• Title/Summary/Keyword: provisioning

Search Result 377, Processing Time 0.028 seconds

A Study on Path Selection Scheme for Fast Restoration in Multilayer Networks (신속한 다계층 보호 복구를 위한 경로선택 방식 연구)

  • Cho, Yang-Hyun;Kim, Hyun-Cheol
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.35-43
    • /
    • 2012
  • The explosive growth of Internet traffic cause by smart equipment such as smart phone has led to a dramatic increase in demand for data transmission capacity and network control architecture, which requires high transmission rates beyond the conventional transmission capability. Next generation networks are expected to be controlled by Generalized Multi-Protocol Label Switching(GMPLS) protocol suite and operating at multiple switching layers. In order to ensure the most efficient utilization of multilayer network resources, effective global provisioning that providing the network with the possibility of reacting in advance to traffic changes should be provided. In this paper, we proposes a new path selection scheme in multilayer optical networks based on the vertical PCE architecture and a different approach to efficiently exploit multiple PCE cooperation.

Handoff Management for Mobile Devices in Hybrid Wireless Data Networks

  • Inayat Riaz;Aibara Reiji;Nishimura Kouji
    • Journal of Communications and Networks
    • /
    • v.7 no.1
    • /
    • pp.76-86
    • /
    • 2005
  • Today's wireless access networks consist of several tiers that overlap each other. Provisioning of real time undisrupted communication to mobile users, anywhere and anytime through these heterogeneous overlay networks, is a challenging task. We extend the end-to-end approach for the handoff management in hybrid wireless data network by designing a fully mobile-controlled handoff for mobile devices equipped with dual mode interfaces. By handoff, we mean switching the communication between interfaces connected to different subnets. This mobile-controlled handoff scheme reduces the service disruption time during both horizontal and vertical handoffs and does not require any modification in the access networks. We exploit the IP diversity created by the dual interfaces in the overlapping area by simultaneously connecting to different subnets and networks. Power saving is achieved by activating both interfaces only during the handoff period. The performance evaluation of the handoff is carried out by a simple mathematical analysis. The analysis shows that with proper network engineering, exploiting the speed of mobile node and overlapping area between subnets can reduce service disruption and power consumption during handoff significantly. We believe that with more powerful network interfaces our proposal of dual interfaces can be realized.

Wireless Measurement based TFRC for QoS Provisioning over IEEE 802.11 (IEEE 802.11에서 멀티미디어 QoS 보장을 위한 무선 측정 기반 TFRC 기법)

  • Pyun Jae young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.4B
    • /
    • pp.202-209
    • /
    • 2005
  • In this paper, a dynamic TCP-friendly rate control (TFRC) is proposed to adjust the coding rates according to the channel characteristics of the wireless-to-wired network consisting of wireless first-hop channel. To avoid the throughput degradation of multimedia flows traveling through wireless lint the proposed rate control system employs a new wireless loss differentiation algorithm (LDA) using packet loss statistics. This method can produce the TCP-friendly rates while sharing the backbone bandwidth with TCP flows over the wireless-to-wired network. Experimental results show that the proposed rate control system can eliminate the effect of wireless losses in flow control of TFRC and substantially reduce the abrupt quality degradation of the video streaming caused by the unreliable wireless link status.

Call Admission Control Based on Adaptive Bandwidth Allocation for Wireless Networks

  • Chowdhury, Mostafa Zaman;Jang, Yeong Min;Haas, Zygmunt J.
    • Journal of Communications and Networks
    • /
    • v.15 no.1
    • /
    • pp.15-24
    • /
    • 2013
  • Provisioning of quality of service (QoS) is a key issue in any multi-media system. However, in wireless systems, supporting QoS requirements of different traffic types is a more challenging problem due to the need to simultaneously minimize two performance metrics - the probability of dropping a handover call and the probability of blocking a new call. Since QoS requirements are not as stringent for non-real-time traffic, as opposed to real-time traffic, more calls can be accommodated by releasing some bandwidth from the already admitted non-real-time traffic calls. If the released bandwidth that is used to handle handover calls is larger than the released bandwidth that is used for new calls, then the resulting probability of dropping a handover call is smaller than the probability of blocking a new call. In this paper, we propose an efficient call admission control algorithm that relies on adaptive multi-level bandwidth-allocation scheme for non-realtime calls. The scheme allows reduction of the call dropping probability, along with an increase in the bandwidth utilization. The numerical results show that the proposed scheme is capable of attaining negligible handover call dropping probability without sacrificing bandwidth utilization.

An Experiment on On-Demand Circuit Provisioning in SONET/SDH ASON Networks (지능형 광 전달망에서의 on-demand 회선 생성 성능 분석 실험)

  • Nga, Kinh Thi Thuy;Kim, Byung-Jae;Lee, Yong-Gi;Kang, Min-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2005.08a
    • /
    • pp.174-179
    • /
    • 2005
  • In the SONET/SDH based ASON, one VC3 connection contains 21 VC12 calls. Hence, it can serve up to 21 VC12 calls. When a new VC12 call arrives, if there exists at least one available VC3 connection in the network, that VC12 call is severed immediately. However, if there is no available VC3 connection, that VC12 call has to wait a certain time, called setup latency, for the a new VC3 connection to be established. This is inconvenient for the customers. On the other hand, if there are more VC3 connections than the network requires, this can waste network resources. In this paper, we proposed the solution for these problems. In order to reduce the number of VC12 calls which have to wait, we setup a new VC3 before all VC12 time slots are occupied. Furthermore, to avoid the waste of the network resources, we do not establish all VC3 connections at the same time, but do establish step by step.

  • PDF

An Analysis and Evaluation of Policy-Based Network Management Approaches (정책기반 네트워크 관리 구조의 분석과 평가)

  • Lim Hyung J.;Lee Hyun J.;Lee Jong H.;Chung Tai M.
    • The KIPS Transactions:PartC
    • /
    • v.12C no.2 s.98
    • /
    • pp.289-300
    • /
    • 2005
  • This paper proposed an analytical framework to compare and model the policy-based network management; centralized and distributed typed model. Policy-based network is introduced in various application fields, and a policy framework can offer different processing performance according to application. Therefore, we evaluated the performance and extensibility of each PBNM model when we apply the policy process to the models. The evaluated measurement metrics are policy provisioning time, traffic occurrence amount, PDP processing rate, and global conflict detection in qualitative simulation. The results show that the suitable structure is required according to the analysis for the careful application characteristics, when PBNM is adopted. The modeling framework presented in this paper is intended to quantify the merits and demerits among the currently suggested PBNM models.

LSTM based Network Traffic Volume Prediction (LSTM 기반의 네트워크 트래픽 용량 예측)

  • Nguyen, Giang-Truong;Nguyen, Van-Quyet;Nguyen, Huu-Duy;Kim, Kyungbaek
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.362-364
    • /
    • 2018
  • Predicting network traffic volume has become a popular topic recently due to its support in many situations such as detecting abnormal network activities and provisioning network services. Especially, predicting the volume of the next upcoming traffic from the series of observed recent traffic volume is an interesting and challenging problem. In past, various techniques are researched by using time series forecasting methods such as moving averaging and exponential smoothing. In this paper, we propose a long short-term memory neural network (LSTM) based network traffic volume prediction method. The proposed method employs the changing rate of observed traffic volume, the corresponding time window index, and a seasonality factor indicating the changing trend as input features, and predicts the upcoming network traffic. The experiment results with real datasets proves that our proposed method works better than other time series forecasting methods in predicting upcoming network traffic.

Scalable Service Placement in the Fog Computing Environment for the IoT-Based Smart City

  • Choi, Jonghwa;Ahn, Sanghyun
    • Journal of Information Processing Systems
    • /
    • v.15 no.2
    • /
    • pp.440-448
    • /
    • 2019
  • The Internet of Things (IoT) is one of the main enablers for situation awareness needed in accomplishing smart cities. IoT devices, especially for monitoring purposes, have stringent timing requirements which may not be met by cloud computing. This deficiency of cloud computing can be overcome by fog computing for which fog nodes are placed close to IoT devices. Because of low capabilities of fog nodes compared to cloud data centers, fog nodes may not be deployed with all the services required by IoT devices. Thus, in this article, we focus on the issue of fog service placement and present the recent research trends in this issue. Most of the literature on fog service placement deals with determining an appropriate fog node satisfying the various requirements like delay from the perspective of one or more service requests. In this article, we aim to effectively place fog services in accordance with the pre-obtained service demands, which may have been collected during the prior time interval, instead of on-demand service placement for one or more service requests. The concept of the logical fog network is newly presented for the sake of the scalability of fog service placement in a large-scale smart city. The logical fog network is formed in a tree topology rooted at the cloud data center. Based on the logical fog network, a service placement approach is proposed so that services can be placed on fog nodes in a resource-effective way.

The Impact of Ownership Structure on Credit Risk of Commercial Banks: An Empirical Study in Vietnam

  • PHAM, Thi Bich Duyen;PHAM, Thi Kieu Khanh
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.7
    • /
    • pp.195-201
    • /
    • 2021
  • This study aims to assess the impact of ownership structure of commercial banks on bank credit risk in Vietnam. The authors used the unbalanced table data of 28 commercial banks in the period from 2004 to 2020 with 439 observations. The ratio of loan loss provisioning to loans (CR) is selected as a dependent variable representing credit risk at commercial banks. The regression methods used include: least squares method (OLS), fixed-effect model (FEM), random-effect model (REM) and general least squares method (GLS). The results reveal that, with interaction variable between the ratio of equity to total assets and foreign ownership, the national GDP annual growth rate is negatively associated with credit risk. With the ratio of equity to total assets, the interaction variable between equity and state ownership, and bank size have a significant positive impact on credit risk. In addition, inflation has negligible impact on the credit risk of commercial banks in Vietnam over the research period. The findings of this study suggest that, if foreign-owned banks increase equity capital, there will be a stronger impact on reducing credit risk than other banks. On the other hand, when state-owned commercial banks in Vietnam increase equity, they will have higher credit risk.

How to Implement Successful Virtual Desktop Infrastructure (VDI) in the Manufacturing Sector

  • KIM, Tae-Hi
    • The Journal of Industrial Distribution & Business
    • /
    • v.13 no.10
    • /
    • pp.15-22
    • /
    • 2022
  • Purpose: In the manufacturing sector, VDI (Virtual Desktop Infrastructure) offers advantages to the organizations, such as allowing manufacturers access to the system from any location. The most important things are understanding what the user needs, avoiding under-provisioning, network preparation. This research is to provide useful practical l implementations of VDI in manufacturing industry based on numerous prior studies. Research design, data and methodology: This research has conducted the qualitative content analysis (QCA). When conducting this research, the present author assumed that it is crucial to create the procedures and processes that will be used to acquire the text data needed to structure or solve problems. Results: According to the prior literature analysis, there are five suggestions to implement successful VDI for manufacturing sector. The five solutions are (1) Creation of the machines, (2) Direct users to an available 'Virtual Machine', (3) 'Virtual Machine Power Management', (4) Performance monitoring, and (5) Review security. Conclusions: The research clearly details how VDI can be implemented on a manufacturer platform and how it can be connected to hundreds of users. The author can conclude that connecting hundreds of users can be done using the remote connection of devices and encourage manufacturers to work from different areas.