scholarly journals Automation of Detection and Fault Management Response of Common Last-Mile Loss-Of-Connectivity Outages Within the Access Network

Author(s):  
Alban Scribbins ◽  
Kevin Curran

The article to assesses whether it may be possible to recommend a solution to enable automation of the process of detection and fault management of common conclusive loss-of-connectivity last-mile outages, within the access network. To ascertain the utility of the research, UK based MPLS VPN managed service providers, their fault management staff and their business customers, were surveyed using online questionnaires for their views. UK public Internet users were additionally surveyed via five UK Internet forums. UK communication providers offering MPLS VPN solutions were characterised. Access network connectivity technologies and fault management functions were compared, contrasted and analysed. An aspiration for the solution to be beneficial to the largest potential population, meant that current non-proprietary Internet Standard technologies were selected, justified and identified which could be recommended for use. It was found that of the participating survey respondents, two-thirds were in favour of automation. Many current communication provider processes were found to be mostly automated. The article concludes with recommendations of how an automated solution could potentially be enabled. This involves further use of business-to-business interfacing between communication providers, automation of their Fault Management Systems and introducing Bi-Directional forwarding for detection between last-mile active network elements.

2022 ◽  
pp. 607-635
Author(s):  
Alban Scribbins ◽  
Kevin Curran

The article to assesses whether it may be possible to recommend a solution to enable automation of the process of detection and fault management of common conclusive loss-of-connectivity last-mile outages, within the access network. To ascertain the utility of the research, UK based MPLS VPN managed service providers, their fault management staff and their business customers, were surveyed using online questionnaires for their views. UK public Internet users were additionally surveyed via five UK Internet forums. UK communication providers offering MPLS VPN solutions were characterised. Access network connectivity technologies and fault management functions were compared, contrasted and analysed. An aspiration for the solution to be beneficial to the largest potential population, meant that current non-proprietary Internet Standard technologies were selected, justified and identified which could be recommended for use. It was found that of the participating survey respondents, two-thirds were in favour of automation. Many current communication provider processes were found to be mostly automated. The article concludes with recommendations of how an automated solution could potentially be enabled. This involves further use of business-to-business interfacing between communication providers, automation of their Fault Management Systems and introducing Bi-Directional forwarding for detection between last-mile active network elements.


ADALAH ◽  
2020 ◽  
Vol 4 (2) ◽  
Author(s):  
Munadhil Abdul Muqsith

Abstract:The internet developed for the first time in Indonesia in the early 1990s. Starting from the pagayuban network, it is now expanding without boundaries anywhere. A survey conducted by the Indonesian Internet Service Providers Association (APJII) said that the number of internet users in Indonesia in 2012 reached 63 million people or 24.23 percent of the country's total population. Next year, that figure is predicted to increase by close to 30 percent to 82 million users and continue to grow to 107 million in 2014 and 139 million or 50 percent of the total population in 2015. million people. This matter also results in political communication with the internet media, or is often said to be cyber politics. Cyber politics in Indonesia has faced growth in recent years. There are many facilities that support the growth of cyber politics, such as Facebook, Twitter, mailing list, YouTube, and others.Keywords: Cyberpolitik, Internet  Abstrak:Internet berkembang pertama kali di Indonesia pada awal tahun 1990-an. Diawali dari pagayuban network kini berkembang luas tanpa batas dimanapun juga. Suatu survei yang diselenggarakan Asosiasi Penyelenggara Jasa Internet Indonesia (APJII) mengatakan kalau jumlah pengguna internet di Indonesia tahun 2012 menggapai 63 juta orang ataupun 24,23 persen dari total populasi negeri ini. Tahun depan, angka itu diprediksi naik dekat 30 persen jadi 82 juta pengguna serta terus berkembang jadi 107 juta pada 2014 serta 139 juta ataupun 50 persen total populasi pada 2015. juta orang. Perihal ini pula berakibat pada komunikasi politik dengan media internet, ataupun kerap diucap dengan cyber politic. Cyber politic di Indonesia hadapi pertumbuhan sebagian tahun terakhir. Banyaknya fasilitas yang menunjang pertumbuhan cyber politic semacam terdapatnya facebook, Twitter, mailing list, youtobe, serta lain-lain.Kata Kunci: Cyberpolitik, Internet 


2015 ◽  
Vol 8 (1) ◽  
Author(s):  
Swati Ganeti ◽  
Rajat Agarwal ◽  
Murali Krishna Medudula ◽  
Mahim Sagar

Telecom industry is one of those industries which has changed dramatically during the past decade. With more and more players entering in this industry, competition is ever increasing. The war between these players is slowly shifting from the price to the augmentation. This paper aims at exploring such factors which influence a customers preference of one telecom service provider (TSP) over the other. It is a descriptive research where study has been conducted among the consumers of different telecom service providers (TSPs). By reviewing the existing literature in this domain, we explored different factors which affect the consumers decision to prefer one telecom service provider over the other. A consumer targeted questionnaire was designed where consumers were asked about the factors they consider (with their relative importance quantified using Likert scale), before buying a new network connection to know the relative importance of the various factors. Factor Analysis was performed to club various variables into distinct factors. Statistical techniques then helped in identifying the relative importance. From the Factor Loading matrix the following five factors were generated:- Overall service quality, Point of Purchase Differentiator, Promotion Measures, Tariff Plans and Size of the Network. Further study in the behavioural perceptions of consumer shows that the most important factor in influencing the customer buying behavior is Service Quality. The second most important factor is cost and various plans offered by the telecom service provider. Network connectivity was considered by almost all the respondents and consumers prefer the largest network player. The study also found that promotional measures dont influence the customers as expected.


Author(s):  
Bangaly Kaba

The purpose of this study is to understand the difference between Internet users' continuing use behavior in the context of digital inequality. Data were collected through a survey of Internet users in the Ivory Coast. The structural equation modeling technique was used to test the research hypothesis. This study showed empirically that concern over information and communication technologies (ICT) access as an explanation for digital inequality should be toned down. This research suggests emphasizing alternative factors to explain Internet sustained use intention by underprivileged individuals, including normative beliefs. The results will help internet service providers, governments, and international aid agencies to better understand users' behaviors or reactions to ICT available to them. This understanding provides a foundational platform upon which viable and effective information technology-enabled solutions and policies can be conceptualized and implemented. This study is one of the few that integrate three salient beliefs to differentiate ICT use continuance intention in the context of digital inequality.


Information ◽  
2021 ◽  
Vol 12 (4) ◽  
pp. 145
Author(s):  
Anas Hidayat ◽  
Tony Wijaya ◽  
Asmai Ishak ◽  
Putra Endi Catyanadika

The e-commerce industry in Indonesia is growing in line with the increasing number of internet users in Indonesia. Unfortunately, many internet users in Indonesia are still unsure about shopping online because of the lack of buyer trust with sellers and service providers. This study aims to identify the factors that influence online shop consumers to conduct transactions online. This research used a questionnaire survey distributed to customers who had ever used an online shop application. The sample used in this research was 468 respondents. The data collected was then analyzed using Partial Least Square. The results of this research indicated that trust, perceived value, and buying interest positively influence consumers’ decisions to purchase using an online shop application.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Btissam Moncef ◽  
Marlène Monnet Dupuy

PurposeThe purpose of this paper is to explore sustainability paradoxes in sharing economy initiatives by focusing on logistics management in last-mile logistics.Design/methodology/approachIn this exploratory study, a total of 10 case studies were conducted in three categories of companies: anti-waste platforms, food delivery platforms and bicycle delivery companies. Twenty-seven face-to-face interviews with founders and/or managers and contractors (couriers, logistics service providers or volunteers) were the primary source of data collection. The heterogeneity of the sample enabled the authors to build an understanding of sustainability paradoxes in the logistics of sharing economy initiatives.FindingsThe findings indicate how logistics management impacts the sustainability of sharing economy initiatives in last-mile delivery. The authors identify seven paradoxical tensions (five of them social) generated by the contradictions between the organizations' promised environmental and social values and the impacts of their operations.Research limitations/implicationsThis exploratory research is based on a qualitative study of 10 cases and 27 interviews from heterogeneous samples; further empirical research is needed to ensure generalization.Practical implicationsThe paper increases the understanding of environmental and social paradoxical tensions and awareness of logistics challenges.Social implicationsThe paper helps identify ways to reconcile promised values and impacts generated by sharing economy initiatives while managing last-mile delivery.Originality/valueThe results enrich the literature about the paradoxes in sharing economy initiatives by providing illustrations in last-mile logistics and exposing the underlying challenges for sharing economy logistics actors.


Author(s):  
Theo Lynn

Abstract Cloud computing is the dominant paradigm in modern computing, used by billions of Internet users worldwide. It is a market dominated by a small number of hyperscale cloud service providers. The overwhelming majority of cloud customers agree to standard form click-wrap contracts, with no opportunity to negotiate specific terms and conditions. Few cloud customers read the contracts that they agree to. It is clear that contracts in cloud computing are primarily an instrument of control benefiting one side, the cloud service provider. This chapter provides an introduction to the relationship between psychological trust, contracts and contract law. It also offers an overview of the key contract law issues that arise in cloud computing and introduces some emerging paradigms in cloud computing and contracts.


2021 ◽  
Author(s):  
◽  
Elizabeth Ivy Calvert

<p>Website Terms of Service and Privacy Policy documents are the delivery methods employed by online services to inform internet users of how information is treated on their platform. When users fail to read or understand these documents, many issues can arise. These issues take shape in the form of unwillingness to use services, misunderstandings of how online data is treated, and/or user concerns for personal privacy. Currently, the leading factors influencing user motivation to read these documents include (but are not limited to) document length, complicated language, and time required to read. To encourage users to engage with these documents, this research investigates the delivery methods service providers use to present these legal documents online. During the course of this investigation, the proposal of a new method of presenting website Privacy Policies to users is explored. This tool, ‘Re: Privacy’, was developed with the aim of increasing user awareness of online data treatment, whilst minimising the factors that dissuade users from reading the official document. Published alongside Re: Privacy is a comprehensive analysis of website legal documents and user understanding of these documents. This analysis also provides an investigation into user understanding of current website legal documents, and how user understanding can be improved.</p>


Author(s):  
Tung-Hsiang Chou ◽  
Ching-Chang Lee ◽  
Chin-Wen Lin

The Internet has come a long way over the past twenty years, and many Internet-era enterprises have had to face daunting challenges while trying to create innovative business models. Many types of Internet interactions can facilitate networking (e.g., The Web, Web services). Since the advent of the Internet, service requesters and service providers have generated diverse electronic services (e-services), and since 2003, many experts have proposed the concept of Web 2.0. People rely on Internet e-services to execute activities and meet requirements; however, e-services lack a standardization method for constructing and managing them. The current study presents a framework design and a comprehensive interface for e-service providers and requesters. The study adopts the concept of Web 2.0 by using Web services with related standards for developing the framework design. Specifically, the study uses semantic Web technologies to complete the construction of e-services. After that, Internet users can quickly and conveniently access the framework to obtain suitable e-services.


Author(s):  
V. Sridhar ◽  
Piyush Jain

This case highlights the challenges faced by organizations in developing countries in getting reliable, high-speed Internet access to support their mission critical web enabled information systems. The case prescribes various measures to optimally use the constrained bandwidth available from service providers. The challenges in defining and monitoring appropriate service level agreements with the service providers are discussed.


Sign in / Sign up

Export Citation Format

Share Document