holes in a WSN because of the existence of obstacles or the death of some sensors. To detect these holes is of great importance to both WSN applications and networking functionalities. Holes are described by a set of sensor nodes on their boundaries. In...
In Telecom Italia has been implemented a monitoring tool in order to calculate an Indicator (KPI key performance indicator) of availability / unavailability of the network management systems as a percentage of time that the systems are available / unavailable to support the internal processes of production of important market services (regarding retail and wholesale customers), compared to the total...
Telecommunication networks are evolving towards unified next generation networks (NGN). Policy control is included in different subsystems of NGN to provide customized control of service delivery depending on different factors. Many management challenges rise considering the intrinsic heterogeneity of the different sub-domains where policy control is to be applied. Each of the current proposed policy...
Status and effect of the service have been increasingly exposed under the drastic situation of marketing competition. Nowadays, the telecom corporations may win in the smoking competition by putting the differentiated service (DiffServ) into practice because the deviations of telecommunication products become narrower and narrower, the promotion less and less innovation, the demand of customers more...
We propose a hybrid active queue management (AQM) scheme, Proportional Rate-based Control (PRC), which aims to maintain the queue length around the target level by 1) dropping the packet whose arrival rate exceeding maximum desired rate; 2) using virtual queue to control the packet whose arrival rate above minimum desired rate. We compare the performance of PRC through simulation with several well-known...
Studying the behavior of mobile ad-hoc networks (MANETs) is essential for predicting the performance of the network over the mission/application duration. In this work, we develop a framework for automating the network design to aid the user in tuning the design parameters as the mission progresses. We show the different states that the automated design manager (ADM) goes through to support different...
Automatic dynamic resource management (AutoDRM) architecture is a framework to efficiently manage shared resources in the tactical network environments without human operator intervention. The autoDRM architecture was developed to resolve the resource contention issues and to improve the quality of service in the tactical network environments. The information herein describes key components of the...
This paper presents a joint network management approach being studied for interfacing network management of different US future force networks. The approach attempts to pass information between the cipher text network managers of the army, the navy and the air force networks such that intelligent decisions can be made as traffic flows between these networks. As the first straw man approach, the paper...
The problem of anonymous wireless networking is considered when adversaries who monitor the transmissions in the network are also capable of compromising a fraction of nodes to extract network information. For a given level of network performance, as measured by network throughput, the problem of maximizing anonymity is studied from a game-theoretic perspective. The metric of anonymity considered...
With the proliferation of network management tools that adjust link and path characteristics to optimize network performance and health, TCP's are frequently incorporating path characteristic detection mechanisms to quickly adapt to the effects of these changes. Optimal TCP performance, including rapid adaptability, depends on, among other things, an accurate view of the of the bandwidth-delay product...
The net-centric vision for the global information grid (GIG) includes evolution toward Internet protocol (IP) based services. IP service profiles and in-service traffic flows in support of Warfighters in evolving deployments are highly variable, with end-to-end (E2E) flows typically spanning both terrestrial and satellite communications (SATCOM) networks. Communications planning, management and control...
Nowadays, BitTorrent packets constitutes a large part of peer-to-peer application traffic on the Internet. Due to increasing size of BitTorrent traffic, it becomes inevitable to take into account the effects of it in network management. Generally, studies relevant with Bittorrent traffic measurement have performed analysis with packets transmitted via IPv4 protocol. However, provided many facilities...
The paper reports on an analysis of the WiMAX market for the purpose of positioning future contributions of WiMAX standards as part of the WiMAGIC project. The report examines nine key themes that are influencing current and future WiMAX deployments: WiMAX devices, confusion concerning WiMAX capabilities, spectrum allocation, WiMAX as 4G, WiMAX as an emerging country technology, political and regulatory...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.