Showing 1 - 20 results of 68 for search '"telecommunications network"', query time: 0.05s Refine Results
  1. 1

    Modeling method of telecommunication network resources by Yuan LIN, Yanbin WANG, Hui ZHANG, Jiahai YANG

    Published 2016-01-01
    Subjects: “…telecommunication network…”
    Get full text
    Article
  2. 2

    Research on intelligent scheme of telecommunication network by Tao LI, Chunjia WANG, Shanshan LI

    Published 2023-03-01
    Subjects: “…telecommunication network…”
    Get full text
    Article
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    Design and application of multi-dimensional evaluation model of telecommunication network operations and maintenance by Liang XU, Ye WANG, Ran ZHENG, Jiheng ZHANG, Ping YUAN, Xinyang LI, Yu TIAN

    Published 2023-04-01
    “…Telecommunication network operations and maintenance is a basic and critical work for communications service providers (CSP).At present, there is little public operations and maintenance information of CSP.In addition, it is lack of effective evaluation model of telecommunication network operations and maintenance.A multi-dimensional evaluation model of telecommunication network operations and maintenance was proposed, which took abalanced score card as a basis and was combined with long-term operations and maintenance work and research practice.The model was verified by applying different types of CSP, including international large CSP, innovative CSP, and high-growth CSP.…”
    Get full text
    Article
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    Research on NFV fault association and fault self-healing by Binhong MAO, Zhiming YANG

    Published 2017-11-01
    “…NFV implements the hardware and software decoupling of telecommunications network equipment,gets rid of the dependence on dedicated hardware equipment.NFV brings benefits such as resource sharing,automatic deployment,flexibility and other features,but it also brings some problems such as more fault points,difficult fault analysis and so on.It results in NFV network operation and maintenance more difficult.The NFV fault process and fault association were analyzed,and guidance for fault location processing in NFV was provided.At the same time,the VNF fault self-healing implementation scheme was given to realize the network element and service fault self-healing,and improve capability of automatic operation and maintenance.…”
    Get full text
    Article
  18. 18

    Globalização e integração territorial – o caso da região de Tefé no Amazonas by Kristian Oliveira Queiroz

    Published 2018-04-01
    “…It was concluded that this relativized integration occurs due to the existence of a telecommunications network and services with limited infrastructures that damage the fluidity of relations and flows. …”
    Get full text
    Article
  19. 19

    Research of WLAN authentication in roaming environment with the trend of network integration by Zhang-zhe LIU, Hua-ying SHU

    Published 2012-09-01
    “…In the tendency of network convergence,the method of WLAN network client authentication based on telecommunications network will be the main way of WLAN authentication in the future.In order to make WLAN authentication efficiency and security under roaming condition,WLAN authentication requirements were analyzed,the authentication mode,the process and the existing problems were discussed.An application model and design scheme of WLAN network client authentication based on EAP SIM/AKA protocol with the trend of network integration were proposed and verified.Experimental results show that this application model can complete the EAP SIM/AKA protocol identification of a WLAN client in roaming process,reduce the investment of networks,keep the safety grades of the nodes in the visited WLAN with the initial safety grades,and realize the real-time charging.…”
    Get full text
    Article
  20. 20

    Practice analysis of domestic and foreign industry benchmarking enterprises in the field of network and information security by Xiaoyin XI, Xiaoyun YUAN

    Published 2020-11-01
    “…In order to better promote the construction of China Telecom’s network and information security governance system,optimize the network and information security product service system,and promote the cultivation and development of network and information security core competence,domestic and foreign industry benchmark enterprises were selected to carry out practical case analysis.The advanced successful experience of benchmarking enterprises in the field of network and information security were summarized,and the current development status and future development trend in the field of network and information security were further combined,and targeted development suggestions and measures were put forward to improve the governance system of China’s telecommunications network and information security,improve the governance ability,as well as related business,and the development of products and services provides useful help.…”
    Get full text
    Article