Journal articles on the topic 'Network configuration management'

To see the other types of publications on this topic, follow the link: Network configuration management.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Network configuration management.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Stancu, Stefan Nicolae, Arkadiy Shevrikuko, and David Gutierrez Rueda. "Evolving CERN’s Network Configuration Management System." EPJ Web of Conferences 214 (2019): 08015. http://dx.doi.org/10.1051/epjconf/201921408015.

Full text
Abstract:
CERN’s networks comprise several thousands network devices from multiple vendors and from different generations, fulfilling various purposes (campus network, data centre network, and dedicated networks for the LHC accelerator and experiments control). To ensure the reliability of the networks, the IT Communication Systems group has developed an in-house, Perl-based software called “cfmgr”, capable of deriving and enforcing the appropriate configuration on all these network devices, based on information from a central network database. Due to the decrease in popularity of the technologies it relies upon, maintaining and expanding the current network configuration management system has become increasingly challenging. Hence, we have evaluated the functionality of various open-source network configuration tools, in view of leveraging them for evolving the cfmgr platform. We will present the result of this evaluation, as well as the plan for evolving CERN’s network configuration management system by decoupling the configuration generation (CERN specific) from the configuration enforcement (generic problem, partially addressed by vendor or community Python based libraries).
APA, Harvard, Vancouver, ISO, and other styles
2

Nilausen, Jesper. "Token ring network management: Configuration management." International Journal of Network Management 4, no. 4 (December 1994): 211–17. http://dx.doi.org/10.1002/nem.4560040407.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Saeed, Bilal, Khalil Shahid, and Zeeshan Khan. "Development and Simulation of Next Generation SDH Network Management System." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 12, no. 3 (January 9, 2014): 3361–65. http://dx.doi.org/10.24297/ijct.v12i3.3246.

Full text
Abstract:
In present scenario Network Management System of Next Generation SDH is not performing Offline reporting, offline analysis of alarms, offline performance management and Configurations of network like real time. Any offline configuration of a network when implemented on a real time environment leaves some shortcomings and wrong configuration attributes due to non-availability of Alarms and Performance Management in the presently available offline utility. A simulated platform is developed for implementation of a traffic matrix in an offline environment before implementing over a real time NG SDH Transmission network to reduce the chance of faults or any network disaster.
APA, Harvard, Vancouver, ISO, and other styles
4

Alimi, Richard, Ye Wang, and Y. Richard Yang. "Shadow configuration as a network management primitive." ACM SIGCOMM Computer Communication Review 38, no. 4 (October 2008): 111–22. http://dx.doi.org/10.1145/1402946.1402972.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Couch, Alva, and Yizhan Sun. "On observed reproducibility in network configuration management." Science of Computer Programming 53, no. 2 (November 2004): 215–53. http://dx.doi.org/10.1016/j.scico.2004.04.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Schonwalder, Jurgen, Martin Bjorklund, and Phil Shafer. "Network configuration management using NETCONF and YANG." IEEE Communications Magazine 48, no. 9 (September 2010): 166–73. http://dx.doi.org/10.1109/mcom.2010.5560601.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Seitz, Ludwig, Göran Selander, Erik Rissanen, Cao Ling, and Babak Sadighi. "Decentralized Access Control Management for Network Configuration." Journal of Network and Systems Management 16, no. 3 (September 2008): 303–16. http://dx.doi.org/10.1007/s10922-008-9111-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lim, Stanley Frederick W. T., and Jagjit Singh Srai. "Examining the anatomy of last-mile distribution in e-commerce omnichannel retailing." International Journal of Operations & Production Management 38, no. 9 (September 3, 2018): 1735–64. http://dx.doi.org/10.1108/ijopm-12-2016-0733.

Full text
Abstract:
Purpose The purpose of this paper is to investigate the interplay between configuration dimensions (network structure, network flow, relationship governance, and service architecture) of last-mile supply networks (LMSN) and the underlying mechanisms influencing omnichannel performance. Design/methodology/approach Based on mixed-method design incorporating a multiple embedded case study, mapping, survey, and archival records, this research involved undertaking in-depth within- and cross-case analyses to examine seven LMSNs, employing a configuration approach. Findings The existing literature in the operations management (OM) field was shown to provide limited understanding of LMSNs within the emerging omnichannel context. Case results suggest that particular configurations have intrinsic capabilities, and that these directly influence omnichannel performance. The study further proposes a taxonomy of LMSNs comprising six forms, with two hybrids, supporting the notion of equifinality in configuration theory. Propositions are developed to further explore interdependencies between configurational attributes, refining the relationship between LMSN types, and factors influencing omnichannel performance. Practical implications The findings provide retailers with a set of design parameters for the (re)configuration of LMSNs and facilitate performance evaluation using the concept of fit between configurational attributes. The developed model sheds light on the consequential effects when certain configurational attributes are altered, preempting managerial attention. Given the global trend in urbanization, improved LMSN performance would have positive societal impacts in terms of service and resource efficiency. Originality/value This is one of the first studies in the OM field to critically analyze LMSNs and their behaviors in omnichannel retailing. Additionally, the paper offers several important avenues for future research.
APA, Harvard, Vancouver, ISO, and other styles
9

Firoozi, Zahra, N. Ismail, Shahram Ariafar, S. H. Tang, M. K. A. M. Ariffin, and Azizollah Memariani. "Cost Analysis of Two Different Configurations for a Distribution Network Design." Applied Mechanics and Materials 564 (June 2014): 656–60. http://dx.doi.org/10.4028/www.scientific.net/amm.564.656.

Full text
Abstract:
One significant decision in supply chain management is to determine the configuration of the supply chain network. However, studies that analyze different configurations are rare in the literature. This paper considers a supply chain network consisting of one supplier and a number of retailers. Two different configurations were proposed and were compared in terms of total cost for the network. In the first configuration, retailers directly order to the supplier and hold the inventory to meet the demand of customers. However, in the second configuration, a number of intermediate facilities were established to order products from the supplier and satisfy the demands of retailers. The inventory of retailers in the latter configuration is stored in the intermediate facilities. These two configurations were compared in terms of total cost. Numerical calculations indicate that the latter configuration was preferred in most cases.
APA, Harvard, Vancouver, ISO, and other styles
10

Alt, Rainer, Clemens Eckert, and Thomas Puschmann. "Network Management and Service Systems." Information Resources Management Journal 28, no. 1 (January 2015): 38–56. http://dx.doi.org/10.4018/irmj.2015010103.

Full text
Abstract:
Service science views companies as service system entities that interact with other entities to create value. In today's networked value chains competition is no longer among companies, but among networks that may be regarded as service ecologies. Following service science each entity comprises a dynamic configuration of resources and structures, thus a variety of design aspects needs alignment within these ecologies. To manage service ecologies this article suggests to link insights from network management with service science. A multi-dimensional framework consistently describes the organizational aspects of network management among service system entities as well as the required processes to align activities between service system entities and the possible information systems to support network management. The framework emerged from a design-oriented research project based on eleven interviews with managers from financial service providers in Germany and Switzerland.
APA, Harvard, Vancouver, ISO, and other styles
11

Dubois, Anna, Kajsa Hulthén, and Viktoria Sundquist. "Organising logistics and transport activities in construction." International Journal of Logistics Management 30, no. 2 (May 13, 2019): 620–40. http://dx.doi.org/10.1108/ijlm-12-2017-0325.

Full text
Abstract:
Purpose The purpose of this paper is to identify and analyse how different ways of organising transport and logistics activities in construction impact on efficiency. The paper scrutinises three particular transport and logistics configurations: the de-centralised coordinated configuration, the on-site coordinated configuration and the supply network coordinated configuration. Design/methodology/approach Three configurations are derived from the literature and from case studies. The efficiency of the three configurations is analysed on three levels of analysis: the construction site, the supply chain, and across supply chains and construction sites. Findings The paper concludes that there are possibilities to enhance efficiency on all three levels of analysis by widening the scope of coordination beyond the individual construction site. Practical implications The analysis points to efficiency potentials in applying the supply network coordinated configuration, although this configuration puts high demands on collaboration amongst the actors involved. Originality/value The paper provides illustration, and explanation, of the efficiency potentials involved in the three configurations.
APA, Harvard, Vancouver, ISO, and other styles
12

Leblang, D. B., and R. P. Chase. "Parallel Software Configuration Management in a Network Environment." IEEE Software 4, no. 6 (November 1987): 28–35. http://dx.doi.org/10.1109/ms.1987.232085.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Mi-Jung Choi, Hyoun-Mi Choi, J. W. Hong, and Hong-Taek Ju. "XML-based configuration management for IP network devices." IEEE Communications Magazine 42, no. 7 (July 2004): 84–91. http://dx.doi.org/10.1109/mcom.2004.1316538.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Košťál, Kristián, Pavol Helebrandt, Matej Belluš, Michal Ries, and Ivan Kotuliak. "Management and Monitoring of IoT Devices Using Blockchain." Sensors 19, no. 4 (February 19, 2019): 856. http://dx.doi.org/10.3390/s19040856.

Full text
Abstract:
Nowadays, we are surrounded by a large number of IoT (Internet of Things) devices and sensors. These devices are designed to make life easier and more comfortable. Blockchain technology, especially its mass application, is becoming a term number one. Adoption of blockchain into enterprise networks still has a few challenges that need to be tackled. Utilizing blockchain can bring increased security and efficiency of network maintenance. The key feature of the blockchain, immutability, brings resistance to unauthorized modifications. The whole history of device configuration changes is stored in the blockchain, hence recovery after incidents is very straightforward. This paper extends our previous studies. We are introducing an improved architecture for management and monitoring of IoT devices using a private blockchain. The majority of the system is built on a chaincode, which handles CRUD (Create, Read, Update, Delete) operations as well as encryption and access control. Device configuration files are stored in the blockchain. When a modification occurs, the device downloads a new configuration in a simple manner. The chaincode receives notification whether setup was successful and this history is available for administrators. Our results show that such a system is possible and dissemination of configuration changes to IoT devices can be secured by the blockchain. The key novelty of our solution is a distributed management of configuration files of IoT devices in enterprise networks utilizing blockchain technology. This is essentially improving security and storage options for configurations in the blockchain.
APA, Harvard, Vancouver, ISO, and other styles
15

OKITA, Hideki, Masahiro YOSHIZAWA, Keitaro UEHARA, Kazuhiko MIZUNO, Toshiaki TARUI, and Ken NAONO. "Virtual Network Configuration Management System for Data Center Operations and Management." IEICE Transactions on Communications E95.B, no. 6 (2012): 1924–33. http://dx.doi.org/10.1587/transcom.e95.b.1924.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Ai, Songpu, Antorweep Chakravorty, and Chunming Rong. "Household Power Demand Prediction Using Evolutionary Ensemble Neural Network Pool with Multiple Network Structures." Sensors 19, no. 3 (February 10, 2019): 721. http://dx.doi.org/10.3390/s19030721.

Full text
Abstract:
The progress of technology on energy and IoT fields has led to an increasingly complicated electric environment in low-voltage local microgrid, along with the extensions of electric vehicle, micro-generation, and local storage. It is required to establish a home energy management system (HEMS) to efficiently integrate and manage household energy micro-generation, consumption and storage, in order to realize decentralized local energy systems at the community level. Domestic power demand prediction is of great importance for establishing HEMS on realizing load balancing as well as other smart energy solutions with the support of IoT techniques. Artificial neural networks with various network types (e.g., DNN, LSTM/GRU based RNN) and other configurations are widely utilized on energy predictions. However, the selection of network configuration for each research is generally a case by case study achieved through empirical or enumerative approaches. Moreover, the commonly utilized network initialization methods assign parameter values based on random numbers, which cause diversity on model performance, including learning efficiency, forecast accuracy, etc. In this paper, an evolutionary ensemble neural network pool (EENNP) method is proposed to achieve a population of well-performing networks with proper combinations of configuration and initialization automatically. In the experimental study, power demand predictions of multiple households are explored in three application scenarios: optimizing potential network configuration set, forecasting single household power demand, and refilling missing data. The impacts of evolutionary parameters on model performance are investigated. The experimental results illustrate that the proposed method achieves better solutions on the considered scenarios. The optimized potential network configuration set using EENNP achieves a similar result to manual optimization. The results of household demand prediction and missing data refilling perform better than the naïve and simple predictors.
APA, Harvard, Vancouver, ISO, and other styles
17

Gottschalk, Petter. "Information systems in value configurations." Industrial Management & Data Systems 106, no. 7 (August 1, 2006): 1060–70. http://dx.doi.org/10.1108/02635570610688922.

Full text
Abstract:
PurposeThis paper proposes a value configuration approach for managing information technology in enterprises.Design/methodology/approachThis conceptual research paper is concerned with industrial management and data systems from the perspective of value configurations. The value configuration approach consists of value shop, vale chain and value network.FindingsThe contingent approach to information technology management can be applied to value configurations.Originality/valueTraditionally, data systems in industrial management have been supporting value chains. Recently, alternative value configurations have emerged. Specifically, the value shop and the value network are alternative value configurations. This paper makes an important contribution to insights into information systems depending on value configurations. The final section of this paper suggests that industrial management might expand from value chain management to value shop management, as firms become electronic businesses.
APA, Harvard, Vancouver, ISO, and other styles
18

Merayo, Noemí, David de Pintos, Juan C. Aguado, Ignacio de Miguel, Ramón J. Durán, Patricia Fernández, Rubén M. Lorenzo, and Evaristo J. Abril. "An Experimental OpenFlow Proposal over Legacy GPONs to Allow Real-Time Service Reconfiguration Policies." Applied Sciences 11, no. 3 (January 20, 2021): 903. http://dx.doi.org/10.3390/app11030903.

Full text
Abstract:
The integration of Software Defined Networking (SDN) technologies in Passive Optical Networks (PONs) would provide great advantages to Internet Service Providers (ISPs) and Network Operators, since they can optimize the network operation and reduce its complexity. However, some tasks regarding online service and network configuration strategies are difficult to move to external SDN-controllers since they are time-critical operations. However, the control of some of these policies by SDN techniques could lead to better network and management configuration in a centralized and automatic way. As a consequence, we propose and experimentally test the integration of an OpenFlow approach over legacy Gigabit Passive Optical Networks (GPONs), which allows moving some global service configuration policies to an external SDN controller implementing an SDN management layer that adjust these strategies according to dynamic Quality of Service (QoS) requirements of services in residential users. The viability and efficiency of our approach are demonstrated using a GPON testbed and proposing a new business scenario for ISPs and Network Operators.
APA, Harvard, Vancouver, ISO, and other styles
19

Bystrov, V. V., D. N. Khaliullina, and S. N. Malygina. "Technology for dynamic configuration of the network-centric information support system for regional security management." Transaction Kola Science Centre 11, no. 8-2020 (December 16, 2020): 11–26. http://dx.doi.org/10.37614/2307-5252.2020.8.11.001.

Full text
Abstract:
The article is devoted to the development of software of information and analytical support for regional security management. The authors formulate the concepts of configuration of a network-centric management support system and its dynamic configuration. The conceptual scheme of the configuration in the notation of ER diagrams and its implementation in the form of a configuration file is proposed. The technology for dynamic configuration of multi-level network-centric information and control systems is described. The technology is designed for automated deployment of a network of software agents and their parametric configuration depending on the context of the application problem being solved
APA, Harvard, Vancouver, ISO, and other styles
20

Chakkol, Mehmet, Mark Johnson, Jawwad Raja, and Anna Raffoni. "From goods to solutions: how does the content of an offering affect network configuration?" International Journal of Physical Distribution & Logistics Management 44, no. 1/2 (March 3, 2014): 132–54. http://dx.doi.org/10.1108/ijpdlm-03-2013-0064.

Full text
Abstract:
Purpose – This paper aims to adopt service-dominant logic (SDL) to empirically explore network configurations resulting from the provision of goods, goods and services, and solutions. Design/methodology/approach – This paper uses a single, in-depth, exploratory case study in a truck manufacturer and its supply network. An abductive approach is adopted. In total, 54 semi-structured interviews were conducted. Findings – Three value propositions are clearly discernible within the truck provider. These range from a truck to a “solution”. These propositions have different supply network configurations: dyadic, triadic and tetradic. The extent to which different network actors contribute to value co-creation varies across the offerings. Research limitations/implications – This paper is based on a single, in-depth case study developed in one industrial context. Whilst this represents an appropriate approach given the exploratory nature of the study, further empirical investigation is needed across different industries. Originality/value – This paper is one of the first to empirically examine supply networks using SDL. A rich understanding of the challenges faced by a truck manufacturer in providing different value propositions and the resulting network configurations are discussed. In so doing, evidence is provided of a more complex, tetradic network configuration for solutions, with varying degrees of interplay between actors in the flow of operand and operant resources to create value.
APA, Harvard, Vancouver, ISO, and other styles
21

Alam, Mahabubul, Salam Salloum, and Mohammad Husain. "Improving Network Management by XML to Relational Data Translation." International Journal of Interdisciplinary Telecommunications and Networking 5, no. 3 (July 2013): 34–48. http://dx.doi.org/10.4018/jitn.2013070104.

Full text
Abstract:
Network management is a critical component in both wired and wireless network. In wireless networks, the network dynamics changes rapidly and the network management information needs to be updated frequently. Due to its structured form and ease of usage in communication, eXtensible Markup Language (XML) is preferred as a configuration and logging tool in network management. However, it is convenient to use relational databases such as SQL to store and process data of wireless network management where frequent updates are necessary. In this paper, the authors show an automated method of converting XML documents to store in relational. We have implemented a proof of concept and compared performance to existing approach.
APA, Harvard, Vancouver, ISO, and other styles
22

Liu, J., R. K. Ahuja, and G. Şahin. "Optimal network configuration and capacity expansion of railroads." Journal of the Operational Research Society 59, no. 7 (July 2008): 911–20. http://dx.doi.org/10.1057/palgrave.jors.2602403.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Tao, Chen, Zeng Shao Ying, and Jiao Liang Yu. "Local Access and Security Strategies of Medical Data." Applied Mechanics and Materials 635-637 (September 2014): 1578–81. http://dx.doi.org/10.4028/www.scientific.net/amm.635-637.1578.

Full text
Abstract:
Hospital network office automation system could make the hospital connected by a PC, terminal equipment, medical equipment and hospital networks to link up and connected to the Internet. In this paper, the star tree on the hospital's existing network structure transformation, using port aggregation technology upgrades to existing network data transmission and improve the operating efficiency of the entire hospital network, and the hospital server, computer workstation security configuration and remote management configuration, database and application development of all types of information systems are a good network support.
APA, Harvard, Vancouver, ISO, and other styles
24

Jo, Gwang-ng, Seong-Jin An, and Jin-Uk Jeong. "RBR Based Network Configuration Fault Management Algorithms using Agent Collaboration." KIPS Transactions:PartC 9C, no. 4 (August 1, 2002): 497–504. http://dx.doi.org/10.3745/kipstc.2002.9c.4.497.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Gonen, Bilal, Gurhan Gunduz, and Murat Yuksel. "Automated network management and configuration using Probabilistic Trans-Algorithmic Search." Computer Networks 76 (January 2015): 275–93. http://dx.doi.org/10.1016/j.comnet.2014.11.013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Ji, Zhifeng. "Engineering operation management technology based on network automation configuration visualization." International Journal of System Assurance Engineering and Management 12, no. 4 (April 9, 2021): 765–75. http://dx.doi.org/10.1007/s13198-021-01093-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Waheed, Faisal, and Maaruf Ali. "Hardening CISCO Devices based on Cryptography and Security Protocols - Part One: Background Theory." Annals of Emerging Technologies in Computing 2, no. 3 (July 1, 2018): 27–44. http://dx.doi.org/10.33166/aetic.2018.03.004.

Full text
Abstract:
Network Security is a vital part of any corporate and enterprise network. Network attacks greatly compromise not only the sensitive data of the consumers but also cause outages to these networks. Thus inadequately protected networks need to be “hardened”. The hardening of network devices refers to the hardware and software components, device operating system’s features, management controls, access-list restrictions, operational configurations and above all making sure that the data and credentials are not stored or transferred in ‘plaintext’ over the network. This article investigates the use of cryptography and network protocols based on encryption, to meet the need for essential security requirements. Use of non-secure protocols, underrating and misconfigurations of management protection are reasons behind network devices not properly being hardened; hence leaving vulnerabilities for the intruders. The gap identified after conducting intense search and review of past work is used as the foundation to present solutions. When performing cryptography techniques by encrypting packets using tunnelling and security protocols, management level credentials are encrypted. These include password encryption and exceptional analysis of the emulated IOS (Internetwork Operating System). Necessary testing is carried out to evaluate an acceptable level of protection of these devices. In a virtual testing environment, security flaws are found mainly in the emulated IOS. The discoveries does not depend on the hardware or chassis of a networking device. Since routers primarily rely on its Operating System (OS), attackers focus on manipulating the command line configuration before initiating an attack. Substantial work is devoted to implementation and testing of a router based on Cryptography and Security Protocols in the border router. This is deployed at the core layer and acts as the first point of entry of any trusted and untrusted traffic. A step-by-step hardening approach is adopted to secure the proposed network framework’s border router. Encrypted services coupled with best practice configurations are implemented and tested in an emulated environment. The use of protocol analysers, CISCO Configuration Professional’s Audit and penetration testing tools corroborated the success of the project.
APA, Harvard, Vancouver, ISO, and other styles
28

Kulkarni, Shailesh S., Michael J. Magazine, and Amitabh S. Raturi. "Risk Pooling Advantages of Manufacturing Network Configuration." Production and Operations Management 13, no. 2 (January 5, 2009): 186–99. http://dx.doi.org/10.1111/j.1937-5956.2004.tb00154.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Singh, Avinash, Surya Pratap Singh, Arvind Kumar Maurya, and Upendra Nath Tripathi. "Combined Strategy for Cellular Traffic Congestion Management." International Journal of Emerging Research in Management and Technology 6, no. 8 (June 25, 2018): 12. http://dx.doi.org/10.23956/ijermt.v6i8.113.

Full text
Abstract:
In wireless media, congestion is usual phenomenon that arises due abruptly raised subscribers demand to establish connections congruently in particular cell at mean real time. Generally, the congestion problem occurs in cellular network traffic and almost persists in every generation. Every mobile network operators is facing this problem every day and struggling to resolve this issue but not being success yet. As more advance cellular devices are being in demand and its users are also being increasing which turns to demand larger bandwidth requirements from cellular subscriber. Presently for cellular network, both at infrastructures level and manual configuration, the network management strategy founds to be inefficient to resolve these issues effective way. While trying to resolve, at certain critical peak hours and occasions, situation gets worse. Since, every cellular operator are being facing strong criticism from both user and regulating authorities on this issue. An effort from subscriber’s end is to done only minor infrastructural changes to operate and maintain the network at low cost which found to ineffective and being failed to handle the communication demands of higher Quality of Service (QoS). One way of handling congestion would be through hardware amendment like sectorial design, cell partition, or some software enabled functions use to organize to automate the configuration, optimize and maintenance of cellular networks, But these changes involves heavy investment by subscriber which in turns to cost from user for its services. Concerning on this unresolved issue, our prime motive is to forward innovative effort work that could effectively and sustainable to manage the congestion for long duration. In this paper, we first review the various load sharing and balancing techniques those are used to resolve traffic congestion occurrences in mobile networks. And further presents an algorithm design that would helpful to develop a reliable, flexible, highly efficient load balancing and sharing system. The system based on proposed schema could manage the cell network resources with special emphasis techniques having suitable self optimization feature for future wireless cellular networks.
APA, Harvard, Vancouver, ISO, and other styles
30

Gerk, Livia F., and Débora C. Muchaluat-Saade. "Voice Traffic Service Guarantee in Wireless Mesh Networks Based on IEEE 802.11e." International Journal of Business Data Communications and Networking 8, no. 4 (October 2012): 49–66. http://dx.doi.org/10.4018/jbdcn.2012100104.

Full text
Abstract:
The IEEE 802.11e standard is mostly concerned with traffic differentiation in single-hop infrastructured wireless networks. Wireless mesh networks use several wireless hops in order to forward packets to their destination. A significant issue is that the standard does not map network characteristics into the access protocol parameters it provides. This paper investigates different configurations of the IEEE 802.11e access parameters in wireless mesh networks and proposes two configuration settings. Both proposals provide voice traffic service guarantee without significantly degrading the performance of other multimedia traffic classes, as demonstrated by simulation experiment results.
APA, Harvard, Vancouver, ISO, and other styles
31

Francas, David, and Stefan Minner. "Manufacturing network configuration in supply chains with product recovery." Omega 37, no. 4 (August 2009): 757–69. http://dx.doi.org/10.1016/j.omega.2008.07.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Chen, Zhaoxun, and Liya Wang. "Adaptable product configuration system based on neural network." International Journal of Production Research 47, no. 18 (June 30, 2009): 5037–66. http://dx.doi.org/10.1080/00207540802007571.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Zkik, Karim, Said EL Hajji, and Ghizlane Orhanou. "A centralized secure plan for detecting and mitigation incidents in hybrid SDN." MATEC Web of Conferences 189 (2018): 10015. http://dx.doi.org/10.1051/matecconf/201818910015.

Full text
Abstract:
The information technology sector has experienced phenomenal growth during recent years. To follow this development many new technologies have emerged to satisfy the expectations of businesses and customers, such as Cloud Computing, mobility, virtualization, Internet of things and big data. Traditional network cannot longer support this growth and suffers more and more in terms of misconfiguration,management and configurations complexity. Software defined network (SDN) architectures can be considered as a big revolution in the field of computer networks, because they offer a centralized control on infrastructure, services and the applications deployed which facilitate configuration and management on the network. The implementation of this type of architecture is not obvious and requires great expertise and good handling and management of network equipment. To remedy this problem the SDN architectures have evolved towards distributed and hybrid architectures. Despites the advantages of using SDN, security issues remain a real obstacle in front of the deployment of this type of architecture. The centralized architecture of this type of networks makes it vulnerable to several types of attacks and intrusions, and the implementation of security equipment generally causes a decrease in performance and increase latency.
APA, Harvard, Vancouver, ISO, and other styles
34

Hrůza, P. "Optimisation of forest road network under principles of functionally integrated forest management." Journal of Forest Science 49, No. 9 (January 16, 2012): 439–43. http://dx.doi.org/10.17221/4717-jfs.

Full text
Abstract:
A traditional approach to problems of the opening-up of forests has been based primarily on technical and economic aspects. It results particularly from the ground configuration and calculations of minimum costs for logging and transport operations. Optimum density of main forest roads is determined by a minimum value of the summary curve of costs of forest road construction and timber skidding. A new conception from the aspect of integrated forest management taking into account forest functions is based on a standard approach when technical and economic aspects are complemented by the particular functions of the forest. Thus, the technical and economic approach is changed to a technical-economic-environmental conception that will contribute to a reduction in negative effects of the construction of forest road network on the environment.
APA, Harvard, Vancouver, ISO, and other styles
35

Shani, A. B. (Rami), and James A. Sena. "ITs and Structural Change: The Case of Local Area Network Implementation." Journal of Information Technology 8, no. 1 (March 1993): 34–42. http://dx.doi.org/10.1177/026839629300800105.

Full text
Abstract:
New ITs are having a widespread impact on information flow within and between firms, on management practices and, on the basic processes and the structural configurations of the organization. This paper investigates a specific information system – Local Area Network – and its impact on the structural configuration of the firm. An initial discussion about a proposed framework for analysis is followed by an examination of the implementation of a local area network in a software development organization.
APA, Harvard, Vancouver, ISO, and other styles
36

YEH, JINN-YI, and TAI-HSI WU. "Solutions for product configuration management: An empirical study." Artificial Intelligence for Engineering Design, Analysis and Manufacturing 19, no. 1 (February 2005): 39–47. http://dx.doi.org/10.1017/s0890060405050043.

Full text
Abstract:
Customers can directly express their preferences on many options when ordering products today. Mass customization manufacturing thus has emerged as a new trend for its aiming to satisfy the needs of individual customers. This process of offering a wide product variety often induces an exponential growth in the volume of information and redundancy for data storage. Thus, a technique for managing product configuration is necessary, on the one hand, to provide customers faster configured and lower priced products, and on the other hand, to translate customers' needs into the product information needed for tendering and manufacturing. This paper presents a decision-making scheme through constructing a product family model (PFM) first, in which the relationship between product, modules, and components are defined. The PFM is then transformed into a product configuration network. A product configuration problem assuming that customers would like to have a minimum-cost and customized product can be easily solved by finding the shortest path in the corresponding product configuration network. Genetic algorithms (GAs), mathematical programming, and tree-searching methods such as uniform-cost search and iterative deepening A* are applied to obtain solutions to this problem. An empirical case is studied in this work as an example. Computational results show that the solution quality of GAs retains 93.89% for a complicated configuration problem. However, the running time of GAs outperforms the running time of other methods with a minimum speed factor of 25. This feature is very useful for a real-time system.
APA, Harvard, Vancouver, ISO, and other styles
37

Derbel, Hajer, Nazim Agoulmine, and Mikaël Salaün. "ANEMA: Autonomic network management architecture to support self-configuration and self-optimization in IP networks." Computer Networks 53, no. 3 (February 2009): 418–30. http://dx.doi.org/10.1016/j.comnet.2008.10.022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Roy, Abhishek, Navrati Saxena, Bharat J. R. Sahu, and Sukhdeep Singh. "BiSON: A Bioinspired Self-Organizing Network for Dynamic Auto-Configuration in 5G Wireless." Wireless Communications and Mobile Computing 2018 (November 7, 2018): 1–13. http://dx.doi.org/10.1155/2018/2632754.

Full text
Abstract:
Emerging 5G wireless networks are expected to herald significant transformation in industrial applications, with improved coverage, high data rates, and massive device capacity. However, the introduction of 5G wireless makes the network configuration, management, and planning extremely challenging. For efficient network configuration, every cell needs to be allocated a particular Physical Cell Identifier (PCID), which is unique in its vicinity. Wireless standards (e.g., 3GPP) typically specify a limited number of PCIDs. However, the number of cells in 5G Ultradense Networks (UDN) is expected to significantly outnumber these limited PCIDs. Hence, these PCIDs need to be efficiently allocated among the myriad of cells, such that two cells which are neighbors or neighbor’s neighbor are assigned with different PCIDs. This complicated network configuration problem becomes even more complex by dynamic introduction and removal of 5G small cells (e.g., micro, femto, and pico). In this paper, we introduce BiSON, a new Bioinspired Self-Organizing Solution for automated and efficient PCID configuration in 5G UDN. Using two different extensions, namely, “always near-optimal” and “heuristic,” we explain near-optimal and dynamic auto-configuration in computationally feasible time, with negligible overhead. Our extensive network simulation experiments, based on actual 5G wireless trials, demonstrate that the proposed algorithm achieves better optimality (minimum PCIDs in use) than earlier works in a reasonable computational complexity.
APA, Harvard, Vancouver, ISO, and other styles
39

Ullah, Rahat, Fahim Ullah, Zubair Khalid, and Hashim Safdar. "A REVIEW OF INTER CELL INTERFERENCE MANAGEMENT IN REGULAR AND IRREGULAR GEOMETRY CELLULAR NETWORKS." Jurnal Teknologi 83, no. 5 (August 1, 2021): 45–56. http://dx.doi.org/10.11113/jurnalteknologi.v83.16866.

Full text
Abstract:
This paper reviews the inter-cell interference (ICI) mitigation approaches in the OFDMA based multicellular networks with more emphasis on the frequency reused based ICI coordination schemes in the downlink systems. The geometry of the network severely affects the Signal to Interference and Noise Ratio (SINR); therefore, the wireless cellular systems are strongly dependent on the spatial BSs configuration and topology of a network. ICI mitigation techniques for both regular and irregular geometry networks are analyzed and a qualitative comparison along with the future research directions are presented.
APA, Harvard, Vancouver, ISO, and other styles
40

Mihăilă, Paul, Titus Bălan, Radu Curpen, and Florin Sandu. "Network Automation and Abstraction using Python Programming Methods." MACRo 2015 2, no. 1 (October 1, 2017): 95–103. http://dx.doi.org/10.1515/macro-2017-0011.

Full text
Abstract:
AbstractNetwork programmability is a trend, enhanced and inspired by Software Defined Networks, that are based on scripting methods and standard programming languages used for controlling and monitoring of network elements. This paper is illustrating some new methods in configuring network devices by using automation, reducing time for equipment configuration and easier maintenance. It also improves network security by recognizing and fixing security vulnerabilities and it increases the network stability. These methods represent the future of networks, allowing the management of an increased number of devices in a unitary way.
APA, Harvard, Vancouver, ISO, and other styles
41

Hariyadi, I. Putu, and Khairan Marzuki. "Implementation Of Configuration Management Virtual Private Server Using Ansible." MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 19, no. 2 (May 30, 2020): 347–57. http://dx.doi.org/10.30812/matrik.v19i2.724.

Full text
Abstract:
Virtualization technology has been applied to universities with computer study programs to support practicum in Network Management courses. Each user gets a Virtual Private Server (VPS) with container technology. VPS system that is prepared manually requires a long time, especially when the number of users is increasing. The activity repeats every semester so it becomes ineffective and inefficient. Application of automation using Ansible can help to manage VPS objects in the Promox Virtual Environment (PVE) Cluster dynamically. Network Development Life Cycle (NDLC) was used as a method in this study. The design of the VPS management automation system created supports the grouping of container, user and permission resource management for users. The design is implemented in Ansible Playbook. The test results show the average time of making VPS objects per student with an automation system 2 (two) times faster, that is 26.25 seconds compared to the old system which takes 2 minutes 15 seconds. Besides that, the Playbook that was created succeeded in automating the start and stop containers per group of students based on the practicum schedule dynamically so as to maintain the availability of services from the PVE Cluster.
APA, Harvard, Vancouver, ISO, and other styles
42

Maximov, Roman, Sergey Sokolovsky, and Ivan Voronchikhin. "Algorithm and Technical Solutions for Dynamic Configuration of Client-Server Computing Networks." Informatics and Automation 19, no. 5 (October 13, 2020): 1018–49. http://dx.doi.org/10.15622/ia.2020.19.5.5.

Full text
Abstract:
The main factors that determine the expansion of capabilities and increase the effectiveness of network intelligence to identify the composition and structure of client-server computer networks due to the stationarity of their structural and functional characteristics are analyzed. The substantiation of an urgent problem of dynamic management of structurally-functional characteristics of the client-server computer networks functioning in the conditions of network reconnaissance is resulted on the grounds of the revealed protection features of client-server computer networks at the present stage that is based on realization of principles of spatial safety maintenance, and also formalization and introduction of forbidding regulations. The mathematical model allowing to find optimum modes for dynamic configuration of structurally-functional characteristics of client-server computer networks for various situations is presented. Calculation results are given. An algorithm is presented that makes it possible to solve the problem of dynamic configuration of the structural and functional characteristics of a client-server computer network, which reduces the reliability time of data obtained by network intelligence. The results of practical tests of software developed on the basis of the dynamic configuration algorithm of client-server computer networks are shown. The obtained results show that the use of the presented solution for the dynamic configuration of client-server computer networks allows to increase the effectiveness of protection by changing the structural and functional characteristics of client-server computer networks within several subnets without breaking critical connections through time intervals that are adaptively changed depending on the functioning conditions and the attacker’s actions. The novelty of the developed model lies in the application of the mathematical apparatus of the Markov’s theory of random processes and Kolmogorov’s solution of equations to justify the choice of dynamic configuration modes for the structural and functional characteristics of client-server computer networks. The novelty of the developed algorithm is the use of a dynamic configuration model for the structural and functional characteristics of client-server computer networks for the dynamic control of the structural and functional characteristics of a client-server computer network in network intelligence.
APA, Harvard, Vancouver, ISO, and other styles
43

Dominguez, Roberto, Salvatore Cannella, and Jose M. Framinan. "On returns and network configuration in supply chain dynamics." Transportation Research Part E: Logistics and Transportation Review 73 (January 2015): 152–67. http://dx.doi.org/10.1016/j.tre.2014.11.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Li, Chun Long, Xiang Qun Wang, Zeng Hua Zhang, He Wang, and Xiao Yan Sun. "Management System in Routing and Switching Platforms." Advanced Materials Research 760-762 (September 2013): 1033–37. http://dx.doi.org/10.4028/www.scientific.net/amr.760-762.1033.

Full text
Abstract:
Routing and switching platforms are widely used in modern communication equipments, network management based on routing and switching platform has a significant meaning and a prospect of application. The article briefly describes the routing and switching platform ZebOS and the Simple Network Management Protocol SNMP, it explains the implementation method and workflow of SNMP network management used in routing and switching platform, and it realizes the configuration and management of routing exchange platform.
APA, Harvard, Vancouver, ISO, and other styles
45

Lavassani, Mehrzad, Johan Åkerberg, and Mats Björkman. "From Brown-Field to Future Industrial Networks, a Case Study." Applied Sciences 11, no. 7 (April 3, 2021): 3231. http://dx.doi.org/10.3390/app11073231.

Full text
Abstract:
The network infrastructures in the future industrial networks need to accommodate, manage and guarantee performance to meet the converged Internet technology (IT) and operational technology (OT) traffics requirements. The pace of IT–OT networks development has been slow despite their considered benefits in optimizing the performance and enhancing information flows. The hindering factors vary from general challenges in performance management of the diverse traffic for green-field configuration to lack of outlines for evolving from brown-fields to the converged network. Focusing on the brown-field, this study provides additional insight into a brown-field characteristic to set a baseline that enables the subsequent step development towards the future’s expected converged networks. The case study highlights differences between real-world network behavior and the common assumptions for analyzing the network traffic covered in the literature. Considering the unsatisfactory performance of the existing methods for characterization of brown-field traffic, a performance and dynamics mixture measurement is proposed. The proposed method takes both IT and OT traffic into consideration and reduces the complexity, and consequently improves the flexibility, of performance and configuration management of the brown-field.
APA, Harvard, Vancouver, ISO, and other styles
46

Prakash, K., F. R. Islam, K. A. Mamun, and H. R. Pota. "Configurations of Aromatic Networks for Power Distribution System." Sustainability 12, no. 10 (May 25, 2020): 4317. http://dx.doi.org/10.3390/su12104317.

Full text
Abstract:
A distribution network is one of the main parts of a power system that distributes power to customers. While there are various types of power distribution networks, a recently introduced novel structure of an aromatic network could begin a new era in the distribution levels of power systems and designs of microgrids or smart grids. In order to minimize blackout periods during natural disasters and provide sustainable energy, improve energy efficiency and maintain stability of a distribution network, it is essential to configure/reconfigure the network topology based on its geographical location and power demand, and also important to realize its self-healing function. In this paper, a strategy for reconfiguring aromatic networks based on structures of natural aromatic molecules is explained. Various network structures are designed, and simulations have been conducted to justify the performance of each configuration. It is found that an aromatic network does not need to be fixed in a specific configuration (i.e., a DDT structure), which provides flexibility in designing networks and demonstrates that the successful use of such structures will be a perfect solution for both distribution networks and microgrid systems in providing sustainable energy to the end users.
APA, Harvard, Vancouver, ISO, and other styles
47

Shen, Jin, Bin Wu, and Li Yu. "Personalized configuration rules extraction in product service systems by using Local Cluster Neural Network." Industrial Management & Data Systems 115, no. 8 (September 14, 2015): 1529–46. http://dx.doi.org/10.1108/imds-03-2015-0092.

Full text
Abstract:
Purpose – Configuration systems are used as a means for efficient design of customer tailored product service systems (PSS). In PSS configuration, mapping customer needs with optimal configuration of PSS components have become much more challenging, because more knowledge with personalization aspects has to be considered. However, the extant techniques are hard to be applied to acquire personalized configuration rules. The purpose of this paper is to extract the configuration rule knowledge in symbolism formulation from historical data. Design/methodology/approach – Customer characteristics (CCs) are defined and introduced into the construction of configuration rules. Personalized PSS configuration rules (PCRs) are thereby proposed to collect and represent more knowledge. An approach combining Local Cluster Neural Network and Rulex algorithm is proposed to extract rule knowledge from historical data. Findings – The personalized configuration rules with CCs are able to alleviate the burden of customers in expressing functional requirements. Furthermore, in the long-term relationship with a customer in PSS realization, PSS offerings can be reconfigured according to the changing CCs with the guide of PCRs. Originality/value – The contribution of this paper lies in introducing the attribute of CCs into the antecedents of PCRs and proposing the neural networks-based approach to extracting the rule knowledge from historical data.
APA, Harvard, Vancouver, ISO, and other styles
48

Ovsyanikova, Irina, and Aleksandr Tarapanov. "Development of a virtual management system for the cutting process using neural networks." MATEC Web of Conferences 224 (2018): 01015. http://dx.doi.org/10.1051/matecconf/201822401015.

Full text
Abstract:
The article deals with the problems of choosing the neural network configuration for blade processing control. The analysis of input parameters is carried o7ut and the virtual representation of cutting’s technological process is simulated. A mathematical control model that allows to mutually transform processes depending on the control criteria is proposed. The configuration of the neural network, that allows to provide the most productive and stable operation with insufficient and contra dictionary input parameters is established.
APA, Harvard, Vancouver, ISO, and other styles
49

Orjuela-Castro, Javier Arturo, Juan Pablo Orejuela-Cabrera, and Wilson Adarme-Jaimes. "Logistics network configuration for seasonal perishable food supply chains." Journal of Industrial Engineering and Management 14, no. 2 (February 5, 2021): 135. http://dx.doi.org/10.3926/jiem.3161.

Full text
Abstract:
Purpose: The location of actors and production, transformation, commercialization and distribution facilities generate the configuration of the perishable food supply chain (PFSC). The logistics network design (LND) lead to different supply, storage and distribution environments and result in flows, these logistics operations have an impact on the performance of the chain of fresh agricultural products. Specifically, in the PFSC with seasonality, a temporary imbalance between supply and demand is generated, which affects the balance in the flows and affects the losses, costs and response capacity. This research study that problem.Design/methodology/approach: A multi-echelon, multi-objective and multi-product model is established that determines the configuration of the logistics network of the PFSC with seasonally and allows actors to approach efficiency frontiers, which contribute to their permanence in the markets. The model was applied to the case of the perishable fruit supply chain, in a developing country, Colombia. The population information was taken from government surveys and studies, which allowed parameterizing the model.Findings: The application of model permitted to answer the next questions: How does improve the performance from PFSC through logistics network design? And, How the existence of smallholdings in food production and from retail merchants is preserved? In the perishable food supply chain.Social implications: Where the perishable food supply chain actors are located in non-efficient borders and their sustainability may be affected by competition factors, the stakeholders should focus on increasing food availability and reducing losses to improve access and therefore food security.Originality/value: A new model for the logistics network configurations of seasonal perishable fruit supply chain was development, the optimizing from five objectives with two sub-models is obtained, one for surplus and the other for the deficit moments. The model includes real conditions, such as, fruit loss due T0 and RH by different thermal floors and the means used for the transport of fruits in mountain areas at countries in route of development. The impact over the small producers, retailers and consumers in the times of scarcity or surplus was analyzed.
APA, Harvard, Vancouver, ISO, and other styles
50

SAVINA, NATALIA VIKTOROVNA, IVAN ALEXANDROVICH LISOGURSKY, and LYDIA NIKOLAEVNA LISOGURSKY. "APPLICATION OF ACTIVE-ADAPTIVE NETWORK TECHNOLOGIES FOR POWER QUALITY MANAGEMENT IN ELECTRIC NETWORKS WITH TRACTION LOAD." Messenger AmSU, no. 93 (2021): 56–61. http://dx.doi.org/10.22250/jasu.93.12.

Full text
Abstract:
On the basis of the system approach, the analysis of the basic technologies of the intelligent electric power system that provide adaptive management of the electric network is carried out. The expediency of their application for adaptive power quality management in electric networks with traction load by expanding the functions is shown. The variants of their configuration are proposed to improve the quality of electricity and ensure optimal parameters of electricity quality indicators.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography