Academic literature on the topic 'Information and telecommunications network'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Information and telecommunications network.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Information and telecommunications network"

1

BAGRETSOV, SERGEY A., ILYA A. GALKIN, NIKOLAY B. ACHKASOV, and DENIS A. IVANOV. "METHODOLOGY FOR ANALYZING THE CONSTRUCTION OF STRUCTURAL REDUNDANCY OF AN INFORMATION AND TELECOMMUNICATIONS NETWORK UNDER THE INFLUENCE OF THE ENEMY." H&ES Research 13, no. 5 (2021): 29–37. http://dx.doi.org/10.36724/2409-5419-2021-13-5-29-37.

Full text
Abstract:
Introduction: the problems of building an information and telecommunications network are considered from the position of fragmentary development based on the methodology of implementing structural and topological principles of ensuring survivability in the construction of an information and telecommunications network. Information and telecommunication networks belong to the class of large systems. They cannot be created in a short time and assume fragmentary (evolutionary) development. Therefore, some of its elements can be exploited, others can be designed, and others can be investigated. For this reason, the methodology should include not only synthesis methods, algorithmic and parametric optimization methods (system design), but also engineering design methods (implementation of synthesis results). Purpose: a methodology is proposed for the implementation of structural and topological principles of ensuring survivability in the construction of an information and telecommunications network, including a methodology for constructing a structurally redundant information and telecommunications network, implementing the integration – triad principle of its construction, an algorithm for constructing a reference variant of the network structure and an algorithm for its correlation, taking into account the use of means and methods of counteraction by the enemy. The questions of the structural and mathematical definition of the methodology for constructing a structurally redundant information and telecommunications network that implements the integration – triad principle of its construction, the algorithm for constructing a reference version of the network structure and the algorithm for its correlation, considering the use of means and methods of counteraction by the enemy, are presented. Methods: the proposed methodology can also be used to analyze networks under the influence of the enemy, when it is necessary to modernize the information and telecommunications network with network transformation. Results: the results indicate the adequacy and effectiveness of the methodology for solving the problem of building a network in its design, as well as for analyzing networks under the influence of the enemy, when it is necessary to modernize the information and telecommunications network with the transformation of the network As a result of calculating the ordinal function of the graph reflecting the hierarchical structure of communication nodes of the information and telecommunications network, their hierarchical distribution determining the reference structure of the system is obtained. Within the framework of this structure, its rational variant is being sought. Thus, to assess the adequacy and effectiveness of the proposed network, it is necessary to compare alternative options for building a network. The information and telecommunication network obtained as a result of the application of the proposed construction methodology corresponds in its characteristics to the set goals, i.e. corresponds to a network that is the result of many years of experience and repeated improvements aimed at the most effective mutual exchange of information in accordance with the conditions of the enemy's influence. Discussion: the resulting network is better, since it is more stable when exposed to the enemy, and the existing network satisfies the conditions that exist in this particular period of time, and when exposed to the enemy worsens its performance.
APA, Harvard, Vancouver, ISO, and other styles
2

Sova, Oleg. "Analysis of conditions and factors affecting cyber security in the special purpose information and telecommunication system." Technology audit and production reserves 4, no. 2(66) (2022): 25–28. http://dx.doi.org/10.15587/2706-5448.2022.261874.

Full text
Abstract:
The increase in the number of cases of failure of information and telecommunication networks due to cyber attacks determines the need to protect them from this type of attacks. The issue of increasing cyber security in the conditions of conducting operations by groups of troops (forces) is very important. Due to the armed conflict in the East of Ukraine, the military-political instability in the Middle East, the struggle for influence on world financial and energy flows, the global military-political instability is intensifying. This is due to an increase in the number of communication devices in information and telecommunication networks, as well as an increase in the number of possible attacks that can be used to disrupt the operation of an information and telecommunication network. Considering the above, the object of research is a special purpose information and telecommunication system. The subject of research is cyber security of a special purpose information and telecommunication system. Classical methods of scientific knowledge, namely analysis and synthesis, were used during the research. The research identifies factors that affect cyber security in a special purpose information and telecommunications system. All this must be taken into account while planning and deploying a special purpose information and telecommunication system. The analysis of the consequences of the impact on the information and telecommunications system of special purpose of modern devices of defeat and the impact of devices of radio-electronic suppression and other factors was carried out. A typical special purpose information and telecommunication system does not fully meet the requirements for constant readiness to ensure the management of troops (forces), stability, mobility and throughput. A formalized description of the task of improving cyber security in a special purpose information and telecommunications network is provided. The components that affect the level of cyber security of the special purpose information and telecommunication network during the group's operations have been established. The impact of the specified conditions and factors must be reflected: in the planning documents during the planning of the deployment and operation of the group's information and telecommunications system; in the software, during operational management.
APA, Harvard, Vancouver, ISO, and other styles
3

Oleg, Sova. "Analysis of conditions and factors affecting cyber security in the special purpose information and telecommunication system." Technology audit and production reserves 4, no. 2(66) (2022): 25–28. https://doi.org/10.15587/2706-5448.2022.261874.

Full text
Abstract:
<em>The increase in the number of cases of failure of information and telecommunication networks due to cyber attacks determines the need to protect them from this type of attacks. The issue of increasing cyber security in the conditions of conducting operations by groups of troops (forces) is very important. Due to the armed conflict in the East of Ukraine, the military-political instability in the Middle East, the struggle for influence on world financial and energy flows, the global military-political instability is intensifying. This is due to an increase in the number of communication devices in information and telecommunication networks, as well as an increase in the number of possible attacks that can be used to disrupt the operation of an information and telecommunication network. Considering the above, the object of research is a special purpose information and telecommunication system. The subject of research is cyber security of a special purpose information and telecommunication system. Classical methods of scientific knowledge, namely analysis and synthesis, were used during the research. The research identifies factors that affect cyber security in a special purpose information and telecommunications system. All this must be taken into account while planning and deploying a special purpose information and telecommunication system. The analysis of the consequences of the impact on the information and telecommunications system of special purpose of modern devices of defeat and the impact of devices of radio-electronic suppression and other factors was carried out. A typical special purpose information and telecommunication system does not fully meet the requirements for constant readiness to ensure the management of troops (forces), stability, mobility and throughput. A formalized description of the task of improving cyber security in a special purpose information and telecommunications network is provided. The components that affect the level of cyber security of the special purpose information and telecommunication network during the group&#39;s operations have been established. The impact of the specified conditions and factors must be reflected: in the planning documents during the planning of the deployment and operation of the group&#39;s information and telecommunications system; in the software, during operational management.</em>
APA, Harvard, Vancouver, ISO, and other styles
4

Shi, Tao, Peng Zhang, and Fang Cheng. "The Design and Application of Telecommunication Network Resources Abstract Model." Applied Mechanics and Materials 602-605 (August 2014): 3451–56. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.3451.

Full text
Abstract:
Model Tao Shi ,Peng Zhang and Fang Cheng School of Chongqing University of Posts and Telecommunications, Chongqing 400065, China shitao12300@163.com Keywords: telecommunications network resources, resource model, object-oriented, virtualization technology, network management system Abstract. In order to manage and utilize telecommunication network resources more effectively, aiming at the shortage of the resource management of telecom network management system, through the study the concept of the shared information data (SID) model in the new generation of telecom operation support system (NGOSS) , according to the characteristics of the telecommunications network resources, telecommunications network resource model with object-oriented approach is proposed and designed. Meanwhile, Combined with telecommunication network business resource model to illustrate the mechanism of telecom network resource by users applications in network management system. Experiments have proved that resource model can provide powerful support for complex network management.
APA, Harvard, Vancouver, ISO, and other styles
5

Dovgiy, Stanislav O., Oleh V. Kopiika, and Oleksii S. Kozlov. "Synthesis of information and telecommunication networks of automatized environmental security systems with the purpose of gaining maximum noise resistance with a given efficiency." Environmental safety and natural resources 40, no. 4 (2021): 5–20. http://dx.doi.org/10.32347/2411-4049.2021.4.5-20.

Full text
Abstract:
The article defines the system features, properties and characteristics of information and telecommunication networks of automated environmental safety systems: information reliability and proven efficiency as a fundamental characteristic of system perfection. The main task of this research is to standardize the highest level of information and telecommunications networks architecture that provide the creation, processing, storage, deletion and transportation of information. In this case, the architecture is considered as a single for: all types of networks (including network services): optical transport network, Internet network (data network), fixed telephone network, mobile network and all types of products, customers, services, resources, aspects of management. A very important requirement is that the system architecture should not change when changing the structure of products, market requirements or the structure of the company. Standardization of information systems architecture involves: defining a complete list of architecture components; determination of functional boundaries of components; definition of interfaces (protocols) of interaction of components. The main purpose of architecture standardization is: to reduce the implementation of telecommunications services by reducing the time for implementation and modernization of information systems, and increase the efficiency of implementation of information systems, as well as reduce costs for their creation and operation by: avoiding duplication of functions; use of open interfaces; repeated use of the same type of elements. The research concerns the structural synthesis of the architectures of four main telecommunication networks: transport, IP, mobile and fixed. Eight sets of network resources (levels) were selected to standardize each network architecture. Based on the results of the analysis, it is possible to draw a conclusion about the development potential of each network depending on the trends of modern telecommunications services. The telecommunication services means of production architecture, which include platforms of network resources and network services, is considered. The article proposes a methodological basis for the synthesis of information and communication technology systems in order to establish a single information platform, which is presented as a universal architecture of information and communication systems. The messaging service is considered in the context of: one workstation, one domain and interconnection between domains. The efficiency of information transmission systems is considered. When evaluating different communication systems, two indicators were taken into account: efficiency and noise immunity; their combination gives a fairly complete description of the system. The most perfect system is the one that provides the greatest efficiency at a given noise immunity or, conversely, the greatest noise immunity at a given efficiency.
APA, Harvard, Vancouver, ISO, and other styles
6

Kanaev, Andrey, Elina Login, and Kseniya Pudovkina. "Informational Model of Promising Database in the System of Management for Carrier Ethernet Telecommunication Network." Proceedings of Petersburg Transport University 19, no. 3 (2022): 421–31. http://dx.doi.org/10.20295/1815-588x-2022-3-421-431.

Full text
Abstract:
Purpose: To develop an informational model of a promising database in the system of management of telecommunication network which uses Carrier Ethernet technology for to ensure the efficiency of storage, access and update of data on the telecommunication network functioning that will allow to increase the operativeness of implementation of OAM (Operation, Administration and Management) control-management built-in processes at timely and reasonable decision-making on telecommunication network management in conditions of high dynamics of changes in the network state as well as in view of Carrier Ethernet technology specificities. Thus, in order to provide services of given quality, an information model of database in telecommunication network management system has been created with indication of information main sources which’re represented by subsystems and models of telecommunications network management system in accordance with the previously developed three-level conceptual model. Also, to achieve the stated goal a logical structure of the obtained database information model on the example of domain objects has been developed. Methods: Fundamentals of complex process management theory; theory of multi-agent systems of management of distributed object; theory of systems of information storage and presentation; object-oriented projection method; set-theoretic approach for the description of data set about a control object. Results: The obtained informational model of database and the developed logical three-level structure of functioning are described verbally and mathematically. The evaluation of functioning of the proposed logical structure of the database in the system of telecommunication network management using Carrier Ethernet technology and OAM mechanisms is given. The directions of further research towards development of the models of major processes of collection, processing and provision of data on functioning of subsystems in the system of telecommunications network management are proposed. Practical significance: The developed informational model of database in the system of telecommunications network management differs from well-known ones by the possibility of accounting for and including in the data of the implementation of the complex of unique models of functioning and management of Carrier Ethernet telecommunication network and the mechanisms of OAM management, that were previously obtained by the authors and represent subsystems in the telecommunications network management system with the use of Carrier Ethernet technology possibilities.
APA, Harvard, Vancouver, ISO, and other styles
7

Ilyenko, Anna, Sergii Ilyenko, Kvasha Diana, and Yana Mazur. "PRACTICAL APPROACHES TO DETECTING VULNERABILITIES IN INFORMATION AND TELECOMMUNICATION NETWORKS." Cybersecurity: Education, Science, Technique 3, no. 19 (2023): 96–108. http://dx.doi.org/10.28925/2663-4023.2023.19.96108.

Full text
Abstract:
Looking at information and telecommunication networks, we see that the transmission of confidential data via the Internet is becoming more frequent every day, and therefore, it is necessary that our data be reliably protected from various threats, vulnerabilities that every day try to gain access to the network and intercept data, neutralize, gain access to network resources. That is why, in our time, protecting data, software and hardware from viruses and various vulnerabilities is more necessary than ever, and not just a problem. Based on these considerations, it is necessary both to create new methods for protecting information and telecommunication networks, and to improve existing ones for better network security, because one of the important elements of information protection is network protection itself. Taking into account the constantly growing statistics of cyber attacks on information and telecommunication networks, after in-depth analysis and processing of the mentioned issues, the authors of the article highlighted the current state of ensuring the security of information and telecommunication networks and solutions regarding security in information and telecommunication networks. The authors comprehensively covered and investigated the problems of ensuring security in information and telecommunication networks, conducted an analysis of threats and vulnerabilities that harm the information network, and conducted research on methods of countering modern threats to information and telecommunication networks. Attention is also paid to the development of security solutions in the information and telecommunications network. The authors plan a number of scientific and technical solutions for the development and implementation of effective methods for detecting vulnerabilities and means for ensuring the requirements, principles and approaches for ensuring the security of information and telecommunication networks.
APA, Harvard, Vancouver, ISO, and other styles
8

Sokolova, A. V., E. V. Login, G. A. Mashkovtsev, and I. S. Grishanov. "Package for data management of a telecommunication device in a monitoring system." E3S Web of Conferences 549 (2024): 08026. http://dx.doi.org/10.1051/e3sconf/202454908026.

Full text
Abstract:
In order to identify the role of data storage in the monitoring system of a telecommunications device, a conceptual design method was used, which was based on the basic principles of the Telecommunication Management Network concept, which is a network management system for telecommunication operators. Based on this concept, it was possible to design a data storage model in the monitoring system of a telecommunications device, which clearly reflects the separation of databases involved in the telecommunications network at different levels of the concept. A description of the differences between the databases assigned to each specific level from each other and an explanation of the functional features of each of the databases under consideration, as well as a description of the data circulation process over the network, is presented. The work focuses on describing the contents of the database of a specific telecommunications device, which is the object of control in the communication network, with the possibility of developing an interface to this database, which makes it convenient to search, view and modify stored data. To designate the information stored in the database of a telecommunications device, a fragment of the database was developed containing a set of attributes characterizing the device, their values and parameters of attribute values. The role of the database interface is to enable the user to quickly and easily access the information contained in the database.
APA, Harvard, Vancouver, ISO, and other styles
9

Humeniuk, I. V., M. S. Basaraba, and O. V. Nekrilov. "METHODS OF ENSURING CYBER SECURITY OF CRITICAL COMPONENTSNETWORKS OF INFORMATION AND TELECOMMUNICATION SYSTEM." Проблеми створення, випробування, застосування та експлуатації складних інформаційних систем, no. 18 (December 30, 2020): 101–10. http://dx.doi.org/10.46972/2076-1546.2020.18.10.

Full text
Abstract:
It is established that the efficiency and reliability of information and telecommunication systems, in particular the networks that are part of them, significantly depends on the high level of protection of critical components. However, the constant improvement of the technical equipment of these systems requires the creation of new and improvement of existing methodological support for cyber security. One of the promising approaches is the development of a universal method of cybersecurity in the context of cyberattacks (influences, threats, etc.) and unauthorized access by unauthorized users to critical nodes (components) of information and telecommunications systems. Timely detection, prompt counteraction to cyber threats and unauthorized access to critical network components is a necessary component of ensuring a high level of cybersecurity of the information and telecommunications system as a whole, especially in the context of hybrid warfare and armed aggression by the Russian Federation. To this end, the article proposes a method of cybersecurity of critical components of information and telecommunications systems, which is based on the integrated application of monitoring the state of network nodes and user access to them, recording the facts of cyberattacks based on analysis of incoming (outgoing) traffic, timely detection of unauthorized access to and commission of cyber threats, as well as operational response to these attempts. The paper presents the results of verification of the proposed methods. To this end, the article proposes a method of cybersecurity of critical components of information and telecommunications systems, which is based on the integrated application of monitoring the state of network nodes and user access to them, recording the facts of cyberattacks based on analysis of incoming (outgoing) traffic, timely detection of unauthorized access to and commission of cyber threats, as well as operational response to these attempts. The paper presents the results of verification of the proposed method. It is shown that its application allows to quickly detect the facts of cyber threats and unauthorized access to critical components of information and telecommunication systems networks and effectively counteract these attempts.
APA, Harvard, Vancouver, ISO, and other styles
10

Metelev, O. "Transport telecommunication networks as an information medium for obtaining information relevant to criminal proceedings: problematic issues of legal regulation." Herald of criminal justice, no. 4 (2019): 161–73. http://dx.doi.org/10.17721/2413-5372.2019.4/161-173.

Full text
Abstract:
Scientific and technological progress, as well as the rapid development of information technologies, the formation of the information society, the introduction of telecommunications systems and networks into all vital processes, the availability of digital communications and information transmission have necessitated the use of new methods of combating crime in the new information (cybernetic) space, this artificially created environment, which is an integral part of transport telecommunications networks (TTN). The extraterritorial nature of transport telecommunication networks and systems, together with the global Internet, greatly complicates their legal regulation, as it is sometimes quite difficult to determine the jurisdiction of which state relates a criminal offense. Thus, when conducting silent investigative actions, a legitimate question arises as to the lawfulness of work in the information environment of the transport telecommunication network for obtaining digital evidence in the interests of criminal proceedings. Purpose of the article: to investigate the problematic issues of legal regulation when working in transport telecommunication networks in order to obtain information relevant to criminal proceedings during the conduct of silent investigative actions. The paper draws attention to the insufficient level of scientific research to cover the problematic issues of studying transport telecommunications networks as an information medium for legal obtaining digital evidence in the interests of criminal justice. The national legislation regulating public relations in this field is analyzed, as well as the case law of the European Court of Human Rights, which reveals some «white spots» in national legislation on ensuring the legitimacy and protection of human rights in the conduct of vague private communication interventions in the information environment of transport telecommunication networks. Taking into account the extraterritorial nature of the information (cyber) space, it is concluded that there is a need for clear legislative regulation of procedural activity in the transport telecommunication networks in order to ensure the security of the individual, society and the state as a whole in this sphere. The article also discusses different approaches to legal disparities in cyber crime investigations. The question of determining the crime scene in the information (cybernetic) space is raised, an attempt is made to define the "crime scene" and provides suggestions for improving legislation.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Information and telecommunications network"

1

Morris, Brian. "The network paradigm : considering the development of an information technology and telecommunications industy in Ballarat, Victoria with a network perspective." Thesis, Federation University Australia, 2002. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/165014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yang, Baojiang. "Essays on Telecommunications Management: Understanding Consumer Switch, Search and Purchase Behaviors." Research Showcase @ CMU, 2018. http://repository.cmu.edu/dissertations/1149.

Full text
Abstract:
Digitization has been pervasively reshaping the landscape of home-based telecommunication industries. The massive disruptive challenges call for telecom companies to react with efficient strategic managerial policies. Meanwhile, how consumer decision makings and welfare are impacted by such policies often remains complicated and non-transparent to policy makers. My thesis aims at leveraging large-scale empirical data to investigate the impacts of several prevalent firm initiated strategies on both sides of the market, i.e. consumers and firms. The thesis is comprised of three studies focusing on consumer switch, search and purchase behaviors. The first study, centering at consumer switching behaviors, investigates the impact of lock in shortening policies on both firm profits and consumer welfare in home-based telecommunication service market. Using household level data from a large telecommunications service provider, we show that a market level policy that shortens the lock-in period from the status quo can decrease the profits on the firms side more than it increases consumer surplus. This is majorly caused by the substantial acquisition costs associated with user switching and service initiation. As a result if regulators shorten lock-in periods but then firms respond by collaboratively increasing prices to recover their rate of return, the consumers, as the analyses indicate, may be worse off compared to the world in which lock-in periods do not change. Therefore lock-in reduction policy need to be paired with a policy precluding operators from increasing prices too much. The later two studies jointly examine consumer’s search and purchase behaviors in social environment. With a wide scope of services, telecommunication service providers can often leverage their knowledge on consumer’s social environment to reshape consumer choices. We aim to understand how consumers combine different sources of social information, one from friends versus one from the crowd, as a function of how close they are to the point of conversion. We developed a dynamic structural econometric model that jointly describes consumer information search and product purchase while taking into account sequential arrival of information and non-negligible search costs. The model is then instantiated on two connected yet distinct empirical contexts, where consumers shop for movies to watch on home screens. The first empirical context (discussed in the second study in this thesis) lies in an observational setting, where we studied individual level clickstream and transactional data from a Video-on- Demand service platform operated by a large telecommunication service provider. Later in the third study, we created an artificial movie market and leveraged a randomized web experiment to further study the research questions with more solid identification support. We find that, in both contexts, consumers seem to start by browsing products they heard about from friends. The popularity signals become more relevant when consumers getting closer to the point of purchase. The results have important managerial implications to online vendors by suggesting a reasonable strategy of providing the most valuable social information at the right time to enhance consumer shopping experiences.
APA, Harvard, Vancouver, ISO, and other styles
3

Hong, Jun, and 洪珺. "Impact of information on wireless network performance." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B46585989.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lefebvre, Thibaut. "Optimization of information flows in telecommunication networks." Thesis, Paris, CNAM, 2016. http://www.theses.fr/2016CNAM1053/document.

Full text
Abstract:
Dans les réseaux de télécommunications, la demande croissante pour de nouveaux services, comme la diffusion de vidéos en continu ou les conférences en ligne, engendre un besoin pour des dispositifs de télécommunication où le même contenu est acheminé depuis un émetteur unique vers un groupe de récepteurs. Cette évolution ouvre la voie au développement de nouvelles techniques d'acheminement des données, comme le multicast qui laisse un nœud du réseau copier ses données d'entrée puis retransmettre ces copies, ou le codage réseau, qui est une technique permettant à un nœud d'effectuer des opérations de codage à partir de ses données d'entrée. Cette thèse traite de la mise en place de techniques de codage au sein d'un réseau multicast filaire. Nous formalisons certains problèmes qui apparaissent naturellement dans ce contexte grâce à la recherche opérationnelle et à des outils d'optimisation mathématique. Notre objectif est de développer des modèles et des algorithmes afin de calculer, au moins de manière approchée, certaines grandeurs qui ont vocation à être pertinentes dans le cadre de la comparaison de techniques d'acheminement de données dans un réseau de télécommunications. Nous évaluons ainsi, d'un point de vue à la fois théorique et expérimental, l'impact induit par l'introduction de techniques de codage au sein d'un réseau multicast. Nous nous concentrons en particulier sur des critères importants pour un opérateur de télécommunication, comme la maximisation du débit d'information entre une source et un ensemble de destinataires dans le réseau, la minimisation de la congestion sous contrainte de demande, ou la minimisation de la perte de débit ou du coût induit par l'acheminement des données dans un réseau soumis à des pannes<br>In telecommunication networks, the increasing demand for new services, like video-streaming or teleconferencing, along with the now common situation where the same content is simultaneously requested by a huge number of users, stress the need for point to many data transmission protocols where one sender wishes to transmit the same data to a set of receivers. This evolution leads to the development of new routing techniques like multicast, where any node of the network can copy its received data and then send these copies, or network coding, which is a technique allowing any node to perform coding operations on its data. This thesis deals with the implementation of coding techniques in a wired multicast network. We formalize some problems naturally arising in this setting by using operations research and mathematical optimization tools. Our objective is to develop models and algorithms which could compute, at least approximately, some quantities whose purpose is to be relevant as far as forwarding data using either multicast and network coding in telecommunications networks is concerned. We hence evaluate, both in theory and numerically, the impact of introducing coding techniques in a multicast network. We specifically investigate relevant criteria, with respect to the field of telecommunications, like the maximum amount of information one can expect to convey from a source to a set of receivers through the network, the minimum congestion one can guarantee while satisfying a given demand, or the minimum loss in throughput or cost induced by a survivable routing in a network prone to failures
APA, Harvard, Vancouver, ISO, and other styles
5

Broman, Rickard. "A Practical Study of Network Coding in Distributed Storage Systems." Thesis, KTH, Kommunikationsteori, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-136360.

Full text
Abstract:
Highly increased data traffic over the last few years has led to a need to improve the networkefficiency. One way to achieve this is by network coding. In this thesis two codes, namelyreplication code and regenerating codes, have been examined. Most other works in this area hasbeen theoretical, so we created a testbed to perform practical tests. Then these practical resultsare compared to the theoretical results with varying finite field size. It will be shown that thepractical studies verify the theoretical work. Furthermore, we observe the probability ofsuccessful repair after several stages of repair. More so, the achievability of exact repair of a failed node in a tandem network has beenexamined. This has been proven possible, and also the required finite field size is presented.Another issue at focus is the number of transfers required to achieve exact repair in such anetwork. The results show that 2*k transfers is required, which is comparable to functionalrepair.
APA, Harvard, Vancouver, ISO, and other styles
6

Lefebvre, Thibaut. "Optimization of information flows in telecommunication networks." Electronic Thesis or Diss., Paris, CNAM, 2016. http://www.theses.fr/2016CNAM1053.

Full text
Abstract:
Dans les réseaux de télécommunications, la demande croissante pour de nouveaux services, comme la diffusion de vidéos en continu ou les conférences en ligne, engendre un besoin pour des dispositifs de télécommunication où le même contenu est acheminé depuis un émetteur unique vers un groupe de récepteurs. Cette évolution ouvre la voie au développement de nouvelles techniques d'acheminement des données, comme le multicast qui laisse un nœud du réseau copier ses données d'entrée puis retransmettre ces copies, ou le codage réseau, qui est une technique permettant à un nœud d'effectuer des opérations de codage à partir de ses données d'entrée. Cette thèse traite de la mise en place de techniques de codage au sein d'un réseau multicast filaire. Nous formalisons certains problèmes qui apparaissent naturellement dans ce contexte grâce à la recherche opérationnelle et à des outils d'optimisation mathématique. Notre objectif est de développer des modèles et des algorithmes afin de calculer, au moins de manière approchée, certaines grandeurs qui ont vocation à être pertinentes dans le cadre de la comparaison de techniques d'acheminement de données dans un réseau de télécommunications. Nous évaluons ainsi, d'un point de vue à la fois théorique et expérimental, l'impact induit par l'introduction de techniques de codage au sein d'un réseau multicast. Nous nous concentrons en particulier sur des critères importants pour un opérateur de télécommunication, comme la maximisation du débit d'information entre une source et un ensemble de destinataires dans le réseau, la minimisation de la congestion sous contrainte de demande, ou la minimisation de la perte de débit ou du coût induit par l'acheminement des données dans un réseau soumis à des pannes<br>In telecommunication networks, the increasing demand for new services, like video-streaming or teleconferencing, along with the now common situation where the same content is simultaneously requested by a huge number of users, stress the need for point to many data transmission protocols where one sender wishes to transmit the same data to a set of receivers. This evolution leads to the development of new routing techniques like multicast, where any node of the network can copy its received data and then send these copies, or network coding, which is a technique allowing any node to perform coding operations on its data. This thesis deals with the implementation of coding techniques in a wired multicast network. We formalize some problems naturally arising in this setting by using operations research and mathematical optimization tools. Our objective is to develop models and algorithms which could compute, at least approximately, some quantities whose purpose is to be relevant as far as forwarding data using either multicast and network coding in telecommunications networks is concerned. We hence evaluate, both in theory and numerically, the impact of introducing coding techniques in a multicast network. We specifically investigate relevant criteria, with respect to the field of telecommunications, like the maximum amount of information one can expect to convey from a source to a set of receivers through the network, the minimum congestion one can guarantee while satisfying a given demand, or the minimum loss in throughput or cost induced by a survivable routing in a network prone to failures
APA, Harvard, Vancouver, ISO, and other styles
7

Rahim, Shafqat. "Evalution of VOD by using MPLS network." Thesis, Blekinge Tekniska Högskola, Avdelningen för telekommunikationssystem, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1225.

Full text
Abstract:
My project aims to develop the solution in iptv for Video-on-Demand to provide users with a world of choices - for more channels to view along with the ability to enjoy what they want, when they want, according to their desires and time constraints. This contribution briefly proposes areas that need familiarity and implementation of network technology that brings forward the requirements of the bearer network for the IPTV service VOD.<br>+4917681112914 you can conatct me on this number.
APA, Harvard, Vancouver, ISO, and other styles
8

Nazar, Arbab. "Evaluation of VoIP Codecs over 802.11 Wireless Networks : A Measurement Study." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-3650.

Full text
Abstract:
<p>Voice over Internet Protocol (VoIP) has become very popular in recent days andbecome the first choice of small to medium companies for voice and data integration inorder to cut down the cost and use the IT resources in much more efficient way. Anotherpopular technology that is ruling the world after the year 2000 is 802.11 wirelessnetworks. The Organization wants to implement the VoIP on the wireless network. Thewireless medium has different nature and requirement than the 802.3 (Ethernet) andspecial consideration take into account while implementing the VoIP over wirelessnetwork.One of the major differences between 802.11 and 802.3 is the bandwidthavailability. When we implement the VoIP over 802.11, we must use the availablebandwidth is an efficient way that the VoIP application use as less bandwidth as possiblewhile retaining the good voice quality. In our project, we evaluated the differentcompression and decompression (CODEC) schemes over the wireless network for VoIP.To conduct this test we used two computers for comparing and evaluatingperformance between different CODEC. One dedicated system is used as Asterisk server,which is open source PBX software that is ready to use for main stream VoIPimplementation. Our main focus was on the end-to-end delay, jitter and packet loss forVoIP transmission for different CODECs under the different circumstances in thewireless network. The study also analyzed the VoIP codec selection based on the MeanOpinion Score (MOS) delivered by the softphone. In the end, we made a comparisonbetween all the proposed CODECs based on all the results and suggested the one Codecthat performs well in wireless network.</p>
APA, Harvard, Vancouver, ISO, and other styles
9

Qiang, Qiang. "Network efficiency/performance measurement with vulnerability and robustness analysis with application to critical infrastructure." Amherst, Mass. : University of Massachusetts Amherst, 2009. http://scholarworks.umass.edu/dissertations/AAI3372272/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

McGovern, Susan C. "Information security requirements for a coalition wide area network." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA397542.

Full text
Abstract:
Thesis (M.S. in Systems Technology (Command, Control, and Communications)) Naval Postgraduate School, June 2001.<br>Thesis advisor(s): Irvine, Cynthia E. "June 2001." Includes bibliographical references (p. 77-78). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Information and telecommunications network"

1

Anandalingam, G. Telecommunications Network Design and Management. Springer US, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Peat Marwick Main & Co. and Washington State University, eds. Information technology project feasibility study for telecommunications network improvements. Washington State University, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Heldman, Robert K. Information telecommunications: Networks, products, & services. McGraw-Hill, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

IEEE Computer Society. LAN/MAN Standards Committee., International Organization for Standardization, and International Electrotechnical Commission, eds. Information technology--telecommunications and information exchange between systems--local and metropolitan area networks--specific requirements. 6th ed. Institute of Electrical and Electronics Engineers, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

IEEE Computer Society. LAN/MAN Standards Committee., IEEE Computer Society. Technical Committee on Computer Communications., International Electrotechnical Commission, and International Organization for Standardization, eds. Information technology--telecommunications and information exchange between systems--local and metropolitan area networks--specific requirements. 3rd ed. ISO/IEC, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

IEEE Computer Society. LAN/MAN Standards Committee., Institute of Electrical and Electronics Engineers., IEEE Standards Board, and IEEE Standards Association, eds. IEEE standard for information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements. Institute of Electrical and Electronics Engineers, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

IEEE Computer Society. LAN MAN Standards Committee., International Electrotechnical Commission, International Organization for Standardization, Institute of Electrical and Electronics Engineers., and IEEE Standards Board, eds. Information technology -- telecommunications and information exchange between systems -- local and metropolitan area networks -- specific requirements--: Part 2: logical link control. Institute of Electrical and Electronics Engineers, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

IEEE Computer Society. Technical Committee on Computer Communications., IEEE Standards Board, American National Standards Institute, International Electrotechnical Commission, and Institute of Electrical and Electronics Engineers., eds. Information technology -- telecommunications and information exchange between systems -- local and metropolitan area networks -- specific requirements--: Part 2: logical link control. Institute of Electrical and Electronics Engineers, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Institute Of Electrical and Electronics Engineers. Information technology -- telecommunications and information exchange between systems -- local and metropolitan area networks -- common specifications--: Part 4: system load protocol. Institute of Electrical and Electronics Engineers, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bhargava, Vijay K. Communications, Information and Network Security. Springer US, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Information and telecommunications network"

1

Harashima, Susumu. "Information Network System (INS)." In Telecommunications. Springer Berlin Heidelberg, 1985. http://dx.doi.org/10.1007/978-3-642-95465-8_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Takaki, Ricardo, Luis Cláudio Palma Pereira, Ivan Lucio Junqueira, Jorge Seki, and João Paulo Miranda. "Integration Between LTE and Satellite Networks." In Telecommunications and Information Technology. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23823-4_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Szpyrka, Marcin, Bartosz Jasiul, Konrad Wrona, and Filip Dziedzic. "Telecommunications Networks Risk Assessment with Bayesian Networks." In Computer Information Systems and Industrial Management. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40925-7_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Siergiejczyk, Mirosław. "Security Analysis of Information Transmission in Intelligent Transport Telecommunications Network." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-19501-4_45.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

John, Thomas. "Managing the Infoglut: Information Filtering Using Neural Networks." In Neural Networks in Telecommunications. Springer US, 1994. http://dx.doi.org/10.1007/978-1-4615-2734-3_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Consortium, Tina. "An Overview of the Telecommunications Information Networking Architecture." In Intelligent Networks and Intelligence in Networks. Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35066-0_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kellerer, Wolfgang. "A Versatile Network Independent Server Architecture for Multimedia Information and Commmunication Services." In Telecommunication Network Intelligence. Springer US, 2000. http://dx.doi.org/10.1007/978-0-387-35522-1_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Szmidt, Eulalia. "Using Uncertain Information from a Telecommunication Network." In Operations Research ’93. Physica-Verlag HD, 1994. http://dx.doi.org/10.1007/978-3-642-46955-8_126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zaalouk, Adel, and Kostas Pentikousis. "Network Configuration in OpenFlow Networks." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-16292-8_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Shao, Guohua. "Sports Information Communication Model Based on Network Technology." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77417-2_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Information and telecommunications network"

1

Mancini, Lucrezia, Edoardo Meraviglia, Mattia Magnaghi, Antonio Ghezzi, and Andrea Rangone. "5G for the Future of Telecommunications: How Innovation Platforms Redefine the Mobile Network Operators' Role." In 27th International Conference on Enterprise Information Systems. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013470700003929.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Oktavian, Jason, Monika Evelin Johan, and Haditya Setiawan. "Integrated Map-Based System Using Decision Trees and Random Forests to Classify Network Service Issues in Telecommunications Infrastructure." In 2024 8th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE). IEEE, 2024. http://dx.doi.org/10.1109/icitisee63424.2024.10730407.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Assis, Elvis, Emmanuel Tavares, Demóstenes Rodríguez, and Renata Rosa. "Information System for the Improvement of Telecommunication Service Quality." In XIII Simpósio Brasileiro de Sistemas de Informação. Sociedade Brasileira de Computação, 2017. http://dx.doi.org/10.5753/sbsi.2017.6095.

Full text
Abstract:
This work describes an information system regarding to the telecommunication service with the goal to inform to the telephony service users about the operators signal quality and the users’ opinion about the telecommunication operators. The system contains information of cellular base station locations and the results are crossed with sentiment analyses of sentences extracted from a social network, which are related to the telecommunication services. The study aims to detect complaints and dissatisfaction of users about a determined service, helping to make a relation between the users’ complains extracted from social network with the number of base stations in the same geographic area of the user's social network. Therefore, the proposed information system can be used by the National Telecommunications Agency of each country for monitoring the quality-of-service of cellular network operators.
APA, Harvard, Vancouver, ISO, and other styles
4

SHeruntaev, D. A. "Information security in the corporate information and telecommunications network." In Scientific trends: Questions of exact and technical sciences. ЦНК МОАН, 2020. http://dx.doi.org/10.18411/sciencepublic-12-06-2020-09.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jankowski, Bartosz, Wojciech Mazurczyk, and Krzysztof Szczypiorski. "Information Hiding Using Improper frame padding." In 2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS). IEEE, 2010. http://dx.doi.org/10.1109/netwks.2010.5624901.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Angelini, Marco, Giorgio Cazzetta, Marina Geymonat, Mario Mirabelli, and Giuseppe Santucci. "Toward Multidimensional Geographical Performance Analysis for Telecommunications Network." In 2019 23rd International Conference Information Visualisation (IV). IEEE, 2019. http://dx.doi.org/10.1109/iv.2019.00049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hong, Jun, and Victor O. K. Li. "Impact of Information on Network Performance - An Information-Theoretic Perspective." In GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference. IEEE, 2009. http://dx.doi.org/10.1109/glocom.2009.5425421.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lalović, Danilo, Vesna Vukićević, Ivan Vukadinović, Zlatko Mitrović, Miodrag Jevtić, and Dalibor Mitić. "APPLICATION OF IP MPLS NETWORK OF EPS TO PROVIDE COMMUNICATION NEEDS." In 21.Simpozijum CIGRE Srbija 2024. Srpski nacionalni komitet Međunarodnog saveta za velike električne mreže CIGRE Srbija, 2024. https://doi.org/10.46793/cigre21s.414l.

Full text
Abstract:
Taking into account that a significant period of exploitation of the IP MPLS network of EPS has already passed, it can be said that practice confirms that the applied network design enabled the flexibility and scalability of the network, as well as its further development in terms of connecting new facilities and users. With the appearance of new requirements that were placed before the telecommunications system, the number of new services that were provisioned through the IP MPLS network increased, enabling the realization of these requirements. The paper will deal with practical examples regarding the use of the IP MPLS network to solve various communication needs that arise in the operation of the information and telecommunication system of EPS and EDS. The flexibility of the IP MPLS network will be demonstrated by presenting solutions implemented using a single communication platform. The facility's optical connectivity is a sufficient condition to create and implement an efficient communication design using IP MPLS and DWDM networks, whose scalability enables easy connection of new customer locations and provision of required services.
APA, Harvard, Vancouver, ISO, and other styles
9

Michlovic, Dave. "Powering the fiber information network." In INTELEC 2008 - 2008 IEEE 30th International Telecommunications Energy Conference. IEEE, 2008. http://dx.doi.org/10.1109/intlec.2008.4664082.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sobchuk, Valentyn, Farhod Asrorov, Oleg Perehuda, Anna Sukretna, Oleksandr Laptiev, and Nataliia Lukova-Chuiko. "The Limited Solutions Method for Telecommunications Network Information Security Models." In 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT). IEEE, 2021. http://dx.doi.org/10.1109/atit54053.2021.9678655.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Information and telecommunications network"

1

Sokolovsky, Dmitry, Sergey Sokolov, and Alexey Rezaykin. e-learning course "Informatics". SIB-Expertise, 2024. http://dx.doi.org/10.12731/er0785.29012024.

Full text
Abstract:
The e-learning course "Informatics" is compiled in accordance with the requirements of the Federal State Educational Standard of Higher Education in the specialty 33.05.01 Pharmacy (specialty level), approved by Order of the Ministry of Education and Science of the Russian Federation dated August 11, 2016 No. 1037, and taking into account the requirements of the professional standard 02.006 "Pharmacist", approved by order of the Ministry of Labor and Social Protection No. 91n of the Russian Federation dated March 9, 2016. The purpose of the course is to master the necessary amount of theoretical and practical knowledge in computer science for graduates to master competencies in accordance with the Federal State Educational Standard of Higher Education, capable and ready to perform the work functions required by the professional standard. Course objectives: to provide knowledge about the rules of working with spreadsheets; to provide knowledge about working in medical information systems and the Internet information and telecommunications network; to provide skills in working with computer science software and hardware used at various stages of obtaining and analyzing biomedical information; to learn how to use the knowledge gained to solve problems of pharmaceutical and biomedical content. The labor intensity of the course is 72 hours. The course consists of 12 didactic units.
APA, Harvard, Vancouver, ISO, and other styles
2

Kimmins, John, Charles Dinkel, and Dale Walters. Telecommunications security guidelines for telecommunications management network. National Institute of Standards and Technology, 1995. http://dx.doi.org/10.6028/nist.sp.800-13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

McBeth, Michael S., R. B> Adamson, and Raymond Cole Jr. Application of Network Voice to Navy and DOD Telecommunications. Defense Technical Information Center, 1998. http://dx.doi.org/10.21236/ada464915.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

SECRETARY OF THE AIR FORCE WASHINGTON DC. Communications and Information: Telecommunications Monitoring and Assessment Program (TMAP). Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada404979.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Weiss, M., Lee Cosart, James Hanssen, et al. Ethernet Time Transfer through a U.S. Commercial Optical Telecommunications Network. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada623787.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Brodaric, B. Groundwater Information Network. Natural Resources Canada/CMSS/Information Management, 2021. http://dx.doi.org/10.4095/329831.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

DEPARTMENT OF THE ARMY WASHINGTON DC. Information Management: Telecommunications: Record Communications and the Privacy Communications System. Defense Technical Information Center, 1990. http://dx.doi.org/10.21236/ada402244.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Stern, Peter A. Promoting Investment in Information and Communications Technologies in the Caribbean. Inter-American Development Bank, 2006. http://dx.doi.org/10.18235/0008750.

Full text
Abstract:
This paper is based on the premise that investment in Information and Communication Technologies (ICT) has a positive impact on economic development because of its contribution to growth and labor productivity. Development of an information-based society and the realization of an ICT strategy and its incorporation into every day social and economic activity are, however, dependent on the availability and accessibility of physical infrastructure. The report reviews the basic infrastructure for ICT in the Caribbean and compares the current telecommunications policy and regulatory framework with that of the mid 1990s when governments in the region began earnestly to think about reform. At that time twelve of them participated in the World Trade Organization negotiations on basic telecommunications. The report also examines telecommunications pricing issues, the current free trade negotiations which impact the ICT sector and some noteworthy regional initiatives to promote ICT. Finally it discusses regulatory barriers to investment in the telecommunications sector and recommends a number of actions to overcome these.
APA, Harvard, Vancouver, ISO, and other styles
9

Olsen, Karen, and John Tebbutt. The impact of the FCC's Open Network Architecture on NSNP telecommunications security. National Institute of Standards and Technology, 1995. http://dx.doi.org/10.6028/nist.sp.800-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Brodaric, B. Groundwater Information Network: GIN. Natural Resources Canada/CMSS/Information Management, 2021. http://dx.doi.org/10.4095/327585.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography