To see the other types of publications on this topic, follow the link: Telecommunication network failures.

Journal articles on the topic 'Telecommunication network failures'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Telecommunication network failures.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Batenkov, Aleksandr, Kirill Batenkov, and Aleksandr Fokin. "Methods for Formation of Telecommunication Network States Sets for Different Measures of Connectivity." SPIIRAS Proceedings 19, no. 3 (June 1, 2020): 644–73. http://dx.doi.org/10.15622/sp.2020.19.3.7.

Full text
Abstract:
Reliability, survivability, and stability analysis tasks are typical not only for telecommunications, but also for systems whose components are subject to one or more types of failures, such as transport, power, mechanical systems, integrated circuits, and even software. The logical approach involves the decomposition of the system into a number of small functional elements, and within telecommunications networks they are usually separate network devices (switches, routers, terminals, etc.), as well as communication lines between them (copper-core, fiber-optic, coaxial cables, wireless media, and other transmission media). Functional relationships also define logical relationships between the failures of individual elements and the failure of the network as a whole. The assumption is also used that device failures are relatively less likely than communication line failures, which implies using the assumption of absolute stability (reliability, survivability) of these devices. Model of a telecommunication network in the form of the generalized model of Erdos–Renyi is presented. In the context of the stability of the telecommunications network, the analyzed property is understood as the connectivity of the network in one form or another. Based on the concept of stochastic connectivity of a network, as the correspondence of a random graph of the connectivity property between a given set of vertices, three connectivity measures are traditionally distinguished: two-pole, multi-pole, and all-pole. The procedures for forming an arbitrary structure of sets of paths and trees for networks are presented, as well as their generalization of multipolar trees. It is noted that multipolar trees are the most common concept of relatively simple chains and spanning trees. Solving such problems will allow us to proceed to calculating the probability of connectivity of graphs for various connectivity measures.
APA, Harvard, Vancouver, ISO, and other styles
2

Yakymchuk, N. M., and A. I. Toroshanko. "METHODS OF IDENTIFICATION AND COMPREHENSIVE DIAGNOSIS OF TELECOMMUNICATION SYSTEMS." Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University, no. 69 (2020): 58–65. http://dx.doi.org/10.17721/2519-481x/2020/69-06.

Full text
Abstract:
The article formulates the main tasks of management of information networks and telecommunications services in terms of ensuring their reliable operation. The telecommunication network is considered as a complex system consisting of many components, each of which has its own characteristics of operation during operation. The main functions of the telecommunication network control system are determined: fault detection and network status diagnostics, network device administration, forecasting and elimination of congestion and other possible deviations in network functioning, ensuring coordinated interaction between different types of control systems for providing telecommunication services with specified quality. Methods of analysis and management of networks are essentially a kind of identification methods, i.e. the current assessment of the parameters and condition of complex technical systems. There is a close relationship between identification and diagnostic tasks. The methods for solving these problems largely depend on the class to which the identification object can be assigned. Computer and telecommunication networks belong to the class of distributed systems with delays in signal and control information. Methods of retrospective identification are used to analyze the state of such systems. The influence of delays of signal and control information on the efficiency of search and determination of places of failures, overloads and emergency modes in communication networks is investigated. The results of computer simulation are given. The approach based on regular control of parameters and condition of network nodes taking into account delays of receipt of information on parameters and a condition of a concrete network node and delays of the control information necessary for adjustment of parameters of a network node as control object has found further development.
APA, Harvard, Vancouver, ISO, and other styles
3

Aishah Zainiar, Noor, Farabi Iqbal, ASM Supa’at, and Adam Wong Yoon Khang. "Robustness metrics for optical networks." Indonesian Journal of Electrical Engineering and Computer Science 20, no. 2 (November 1, 2020): 845. http://dx.doi.org/10.11591/ijeecs.v20.i2.pp845-853.

Full text
Abstract:
Telecommunication networks are vulnerable towards single or simultaneous nodes/links failures, which may lead to the disruption of network areas. The failures may cause performance degradation, reduced quality of services, reduced nodes/links survivability, stability, and reliability. Therefore, it is important to measure and enhance the network robustness, via the use of robustness metrics. This paper gives an overview of several robustness metrics that are commonly used for optical networks, from the structural, centrality and functional perspectives.
APA, Harvard, Vancouver, ISO, and other styles
4

Tang, Alex, Alexis Kwasinski, John Eidinger, Colin Foster, and Pete Anderson. "Telecommunication Systems’ Performance: Christchurch Earthquakes." Earthquake Spectra 30, no. 1 (February 2014): 231–52. http://dx.doi.org/10.1193/022213eqs046m.

Full text
Abstract:
Telecommunication systems generally performed better than other lifelines in the Christchurch-area earthquake sequence of 2010–2011; however, various service interruptions were a major concern for subscribers. Power disruption was the primary reason for service interruption in Christchurch, as has been similarly observed in many other major earthquakes around the world. Extensive ground failures impacted underground cabling, while Central Offices (COs) sustained minor damage due to strong shaking. Closure of the Central Business District and increased call volumes created additional strain on telecommunication service providers to deal with emergency response. This paper presents the findings of the post-earthquake lifeline performance investigations of both the landline network and the cellular network. Voice and data services of these networks are examined and commented based on the findings. The authors’ view of rendering the telecommunication systems more resilient is presented ( Eidinger and Tang 2014 ).
APA, Harvard, Vancouver, ISO, and other styles
5

Al-namer, Zain-aalabdain. "Rationing the main parameters of the Quality of Network services." T-Comm 14, no. 11 (2020): 72–76. http://dx.doi.org/10.36724/2072-8735-2020-14-11-72-76.

Full text
Abstract:
The European Telecommunications Standards Institute (ETSI) recommends that IP-telephony networks be divided into four classes according to the quality of service (quality of network services) QoS, the main indicator of which is packet delay (Y.1541). ITU-T Recommendation G.114 for public switched telephone networks provides delays close to ETSI gradations that correspond to different types of communication. The quality of the service from the user's point of view can be expressed by a set of indicators. These metrics are described in terms that are understandable to both the user and the service, and are independent of the network structure. Quality of service indicators are focused primarily on the effect perceived by the user, must be guaranteed to the user by the service and be objectively measured at the point of access to the service (ITU-T Recommendation I.350). ITU-T Recommendation E.862 provides possible approaches to accounting for the economic losses of the operator (in planning, design, operation and telecommunication network) and the user associated with technical failures. Operators of networks, working in market conditions, are interested in assessing possible losses due to failures and in comparing them with the costs of increasing the reliability of their funds.
APA, Harvard, Vancouver, ISO, and other styles
6

Rueda, Diego F., Eusebi Calle, Xiangrong Wang, and Robert E. Kooij. "Enhanced Interconnection Model in Geographically Interdependent Networks." International Journal of Computers Communications & Control 13, no. 4 (July 25, 2018): 537–49. http://dx.doi.org/10.15837/ijccc.2018.4.3090.

Full text
Abstract:
Interconnection between telecommunication networks and other critical infrastructures is usually established through nodes that are spatially close, generating a geographical interdependency. Previous work has shown that in general, geographically interdependent networks are more robust with respect to cascading failures when the interconnection radius (r) is large. However, to obtain a more realistic model, the allocation of interlinks in geographically interdependent networks should consider other factors. In this paper, an enhanced interconnection model for geographically interdependent networks is presented. The model proposed introduces a new strategy for interconnecting nodes between two geographical networks by limiting the number of interlinks. Results have shown that the model yields promising results to maintain an acceptable level in network robustness under cascading failures with a decrease in the number of interlinks.
APA, Harvard, Vancouver, ISO, and other styles
7

Kanaev, A. K., E. V. Oparin, and E. V. Oparina. "Entropic model of network dynamics of clocking network synchronization." Journal of Physics: Conference Series 2131, no. 4 (December 1, 2021): 042089. http://dx.doi.org/10.1088/1742-6596/2131/4/042089.

Full text
Abstract:
Abstract The main task of the clocking network synchronization (CNS) network subsystem is the formation, transmission, distribution and delivery of synchronization signals to the telecommunication system (TCS) digital equipment for the purpose of its coordinated interaction. Indicators of the telecommunication services quality are inextricably linked with the indicators of the CNS network functioning quality, in this regard, the process of monitoring and managing the CNS network comes to the fore for the purpose of prompt detection of failures and their subsequent elimination. The article provides an overview of the main classes of CNS network equipment and their diagnostic parameters, and also indicates the significant influence of the CNS network functioning process on the entire TCS functioning. To assess the technical condition of the CNS network an approach using the entropy analysis of the diagnostic parameters of the CNS network elements is proposed. The entropy model of the network dynamics is obtained in CNS work, which can later be used to develop a methodology for monitoring the technical condition of the CNS network. Using this model, it is possible to estimate not only the differential entropy of each CNS network element, but also to estimate the differential entropy of the entire CNS network or a separate fragment of the CNS network. Differential entropy parameters reflect the technical state of the CNS network.
APA, Harvard, Vancouver, ISO, and other styles
8

Srinivasa, Rao D. "Disaster Resilient Infrastructure: A study of Impact of cyclones on the Telecom Sector in Andhra Pradesh Coastal Zones." Disaster Advances 15, no. 5 (April 25, 2022): 51–57. http://dx.doi.org/10.25303/1505da051057.

Full text
Abstract:
Andhra Pradesh (AP) is one of the most vulnerable States in India to natural disasters such as cyclones, high rainfall and flooding. With a second-longest coastline of 975km, atleast one cyclone hits every year, mainly during October and November. Although the AP Government is taking preventive measures to reduce the loss of lives, the increase in economic loss due to the damage to critical infrastructure has become a point of worry. Power and telecom industries are interlinked; power loss or failure may disrupt the entire telecommunication network. This study examines the impact of cyclones on the telecom industry in AP coastal zones during the last two decades, considering it to be the most vital of all infrastructure systems. This study also discusses the measures that need to be taken by telecom service providers (TSPs) to build robust networks, provide redundancy during network element failures and resource management during network overload. To safeguard the people and assets, State Governments must ensure that their infrastructure systems conform to specific standards of quality and reliability. These standards should, however, be revised regularly and applied consistently.
APA, Harvard, Vancouver, ISO, and other styles
9

Parodi, Cecilia, Franco Robledo, Pablo Romero, and Carlos Testuri. "Resilient overlay design in DWDM systems." Yugoslav Journal of Operations Research 26, no. 3 (2016): 343–60. http://dx.doi.org/10.2298/yjor150730001p.

Full text
Abstract:
The goal of this work is to design a minimum cost resilient overlay network, where a data network is on top of a transport network. Two major challenges are addressed. On one hand, a single failure in the transport network causes multiple simultaneous failures; on the other, the multicommodity flow must respect integrality. An integer programming formulation is presented to design an overlay, meeting the previous constraints. We prove the problem belongs to the class NP-Hard. Then, a decomposition approach is introduced, where the problem is solved in two steps by means of relaxations of the original formulation. Experiments carried out with real-life instances, coming from the Uruguayan telecommunication operator, show that the approach is competitive with respect to previous metaheuristics, to know, Tabu-Search (TS) and Variable Neighborhood Search (VNS). A modest percentage of cost-reduction is achieved in some instances, which means millionaire savings in practice.
APA, Harvard, Vancouver, ISO, and other styles
10

Batenkov, Aleksandr, Kirill Batenkov, and Aleksandr Fokin. "Forming the Telecommunication Networks’ Cross-Sections to Analyze the Latter Stability with Different Connectivity Measures." Informatics and Automation 20, no. 2 (March 30, 2021): 371–406. http://dx.doi.org/10.15622/ia.2021.20.2.5.

Full text
Abstract:
The problem of stability analysis and its components of reliability and survivability is quite popular both in the field of telecommunications and in other industries involved in the development and operation of complex networks. The most suitable network model for this type of problem is a model that uses the postulates of graph theory. At the same time, the assumption of the random nature of failures of individual links of the telecommunications network allows it to be considered in the form of a generalized Erdos–Renyi model. It is well known that the probability of failure of elements can be interpreted in the form of a readiness coefficient and an operational readiness coefficient, as well as in the form of other indicators that characterize the performance of elements of a telecommunications network. Most approaches consider only the case of bipolar connectivity, when it is necessary to ensure the interaction of two end destinations. In modern telecommunications networks, services such as virtual private networks come to the fore, for which multipoint connections are organized that do not fit into the concept of bipolar connectivity. In this regard, we propose to extend this approach to the analysis of multi-pole and all-pole connections. The approach for two-pole connectivity is based on a method that uses the connectivity matrix as a basis, and, in fact, assumes a sequential search of all combinations of vertex sections, starting from the source and drain. This method leads to the inclusion of non-minimal cross-sections in the general composition, which required the introduction of an additional procedure for checking the added cross-section for non-excess. The approach for all-pole connectivity is based on a method that uses the connectivity matrix as a basis, and, in fact, assumes a sequential search of all combinations of vertex sections, not including one of the vertices considered terminal. A simpler solution was to control the added section for uniqueness. The approach for multipolar connectivity is similar to that used in the formation of the set of minimal all-pole sections and differs only in the procedure for selecting the combinations used to form the cross-section matrix, of which only those containing pole vertices are preserved. As a test communication network, the Rostelecom backbone network is used, deployed to form flows in the direction of "Europe-Asia". It is shown that multipolar sections are the most general concept with respect to two-pole and all-pole sections. despite the possibility of such a generalization, in practical applications it is advisable to consider particular cases due to their lower computational complexity.
APA, Harvard, Vancouver, ISO, and other styles
11

Auerbach, Jeremy, and Hyun Kim. "Local network connectivity optimization: an evaluation of heuristics applied to complex spatial networks, a transportation case study, and a spatial social network." PeerJ Computer Science 7 (June 18, 2021): e605. http://dx.doi.org/10.7717/peerj-cs.605.

Full text
Abstract:
Optimizing global connectivity in spatial networks, either through rewiring or adding edges, can increase the flow of information and increase the resilience of the network to failures. Yet, rewiring is not feasible for systems with fixed edges and optimizing global connectivity may not result in optimal local connectivity in systems where that is wanted. We describe the local network connectivity optimization problem, where costly edges are added to a systems with an established and fixed edge network to increase connectivity to a specific location, such as in transportation and telecommunication systems. Solutions to this problem maximize the number of nodes within a given distance to a focal node in the network while they minimize the number and length of additional connections. We compare several heuristics applied to random networks, including two novel planar random networks that are useful for spatial network simulation research, a real-world transportation case study, and a set of real-world social network data. Across network types, significant variation between nodal characteristics and the optimal connections was observed. The characteristics along with the computational costs of the search for optimal solutions highlights the need of prescribing effective heuristics. We offer a novel formulation of the genetic algorithm, which outperforms existing techniques. We describe how this heuristic can be applied to other combinatorial and dynamic problems.
APA, Harvard, Vancouver, ISO, and other styles
12

Krawietz Ramos, Eduardo, Rosa María Aguilar Chinea, and Pedro Juan Baquero Pérez. "The open-access telecommunication transmission network in the Canary Islands: an alternative proposal to the current management model?" Digital Policy, Regulation and Governance 23, no. 6 (November 15, 2021): 617–41. http://dx.doi.org/10.1108/dprg-02-2021-0027.

Full text
Abstract:
Purpose This paper aims to study the competition problems and market failures in the Canary Islands and propose an alternative management model for the telecommunication transmission network. This model is based on a wholesale-only open-access transmission network, available to all the retail service providers of this region, and managed by a unique entity subject to regulation with cost-based prices. The proposal hopefully will help to debate about the implementation of certain regulatory models in the network industries, concerning telecommunication submarine cables connecting archipelagos. Design/methodology/approach An empirical approach has been used, based on the observation and analysis of the regulatory policies applied to the wholesale transmission networks in the Canary Islands, Azores and Madeira archipelagos. Findings Results show a persistent margin squeeze situation on the retail broadband market in the Canary Islands, due to the pricing strategy on the Spanish mainland-Canaries wholesale market, which is, in turn, delaying the entry of alternatives and the level of development and efficiency of competition. The risk of duopoly collusion is also present on this wholesale market. Additionally, public aids will be needed to replace the systems connecting with the non-capital islands and to provide redundancy to El Hierro. The alternative proposal might help preventing the above. Eventually, several insights are considered for further investigation. Originality/value Little attention has been paid to this topic in the literature, regarding the analysis of regulatory policies applied over fiber optic submarine cable infrastructures in fragmented territories like archipelagos. Consequently, an empirical analysis has been accomplished to emphasize this research work, based on the regulatory policies adopted.
APA, Harvard, Vancouver, ISO, and other styles
13

El Fachtali, Imad, Rachid Saadane, and Mohammed ElKoutbi. "Vertical Handover Decision Algorithm Using Ants’ Colonies for 4G Heterogeneous Wireless Networks." Journal of Computer Networks and Communications 2016 (2016): 1–15. http://dx.doi.org/10.1155/2016/6259802.

Full text
Abstract:
With the development of 4G mobile telecommunication systems, providing users with the convenience of a seamless continuous connection is not enough anymore. Users want to be connected through the best available network with the best quality of service. It is necessary to have a good decision-making algorithm which decides whether it is necessary to perform handoff to another network, the best network to vertically perform handoff to, and the right time to initiate the handover. This paper proposes a new approach in which mobile terminals (MTs) continuously analyze the network and keep a database of the best available networks. The concept is based on QoS aware ant colony built on the vertical handoff mechanism that uses an updated version of ants’ colony optimization decision algorithm (ACOR), the dynamic and static factors such as RSS, the cost of service, bandwidth, the velocity of MT, the power consumption and security, and the module for predicting the traveling distance within an IEEE 802.11 WLAN cell. Simulation results show that we can not only meet the individual needs of users in terms of QoS, but also improve the whole system performance by reducing the number of handover failures and unnecessary handover instances by up to 95%.
APA, Harvard, Vancouver, ISO, and other styles
14

Rastayesh, Sima, Sajjad Bahrebar, Frede Blaabjerg, Dao Zhou, Huai Wang, and John Dalsgaard Sørensen. "A System Engineering Approach Using FMEA and Bayesian Network for Risk Analysis—A Case Study." Sustainability 12, no. 1 (December 20, 2019): 77. http://dx.doi.org/10.3390/su12010077.

Full text
Abstract:
This paper uses a system engineering approach based on the Failure Mode and Effect Analysis (FMEA) methodology to do risk analysis of the power conditioner of a Proton Exchange Membrane Fuel Cell (PEMFC). Critical components with high risk, common cause failures and effects are identified for the power conditioner system as one of the crucial parts of the PEMFCs used for backup power applications in the telecommunication industry. The results of this paper indicate that the highest risk corresponds to three failure modes including high leakage current due to the substrate interface of the metal oxide semiconductor field effect transistor (MOSFET), current and electrolytic evaporation of capacitor, and thereby short circuit, loss of gate control, and increased leakage current due to gate oxide of the MOSFET. The MOSFETs, capacitors, chokes, and transformers are critical components of the power stage, which should be carefully considered in the development of the design production and implementation stage. Finally, Bayesian networks (BNs) are used to identify the most critical failure causes in the MOSFET and capacitor as they are classified from the FMEA as key items based on their Risk Priority Numbers (RPNs). As a result of BNs analyses, high temperature and overvoltage are distinguished as the most crucial failure causes. Consequently, it is recommended for designers to pay more attention to the design of MOSFETs’ failure due to high leakage current owing to substrate interface, which is caused by high temperature. The results are emphasizing design improvement in the material in order to be more resistant from high temperature.
APA, Harvard, Vancouver, ISO, and other styles
15

Sova, Oleg. "Analysis of conditions and factors affecting cyber security in the special purpose information and telecommunication system." Technology audit and production reserves 4, no. 2(66) (July 25, 2022): 25–28. http://dx.doi.org/10.15587/2706-5448.2022.261874.

Full text
Abstract:
The increase in the number of cases of failure of information and telecommunication networks due to cyber attacks determines the need to protect them from this type of attacks. The issue of increasing cyber security in the conditions of conducting operations by groups of troops (forces) is very important. Due to the armed conflict in the East of Ukraine, the military-political instability in the Middle East, the struggle for influence on world financial and energy flows, the global military-political instability is intensifying. This is due to an increase in the number of communication devices in information and telecommunication networks, as well as an increase in the number of possible attacks that can be used to disrupt the operation of an information and telecommunication network. Considering the above, the object of research is a special purpose information and telecommunication system. The subject of research is cyber security of a special purpose information and telecommunication system. Classical methods of scientific knowledge, namely analysis and synthesis, were used during the research. The research identifies factors that affect cyber security in a special purpose information and telecommunications system. All this must be taken into account while planning and deploying a special purpose information and telecommunication system. The analysis of the consequences of the impact on the information and telecommunications system of special purpose of modern devices of defeat and the impact of devices of radio-electronic suppression and other factors was carried out. A typical special purpose information and telecommunication system does not fully meet the requirements for constant readiness to ensure the management of troops (forces), stability, mobility and throughput. A formalized description of the task of improving cyber security in a special purpose information and telecommunications network is provided. The components that affect the level of cyber security of the special purpose information and telecommunication network during the group's operations have been established. The impact of the specified conditions and factors must be reflected: in the planning documents during the planning of the deployment and operation of the group's information and telecommunications system; in the software, during operational management.
APA, Harvard, Vancouver, ISO, and other styles
16

Mogylevych, Dmytro, and Viktoriia Sinko. "Reliability models of telecommunication equipment facilities with non-replenishable or completely replenishable software failures." Collection "Information Technology and Security" 10, no. 1 (June 30, 2022): 50–59. http://dx.doi.org/10.20535/2411-1031.2022.10.1.261132.

Full text
Abstract:
The main features of telecommunication equipment of modern communication networks include, first of all, that they are complex hardware and software complexes. Software, along with hardware (technical) part, has a significant impact on the reliability of telecommunications equipment of communication networks, as software failures and malfunctions often lead to no less serious consequences than hardware failures. The subject of theoretical research is the processes of operation of telecommunications equipment in conditions of limited reliability of software in order to build models of reliability of facilities, taking into account the use of non-replenishable time reserves to compensate for various types of failures. According to the nature of the consequences, all software failures can be divided into three groups: depreciated, partially depreciated and fully depreciate previous work. The result of building the reliability of telecommunications equipment with non-replenishing time reserve is to obtain analytical models that establish the relationship between indicators of reliability of facilities, characteristics of software failures and their consequences, as well as a set of technical parameters that determine the conditions its functioning. The essence of the novelty of these models is to jointly take into account the factors that compensate (reduce) the impact of software failures on the operation of telecommunications equipment, in particular, the use of non-replenishing time reserve, as well as breaking the tasks performed by objects successive stages with memorization of intermediate results and justification of the optimal number of stages. In the process of achieving the goal of the study was further developed differential method, the essence of which is to build a more general, compared to the known, model of three-dimensional homogeneous Markov process, which describes the operation of telecommunications equipment failures and malfunctions, some of which do not depreciate and part which completely devalues the previous development of telecommunications equipment that perform certain tasks.
APA, Harvard, Vancouver, ISO, and other styles
17

Kuchuk, Nina, Oleksandr Shefer, Galina Cherneva, and Frhat Ali Alnaeri. "Determining the capacity of the self-healing network segment." Advanced Information Systems 5, no. 2 (June 22, 2021): 114–19. http://dx.doi.org/10.20998/2522-9052.2021.2.16.

Full text
Abstract:
An approach to determining the bandwidth of the self-healing segment of the data network is proposed. The subject of the study are autonomous segments of the telecommunications network, which have the property of self-healing. The object of research is the process of information transfer between nodes of an autonomous segment. The scientific novelty is to improve the method of determining the capacity of the self-healing segment of the telecommunications network with limited network resources by applying the criterion of ensuring the minimum time of information delivery at a given limit of possible probability of loss. The following tasks were solved: a mathematical model of the self-healing segment of the telecommunication network in the form of a queuing system was developed; the proposed method of calculating the degree of channel congestion. Conclusion: the proposed approach made it possible to calculate the bandwidth of the communication channels of the self-healing segment of the telecommunications network and the required amount of buffer memory with a known network topology and a given gravity matrix, providing the required values of failure probability and guarantee minimum message delivery time.
APA, Harvard, Vancouver, ISO, and other styles
18

Nagadi, Khalid, and Mohammed Basingab. "Developing an agent-based platform to monitor intelligent buildings." Engineering Research Express 4, no. 2 (April 4, 2022): 025002. http://dx.doi.org/10.1088/2631-8695/ac5fda.

Full text
Abstract:
Abstract In recent times, significant advancements have been evidenced in efforts to enhance connectivity and security within intelligent buildings (IBs). An IB is a contemporary structure that leverages state-of-the-art computer technologies to autonomously control the environmental conditions within a building to enhance occupants’ comfort, safety, work efficiency, and wellbeing while also ensuring optimal energy consumption. In the access aspect of a telecommunication network for IBs, the Main Distribution Frame (MDF) is in the central office. Intermediate Distribution Frames (IDFs) act as the isolation points for additional troubleshooting and further distribute the lines. The MDF is essentially a circuit switch that is typically operated through manual intervention because requests to establish or remove connections are sporadic and occasional. This can be tackled by utilizing Agent Based Systems (ABS) and Internet of Things (IoT) monitoring systems to develop a more holistic perspective of the process by which IDFs and MDF rooms are maintained. Furthermore, it will generate a process overview if we eradicate the process of physically checking a room that is currently used for IoT monitoring. In this research, a case study is presented to determine the feasibility of developing an IoT monitoring system. Currently, the monitoring applied in the case study is long, and over 40% of the equipment has maintenance failures. Distributed simulation of ABS is used to simulate the use of IoT for this project. Its data forecast can be very useful in determining the appropriate actions to improve the process of IDF and MDF and operational cost.
APA, Harvard, Vancouver, ISO, and other styles
19

Wu, Bo. "Robustness Analysis of Telecommunications Customer Service System." Advanced Materials Research 989-994 (July 2014): 4179–82. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4179.

Full text
Abstract:
The robustness of customer service system for telecommunications industry is researched. To overcome existing robustness defect of node failure in current network robust research model, node efficiency assessment of robustness is employed, generalized evolution theory is taken into, and changes process of telecommunications customer service systems is simulated. In analysis of conditions in different interference, robustness performance is presented. Simulation results show that the method considering the telecommunications industry to build robust customer service system is feasible and effective for large, complex networks, which has a good capability of computing power.
APA, Harvard, Vancouver, ISO, and other styles
20

McLaren, Gary. "What Now for Australia's NBN?" Australian Journal of Telecommunications and the Digital Economy 6, no. 4 (December 9, 2018): 31–62. http://dx.doi.org/10.18080/ajtde.v6n4.162.

Full text
Abstract:
Australia, like other countries, embarked on deregulation and privatisation of its telecommunications market in the late 1980s. The success of infrastructure competition in the mobile communications sector in pushing Australia to being a world leader in that sector contrasts with the failure to achieve the same in fixed telecommunications. Australia’s politics, insular policies and categorisation of fixed telecommunications as a natural monopoly have made Australia a global laggard in the provision of broadband services. The return of government ownership of telecoms infrastructure in the form of the National Broadband Network and the continuing lack of investment in fibre infrastructure highlight the political and policy failures that have accumulated. A disaggregation of NBN Co into competing technology-based entities, along with the establishment of a regional telecommunications fund financed by a broad-based telecommunications levy, is recommended as the answer to fix these long-term problems.
APA, Harvard, Vancouver, ISO, and other styles
21

McLaren, Gary. "What Now for Australia's NBN?" Journal of Telecommunications and the Digital Economy 6, no. 4 (December 9, 2018): 31–62. http://dx.doi.org/10.18080/jtde.v6n4.162.

Full text
Abstract:
Australia, like other countries, embarked on deregulation and privatisation of its telecommunications market in the late 1980s. The success of infrastructure competition in the mobile communications sector in pushing Australia to being a world leader in that sector contrasts with the failure to achieve the same in fixed telecommunications. Australia’s politics, insular policies and categorisation of fixed telecommunications as a natural monopoly have made Australia a global laggard in the provision of broadband services. The return of government ownership of telecoms infrastructure in the form of the National Broadband Network and the continuing lack of investment in fibre infrastructure highlight the political and policy failures that have accumulated. A disaggregation of NBN Co into competing technology-based entities, along with the establishment of a regional telecommunications fund financed by a broad-based telecommunications levy, is recommended as the answer to fix these long-term problems.
APA, Harvard, Vancouver, ISO, and other styles
22

Selwyn, Lee L. "Market failure in ‘open’ telecommunications networks." Utilities Policy 4, no. 1 (January 1994): 21–30. http://dx.doi.org/10.1016/0957-1787(94)90032-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Ripoll, J., M. Manzano, and E. Calle. "Spread of epidemic-like failures in telecommunication networks." Physica A: Statistical Mechanics and its Applications 410 (September 2014): 457–69. http://dx.doi.org/10.1016/j.physa.2014.05.052.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Schoonderwoerd, Ruud, Owen E. Holland, Janet L. Bruten, and Leon J. M. Rothkrantz. "Ant-Based Load Balancing in Telecommunications Networks." Adaptive Behavior 5, no. 2 (January 1997): 169–207. http://dx.doi.org/10.1177/105971239700500203.

Full text
Abstract:
This article describes a novel method of achieving load balancing in telecommunications networks. A simulated network models a typical distribution of calls between nodes; nodes carrying an excess of traffic can become congested, causing calls to be lost. In addition to calls, the network also supports a population of simple mobile agents with behaviors modeled on the trail-laying abilities of ants. The ants move across the network between randomly chosen pairs of nodes; as they move, they deposit simulated pheromone as a function of their distance from their source node and the congestion encountered on their journey. They select their path at each intermediate node according to the distribution of simulated pheromone at each node. Calls between nodes are routed as a function of the pheromone distributions at each intermediate node. The performance of the network is measured by the proportion of calls that are lost. The results of using ant-based control (ABC) are compared with those achieved by using fixed shortest-path routes, and also those achieved by using an alternative algorithmically based type of mobile agent previously proposed for use in network management. The ABC system is shown to result in fewer call failures than the other methods, while exhibiting many attractive features of distributed control.
APA, Harvard, Vancouver, ISO, and other styles
25

Lee, Steven S. W., Kuang-Yi Li, and Chieh-Ching Lin. "Modeling and Algorithm for Multiple Spanning Tree Provisioning in Resilient and Load Balanced Ethernet Networks." Mathematical Problems in Engineering 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/676542.

Full text
Abstract:
We propose a multitree based fast failover scheme for Ethernet networks. In our system, only few spanning trees are used to carry working traffic in the normal state. As a failure happens, the nodes adjacent to the failure redirect traffic to the preplanned backup VLAN trees to realize fast failure recovery. In the proposed scheme, a new leaf constraint is enforced on the backup trees. It enables the network being able to provide 100% survivability against any single link and any single node failure. Besides fast failover, we also take load balancing into consideration. We model an Ethernet network as a twolayered graph and propose an Integer Linear Programming (ILP) formulation for the problem. We further propose a heuristic algorithm to provide solutions to large networks. The simulation results show that the proposed scheme can achieve high survivability while maintaining load balancing at the same time. In addition, we have implemented the proposed scheme in an FPGA system. The experimental results show that it takes only fewμsec to recover a network failure. This is far beyond the 50 msec requirement used in telecommunication networks for network protection.
APA, Harvard, Vancouver, ISO, and other styles
26

Oleinikov, A. A., A. A. Sorokin, and I. A. Beresnev. "Decision Support System for Evaluating Elements of Data Transmission Systems." Journal of Physics: Conference Series 2091, no. 1 (November 1, 2021): 012052. http://dx.doi.org/10.1088/1742-6596/2091/1/012052.

Full text
Abstract:
Abstract The expansion of the coverage areas of telecommunications networks poses the task of improving the quality of service for telecom operators. Currently, in the conditions of transferring employees to a remote mode of operation, the access equipment of individuals is beginning to require much more attention to failures, as well as the communication equipment of legal entities. In both cases, the unavailability of the data transmission network associated with the failure can lead to various kinds of financial and administrative liability. In this paper, we propose algorithms that underlie the developed decision support system for evaluating the operational states of data transmission system elements. The system is designed for the analysis and formation of recommendations on conducting scheduled preventive maintenance or responding to pre-emergency and emergency incidents.
APA, Harvard, Vancouver, ISO, and other styles
27

Luss, H., and R. T. Wong. "Survivable Telecommunications Network Design Under Different Types of Failures." IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans 34, no. 4 (July 2004): 521–30. http://dx.doi.org/10.1109/tsmca.2004.826825.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Kruglikov, S. V., and A. Yu Zalizka. "Synthesis of wireless telecommunication network with adaptation to refusals of central elements of average and high intensity." Proceedings of the National Academy of Sciences of Belarus, Physical-Technical Series 65, no. 1 (April 6, 2020): 117–28. http://dx.doi.org/10.29235/1561-8358-2020-65-1-117-128.

Full text
Abstract:
A technique of synthesis of a wireless digital communication network with package switching, providing transfer of video messages of real time scale between elements of multipurpose information-operating system in conditions of high failure rate of central elements, is considered. As conceptual model of a telecommunication network – the network of the mixed structure, including multipurpose devices, constructed on the basis of standards of a broadband radio access with switching of packages and two interconnected levels of network interaction of elements (local and main) is accepted. The technique of synthesis of a wireless network is based on the multilevel, combined adaptation of a telecommunication network in the conditions of refusals of central elements, which primary goal is rational change of parameters, functions of network elements in close interrelation with purposeful transformation of structure of telecommunication system subnetworks. The main objective of carrying out the combined adaptation of the network consists in achievement of necessary throughput of communication system depending on degree of failure rate of central elements. Properties of multilevel adaptation were investigated in the course of realization of the combined (structurally-parametrical) synthesis with use of the aggregate approach of modelling of difficult technical systems. Efficiency of the specified technique is proven by the results of the imitating experiment with use of the aggregate model of a wireless network of data transmission with switching of packages, obtained previously. The experimental data, received at natural research of networks of a broadband radio communication on the basis of standards 802.11 b/g/n, have shown, that time of processing of packages of a message essentially depends on use of existing ways of adaptation. In particular, application of effective algorithms of adaptation (both parametrical and structural) will allow to reduce the time of finding of details (packages) in broadband communication devices by several times and, thereby, to provide demanded throughput of the network functioning in the conditions of refusals of central elements.
APA, Harvard, Vancouver, ISO, and other styles
29

Molinero Velasco, Fco Javier. "A Bayesian Network approach to diagnosing the root cause of failure from Trouble Tickets." Artificial Intelligence Research 1, no. 2 (September 26, 2012): 75. http://dx.doi.org/10.5430/air.v1n2p75.

Full text
Abstract:
Telecommunications networks comprise elements of very different types that work together to provide services. Quite often, hardware failures are interrelated and it is hard for technicians specialized in specific hardware to find out these relationships. In this context, Bayesian Networks (BN) provide a good and flexible solution because they allow us to model the causal relationships between element failures and infer information from existing evidence. The goal is that network technicians can be informed of the real scope of failures and the probable existence of root problems, thus optimizing resources and reducing recovery time. Besides, with this approach a real element hierarchy can be built, allowing the discovery of hidden dependencies between elements. The outcome of this work has been the development of a rooting module attached to an incident management system (trouble ticketing system, TT).
APA, Harvard, Vancouver, ISO, and other styles
30

Podduturi, Pooja Reddy, Trevor Maco, Pouyan Ahmadi, and Khondkar Islam. "RFID Implementation in Supply Chain Management." International Journal of Interdisciplinary Telecommunications and Networking 12, no. 2 (April 2020): 34–45. http://dx.doi.org/10.4018/ijitn.2020040103.

Full text
Abstract:
A network that is based on a traditional telecommunications network and the Internet is known as the internet of things (IoT). The devices in such networks connect peers and form advanced collaborations. radio frequency identification (RFID) has become a hot topic in recent years with the development of the IOT. However, the traditional RFID reader systems have some drawbacks, such as: single node failure, limited effective reading distance of the reader, and slow reading speeds. The proposed system describes how to estimate the location of an object using RFID technology. This article also incorporates a peer-to-peer (P2P) system to locate individual objects in a supply chain management network, which enables scalable indexing of objects in large distributed traceable networks.
APA, Harvard, Vancouver, ISO, and other styles
31

Колесник, Елена, Elena Kolesnik, Фёдор Лозбинев, Fedor Lozbinev, Александр Гамов, and Aleksandr Gamov. "ELEMENT AND STRUCTURAL RELIABILITY OF MULTISERVICE CORPORATE COMMUNICATIONS NETWORK." Bulletin of Bryansk state technical university 2016, no. 4 (December 28, 2016): 223–29. http://dx.doi.org/10.12737/23240.

Full text
Abstract:
In the paper there is offered a method for the design evaluation of hardware reliability in communi-cations network elements in terms of standard values of its trunk structural reliability. To carry out a gener-alized assessment of communications equipment reliability in general and for the evaluation of network directions reliability there is considered such an index as availability. With the use of the procedure developed the design assessment of time between failures of southern, northern and western trunks in the telecommunications network at different kinds of equipment and a topology and also at different methods of maintenance works is carried out. The computations are carried out in terms of standard coefficients of readiness for existing networks and communications networks of the following generation without taking into account the influence of destabilizing factors. The assessment of the influence of time for reconstruction of communications facilities upon a coefficient of network trunks availability is fulfilled. The following options of maintenance works are considered: an existing choice when equipment failures at the places are eliminated by experts coming from a regional center; a choice providing for trunks obligatory reservation of communication channels up to each endpoint. On the basis of results obtained the conclusions on purposeful methods of maintenance to ensure standard values of readiness coefficients for existing networks and communication networks of the following generation are formulated.
APA, Harvard, Vancouver, ISO, and other styles
32

El Emary, Ibrahiem Mahmoud Mohamed. "Management and Challenges Facing Wireless Sensor Networks in Telemedicine Applications." International Journal of Healthcare Delivery Reform Initiatives 2, no. 4 (October 2010): 39–65. http://dx.doi.org/10.4018/978-1-61520-805-0.ch009.

Full text
Abstract:
This chapter focuses on the management process of the wireless sensor networks in telemedicine applications. The main management tasks that are reported and addressed covers: topology management, privacy and security issues in WSN management, topology management algorithms, and route management schemes. Also, failure detection in WSN and fault management application using MANNA was presented and discussed. The major challenges and design issues facing WSN management was touched in a separate section. Typical telemedicine interactions involve both store-and-forward and live interaction. Both the traditional live and store-and-forward telemedicine systems provide an extension of healthcare services using fixed telecommunications networks (i.e. non-mobile). Various telemedicine solutions have been proposed and implemented since its initial use some 30 years ago in the fixed network environment using wired telecommunications networks (e.g. digital subscriber line). Technological advancements in wireless communications systems, namely wireless personal area networks (WPANs), wireless local area networks (WLANs), WiMAX broadband access, and cellular systems (2.5G, 3G and beyond 3G) now have the potential to significantly enhance telemedicine services by creating a flexible and heterogeneous network within an end-to-end telemedicine framework. In the future, integrating wireless solutions into healthcare delivery may well come to be a requirement, not just a differentiator, for accurate and efficient healthcare delivery. However, this raises some very significant challenges in terms of interoperability, performance and the security of such systems.
APA, Harvard, Vancouver, ISO, and other styles
33

Trubnikov, Dmitrii. "Regulation of Telecommunications: The Choice Between Market and Regulatory Failures." Law, State and Telecommunications Review 9, no. 1 (May 15, 2017): 25–46. http://dx.doi.org/10.26512/lstr.v9i1.21511.

Full text
Abstract:
Purpose – The paper examines the main regulatory frameworks of the telecommunications industry through the concept of market failure and analyses how and why the policy often leads to undesirable outcomes that might be considered as regulatory failure. Methodology/approach/design – The research uses the EU regulatory framework for electronic communications as a base for the analysis of the main policy objectives through the prism of the market failure theory with an eye to the interests of the main market players in the telecommunications markets. Findings – About any aspect of regulation allows to find ways to create opportunities for some groups of the industry and stifle activity of others. Despite the theory of market failure provides reasonable justifications for regulation of telecommunications markets, it is possible to argue that many of these problems are mainly the consequence of the policy and could be better solved by market mechanisms. Originality/value – The results of the research allow to look at the problems of telecommunications development and issues of the high level of concentration of the telecommunications markets as regulatory formed problems rather than consequences of the inherited industry’s characteristics.
APA, Harvard, Vancouver, ISO, and other styles
34

Tugushi, Maia, Boris Karasiev, Gizo Partskhaladze, Madona Loria, and Gocha Chavleshvili. "Increasing the Accuracy of Measuring the Resistance of the Grounding System with an Electrodeless Method." International Journal of Engineering & Technology 7, no. 4.38 (December 3, 2018): 379. http://dx.doi.org/10.14419/ijet.v7i4.38.24586.

Full text
Abstract:
Recently, electrodeless methods of measuring the resistance of grounding devices have appeared, with the help of special clamps. But a large methodological error limits the possibility of their use, especially when rationing low resistances. The article shows the possibility to improve the accuracy of electrodeless measurement methods using commercially available measuring instruments.In electrical installations of telecommunication networks of buildings, structures and industrial enterprises, the form of the AC voltage signal of the industrial supply network (~220V, 50/60Hz) can be differ greatly from the sinusoidal for short periods of time. The causes of distortions are usually associated with a sudden change in the network load [1], for example, when you turn on a powerful electric motor, furnace, welding machine, etc.The occurrence of impulse overvoltages and interference caused by electromagnetic effects (lightning, switching, radio frequency and others) on low-voltage networks, not only leads to failure of electrical installations, cables, switchboards, but also to damage the terminal equipment and malfunction. This is due, primarily, to the saturation of modern buildings and structures with information, telecommunications and other digital equipment, which has a very low level of protection against impulse overvoltages and interference. All this makes it necessary to carry out appropriate protective measures. To reduce interference, it is necessary to perform a separate (working) ground loop, the resistance of which must be measured and periodically monitored.There are devices that allow an electrodeless method to monitor and evaluate the resistance of the ground loop. But these devices have a greater measurement error than devices that measure the resistance of the earth electrode method.The article deals with existing instruments (CA6410, MZC-303E) which can evaluate the resistance of the earth electrode and the possibility of increasing the accuracy of the measurement with the help of special current clamps is shown. Using a predetermined value of neutral impedance, the measurement error of the calculated resistance of the earthing switch can be determined with great accuracy.
APA, Harvard, Vancouver, ISO, and other styles
35

Dzalilov, Zari, and Iradj Ouveysi. "Mathematical models for failure reconfiguration of telecommunication networks: Part 1." Optimization 58, no. 5 (July 2009): 483–504. http://dx.doi.org/10.1080/02331930902928112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Dzalilov, Zari, and Iradj Ouveysi. "Mathematical models for failure reconfiguration of telecommunication networks: Part 2." Optimization 58, no. 5 (July 2009): 505–20. http://dx.doi.org/10.1080/02331930902928153.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

L, Mancinelli, Mazzanti M, and Antonicelli R. "Telemedicine in very elderly patients affected by end-stage Heart Failure: Wishful thinking or real opportunity?" Journal of Cardiovascular Medicine and Cardiology 9, no. 3 (September 15, 2022): 022–23. http://dx.doi.org/10.17352/2455-2976.000182.

Full text
Abstract:
Telemedicine is a network of computerization and telecommunication technologies that provides health care services to remote patients. There is increasing evidence that telemedicine interventions are associated with a reduction in hospital admission rates and mortality in patients with heart failure [1,2].
APA, Harvard, Vancouver, ISO, and other styles
38

Amosov, Oleg Semenovich, and Svetlana Gennadievna Amosova. "Peculiarities and Applications of Stochastic Processes with Fractal Properties." Sensors 21, no. 17 (September 5, 2021): 5960. http://dx.doi.org/10.3390/s21175960.

Full text
Abstract:
In this paper, the fractal properties of stochastic processes and objects in different areas were specified and investigated. These included: measuring systems and sensors, navigation and motion controls, telecommunication systems and networks, and flaw detection technologies. Additional options that occur through the use of fractality were also indicated and exemplified for each application. Regarding the problems associated with navigation information processing, the following fractal nature processes were identified: errors of inertial sensors based on the microelectromechanical systems called MEMS, in particular gyroscopic drift and accelerometer bias, and; the trajectory movement of mobile objects. With regard to navigation problems specifically, the estimation problem statement and its solution are given by way of the Bayesian approach for processing fractal processes. The modified index of self-similarity for telecommunication series was proposed, and the self-similarity of network traffic based on the R/S method and wavelet analysis was identified. In failure detection, fractality manifested as porosity, wrinkles, surface fractures, and ultrasonic echo signals measured using non-destructive sensors used for rivet compound testing.
APA, Harvard, Vancouver, ISO, and other styles
39

Timashev, Sviatoslav A. "CYBER RELIABILITY OF CRITICAL PHYSICAL INFRASTRUCTURES." Russian Journal of Construction Science and Technology 4, no. 2 (2018): 27–35. http://dx.doi.org/10.15826/rjcst.2018.2.005.

Full text
Abstract:
The paper considers the problem of constructing a full group of failure scenarios for physical infrastructures when subjected to cyber attacks (CAs). Physical infrastructures actually are systems of systems, or network of networks [1]. The main idea of the research rests on the assumption, that in order to damage any physical infrastructure by a cyber attack, it has to be able to produce a powerful enough physical impact on the most vulnerable part(s) of the infrastructure. Only civil engineering and industrial structures and installations connected to Internet and World Wide Web are considered. Hence, all infrastructures discussed below have to be elements of the Enterprise IoT or IoT, namely: electrical grids, oil, gas and product pipeline systems, water supply and disposal (waste) systems, rail networks, air traffic control and telecommunications (finance, commerce, business) networks, etc.
APA, Harvard, Vancouver, ISO, and other styles
40

Karetnikov, Vladimir Vladimirovich, Nikita Pavlovich Bydko, and Vladimir Vasilevich Allakin. "SYNTHESIS OF SUBSYSTEM OF INTELLIGENT MONITORING OF INFORMATION AND TELECOMMUNICATION NETWORK OF DEPARTMENTAL SITUATIONAL CENTER." Vestnik of Astrakhan State Technical University. Series: Management, computer science and informatics 2021, no. 3 (July 30, 2021): 64–81. http://dx.doi.org/10.24143/2072-9502-2021-3-64-81.

Full text
Abstract:
The problem statement: based on the analysis of the features of the development of modern public information and telecommunications networks (ITN), which consist in the geographical dispersion of network resources, sources and recipients of information; the pulsating nature of network traffic; heterogeneity of elements and applied network technologies; randomness of functioning; “intolerance” to management; the essential inconsistency of the main char-acteristics and the impossibility of a complete mathematical description, make it impossible to use the existing methods of control of the information and telecommunications system and the need to synthesize its subsystem of intellectual monitoring, as well as to develop new methods based on intelligent approaches. The purpose of the work is to provide synthesis of the subsystem of intelligent monitoring of the information and telecommunications network of the Ministry of Transport of the Russian Federation, as one of the key segments of the situation center of the department being created at the present time. Structuring of the controlled space by the terms “monitoring zone”, “critical element” and “technical condition classes” form the basis of a new approach to intelligent monitoring, regardless of the constant improvement (evolution) and heterogeneity of heterogeneous network infrastructures. The values obtained in the course of parametric synthesis of acceptable optimal values of the degree of loading of channels with measuring information make it possible to calculate the throughput of technological channels of tele-measurement-tele-signaling and the necessary amount of buffer memory with a known network topology and a given gravity matrix, providing the average minimum delivery time of intelligent agents (packets of measuring information) and the value of the maximum probability of failure in their service within acceptable limits. Based on the proposed hypergraph of the topological relationship of the monitoring zones of ITN of a household, the structure of its monitoring subsystem is constructed at the levels of fragmentation during the aggregation of controlled processes. The obtained results of the structural and parametric synthesis form the basis of the conceptual model of intelligent monitoring of ITN of the department
APA, Harvard, Vancouver, ISO, and other styles
41

Evglevskaya, N. V., A. Yu Zuev, A. O. Karasenko, and O. S. Lauta. "Comparative analysis of the effectiveness of existing methods of networks security from DDoS attacks." Radio industry (Russia) 30, no. 3 (September 8, 2020): 67–74. http://dx.doi.org/10.21778/2413-9599-2020-30-3-67-74.

Full text
Abstract:
At present, issues related to information security are highly relevant. DoS and DDoS attacks are carried out by cybercriminals quite often, because cyberattacks can bring almost any system to failure, leaving no legally significant evidence. At the same time, the failure of the attacked subsystem can be an intermediate stage towards the target system. The most vulnerable to DDoS attacks are online stores, online payment systems, news resources and companies, whose activities depend on the frequency of user access to the resource. The main methods of protection against cyberattacks and DDoS attacks, in particular, are currently antivirus programs and firewalls. The article presents a description of some types of DDoS attacks as well as the results of a comparative analysis of several existing methods of networks security from DDoS attacks, which will simplify the choice of the optimal solution to ensure reliable protection of a telecommunication facility. Considering all the advantages and disadvantages, the method of organizing a network protection system against DDoS attacks based on the technology of artificial neural networks is the most suitable solution for ensuring the information security of networks of various purpose.
APA, Harvard, Vancouver, ISO, and other styles
42

Rezghdeh, Keyvan, and Sajjad Shokouhyar. "A six-dimensional model for supply chain sustainability risk analysis in telecommunication networks: a case study." Modern Supply Chain Research and Applications 2, no. 4 (May 19, 2020): 211–46. http://dx.doi.org/10.1108/mscra-09-2019-0018.

Full text
Abstract:
PurposeThe main purpose of the present study was to improve and develop previously proposed models for Iran telecommunication networks. It should be noted that the six-dimensional (6D) sustainability model used in this study will be a useful and comprehensive model for industries. Since, the new dimension of IT along with the five well-known economic, social, environmental, technical and institutional aspects of organizations is considered to have great impacts on supply chain sustainability; the proposed framework can be practical.Design/methodology/approachAccording to the related literature review, there are two research streams in supply chain management. The first stream is exploratory research, seeking out conceptual discussions in this area. The second one is associated with mathematical models and techniques, aiming to set decision-making rules in this regard (Agrell et al., 2004). In this study, evaluation was performed using the FMEA method as an analytical technique based on the principle of pre-occurrence prevention to identify potential failure factors in sensitive systems (Mohammadfam and Kianfari, 2008).FindingsAfter identifying the risks and causes of the incidence and effects and consequences of risks, preventive and risk control measures and advisory strategies were presented. Customers with 45.76% share in critical risks are threatening to maintain supply chain in these companies. During this study, it was found that 33.9% of the main source of supply chain critical risks was customers, constituting 45.76% of such risks, accompanied by organization, having a 38.88% share of critical risk generation. The study findings also revealed that 33.9% of critical risks were mainly (equally) related to economic and technical aspects of supply chain sustainability in telecommunication networks. Moreover, as a newly-introduced sixth dimension, IT represented 10.17% of critical risks threatening supply chain sustainability in such networks. Critical risks are mainly related to the economic and technical aspects (equally) with the sustainability of the telecommunication networks supply chain. Also, as a new finding and the sixth dimension, 10.17% of the critical risks that threaten the sustainability of the telecommunication networks supply chain have the information technology dimension.Originality/valueThe internet and fixed and mobile data services are provided by several private companies in Iran, which are relatively similar in terms of their supply chains. In order to manage the sustainability of Iran's telecommunication supply chain, telecommunication networks affiliated to Iran Telecommunication Company (ITC), operating in the field of data and internet services and fixed telephone were selected in 31 provinces. The intended networks were also providing an important part of the country's needs including Mobile Telecommunication Company of Iran, a subsidiary of Iran's telecommunication networks, as one of the top companies in this industry. Accordingly, all the networks studied in this study needed to be identified with regard to communication sustainability risks, since they provide management solutions to each other by segregating risks. In this study, 68 managers and 72 experts participated in different work teams of telecommunication networks.
APA, Harvard, Vancouver, ISO, and other styles
43

Prochazkova, Dana, Jaroslav Srp, and Jan Prochazka. "Analysis of Cyber Networks in a System Concept." International Journal of Applied Mathematics and Informatics 15 (November 16, 2021): 47–54. http://dx.doi.org/10.46300/91014.2021.15.8.

Full text
Abstract:
The aim of the paper is to show that all cyber networks (such as telecommunication, IT or ICT networks) are systemically identical or very similar, although each of them is applied in another industry or economy field or includes other added functional elements. The effort is to show that systemic identity (similarity) of the mentioned networks identifies the same set of network security threats that can be solved using the same approaches and techniques. The integrative approach based on the systematic approach enables to effectively use the efforts of professionals and all means target to the actual problem solving. The mentioned networks classification to the cyber critical infrastructures is also made based on this concept. Cyber system and cyber networks are threatened by both, the internal system deficits (technical and organisational nature) and the wide range of disasters: natural disasters - impacts primarily on the technical resources; intentional events caused by human vandalism, theft, terrorist attacks; technological accidents; and failure of electricity supply; etc. They threaten individual humans, human groups and states by their technical and organisational deficits and by the IT disuse.
APA, Harvard, Vancouver, ISO, and other styles
44

WYATT, SALLY. "ICT INNOVATION IN CENTRAL GOVERNMENT: LEARNING FROM THE PAST." International Journal of Innovation Management 04, no. 04 (December 2000): 391–416. http://dx.doi.org/10.1142/s1363919600000214.

Full text
Abstract:
This article examines two attempts to develop information networks by central government administrations in the UK and the US during the 1980s. These are examples of service innovations within public services, and can be viewed in the light of analyses of services innovation. They also mark a shift in public procurement, from acquiring a technology to purchasing services. The British attempted to develop a data communication network; the Americans attempted to develop an integrated voice, data and image communication network. Both networks were to be shared by different government departments and both were to be provided by a third-party supplier. The rhetoric and policy concerns behind these networks are similar to those expressed more recently in Britain by the new Labour Government. It is argued that these earlier attempts were unsuccessful because insufficient attention was paid to users, and because the systems were attempting to do too much. Not only were they expected to reduce costs and improve services, they were also intended to implement important elements of telecommunications and competition policies. Paradoxically, over-simplification of the systems, to make them comprehensible to a wide range of actors, may have contributed to their failure.
APA, Harvard, Vancouver, ISO, and other styles
45

Kim, Hyejoo, Sewoong Hwang, Jonghyuk Kim, and Zoonky Lee. "Toward Smart Communication Components: Recent Advances in Human and AI Speaker Interaction." Electronics 11, no. 10 (May 11, 2022): 1533. http://dx.doi.org/10.3390/electronics11101533.

Full text
Abstract:
This study aims to investigate how humans and artificial intelligence (AI) speakers interact and to examine the interactions based on three types of communication failures: system, semantic, and effectiveness. We divided service failures using AI speaker user data provided by the top telecommunication service providers in South Korea and investigated the means to increase the continuity of product use for each type. We proved the occurrence of failure due to system error (H1) and negative results on sustainable use of the AI speaker due to not understanding the meaning (H2). It was observed that the number of users increases as the effectiveness failure rate increases. For single-person households constituted by persons in their 30s and 70s or older, the continued use of AI speakers was significant. We found that it alleviated loneliness and that human-machine interaction using AI speaker could reach a high level through a high degree of meaning transfer. We also expect AI speakers to play a positive role in single-person households, especially in cases of the elderly, which has become a tough challenge in the recent times.
APA, Harvard, Vancouver, ISO, and other styles
46

Akpoviroro, Kowo Solomon, Akinbola Olufemi Amos, Akinrinola Olalekan Oladipo, and Adegbite Ganiu Adewale. "Product Branding and Consumer Loyalty in Telecommunication Industry." Economics and Culture 17, no. 1 (June 1, 2020): 94–103. http://dx.doi.org/10.2478/jec-2020-0009.

Full text
Abstract:
AbstractResearch Purpose. With fierce competition and saturated marketing in Nigeria, telecom operators must work hard to reduce cost, win new customers, and most importantly, retain the existing ones. The aim of the study was to examine the relationship between product branding and consumer loyalty in the Nigerian telecommunication industry.Design / Methodology / Approach. This research employed survey research design. Primary data was adopted with the aid of a questionnaire administered to the customers of three major telecommunication companies in Nigeria (MTN, AIRTEL and GLOBACOM) residing in Lagos State. The population of the study was 172, the sample size was 120, which were determined using the simple computation method. The study made use of statistical tools that include: analysis of variance (ANOVA), correlation efficient and Statistical Packages for Social Sciences (SPSS) Version 17.0.Findings. The results of this study confirm with the existing literature that product branding as a feature has a significant effect on product. The study found out that there exists a significant relationship between product branding and consumer loyalty in the Nigerian telecommunication industry. Consequently, from the practical perspective, telecommunication firms should expand their network coverage, improve the quality of service and provide better access to other networks within and outside Nigeria.Originality / Value / Practical implications. The study seeks to contribute to existing literature on product branding and customer loyalty. The paper contributes in clarifying that telecom providers in Nigeria must make product branding as a very important aspect of its marketing strategy and it must be given a serious approach, because it goes a long way to determine the success or failure of the product offer to the market, the firm in question and its ability to achieve consumer loyalty
APA, Harvard, Vancouver, ISO, and other styles
47

Bakhtiar, Deni, Mulya R. Mashudi, and Maulahikmah Galinium. "Determining Critical Factors Project Delay and Effecting Cost Overruns in Telecommunication Mobile Network Projects." ACMIT Proceedings 6, no. 1 (July 6, 2021): 30–35. http://dx.doi.org/10.33555/acmit.v6i1.93.

Full text
Abstract:
Telecommunication Industry has created numerous employment opportunities and playing a role model in economic growth of Indonesia. This industry is facing serious and critical problem of cost overruns in Telecommunication Mobile Network Projects, especially in implementation 4G-LTE Project in Jakarta, Depok, Bogor, Tangerang, Bekasi (Jadebotabek) area. The purpose of this research is to identify and classify critical factors project delay and expound the effect of that critical factors to cost overruns. A structured questionnaire based on 38 factors project delay related to cost overruns (Ullah et al., 2017) was developed and distributed to 100 respondents from 35 selected Contractor Company in Jadebotabek area. The collected data was statistically analyzed with Factor Analysis and Multiple Linear Regression that processed using SPSS. As a result, 4 new Critical Factor Project Delay effect to Cost Overruns in sequence are Lack of cost plan and monitoring, Equipment failure, Extension of time, and Inadequate project preparations were identified.
APA, Harvard, Vancouver, ISO, and other styles
48

A.M.L.N Gunathilaka, C.S Lewangamage, and M.T.R Jayasinghe. "Effects of Subsoil Characteristics on the Earthquake Loading of Steel Lattice Telecommunication Towers in the South Asia." Electronic Journal of Structural Engineering 18, no. 2 (June 1, 2018): 151–59. http://dx.doi.org/10.56748/ejse.182752.

Full text
Abstract:
Self-supporting lattice towers, which are having quite a few unique structural features, play a vital role in communication networks. Ensuring structural stability of these giant structures under all possible natural and human threats are vital as failures of such structures may cause a catastrophic human & property damages. Further, possible communication outages caused by failure of tower/towers in disaster situation are a critical as it may hamper rescue and other emergency operations. This was experienced by South and South East Asian countries during 2004 Tsunami. Hence, need of mitigating these situations have been highlighted by various reports. Therefore, ensuring structural integrity of self-supporting lattice towers under seismic forces is an essential and timely need. This paper discusses a seismic performance of four leg and three leg lattice towers under Response Spectrum analysis under different sub soil conditions. Results of seismic analyseshas also been compared with wind analyses results.
APA, Harvard, Vancouver, ISO, and other styles
49

Mazdziarz, Artur. "Alarm Correlation in Mobile Telecommunications Networks based on k-means Cluster Analysis Method." Journal of Telecommunications and Information Technology 2 (June 29, 2018): 95–102. http://dx.doi.org/10.26636/jtit.2018.124518.

Full text
Abstract:
Event correlation and root cause analysis play a fundamental role in the process of troubleshooting all technical faults and malfunctions. An in-depth, complicated multiprotocol analysis can be greatly supported or even replaced by a troubleshooting methodology based on data analysis approaches. The mobile telecommunications domain has been experiencing rapid development recently. Introduction of new technologies and services, as well as multivendor environment distributed across the same geographical area create a lot of challenges in network operation routines. Maintenance tasks have been recently becoming more and more complicated, time consuming and require big data analyses to be performed. Most network maintenance activities are completed manually by experts using raw network management information available in the network management system via multiple applications and direct database queries. With these circumstances considered, identification of network failures is a very difficult, if not an impossible task. This explains why effective yet simple tools and methods providing network operators with carefully selected, essential information are needed. Hence, in this paper efficient approximated alarm correlation algorithm based on the k-means cluster analysis method is proposed.
APA, Harvard, Vancouver, ISO, and other styles
50

Azhar, Kamran, Sohail Zafar, Agha Kashif, Amer Aljaedi, and Umar Albalawi. "The Application of Fault-Tolerant Partition Resolvability in Cycle-Related Graphs." Applied Sciences 12, no. 19 (September 23, 2022): 9558. http://dx.doi.org/10.3390/app12199558.

Full text
Abstract:
The concept of metric-related parameters permeates all of graph theory and plays an important role in diverse networks, such as social networks, computer networks, biological networks and neural networks. The graph parameters include an incredible tool for analyzing the abstract structures of networks. An important metric-related parameter is the partition dimension of a graph holding auspicious applications in telecommunication, robot navigation and geographical routing protocols. A fault-tolerant resolving partition is a preference for the concept of a partition dimension. A system is fault-tolerant if failure of any single unit in the originally used chain is replaced by another chain of units not containing the faulty unit. Due to the optimal fault tolerance, cycle-related graphs have applications in network analysis, periodic scheduling and surface reconstruction. In this paper, it is shown that the partition dimension (PD) and fault-tolerant partition dimension (FTPD) of cycle-related graphs, including kayak paddle and flower graphs, are constant and free from the order of these graphs. More explicitly, the FTPD of kayak paddle and flower graphs is four, whereas the PD of flower graphs is three. Finally, an application of these parameters in a scenario of installing water reservoirs in a locality has also been furnished in order to verify our findings.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography