Computer Science Computer Networks and Communications

Mobile Agent-Based Network Management

Description

This cluster of papers focuses on the use of mobile agent technology for network management, security, and fault tolerance in distributed systems. It explores applications in Internet and wireless computing, integration with SNMP and Java platform, and the use of XML-based management. The research also delves into the challenges and future directions of mobile agent technology in network management.

Keywords

Mobile Agents; Network Management; Security; Distributed Systems; Fault Tolerance; Internet Applications; SNMP; Java Platform; Wireless Computing; XML-Based Management

This RFC describes an existing protocol for exchanging routing information among gateways and other hosts.It is intended to be used as a basis for developing gateway software for use in … This RFC describes an existing protocol for exchanging routing information among gateways and other hosts.It is intended to be used as a basis for developing gateway software for use in the Internet community.Distribution of this memo is unlimited.
This RFC is a re-release of RFC 1067, with a changed Status of this Memo section. This memo defines a simple protocol by which management information for a network element … This RFC is a re-release of RFC 1067, with a changed Status of this Memo section. This memo defines a simple protocol by which management information for a network element may be inspected or altered by logically remote users. In particular, together with its companion memos which describe the structure of management information along with the initial management information base, these documents provide a simple, workable architecture and system for managing TCP/IP-based internets and in particular the Internet.
This document specifies Protocol Independent Multicast - Sparse Mode (PIM-SM). PIM-SM is a multicast routing protocol that can use the underlying unicast routing information base or a separate multicast- capable … This document specifies Protocol Independent Multicast - Sparse Mode (PIM-SM). PIM-SM is a multicast routing protocol that can use the underlying unicast routing information base or a separate multicast- capable routing information base. It builds unidirectional shared trees rooted at a Rendezvous Point (RP) per group, and optionally creates shortest-path trees per source. This document obsoletes RFC 2362, an Experimental version of PIM-SM. [STANDARDS-TRACK]
1. Introduction and Overview. 2. Introduction to Queuing Theory. 3. Layered Architectures in Data Networks. 4. Data Link Layer. 5. Examples and Performance Analysis. 6. Network Layer: Flow Control and … 1. Introduction and Overview. 2. Introduction to Queuing Theory. 3. Layered Architectures in Data Networks. 4. Data Link Layer. 5. Examples and Performance Analysis. 6. Network Layer: Flow Control and Congestion Control. 7. Network Layer: Routing Function Transport Layer. 8. Polling and Random Access in Data Networks. 9. Local Area Networks. 10. Introduction to Circuits Switching. 11. Call Processing in Digital Circuit-switching Systems. 12. The Evolution toward Integrated Networks.
1. The Promises and Challenges of Networked Virtual Environments. What Is a Networked Virtual Environment? Graphics Engines and Displays. Control and Communication Devices. Processing Systems. Data Network. Challenges in Net-VE … 1. The Promises and Challenges of Networked Virtual Environments. What Is a Networked Virtual Environment? Graphics Engines and Displays. Control and Communication Devices. Processing Systems. Data Network. Challenges in Net-VE Design and Development. Network Bandwidth. Heterogeneity. Distributed Interaction. Real-Time System Design and Resource Management. Failure Management. Scalability. Deployment and Configuration. Conclusion. References. 2. The Origin of Networked Virtual Environments. Department of Defense Networked Virtual Environments. SIMNET. Distributed Interactive Simulation. Networked Games and Demos. SGI Flight and Dogfight. Doom. Other Games. Academic Networked Virtual Environments. NPSNET. PARADISE. DIVE. Brick Net. MR Toolkit Peer Package. Others. Conclusion. References. 3. A Networking Primer. Fundamentals of Data Transfer. Network Latency. Network Bandwidth. Network Reliability. Network Protocol. The BSD Sockets Architecture. Sockets and Ports. The Internet Protocol. Introducing the Internet Protocols for Net-Ves. Transmission Control Protocol. User Datagram Protocol. IP Broadcasting Using UDP. IP Multicasting. Selecting a Net-VE Protocol. Using TCP/IP. Using UDP/IP. Using IP Broadcasting. Using IP Multicasting. Conclusion. References. 4. Communication Architectures. Two Players on a LAN. Multiplayer Client-Server Systems. Multiplayer Client-Server, with Multiple-Server Architectures. Peer-to-Peer Architectures. Conclusion. References. 5. Managing Dynamic Shared State. The Consistency-Throughput Tradeoff. Maintaining Shared State Inside Centralized Repositories. Reducing Coupling through Frequent State Regeneration. Dead Reckoning of Shared State. Conclusion. References. 6. Systems Design. One Thread, Multiple Threads. Important Subsystems. Conclusion. References and Further Reading. 7. Resource Management for Scalability and Performance. An Information-Centric View of Resources. Optimizing the Communications Protocol. Controlling the Visibility of Data. Taking Advantage of Perceptual Limitations. Enhancing the System Architecture. Conclusion. References. 8. Internet Networked Virtual Environments. VRML-Based Virtual Environments. Virtual Reality Transfer Protocol. Internet Gaming. Conclusion. References. 9. Perspective and Predictions. Better Library Support. Toward a Better Internet. Research Frontiers. Past, Present, and Future. References. Appendix: Network Communication in C, C++, and Java. Using TCP/IP from C and C++. Managing Concurrent Connections in C and C++. Using TCP/IP from Java. Managing Concurrent Connections in Java. Using UDP/IP from C and C++. Using UDP/IP from Java. Broadcasting from C and C++. Broadcasting from Java. Multicasting from C and C++. Multicasting from Java. References. Index. 0201325578T04062001
Article Free Access Share on An architecture for a secure service discovery service Authors: Steven E. Czerwinski Computer Science Division, University of California, Berkeley Computer Science Division, University of California, … Article Free Access Share on An architecture for a secure service discovery service Authors: Steven E. Czerwinski Computer Science Division, University of California, Berkeley Computer Science Division, University of California, BerkeleyView Profile , Ben Y. Zhao Computer Science Division, University of California, Berkeley Computer Science Division, University of California, BerkeleyView Profile , Todd D. Hodes Computer Science Division, University of California, Berkeley Computer Science Division, University of California, BerkeleyView Profile , Anthony D. Joseph Computer Science Division, University of California, Berkeley Computer Science Division, University of California, BerkeleyView Profile , Randy H. Katz Computer Science Division, University of California, Berkeley Computer Science Division, University of California, BerkeleyView Profile Authors Info & Claims MobiCom '99: Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networkingAugust 1999 Pages 24–35https://doi.org/10.1145/313451.313462Online:01 August 1999Publication History 387citation2,335DownloadsMetricsTotal Citations387Total Downloads2,335Last 12 Months78Last 6 weeks13 Get Citation AlertsNew Citation Alert added!This alert has been successfully added and will be sent to:You will be notified whenever a record that you have chosen has been cited.To manage your alert preferences, click on the button below.Manage my Alerts New Citation Alert!Please log in to your account Save to BinderSave to BinderCreate a New BinderNameCancelCreateExport CitationPublisher SiteeReaderPDF
No abstract available. No abstract available.
The paper provides a top-level perspective on how the global positioning system works, how its services are used, and delves into the most important technical and geo-political factors affecting its … The paper provides a top-level perspective on how the global positioning system works, how its services are used, and delves into the most important technical and geo-political factors affecting its long-term availability in an international setting.
The early successes of computer networks in the mid-1970's made it apparent that to utilize the full potential of computer networks, international standards would be required. In 1977, the International … The early successes of computer networks in the mid-1970's made it apparent that to utilize the full potential of computer networks, international standards would be required. In 1977, the International Standards Organization (ISO) initiated work on Open Systems Interconnection (OSI) to address these requirements. This paper briefly describes the OSI Reference Model. The OSI Reference Model is the highest level of abstraction in the OSI scheme. The paper first describes the basic building blocks used to construct the network model. Then the particular seven-layer model used by OSI is briefly described, followed by a discussion of outstanding issues and future extensions for the model.
This article describes an approach to close-formation flight of autonomous aircraft. A standard LQ-based structure was synthesized for each vehicle and for formation position error control using linearized equations of … This article describes an approach to close-formation flight of autonomous aircraft. A standard LQ-based structure was synthesized for each vehicle and for formation position error control using linearized equations of motion and a lifting line model of the aircraft wake. We also consider the definition of a formation management structure, capable of dealing with a variety of generic transmission and communication failures among aircraft. The procedure was developed using a decentralized approach and relies on the Dijkstra algorithm. The algorithm provides optimal path information sequencing in the nominal case, as well as the redundancy needed to accommodate failures in data transmission and reception. Several simulations were carried out, and some of the results are presented. The overall scheme appears to be a valuable starting point for further research, especially specialization to situations representing more detailed and operational failures.
This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements.Please refer to the current edition of the "Internet Official Protocol Standards" … This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements.Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol.Distribution of this memo is unlimited.
This article describes a novel method of achieving load balancing in telecommunications networks. A simulated network models a typical distribution of calls between nodes; nodes carrying an excess of traffic … This article describes a novel method of achieving load balancing in telecommunications networks. A simulated network models a typical distribution of calls between nodes; nodes carrying an excess of traffic can become congested, causing calls to be lost. In addition to calls, the network also supports a population of simple mobile agents with behaviors modeled on the trail-laying abilities of ants. The ants move across the network between randomly chosen pairs of nodes; as they move, they deposit simulated pheromone as a function of their distance from their source node and the congestion encountered on their journey. They select their path at each intermediate node according to the distribution of simulated pheromone at each node. Calls between nodes are routed as a function of the pheromone distributions at each intermediate node. The performance of the network is measured by the proportion of calls that are lost. The results of using ant-based control (ABC) are compared with those achieved by using fixed shortest-path routes, and also those achieved by using an alternative algorithmically based type of mobile agent previously proposed for use in network management. The ABC system is shown to result in fewer call failures than the other methods, while exhibiting many attractive features of distributed control.
The technologies, architectures, and methodologies traditionally used to develop distributed applications exhibit a variety of limitations and drawbacks when applied to large scale distributed settings (e.g., the Internet). In particular, … The technologies, architectures, and methodologies traditionally used to develop distributed applications exhibit a variety of limitations and drawbacks when applied to large scale distributed settings (e.g., the Internet). In particular, they fail in providing the desired degree of configurability, scalability, and customizability. To address these issues, researchers are investigating a variety of innovative approaches. The most promising and intriguing ones are those based on the ability of moving code across the nodes of a network, exploiting the notion of mobile code. As an emerging research field, code mobility is generating a growing body of scientific literature and industrial developments. Nevertheless, the field is still characterized by the lack of a sound and comprehensive body of concepts and terms. As a consequence, it is rather difficult to understand, assess, and compare the existing approaches. In turn, this limits our ability to fully exploit them in practice, and to further promote the research work on mobile code. Indeed, a significant symptom of this situation is the lack of a commonly accepted and sound definition of the term mobile code itself. This paper presents a conceptual framework for understanding code mobility. The framework is centered around a classification that introduces three dimensions: technologies, design paradigms, and applications. The contribution of the paper is two-fold. First, it provides a set of terms and concepts to understand and compare the approaches based on the notion of mobile code. Second, it introduces criteria and guidelines that support the developer in the identification of the classes of applications that can leverage off of mobile code, in the design of these applications, and, finally, in the selection of the most appropriate implementation technologies. The presentation of the classification is intertwined with a review of state-of-the-art in the field. Finally, the use of the classification is exemplified in a case study.
article Free Access Share on MBONE: the multicast backbone Author: Hans Eriksson Swedish Institute of Computer Science (SICS), Kista, Sweden Swedish Institute of Computer Science (SICS), Kista, SwedenView Profile Authors … article Free Access Share on MBONE: the multicast backbone Author: Hans Eriksson Swedish Institute of Computer Science (SICS), Kista, Sweden Swedish Institute of Computer Science (SICS), Kista, SwedenView Profile Authors Info & Claims Communications of the ACMVolume 37Issue 8Aug. 1994pp 54–60https://doi.org/10.1145/179606.179627Published:01 August 1994Publication History 455citation1,645DownloadsMetricsTotal Citations455Total Downloads1,645Last 12 Months34Last 6 weeks11 Get Citation AlertsNew Citation Alert added!This alert has been successfully added and will be sent to:You will be notified whenever a record that you have chosen has been cited.To manage your alert preferences, click on the button below.Manage my AlertsNew Citation Alert!Please log in to your account Save to BinderSave to BinderCreate a New BinderNameCancelCreateExport CitationPublisher SiteeReaderPDF
The agent computing paradigm is rapidly emerging as one of the powerful technologies for the development of large-scale distributed systems to deal with the uncertainty in a dynamic environment. The … The agent computing paradigm is rapidly emerging as one of the powerful technologies for the development of large-scale distributed systems to deal with the uncertainty in a dynamic environment. The domain of traffic and transportation systems is well suited for an agent-based approach because transportation systems are usually geographically distributed in dynamic changing environments. Our literature survey shows that the techniques and methods resulting from the field of agent and multiagent systems have been applied to many aspects of traffic and transportation systems, including modeling and simulation, dynamic routing and congestion management, and intelligent traffic control. This paper examines an agent-based approach and its applications in different modes of transportation, including roadway, railway, and air transportation. This paper also addresses some critical issues in developing agent-based traffic control and management systems, such as interoperability, flexibility, and extendibility. Finally, several future research directions toward the successful deployment of agent technology in traffic and transportation systems are discussed.
The Diameter base protocol is intended to provide an Authentication, Authorization and Accounting (AAA) framework for applications such as network access or IP mobility. Diameter is also intended to work … The Diameter base protocol is intended to provide an Authentication, Authorization and Accounting (AAA) framework for applications such as network access or IP mobility. Diameter is also intended to work in both local Authentication, Authorization & Accounting and roaming situations. This document specifies the message format, transport, error reporting, accounting and security services to be used by all Diameter applications. The Diameter base application needs to be supported by all Diameter implementations.
Active networks are a novel approach to network architecture in which the switches (or routers) of the network perform customized computations on the messages flowing through them. This approach is … Active networks are a novel approach to network architecture in which the switches (or routers) of the network perform customized computations on the messages flowing through them. This approach is motivated by both lead user applications, which perform user-driven computation at nodes within the network today, and the emergence of mobile code technologies that make dynamic network service innovation attainable. The authors discuss two approaches to the realization of active networks and provide a snapshot of the current research issues and activities. They illustrate how the routers of an IP network could be augmented to perform such customized processing on the datagrams flowing through them. These active routers could also interoperate with legacy routers, which transparently forward datagrams in the traditional manner.
This memo, together with its companion document, "Application of the Border Gateway Protocol in the Internet", define an inter-autonomous system routing protocol for the Internet. This memo, together with its companion document, "Application of the Border Gateway Protocol in the Internet", define an inter-autonomous system routing protocol for the Internet.
standardization state and status of this protocol.Distribution of this memo is unlimited. standardization state and status of this protocol.Distribution of this memo is unlimited.
The anticipated increase in popular use of the Internet will create more opportunities in distance learning, electronic commerce, and multimedia communication, but it will also create more challenges in organizing … The anticipated increase in popular use of the Internet will create more opportunities in distance learning, electronic commerce, and multimedia communication, but it will also create more challenges in organizing information and facilitating its efficient retrieval. From the network perspective, there will be additional challenges and problems in meeting bandwidth requirements and network management. Many researchers believed that the mobile agent paradigm (mobile object) could propose several attractive solutions to deal with such challenges and problems. A number of mobile agent systems have been designed and implemented in academic institutions and commercial firms. However, few applications were found to take advantage of the mobile agent. Among the hurdles facing this emerging paradigm are concerns about security requirements and efficient resource management. This article introduces the core concepts of this emerging paradigm, and presents an account of current research efforts in the context of telecommunications. The goal is to provide the interested reader with a clear background of the opportunities and challenges this emerging paradigm brings about, and a descriptive look at some of the forerunners that are providing experimental technologies supporting this paradigm.
Intelligent transportation systems have been under development since at least the early 1990s. The rationale behind the concept is to automate the interactions among vehicles and infrastructure to achieve high … Intelligent transportation systems have been under development since at least the early 1990s. The rationale behind the concept is to automate the interactions among vehicles and infrastructure to achieve high levels of security, comfort, and efficiency. Communications, in general, and networking, in particular, have been essential elements in the evolution of these systems. The IEEE has developed a system architecture known as WAVE to provide wireless access in vehicular environments. This article gives an overview of the associated standards. The presentation loosely follows the order of the layers of the open systems interconnection model.
This paper surveys the control theoretic literature on decentralized and hierarchical control, and methods of analysis of large scale systems. This paper surveys the control theoretic literature on decentralized and hierarchical control, and methods of analysis of large scale systems.
Considering the urgency of the need for standards which would allow constitution of heterogeneous computer networks, ISO created a new subcommittee for "Open Systems Interconnection" (ISO/ TC97/SC 16) in 1977. … Considering the urgency of the need for standards which would allow constitution of heterogeneous computer networks, ISO created a new subcommittee for "Open Systems Interconnection" (ISO/ TC97/SC 16) in 1977. The first priority of subcommittee 16 was to develop an architecture for open systems interconnection which could serve as a framework for the definition of standard protocols. As a result of 18 months of studies and discussions, SC16 adopted a layered architecture comprising seven layers (Physical, Data Link, Network, Transport, Session, Presentation, and Application). In July 1979 the specifications of this architecture, established by SC16, were passed under the name of "OSI Reference Model" to Technical Committee 97 "Data Processing" along with recommendations to start officially, on this basis, a set of protocols standardization projects to cover the most urgent needs. These recommendations were adopted by T.C97 at the end of 1979 as the basis for the following development of standards for Open Systems Interconnectlon within ISO. The OSI Reference Model was also recognized by CCITT Rapporteur's Group on "Layered Model for Public Data Network Services." This paper presents the model of architecture for Open Systems Interconnection developed by SC16. Some indications are also given on the initial set of protocols which will-likely be developed in this OSI Reference Model.
This chapter will introduce you to the Session Initiation Protocol (SIP) and will also give you an insight into the SIP message structure.KeywordsSession Initiation ProtocolUser AgentLive CommunicationServer Session Initiation ProtocolSession … This chapter will introduce you to the Session Initiation Protocol (SIP) and will also give you an insight into the SIP message structure.KeywordsSession Initiation ProtocolUser AgentLive CommunicationServer Session Initiation ProtocolSession Initiation Protocol MessageThese keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Presents corrections to the paper, (Erratum to "Distributed Practical Fixed-Time Resource Allocation Algorithm for Disturbed Multiagent Systems: An Integrated Framework"). Presents corrections to the paper, (Erratum to "Distributed Practical Fixed-Time Resource Allocation Algorithm for Disturbed Multiagent Systems: An Integrated Framework").
| International Research Journal of Modernization in Engineering Technology and Science
Mohammed Ismail | INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT
Abstract—With the growing reliance on human-computer interaction, intelligent personal assistants have become vital in improving user productivity and accessibility. Voice-based interfaces offer hands-free control, making computing more intuitive, efficient, and … Abstract—With the growing reliance on human-computer interaction, intelligent personal assistants have become vital in improving user productivity and accessibility. Voice-based interfaces offer hands-free control, making computing more intuitive, efficient, and accessible—especially for differently abled individuals. This paper presents a voice-enabled desktop assistant built using Python that operates offline and offers a broad range of system automation features. The assistant allows users to perform tasks such as opening and closing applications, translating languages, evaluating mathematical expressions, controlling brightness, sending WhatsApp messages, and capturing screenshots through simple voice commands. It leverages modules like speech_recognition, pyttsx3, and pyautogui along with a secure GUI-based login system for controlled access. The architecture, implementation methodology, features, and future enhancements of the assistant are detailed in this paper. keywords—Voice Assistant, Automation, Python, Speech Recognition, Desktop Assistant, GUI Authentication.
This article presents an innovative network-centric approach to large-scale infrastructure modernization, specifically focusing on the migration of configuration items from Nexus 5K/7K series to Nexus 9K series hardware. The article … This article presents an innovative network-centric approach to large-scale infrastructure modernization, specifically focusing on the migration of configuration items from Nexus 5K/7K series to Nexus 9K series hardware. The article introduces a subnet-based migration strategy that fundamentally transforms traditional application-centric methodologies. By leveraging advanced automation, artificial intelligence, and blockchain technologies, the proposed framework achieves unprecedented efficiency in migration execution while maintaining system stability and security. The procedure incorporates comprehensive subnet dependency mapping, automated validation protocols, and real-time monitoring systems, resulting in significant reductions in migration complexity, operational overhead, and system downtime. The successful implementation demonstrates the effectiveness of network-level transformation strategies in modern enterprise environments, establishing new benchmarks for large-scale infrastructure migrations.
Kshitij Sharma , Andy Nguyen | Computer-supported collaborative learning/˜The œComputer-Supported Collaborative Learning Conference
M. S. Bhat | Journal of Information Systems Engineering & Management
Network traffic optimization is a critical aspect of ensuring efficient and reliable data transmission in complex communication systems. The graph approach, which is the foundation of most modern theories and … Network traffic optimization is a critical aspect of ensuring efficient and reliable data transmission in complex communication systems. The graph approach, which is the foundation of most modern theories and optimization methods, is not sufficient when operating with a traditional toolkit of linear programming for the nonlinear and combinatorial nature of many networks. In this research, we focus on using submodular optimization and discrete Newton methods to improve the network performance as combinatorial optimization problems. The proposed methodology reduces the total end-to-end delay, increases the throughput, and also optimizes the time over which convergence occurs, which provides a reliable framework for controlling network traffic. By performing simulations on a graph-structured network, the two solutions as a one generated 35% lower average end-to-end delay, 25% higher overall throughput, and faster convergence compared to disparate approaches. From these results, we gain an understanding of the importance of handling nonlinear cost functions and the capacity of submodular optimization and DNM. As such, key issues such as scaling up to a large network and its ability to handle time-varying traffic remain limitations and thus require research. The results of this study hold valuable implications for network management allowing a timely route to re-organize the traffic load without overly expensive infrastructural evolutions. This research builds on important limitations of the current approaches to distill knowledge for further development in the context of network traffic shaping, which could be important for the development of 5G, IoT as well as numerous other up-and-coming concepts.
Ushbu maqola noaʼanaviy axborot turlari, global kontektdagi mediametrik o‘lchovi, matn birliklar, konvergent hossasi nazariy hamda amaliy misollar asosida o‘rganilgan. Internetdagi format transformatsiyasi OAV anʼanaviy kontent tarkibi, jurnalistikaning ifoda etish usullari … Ushbu maqola noaʼanaviy axborot turlari, global kontektdagi mediametrik o‘lchovi, matn birliklar, konvergent hossasi nazariy hamda amaliy misollar asosida o‘rganilgan. Internetdagi format transformatsiyasi OAV anʼanaviy kontent tarkibi, jurnalistikaning ifoda etish usullari tubdan yangilanishi tahlil qilingan
This comprehensive article explores the intricate architecture of intelligent routing systems within modern cloud-based contact centers, demonstrating how these technologies deliver optimal customer-agent pairing through sophisticated decision matrices. It demonstrates … This comprehensive article explores the intricate architecture of intelligent routing systems within modern cloud-based contact centers, demonstrating how these technologies deliver optimal customer-agent pairing through sophisticated decision matrices. It demonstrates the interplay between skill-based distribution, queue prioritization, and contextual data integration. The discussion illuminates how contemporary routing logic transforms raw customer interaction data into actionable routing decisions. The article provides technical insights into the construction of decision trees and rule engines that power these systems while addressing implementation strategies that balance operational efficiency with customer experience goals. For CX professionals and system architects, this resource offers both theoretical frameworks and practical approaches to designing, implementing, and continuously refining intelligent routing systems that align with strategic business objectives and evolving customer expectations.
Configuration and compliance automation represents a transformative approach to modern network management, addressing the escalating complexity of enterprise network environments. As organizations expand their digital footprint through cloud integration, IoT … Configuration and compliance automation represents a transformative approach to modern network management, addressing the escalating complexity of enterprise network environments. As organizations expand their digital footprint through cloud integration, IoT adoption, and hybrid work models, the traditional manual approach to network configuration has become increasingly unsustainable. The heterogeneous nature of contemporary networks, typically encompassing multiple vendors, platforms, and technologies, creates significant challenges for maintaining configuration consistency, ensuring regulatory compliance, and safeguarding security postures. This article explores the fundamental components of effective configuration and compliance automation frameworks, including centralized policy repositories, configuration management tools, continuous monitoring systems, and automated remediation workflows. It presents implementation strategies based on organizational maturity and network complexity, outlining critical success factors and addressing common challenges such as legacy device integration and change management resistance. The substantial benefits of automation across operational efficiency, security enhancement, compliance management, and financial performance demonstrate why configuration and compliance automation has become essential for organizations seeking to maintain competitive advantage in an increasingly digital business landscape. As automation technologies continue to evolve, incorporating artificial intelligence and machine learning capabilities, the potential for self-healing, adaptive networks points toward a future where network operations can focus on innovation rather than maintenance.
Yuriy Puholovok | Archaeopress Publishing Ltd eBooks
Mahmoudi S.A.R. | INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT
Abstract - The online reservation system was originally taken from GDS (Global Distribution System), which is also known as a computer reservation system. The system provides a strong platform for … Abstract - The online reservation system was originally taken from GDS (Global Distribution System), which is also known as a computer reservation system. The system provides a strong platform for managing airlines by providing details on the airplane, the rent's tariff, passenger reservation and ticket posts. The inventory of an airline includes all flights along with their accessibility status, which ensures real -time updates and accuracy. The system is powered by a centralized database, which accesses through an application programming interface (API), which enables spontaneous connection and interactions. With the arrival of the online reservation system, passengers and airlines have achieved flexibility to book and manage airline tickets to increase the facilities and efficiency at anytime and anywhere, anywhere, anywhere, facilities and efficiency. The system also facilitates flawless reservations and eliminates manual processes exposed to errors. Key Words: Global Distribution System,Ticket System,Centralized Database,Ordering Flights
AbstractAs distributed systems become increasingly pervasive in everydaylife, performance analyses that provide quantifiable insights intothe efficiency of these systems are essential. This study proposesan analysis of the performance of backend … AbstractAs distributed systems become increasingly pervasive in everydaylife, performance analyses that provide quantifiable insights intothe efficiency of these systems are essential. This study proposesan analysis of the performance of backend frameworks that enablethe development of such distributed systems. It is expected that thefindings of this project will guide better technology choices for thedevelopment of future distributed applications. The results indicatethat the choice of the ideal framework depends on the specific needsof the application. The Flask framework stands out as a robust andefficient option for scenarios requiring a high number of requestsand handling of lightweight data. Actix is an interesting choice forapplications that prioritize low resource consumption. ASP.NETcan be a good option for handling large volumes of data, despite itstendency for high CPU usage.
AbstractNew networking paradigms have been developed to provide greaterflexibility and enable finer-grained management of computer networks.One of the most prominent new network paradigm is theNetwork Function Virtualization (NFV), which can … AbstractNew networking paradigms have been developed to provide greaterflexibility and enable finer-grained management of computer networks.One of the most prominent new network paradigm is theNetwork Function Virtualization (NFV), which can leverage theNFV Infrastructure Emulation Platform (NIEP) as an environment forprototyping and testing virtualized network functions and services.Despite its versatility and comprehensiveness, NIEP poses a steeplearning curve for new users, particularly in the process of specifyingvirtualized network topologies. To address this challenge,this work proposes NIEPx, an assistive interface designed to simplifytopology specification within NIEP while minimizing commonerrors in the process. The effectiveness of NIEPx was evaluatedthrough a qualitative-quantitative model, which demonstrated itsability to reduce human errors during topology specification. Furthermore,the interface was tested for communication overheadwith the NIEP emulator, showing negligible impact in the analyzedscenarios. Thus, NIEPx emerges as an effective solution to facilitatethe onboarding of new users to NIEP, while also supportingexperienced users in handling more complex network topologyspecification tasks.
Abstract Modern enterprise environment requires complex, distributed infrastructures, and centralized logging is essential for managing such systems. Consolidating log data from applications, servers, and network devices to a single central … Abstract Modern enterprise environment requires complex, distributed infrastructures, and centralized logging is essential for managing such systems. Consolidating log data from applications, servers, and network devices to a single central location allows organizations to improve system performance, security, and scalability and realize more efficient logging and archival of system events. As an alternative, it presents a quicker way to try and resolve or at least detect system issues by utilizing a single, high-level view of the system. Centralized logging also supports regulatory compliance for creating an audit trail of access and potential security breaches. In a cloud-native environment, there are distinctive challenges of data fragmentation, varied log formats, and log correlation across distributed goods. Those are amplified in a highly dynamic environment, such as microservices, containers, and multi-cloud environments. These problems can add up to delayed incident detection and increase downtime. They can have an impact on the customer experience as well as the reliability of the system itself without centralized logging. Centralized logging and observability can be implemented easily using the ELK Stack (Elasticsearch, Logstash, Kibana), especially in AWS. The ELK Stack integrates with AWS services such as Lambda, CloudWatch, ELK Stack, and Elasticsearch Service and provides real-time log collection, processing, and visualization at scale. This study explores implementing ELK Stack in enterprise applications to enhance the system observability and performance and adherence to the best practices, security, and trends in logging and observability research.
Este artigo apresenta o desenvolvimento de um sistema web voltado para o gerenciamento de orçamentos e pedidos em uma vidraçaria de pequeno porte localizada no município de Bagé, no estado … Este artigo apresenta o desenvolvimento de um sistema web voltado para o gerenciamento de orçamentos e pedidos em uma vidraçaria de pequeno porte localizada no município de Bagé, no estado do Rio Grande do Norte. O sistema foi implementado utilizando a linguagem PHP para o backend, juntamente com o banco de dados PostgreSQL para armazenamento das informações. O principal objetivo da aplicação é automatizar tarefas que antes eram realizadas manualmente, promovendo maior agilidade, organização e precisão nas atividades administrativas e comerciais da empresa. Durante o processo de desenvolvimento, foram seguidas etapas fundamentais da engenharia de software, como levantamento de requisitos, modelagem, codificação e testes. A solução proposta visa atender às necessidades específicas da vidraçaria, facilitando o controle de clientes, produtos, pedidos e orçamentos. Como resultado, observou-se uma melhoria significativa na eficiência dos processos internos, contribuindo para a redução de erros operacionais e para a otimização do tempo dos colaboradores. O sistema também oferece uma interface simples e acessível, permitindo seu uso mesmo por usuários com pouca familiaridade com tecnologia.
Providing effective technical customer service support is acritical challenge for organizations managing complex productecosystems. This paper explores the application ofRetrieval-Augmented Generation (RAG) using a fine-tunedLLaMA 3 model to enhance customer … Providing effective technical customer service support is acritical challenge for organizations managing complex productecosystems. This paper explores the application ofRetrieval-Augmented Generation (RAG) using a fine-tunedLLaMA 3 model to enhance customer support workflows forBogen’s E7000 system. The project involves creating a customdataset derived from Bogen’s documentation manuals totrain the model with domain-specific knowledge of the E7000system. The objective is to assist customer service representativesby developing an LLM capable of processing technicalqueries, identifying potential issues within the E7000system, and proposing solutions or troubleshooting tips. Byleveraging the RAG framework, the system dynamically retrievesrelevant context from an external knowledge base toaugment the model’s responses, ensuring scalability and precision.Results demonstrate the feasibility of deploying afine-tuned LLM to improve query processing efficiency andresponse accuracy. This work highlights the transformativepotential of advanced LLMs in delivering technical customersupport in specialized domains.
Abstract: - Conventional tracking systems relying on GPS and cellular infrastructure are ineffective in environments with little or no connectivity—such as remote wilderness, mountainous regions, or disaster-affected areas. This paper … Abstract: - Conventional tracking systems relying on GPS and cellular infrastructure are ineffective in environments with little or no connectivity—such as remote wilderness, mountainous regions, or disaster-affected areas. This paper introduces a hybrid tracking architecture that integrates satellite communication, mesh networking, Radio Tomographic Imaging (RTI), signal jumping, drone-assisted relays, and Low-Power Wide-Area Networks (LPWAN). The proposed system addresses signal loss challenges by utilizing AI-driven signal prediction and autonomous drones to extend coverage and improve real-time traceability. Performance is evaluated through simulations and real-world case studies based on key metrics including coverage, latency, energy efficiency, and reliability. The approach demonstrates strong potential for critical applications in search and rescue, defense operations, and autonomous systems, contributing toward the development of resilient off-grid communication and tracking technologies. Keywords: Remote Tracking, GPS Dead Zones, Mesh Networks, Satellite Communication, Drone Relays, RTI, LPWAN, Signal Prediction, Off-Grid Communication, Search and Rescue.
Abstract In this paper, we consider the partial gathering problem of mobile agents in dynamic tori. This problem requires $k$ agents distributed in the network to reach a configuration such … Abstract In this paper, we consider the partial gathering problem of mobile agents in dynamic tori. This problem requires $k$ agents distributed in the network to reach a configuration such that either at least $g$ agents or no agent exists at each node. Thus far, in dynamic graphs, partial gathering is considered in 1-interval connected rings, where one of the links in the ring may be missing at each time step. In this paper, we consider another dynamic topology. Concretely, we consider partial gathering in $n\times n$ dynamic tori such that each of the row and column rings is represented as a 1-interval connected ring. In such networks, when $k = O(gn)$, focusing on the relationship between the values of $k, n$, and $g$, we characterize the solvability of the problem and analyze the move complexity. First, we show that agents cannot solve the problem when $k = o(gn)$. Second, we show that agents can achieve partial gathering with a total number of $O(gn^{3})$ moves when $2gn+2n-1\le k \le 2gn + 6n +16g -12$. Finally, we show that agents can achieve partial gathering with a total number of $\Theta (gn^{2})$ moves when $k\ge 2gn + 6n +16g -11$.
MongoDB, a document-oriented NoSQL database, is crucial in modern web applications, particularly in the MEAN (MongoDB, Express.js, Angular, Node.js) stack. The challenge with optimizing MongoDB schemas exists because of the … MongoDB, a document-oriented NoSQL database, is crucial in modern web applications, particularly in the MEAN (MongoDB, Express.js, Angular, Node.js) stack. The challenge with optimizing MongoDB schemas exists because of the no-schema database design approach combined with changing workload requirements. This article investigates the optimal approaches to creating and optimizing MongoDB schema designs. It focuses on normalization and denormalization decisions using shard and replication systems with workload-related optimizations and scale-up capabilities. The article evaluates modern AI schema optimization trends and computerized performance optimization that dramatically boosts operational efficiency across extensive applications. MEAN applications will obtain superior scalability, reduced query delays, and enhanced system performance through these implementation methods. When merged with reliable data protection and schema longevity, the article will provide organizations with a complete mold to optimize MongoDB schemas for peak operational efficiency.