Network fault management systems rely heavily on observed alarms to identify the root causes of network failures. Due to the increasing complexity of modern computer networks, the information carried by these alarms m...
详细信息
ISBN:
(纸本)9780889868205
Network fault management systems rely heavily on observed alarms to identify the root causes of network failures. Due to the increasing complexity of modern computer networks, the information carried by these alarms may in fact be vague, imprecise, and inconsistent. thus, these alarms often possess different diagnostic capabilities and should not be treated equally. In this paper, we propose a new distributed alarm correlation approach that effectively tackles the aforementioned data deficiencies. According to the proposed approach, the managed network is first divided into a disjoint set of management domains and each domain is assigned an intelligent agent. Within the framework of Dempster-Shafer evidence theory, the intelligent agent perceives each network entity in its domain as a source of information. As such, alarms emitted by these entities are expected to exhibit different information qualities and are assigned different weights accordingly. Based on their weights, the observed alarms are then correlated by their respective agent into a single local fuzzy composite alarm. Since local composite alarms constitute only partial views of the managed network, they are correlated, by a higher management entity, into a global alarm that accurately reflects a comprehensive view of the managed network.
Many of the current service-oriented architectures are built on top of distributed object technologies. these technologies have, however, lost most of their initial appeal, mainly due to the inability to port their co...
详细信息
Withthe current generalisation of parallel architectures arises the concern of applying formal methods to parallelism. the complexity of parallel, compared to sequential, programs makes them more error-prone and diff...
详细信息
Conic curves cryptosystem is a new technology for achieving information security. Point-addition and point-double are fundamental operations in conic curves cryptosystem over ring Zn. there is no existing research abo...
详细信息
this paper proposes a scheme for automatic detection of view access in the View-Oriented parallel Programming (VOPP) model. VOPP is a shared-memory-based, data-centric model that uses "views" to bundle mutua...
详细信息
the distributed optimal path planning (D-OPP) problem has been a bottleneck restricting the performance of Peer-to-Peer (P2P) workflow systems which have met the development trend of workflow systems and been one of t...
详细信息
Routing in mobile ad hoc networks (MANET) is complex and complicated because the network graph is episodically connected. the topology is changing rapidly because of weather, terrain, highly variable delay links, erro...
详细信息
ISBN:
(纸本)9780889868205
Routing in mobile ad hoc networks (MANET) is complex and complicated because the network graph is episodically connected. the topology is changing rapidly because of weather, terrain, highly variable delay links, error rate links, and jamming. A key challenge is to create a method that can present good delivery performance and low end-to-end delay in an intermittent network graph and opportunistic or scheduled intermittent links where nodes may move freely. Delay-Tolerant Networking (DTN) architecture is designed to provide communication in intermittently connected networks by moving messages towards destination via 'store, carry and forward' technique that supports multi-routing algorithms to acquire best path towards destination. In this paper, we propose the use of probabilistic routing in DTN architecture using the concept of History of Encounters. We compared the new approach, History of Encounters Probabilistic Routing Algorithm (HEPRA) to the common DTN-based protocols. We have used the Opportunistic Network Environment (ONE) simulator as a simulation tool. We demonstrate the ability of HEPRA to accomplish good quality performance than the other common existing Protocols.
Concurrency control in distributed and parallelapplications has been studied for many years but is still an ongoing research topic. Transactional memory addresses this challenge for multicore processors by proposing ...
详细信息
OpenMP applications executed on top of software distributed shared memory (SDSM) systems show peaks in network traffic. In these scenarios, synchronization points are used to maintain memory consistency and improve pe...
详细信息
Large-scale distributedcomputing systems (LDCSs) can be best characterized by their dynamic nature particularly in terms of availability and performance. Typically, these systems deal with various types of jobs in ma...
详细信息
暂无评论