scholarly journals Automation of Detection and Fault Management Response of Common Last-Mile Loss-Of-Connectivity Outages Within the Access Network

2022 ◽  
pp. 607-635
Author(s):  
Alban Scribbins ◽  
Kevin Curran

The article to assesses whether it may be possible to recommend a solution to enable automation of the process of detection and fault management of common conclusive loss-of-connectivity last-mile outages, within the access network. To ascertain the utility of the research, UK based MPLS VPN managed service providers, their fault management staff and their business customers, were surveyed using online questionnaires for their views. UK public Internet users were additionally surveyed via five UK Internet forums. UK communication providers offering MPLS VPN solutions were characterised. Access network connectivity technologies and fault management functions were compared, contrasted and analysed. An aspiration for the solution to be beneficial to the largest potential population, meant that current non-proprietary Internet Standard technologies were selected, justified and identified which could be recommended for use. It was found that of the participating survey respondents, two-thirds were in favour of automation. Many current communication provider processes were found to be mostly automated. The article concludes with recommendations of how an automated solution could potentially be enabled. This involves further use of business-to-business interfacing between communication providers, automation of their Fault Management Systems and introducing Bi-Directional forwarding for detection between last-mile active network elements.

Author(s):  
Alban Scribbins ◽  
Kevin Curran

The article to assesses whether it may be possible to recommend a solution to enable automation of the process of detection and fault management of common conclusive loss-of-connectivity last-mile outages, within the access network. To ascertain the utility of the research, UK based MPLS VPN managed service providers, their fault management staff and their business customers, were surveyed using online questionnaires for their views. UK public Internet users were additionally surveyed via five UK Internet forums. UK communication providers offering MPLS VPN solutions were characterised. Access network connectivity technologies and fault management functions were compared, contrasted and analysed. An aspiration for the solution to be beneficial to the largest potential population, meant that current non-proprietary Internet Standard technologies were selected, justified and identified which could be recommended for use. It was found that of the participating survey respondents, two-thirds were in favour of automation. Many current communication provider processes were found to be mostly automated. The article concludes with recommendations of how an automated solution could potentially be enabled. This involves further use of business-to-business interfacing between communication providers, automation of their Fault Management Systems and introducing Bi-Directional forwarding for detection between last-mile active network elements.


Author(s):  
Junaid Ahsenali Chaudhry

The networking technologies are moving very fast in pursuit of optimum performance, which has triggered the importance of non-conventional computing methods. In the modern world of pervasive business systems, time is money. The more the system fulfills the needs of the requesting user, the more revenue the business will generate. The modern world is service-oriented, and therefore, providing customers with reliable and fast service delivery is of paramount importance. In this article we present a scheme to increase the reliability of business systems. The arrival of ubiquitous computing has triggered the need previously mentioned even further, and people hold high exceptions from this technology. In Morikawa (2004), the authors characterize the vision of ubiquitous computing into two categories: “3C everywhere and physical interaction.” 3C consists of “computing everywhere,” “content everywhere,” and “connectivity everywhere.” “Physical interaction” connects the hidden world of ubiquitous sensors with the real world. This wide area of coverage and high scalability makes a ubiquitous system quite fragile toward not only external threats, but internal malfunctioning too. With the high probability of “abnormal behavior” it is more important to have knowledge of fault and its root causes. As described in Yau, Wang, and Karim (2002), application failures are like diseases, and there can be many types of faults with matching symptoms, thus fault localization and categorization are very important. Unlike in Hung et al. (2005) and Steglich and Arbanowski (2004), we cannot categorize all abnormal functionalities into fault tolerance or (re)configuration domains simply because faults do not have any predefined pattern; rather we have to find those pattern. Moreover, as in Steglich and Arbanowski (2004) the “without foresight” type of repair in ubiquitous systems is desired. The conventional FCAPS (Fault, Configuration, Accounting, Performance, Security), network management model categorizes management functions in one group, but we argue that categorizing management functions into different segment is mandatory in self management paradigms. Since in highly dynamic and always available very wide area networks, one fault can be atomic (caused because of one atomic reason) or it can be a set of many faults (caused because of many atomic or related reasons). It is often a good practice to break the problem into smaller atomic problems and then solve them (Chaudhry, Park, & Hong, 2006). If we classify all different types of faults (atomic, related, and composite) into one fault management category, the results would not be satisfactory, nor would the system be able to recover from the “abnormal state” well. Since the side effects of system stability and self healing actions are not yet known (Yau et al., 2002), we cannot afford to assume that running self management modules along with functional modules of the core system will not have a negative effect on the system performance. For example, if the system is working properly, there is no need for fault management modules to be active. Lastly, instead of having a fault-centric approach, we should have a recovery-centric approach because of our objective that is to increase the system availability In this article we present autonomic self healing engine (ASHE) architecture for ubiquitous smart systems. We identify the problem context through artificial immune system techniques and vaccinate (deploy solution to) the system through dynamically composed applications. The services involved in the service composition process may or may not be related, but when they are composed into an application they behave in a way it is specified in their composition scheme. The vaccines are dissolved to liberate the system resources (because they take the system’s own resources to recover it) after the system recovery. When the system is running in a normal state, all self management modules are turned off except context awareness and self optimization. These two are always on to monitor and optimize the system respectively.


2020 ◽  
Vol 12 (15) ◽  
pp. 6110
Author(s):  
Dongdong Feng ◽  
Lin Cheng ◽  
Mingyang Du

As a green and sustainable travel mode, the bikeshare plays an important role in solving the “last-mile” problem. The new dockless bikeshare system (DBS) is widely favored by travelers, and the traditional docked bikeshare system (BS) is affected to a certain extent, but the specific circumstances of this impact are not yet known. To fill the knowledge gap, the objective of this study is to measure the impacts of DBS on London cycle hire, which is a type of BS. In this study, the travel data of 707 docking stations in two periods, i.e., March 2018 and March 2017, are included. A spatial-temporal analysis is first conducted to investigate the mobility pattern changes. A complex network analysis is then developed to explore the impact of DBS on network connectivity. The results suggest a significant decrease of 64% in the average trip amounts, with both origins and destinations in the affected area, and the trips with short and medium duration and short and medium distances are mainly replaced by DBS. DBS also has a considerable impact on the structure and properties of the mobility network. The connectivity and interaction strength between stations decrease after DBS appears. We also concluded that the observed changes are heterogeneously distributed in space, especially on weekends. The applied spatial-temporal analysis and complex network analysis provide a better understanding of the relationships between DBS and BS.


2019 ◽  
Vol 8 (1) ◽  
pp. 188-195
Author(s):  
Adam Wong Yoon Khang ◽  
Shamsul J. Elias ◽  
J. Pusppanathan ◽  
Nadiatulhuda Zulkifli ◽  
N. H. Halim ◽  
...  

This study focuses on mobile ad hoc networks (MANETs) that support Internet routing protocol imposing stringent resource consumption constraints of Quality of service (QoS). The mobile Internet causes the ongoing issue of inefficient use of the MANET resources due to its random nature of wireless environments. In this paper, the new improved architecture of the last mile mobile hybrid optical-wireless access network (adLMMHOWAN) is proposed and designed to tackle the arised issues. The proposed design is based on a unified wireless-wired network solution required the deployment of MANET-based wireless fidelity (WiFi) technology at the wireless front-end and wavelengths division multiplexing passive optical network (WDM PON) at the optical backhaul. The critical performance metrics such as network capacity and energy consumption based on modified AODVUU routing protocol using OMNeT++ software is analyzed with 2 scenarios, namely the number of nodes and mobility speed. This mode of communication results in better QoS network capacity of 47.07% improvement, with 26.85% reduction of lower energy resource consumption for mobile wireless front-end over passive optical network backhaul architecture when compared with the existing work of oRiq scheme that focus on improvement in MANETs.


Author(s):  
Indrawati Indrawati ◽  
Fitri Maya Puspita ◽  
Desta Wahyuni ◽  
Evi Yuliza ◽  
Oki Dwipurwani

In this study, the pricing scheme that will be formed is a model from the previous research model involving model of cloud-radio access network (C-RAN) and fair network management models. This model combines the benefits of internet service provider (ISP) and service quality (QoS) obtained by internet users, one of which is fair network factors. The model used is a nonlinear equation and is solved by the LINGO 13.0 program to get the optimal solution. The results show that the pricing scheme with regard to service quality generates maximum revenue for ISPs. Based on the improved C-RAN model that are classified into 2 cases, the optimal results in the improved model, the optimal value is found in the pricing scheme in case 1 of by conducting numerical computation using  hotspot traffic from local server.


Author(s):  
Mojtaba Mansour Abadi ◽  
Zabih Ghassemlooy ◽  
Nithin Mohan ◽  
Stanislav Zvanovec ◽  
Manav R. Bhatnagar ◽  
...  

Author(s):  
Uma Rathore Bhatt ◽  
Nitin Chouhan ◽  
Antim Bala Marmat ◽  
Raksha Upadhyay

: In the present scenario, increasing bandwidth demand and data-hungry applications require every network to be equipped with cloud services, as a huge amount of storages, processing power and miraculous speed available with it. Cloud integrated Wireless Optical Broadband Access Network (CIW) is one of the suitable choices to fulfil these requirements. CIW can be realized by deploying Cloud Components (CCs) or thin servers either at optical back-end or at wireless front-end of the (Wireless Optical Broadband Access Network) WOBAN. In the present work, we integrate cloud components at wireless front-end of the CIW. Integration of CCs at front-end offloads traffic associated with cloud services from wireless front-end and diverts it towards CCs, which results in a reduction in bandwidth usage of the wireless front-end of WOBAN. We introduce a novel approach known as cluster-based optimization of network components in CIW. The proposed algorithm eliminates redundant Optical Network Units (ONUs) and optimizes a number of CCs while ensuring network connectivity and cloud services to all users. Simulation results validate that the proposed algorithm offers suitable candidature to deploy cost-efficient CIW.


2013 ◽  
Vol 380-384 ◽  
pp. 2510-2514
Author(s):  
Zai Ying Liu ◽  
Ping Yang ◽  
Li Xiao Zhang

VPN based on the internet can not only make some enterprises save a large amount of costs, but also has better scalability, security and reliability. The paper introduced the concept and classifications of VPN, and described the key technologies of IPsec VPN and MPLS VPN. At last, we put the emphasis on the VPN network management mechanism, including fault management, performance management and tunnel management.


2017 ◽  
Vol 4 ◽  
pp. 87-91
Author(s):  
Michał Buryta ◽  
Piotr Kopniak

The article concerns the differences in the mechanisms of securing the three most popular mobile platforms, which are Android, iOS and Windows Phone. Mainly focuses on the differences related to access to user data, installing and running applications, Internet access, network connectivity, cloud services, backup, file encryption capabilities, the use of electronic signatures and connect the device to your computer.


Sign in / Sign up

Export Citation Format

Share Document