首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 296 毫秒
1.
MANDATE: managing networks using database technology   总被引:2,自引:0,他引:2  
There has been a growing demand for the development of tools to manage enterprise communication networks. A management information database is the heart of a network management system-it provides the interface between all functions of the network management system and, therefore, has to provide sophisticated functionality allied with high performance. The authors introduce the design of MANDATE (MAnaging Networks using DAtabase TEchnology), a proposed database system for effectively supporting the management of large enterprise networks. The MANDATE design makes a conscious attempt to take advantage of the special characteristics of network data and transactions, and of advances in database technology, to efficiently derive some of the required management functionality  相似文献   

2.
Recent evolutions in high‐performance computing and high speed broadband Internet access have paved a way to enterprise‐wide multimedia applications, which require stern QoS from the underlying networks. In this paper, we have explored threefold studies on existing enterprise network, whereby we proposed an analytical approach to evaluate the performance of the existing network; we have examined the feasibility of existing enterprise networks to accommodate voice over Internet protocol (VoIP) services with acceptable QoS, and we have redesigned the enterprise network to accommodate VoIP services to comply with the user defined QoS. The network performance is evaluated by number of VoIP calls sustained by the network, bandwidth utilization, loss rate and latency through Network Simulation (NS‐2) tool. We have derived a cost model to show the cost‐effectiveness of VoIP services over telephonic network. For a medium‐size enterprise network of 200 clients and 9 servers, our simulation results show that the redesign improves the network performance by increasing the number of VoIP calls by 57% and decreasing bandwidth utilization and packet loss rate by 20% and 7%, respectively. Moreover, the proposed network redesign demonstrates that the network can be scalable and it can handle up to 4% increased voice calls in the future maintaining QoS standards. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

3.
Millimeter wave (mmWave) communication is a promising technology to support high‐rate (e.g., multi‐Gbps) multimedia applications because of its large available bandwidth. Multipacket reception is one of the important capabilities of mmWave networks to capture a few packets simultaneously. This capability has the potential to improve medium access control layer performance. Because of the severe propagation loss in mmWave band, traditional backoff mechanisms in carrier sensing multiple access/collision avoidance (CSMA/CA) designed for narrowband systems can result not only in unfairness but also in significant throughput reduction. This paper proposes a novel backoff mechanism in CSMA/CA by giving a higher transmission probability to the node with a transmission failure than that with a transmission success, aiming to improve the system throughput. The transmission probability is adjusted by changing the contention window size according to the congestion status of each node and the whole network. The analysis demonstrates the effectiveness of the proposed backoff mechanism on reducing transmission collisions and increasing network throughput. Extensive simulations show that the proposed backoff mechanism can efficiently utilize network resources and significantly improve the network performance on system throughput and fairness. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

4.
邓剑锋  张凌  周杰 《通信学报》2013,34(Z2):35-190
针对企业网络的情况,提出了一种企业级视频会议系统的服务质量保证机制。该机制根据视频会议的传输模式,将视频会议的保障转化成对一组具有时间尺度数据流的保障,通过对网络中优先级带宽的管理来为数据流提供预约带宽,在网络的边缘对每个优先级数据流进行认证、标记和整形,在网络核心使用区分服务保障视频流的优先转发,以实现预约带宽的合法使用。实验结果表明该机制能够在网络拥塞的情况下为媒体流提供所需的带宽,能有效地保证视频会议的服务质量。  相似文献   

5.
Content‐centric networking (CCN) has been recently proposed as an alternative to traditional IP‐based networking. In CCN, content is accessed by content name instead of a host identifier (locational identifier). This new type of access methodology rapidly and efficiently disseminates content in combination with the in‐network caching mechanism. For practical use of CCN, many network properties studied in IP‐based networking are being revisited, and new types of CCN architecture components are being designed. Although mobility is an essential aspect of the future networking system, it has not been sufficiently studied. We therefore address fundamental mobility issues, such as seamless handover, optimal access point selection, network mobility, and handling of persistent interests. In addition, for each issue, we propose practical solutions that efficiently align to a CCN environment. To ensure seamless handoff, we propose various handoff schemes and compare their performance in terms of handoff latency using packet‐level simulation. Because our proposed schemes are consistent with the characteristics and rules of CCN, we believe that they can easily be integrated as a part of CCN. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

6.
WDM全光网网络管理系统的设计与实现   总被引:1,自引:0,他引:1  
周宇迅  曾庆济  吴恺 《电信科学》1999,15(11):18-21
基于波长路的WDM全光网是下一代高速宽带光纤网络的首选技术,如何对它进行有效而灵活的管理是目前研究的热点。SHAONET是国内自主开发的第一个WDM全光试验网,它具有自己网络管理系统,可以实现配置管理、性能管理和故障管理。本报导了SHAONET网络的设计和它基于SNMP的实现。  相似文献   

7.
With the growth of network traffic volume, link congestion cannot be avoided efficiently with conventional routing protocols. By utilizing the single shortest‐path routing algorithm from link state advertisement information, standard routing protocols lack of global awareness and are difficult to be modified in a traditional network environment. Recently, software‐defined network (SDN) provided innovative architecture for researchers to program their own network protocols. With SDN, we can divert heavy traffic to multiple paths in order to resolve link congestion. Furthermore, certain network traffics come in periodic fashion such as peak hours at working days so that we can leverage forecasting for resource management to improve its performance. In this paper, we propose a proactive multipath routing with a predictive mechanism (PMRP) to achieve high‐performance congestion resolution. PMRP has two main concepts: (a) a proactive mechanism where PMRP deploys M/M/1 queue and traffic statistics to simulate weighted delay for possible combinations of multipaths placement of all subnet pairs, and leverage genetic algorithm for accelerating selection of optimized solution, and (b) a predictive mechanism whereby PMRP uses exponential smoothing for demand traffic volumes and variance predictions. Experimental results show a 49% reduction in average delay as compared with single shortest routing, and a 16% reduction in average delay compared with utilization & topology‐aware multipath routing (UTAMP). With the predictive mechanism, PMRP can decrease an additional 20% average delay. Furthermore, PMRP reduces 93% of flow table usage on average as compared with UTAMP.  相似文献   

8.
基于数据库的IP网络管理研究   总被引:2,自引:1,他引:1  
赵洁  李成海 《通信技术》2009,42(10):108-110
针对广泛应用的网络管理协议SNMP,研究了如何高效地进行基于SNMP的IP网络管理。首先分析了目前基于SNMP的IP网络管理框架结构中存在的一些问题,然后有针对性地提出了基于数据库的SNMP网络管理结构,并具体分析了改进结构的工作机制。  相似文献   

9.
Modern wireless networks are offering a wide range of applications that require the efficient integration of multimedia and traditional data traffic along with QoS provision. The IEEE 802.11e workgroup has standardized a new QoS enhanced access scheme for wireless LANs, namely Hybrid Control Function (HCF). HCF consists of the Enhanced Distributed Channel Access (EDCA) and the Hybrid Control Channel Access (HCCA) protocols which manage to ensure QoS support. However, they exhibit specific weaknesses that limit network performance. This work analyzes an alternative protocol, called Priority Oriented Adaptive Polling (POAP). POAP is an integrated channel access mechanism, is collision free, it employs priorities to differentiate traffic in a proportional way, it provides fairness, and generally supports QoS for all types of multimedia applications, while efficiently serving background data traffic. POAP is compared to HCF in order to examine the wireless network performance when serving integrated traffic.  相似文献   

10.
As wireless technology advances, wireless products are integrated with enterprise networking to offer cordless terminal mobility. Most corporations have deployed wireless PBXs at the departmental level. However, the mobility management mechanism that integrates these facilities at the corporation level may not be available. This paper describes a mobility management mechanism for an enterprise wireless telephone network. We show how, to modify the call model of the private branch exchange (PBX) to accommodate mobility management for an enterprise network. Our design was implemented on a commercial PBX product called Jupiter. An analytical model is proposed to evaluate the performance of the implemented system. Our study shows that with a large number of WPBXs and long Internet message delays, the misrouting probability can be limited to within 1%. This performance result is considered satisfactory  相似文献   

11.
The hardware acceleration mechanism for VNF (virtual network function) is recently a hot research topic in SDN/NFV architecture because of the low processing performance of VNF.Once hardware acceleration resources have been plugged into the network,how to optimally mange and orchestrate these resources under service requirements remains a question to be solved.Firstly,a unified management architecture based on separated control for hardware acceleration resources was proposed.Then,traditional network topology together with hardware acceleration resources were modeled into a unified network model and then the hardware acceleration resource orchestration problem was transferred into a multi-objective linear programming problem.Finally,a hardware-accelerator-card-prior’ heuristic algorithm was designed.Experimental results show that compared with existing methods,the proposed orchestration mechanism can efficiently manage hardware acceleration resources and reduce the processing latency by 30%.  相似文献   

12.

As technology rapidly advances, the number of devices constantly communicating, transmitting and receiving data through the cellular networks keeps rising, posing an unprecedented load on them. Such an increase calls for establishing new methods to manage these devices as well as utilize the data produced by them to establish network architectures that can prevent cellular networks from overloading. To achieve the desired results, we need to optimally allocate network resources to existing users. Resource allocation has traditionally been considered an optimization problem where proposed solutions are hard to implement in real time, resulting in the use of inferior solutions with reduced produced performance. With the introduction of Machine Learning, we propose three mechanisms, intending to utilize network data to improve real time network performance. The first mechanism, a Decision Trees based mechanism aims to improve real time decision making by predicting the optimal matching of users and Base Stations. The second mechanism, a K-means based mechanism intends to tackle network congestion and ensure uninterrupted Quality of Service by predicting the optimal coordinates for placing Base Stations along the network based on traffic data. Finally, a Regression based mechanism manages to predict user movement along the network, resulting in improved resource management and reduced energy waste. These mechanisms can work cooperatively, essentially establishing a network architecture that utilizes prediction to efficiently allocate users and manage available resources.

  相似文献   

13.
一种基于不变量的从工作流网到PERT图的转换方法   总被引:3,自引:0,他引:3       下载免费PDF全文
葛季栋  胡昊  吕建 《电子学报》2008,36(5):893-898
 工作流管理系统为现代企业提供了一种协同工作环境,可以管理企业的业务过程,并提高企业的商业竞争能力.为了有效管理业务过程的进度,需要提供一种基于工作流过程模型的进度估算方法.基于Petri网的工作流网模型难以直接估算工作流过程模型的进度与工期,而在传统的项目进度计划中,PERT图是一种成熟的技术,为此,本文在工作流网的基础上增加了时间的概念,基于LMST-不变量的分解技术,提出了一种将LMST-不变量分解得到的子网转换为PERT图的算法,由此达到估算工作流过程模型的进度与工期的目的.  相似文献   

14.
针对无线自组网中网络资源缺乏的问题,在MAC协议中引入优化控制传输功率的机制,可以有效地开发现有资源,提高网络性能。本文详细分析了PCMA协议的思想、机制以及对网络性能的影响,指出了协议的缺陷。  相似文献   

15.
Overlapping is one of the topics in wireless sensor networks that is considered by researchers in the last decades. An appropriate overlapping management system can prolong network lifetime and decrease network recovery time. This paper proposes an intelligent and knowledge‐based overlapping clustering protocol for wireless sensor networks, called IKOCP. This protocol uses some of the intelligent and knowledge‐based systems to construct a robust overlapping strategy for sensor networks. The overall network is partitioned to several regions by a proposed multicriteria decision‐making controller to monitor both small‐scale and large‐scale areas. Each region is managed by a sink, where the whole network is managed by a base station. The sensor nodes are categorized by various clusters using the low‐energy adaptive clustering hierarchy (LEACH)‐improved protocol in a way that the value of p is defined by a proposed support vector machine–based mechanism. A proposed fuzzy system determines that noncluster heads associate with several clusters in order to manage overlapping conditions over the network. Cluster heads are changed into clusters in a period by a suggested utility function. Since network lifetime should be prolonged and network traffic should be alleviated, a data aggregation mechanism is proposed to transmit only crucial data packets from cluster heads to sinks. Cluster heads apply a weighted criteria matrix to perform an inner‐cluster routing for transmitting data packets to sinks. Simulation results demonstrate that the proposed protocol surpasses the existing methods in terms of the number of alive nodes, network lifetime, average time to recover, dead time of first node, and dead time of last node.  相似文献   

16.
In this paper, we introduce an effective bandwidth-based call admission control (CAC) with adaptive modulation technique to manage the traffic in a wireless IP-based network. Furthermore, in order to efficiently use the physical resources of the network, we take advantage of an adaptive MQAM (M-ary quadrature amplitude modulation) to match transmission rates to the time-varying channel conditions. This cross-layer architecture has been examined for the self-similar traffic model. The results show that by simultaneous implementation of the effective bandwidth algorithm in the data-link layer and adaptive modulation technique in the physical layer, the performance of the wireless network in terms of the number of rejected calls and system throughput improves.  相似文献   

17.
Radio frequency identification (RFID) technology adopts the air interface to deliver the information required for object identification. The RFID system is convenient to manage and operate, and is widely encouraged by the large‐scale chain industry. Additionally, electronic product code (EPC) network technology allows immediate, automatic identification and sharing of information on items in the supply chain. This work proposes an RFID service middleware with a highly reliable and efficient application‐level event (ALE)‐based prototype mechanism according to EPCglobal. A Student Muster Roll (SMR) application test bed is implemented in the proposed ALE‐based scheme. The SMR system can be employed to manage the absentee records of students in a class, and can manage and control several operation multi‐reader devices simultaneously. The proposed scheme can filter attendance accurately, eliminating the possibility of reduplication in student records. Performance evaluation results indicate that the proposed novel scheme is much more efficient and reliable than a naive ALE scheme. Copyright © 2008 John Wiley & Sons, Ltd.  相似文献   

18.
With the soaring channel speed and density in all-optical networks (AONs), the risk of high data loss upon network faults increases quickly. To manage network faults efficiently, an m-cycle based fault detection and localization (MFDL) scheme has been introduced recently. This paper verifies the necessary and sufficient condition for achieving the complete fault localization (CFL) in MFDL, which is defined as the case that every single network fault can be located to a unique link. We model the m-cycle construction as a new mathematical problem: the variant version of the constrained cycle-cover problem (vCCCP) and explore its formal expression. The model includes the consideration of the cycle-length limit, cycle number, and wavelength cost, while also keeps the CFL achievable. A two-phase branch-and-bound (B&B) algorithm was developed for solving the vCCCP, which guarantees to find near-optimal solutions. This algorithm is then applied to four typical and four random network examples to validate and assess the performance. The results are analyzed and compared with some previously reported algorithms, in terms of fault localization degree, cycle number, wavelength overhead, and cost reduction. The performance evaluation and comparison reveal that the new model and algorithm could significantly reduce the MFDL cost, including both the cost of monitoring devices and reserved wavelengths.  相似文献   

19.
Access control is one of the fundamental security mechanisms of IT systems. Most existing access control schemes rely on a centralized party to manage and enforce access control policies. As blockchain technologies, especially permissioned networks, find more applicability beyond cryptocurrencies in enterprise solutions, it is expected that the security requirements will increase. Therefore, it is necessary to develop an access control system that works in a decentralized environment without compromising the unique features of a blockchain. A straightforward method to support access control is to deploy a firewall in front of the enterprise blockchain application. However, this approach does not take advantage of the desirable features of blockchain. In order to address these concerns, we propose a novel blockchain‐based access control scheme, which keeps the decentralization feature for access control–related operations. The newly proposed system also provides the capability to protect user's privacy by leveraging ring signature. We implement a prototype of the scheme using Hyperledger Fabric and assess its performance to show that it is practical for real‐world applications.  相似文献   

20.
随着我国信息技术的不断发展,各个企业都在相继建设自己的MIS系统或Internet系统。本简要介绍了电信总局工程管理系统建设方案,主要包括网络结构、系统平台及系统功能等内容。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号