Evaluate and Use Telecommunications Management Networks Report
VerifiedAdded on 2023/06/12
|20
|5000
|217
Report
AI Summary
This report provides a comprehensive evaluation of telecommunications management networks, covering architectural features, functions, and configurations of network management systems in both common carrier and extended models. It details procedures for fault management, accountability, techniques for collecting management information from network nodes, and enterprise solutions. Furthermore, the report examines the major features and functions of QoS agreements, including relevant international standards and monitoring parameters. Network management techniques, such as generating account records in data and voice networks, are also discussed, along with an analysis of network reliability and survivability. The report also addresses organizational policies and procedures related to network management systems, evaluating administrative network management system service support, and reviewing business models and processes within TMN. Finally, the document includes an analysis of service levels and linear and exponential trends to provide a complete overview of telecommunications management networks.

Running head: EVALUATE AND USE TELECOMMUNICATIONS MANAGEMENT NETWORKS
Evaluate and Use Telecommunications Management Networks
Name of the Student
Name of the University
Author Note
Evaluate and Use Telecommunications Management Networks
Name of the Student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1EVALUATE AND USE TELECOMMUNICATIONS MANAGEMENT NETWORKS
1. Network Management System in common carrier and extended models
Feature:
It provide a central and unified environment to manage the campus network1
Ensure scalability with growth of network
Critical events are highlighted with analysis function and data consolidation
Tracking problems and maximize the network uptime2
A function of Network Capacity Planning is being provided
It provide and event notification with Real time network Access
Functions:
1. Vital Net: Automatic collection of network-wide performance data.
2. Vital Apps: Delivering monitoring and diagnostic capabilities which helps to obtain3
performance statistics of the application through network applications.
3. Vital Event: Operational thresholds are used to deliver a real-time, visual monitoring,
measuring and analysing the performance of network4.
1 Rajesh, M., and J. M. Gnanasekar. "Congestion Control Scheme for Heterogeneous Wireless Ad Hoc Networks Using Self-Adjust
Hybrid Model." International Journal of Pure and Applied Mathematics 116 (2017): 537-547.
2 City Kong, Network Management System: What's It All About? (2018) Cityu.edu.hk
<http://www.cityu.edu.hk/csc/netcomp/mar2004-2.htm>.
3 Ata, Shingo, and Toshio Tonouchi. "Management of Information, Communications, and Networking: from the Past to the
Future." IEICE Transactions on Communications 100, no. 9 (2017): 1614-1622.
4 Tode, Hideki, Konosuke Kawashima, and Tadashi Ito. "100-Year History and Future of Network System Technologies in
Japan." IEICE Transactions on Communications 100, no. 9 (2017): 1581-1594.
1. Network Management System in common carrier and extended models
Feature:
It provide a central and unified environment to manage the campus network1
Ensure scalability with growth of network
Critical events are highlighted with analysis function and data consolidation
Tracking problems and maximize the network uptime2
A function of Network Capacity Planning is being provided
It provide and event notification with Real time network Access
Functions:
1. Vital Net: Automatic collection of network-wide performance data.
2. Vital Apps: Delivering monitoring and diagnostic capabilities which helps to obtain3
performance statistics of the application through network applications.
3. Vital Event: Operational thresholds are used to deliver a real-time, visual monitoring,
measuring and analysing the performance of network4.
1 Rajesh, M., and J. M. Gnanasekar. "Congestion Control Scheme for Heterogeneous Wireless Ad Hoc Networks Using Self-Adjust
Hybrid Model." International Journal of Pure and Applied Mathematics 116 (2017): 537-547.
2 City Kong, Network Management System: What's It All About? (2018) Cityu.edu.hk
<http://www.cityu.edu.hk/csc/netcomp/mar2004-2.htm>.
3 Ata, Shingo, and Toshio Tonouchi. "Management of Information, Communications, and Networking: from the Past to the
Future." IEICE Transactions on Communications 100, no. 9 (2017): 1614-1622.
4 Tode, Hideki, Konosuke Kawashima, and Tadashi Ito. "100-Year History and Future of Network System Technologies in
Japan." IEICE Transactions on Communications 100, no. 9 (2017): 1581-1594.

2EVALUATE AND USE TELECOMMUNICATIONS MANAGEMENT NETWORKS
2. Telecommunication Management Network
Features: The TNS sets the network’s controls, flow and operation that support the network
communication of the organization5.
Function: Function of TMN are:
NEF = Network Element Functions
OSF = Operations System Functions
WSF = Work Station Functions
MF = Mediation Functions
QAF = Q Adaptor Functions
Configuration: The system administrator set up a network configuration that meet the
objectives of the network which include
Router configuration: The route setting and the correct IP addresses is specifies6.
Host configuration: Network connection set on host computer or laptop.
Software Configuration: Provide credentials that monitor the network traffic and
allow access to network-based software7
5 Bui, Nicola, Matteo Cesana, S. Amir Hosseini, Qi Liao, Ilaria Malanchini, and Joerg Widmer. "A survey of anticipatory mobile
networking: Context-based classification, prediction methodologies, and optimization techniques." IEEE Communications Surveys &
Tutorials 19, no. 3 (2017): 1790-1821.
6 Tuna, Gurkan, Dimitrios G. Kogias, V. Cagri Gungor, Cengiz Gezer, Erhan Taşkın, and Erman Ayday. "A survey on information
security threats and solutions for machine to machine (M2M) communications." Journal of Parallel and Distributed Computing 109
(2017): 142-154.
7 Singhal, Anoop, and Xinming Ou. "Security risk analysis of enterprise networks using probabilistic attack graphs." In Network
Security Metrics, pp. 53-73. Springer, Cham, 2017.
2. Telecommunication Management Network
Features: The TNS sets the network’s controls, flow and operation that support the network
communication of the organization5.
Function: Function of TMN are:
NEF = Network Element Functions
OSF = Operations System Functions
WSF = Work Station Functions
MF = Mediation Functions
QAF = Q Adaptor Functions
Configuration: The system administrator set up a network configuration that meet the
objectives of the network which include
Router configuration: The route setting and the correct IP addresses is specifies6.
Host configuration: Network connection set on host computer or laptop.
Software Configuration: Provide credentials that monitor the network traffic and
allow access to network-based software7
5 Bui, Nicola, Matteo Cesana, S. Amir Hosseini, Qi Liao, Ilaria Malanchini, and Joerg Widmer. "A survey of anticipatory mobile
networking: Context-based classification, prediction methodologies, and optimization techniques." IEEE Communications Surveys &
Tutorials 19, no. 3 (2017): 1790-1821.
6 Tuna, Gurkan, Dimitrios G. Kogias, V. Cagri Gungor, Cengiz Gezer, Erhan Taşkın, and Erman Ayday. "A survey on information
security threats and solutions for machine to machine (M2M) communications." Journal of Parallel and Distributed Computing 109
(2017): 142-154.
7 Singhal, Anoop, and Xinming Ou. "Security risk analysis of enterprise networks using probabilistic attack graphs." In Network
Security Metrics, pp. 53-73. Springer, Cham, 2017.

3EVALUATE AND USE TELECOMMUNICATIONS MANAGEMENT NETWORKS
3. Collection of Management Information from network nodes
Some range of techniques has been evaluated that has ensure that the management
information could be collected from the network nodes. The network nodes are assign to the
endpoint or the redistribution point. The node is completely depended on the particular
network and to the layer of protocol8. When evaluated it has been found that Fault
Management system manage the network from the information of telecommunication system
that respond to events, logs, accuracy, errors, speed, accuracy, issues, device traffic and
performance information9. The procedure followed to collect the information include
Network device monitoring, Network device discovery, Intelligent notifications and Network
performance analysis10.
4. QoS agreements
The QoS is the total characteristic in the Telecommunication service has to ability to
bear to satiate its state and the end user need is implied. The end to end service of QoS is seen
by ICU through a particular telecommunication network11.
The function that are used in International Standard of QoS include Delay Counter,
Level meter and devices that are similar.
8 Gravina, Raffaele, Parastoo Alinia, Hassan Ghasemzadeh, and Giancarlo Fortino. "Multi-sensor fusion in body sensor networks:
State-of-the-art and research challenges." Information Fusion 35 (2017): 68-80.
9 Li, Tao, Ning Xie, Chunqiu Zeng, Wubai Zhou, Li Zheng, Yexi Jiang, Yimin Yang et al. "Data-driven techniques in disaster
information management." ACM Computing Surveys (CSUR)50, no. 1 (2017): 1.
10 Čolaković, Alem, and Himzo Bajrić. "ASSESSING CUSTOMER SATISFACTION BASED ON QoS
PARAMETERS." International Journal for Quality Research11, no. 1 (2017).
11 Cardellini, Valeria, Emiliano Casalicchio, Vincenzo Grassi, Stefano Iannucci, Francesco Lo Presti, and Raffaela Mirandola.
"MOSES: A Platform for Eperimenting with QoS-Driven Self-Adaptation Policies for Service Oriented Systems." In Software
Engineering for Self-Adaptive Systems III. Assurances, pp. 409-433. Springer, Cham, 2017.
3. Collection of Management Information from network nodes
Some range of techniques has been evaluated that has ensure that the management
information could be collected from the network nodes. The network nodes are assign to the
endpoint or the redistribution point. The node is completely depended on the particular
network and to the layer of protocol8. When evaluated it has been found that Fault
Management system manage the network from the information of telecommunication system
that respond to events, logs, accuracy, errors, speed, accuracy, issues, device traffic and
performance information9. The procedure followed to collect the information include
Network device monitoring, Network device discovery, Intelligent notifications and Network
performance analysis10.
4. QoS agreements
The QoS is the total characteristic in the Telecommunication service has to ability to
bear to satiate its state and the end user need is implied. The end to end service of QoS is seen
by ICU through a particular telecommunication network11.
The function that are used in International Standard of QoS include Delay Counter,
Level meter and devices that are similar.
8 Gravina, Raffaele, Parastoo Alinia, Hassan Ghasemzadeh, and Giancarlo Fortino. "Multi-sensor fusion in body sensor networks:
State-of-the-art and research challenges." Information Fusion 35 (2017): 68-80.
9 Li, Tao, Ning Xie, Chunqiu Zeng, Wubai Zhou, Li Zheng, Yexi Jiang, Yimin Yang et al. "Data-driven techniques in disaster
information management." ACM Computing Surveys (CSUR)50, no. 1 (2017): 1.
10 Čolaković, Alem, and Himzo Bajrić. "ASSESSING CUSTOMER SATISFACTION BASED ON QoS
PARAMETERS." International Journal for Quality Research11, no. 1 (2017).
11 Cardellini, Valeria, Emiliano Casalicchio, Vincenzo Grassi, Stefano Iannucci, Francesco Lo Presti, and Raffaela Mirandola.
"MOSES: A Platform for Eperimenting with QoS-Driven Self-Adaptation Policies for Service Oriented Systems." In Software
Engineering for Self-Adaptive Systems III. Assurances, pp. 409-433. Springer, Cham, 2017.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4EVALUATE AND USE TELECOMMUNICATIONS MANAGEMENT NETWORKS
The possible monitoring parameter of QoS include different telecoms services and
telephony parameters that are fixed12.
The range for fixed telephony services are calls success rates, services that have
Supply times, Faults repair times, Faults report rates, Calls set up time, response times for
Operator service and Directory enquiry, Billing accuracy and complaints resolution time.
The range for different telecoms services are BER, Throughput, Bandwidth, data
transmission and internet logins success rates, Jitter and its variation and Latency.
5. Network Management Techniques
Generating Account records and using in data or voice networks: The technique shows
the solution to manage the data network which is the reference architecture of the Cisco
Systems. The system include the CallManager sever. This server is for the one who plan to
manage the Voice over Internet Protocol (VoIP). In order to integrate the CallManager server
into the Network Management System following things need to be included:
A platform of Simple Network Management Protocol (SNMP) for the fault
management
A platform of Performance Monitoring for long term trending and performance
management
For configuration management a CiscoWorks2000, software and hardware inventory
management and syslog collection.
12 Bicaku, Ani, Silia Maksuti, Silke Palkovits-Rauter, Markus Tauber, Rainer Matischek, Christoph Schmittner, Georgios Mantas,
Mario Thron, and Jerker Delsing. "Towards Trustworthy End-to-End Communication inIndustry 4.0." In Ieee 15th International
Conference Of Industrial Informatics Indin'2017. 2017.
The possible monitoring parameter of QoS include different telecoms services and
telephony parameters that are fixed12.
The range for fixed telephony services are calls success rates, services that have
Supply times, Faults repair times, Faults report rates, Calls set up time, response times for
Operator service and Directory enquiry, Billing accuracy and complaints resolution time.
The range for different telecoms services are BER, Throughput, Bandwidth, data
transmission and internet logins success rates, Jitter and its variation and Latency.
5. Network Management Techniques
Generating Account records and using in data or voice networks: The technique shows
the solution to manage the data network which is the reference architecture of the Cisco
Systems. The system include the CallManager sever. This server is for the one who plan to
manage the Voice over Internet Protocol (VoIP). In order to integrate the CallManager server
into the Network Management System following things need to be included:
A platform of Simple Network Management Protocol (SNMP) for the fault
management
A platform of Performance Monitoring for long term trending and performance
management
For configuration management a CiscoWorks2000, software and hardware inventory
management and syslog collection.
12 Bicaku, Ani, Silia Maksuti, Silke Palkovits-Rauter, Markus Tauber, Rainer Matischek, Christoph Schmittner, Georgios Mantas,
Mario Thron, and Jerker Delsing. "Towards Trustworthy End-to-End Communication inIndustry 4.0." In Ieee 15th International
Conference Of Industrial Informatics Indin'2017. 2017.

5EVALUATE AND USE TELECOMMUNICATIONS MANAGEMENT NETWORKS
6. Reliability and Survivability of Network analysis
Planning for reliability in context of telecommunication usually measured based on
the attributes of availability and serviceability. This can be considered while developing,
designing, maintaining and using the network of telecommunications13. The reliability can be
measured by determining all the processes and components, by measuring the performance
consistency.
Survivability for reliability in context of telecommunication usually refers to the
network ability that finds the challenges and fault in the network and ensures to recover the
network to effectively maintain the reliability14. The figure below illustrate the overview of
the network recovery methods in Pre- fault Protection Scheme and Post-fault Restoration
Scheme15.
7. Organizational policies and procedures related to Network Management
system
The organization should consider the security measures granting access to network.
Each department of the organization that develop, maintain or uses the information systems
need to develop and maintain the security infrastructure of the internal information16. The
13 White, Gary, Vivek Nallur, and Siobhán Clarke. "Quality of service approaches in IoT: A systematic mapping." Journal of Systems
and Software 132 (2017): 186-203.
14 Horalek, J., F. Holik, and V. Hurtova. "Implementation and testing of Cisco IP SLA in smart grid environments." In Information
and Communication Technology, Electronics and Microelectronics (MIPRO), 2017 40th International Convention on , pp. 450-454.
IEEE, 2017.
15 De Poorter, Eli, Jeroen Hoebeke, Matthias Strobbe, Ingrid Moerman, Steven Latré, Maarten Weyn, Bart Lannoo, and Jeroen
Famaey. "Sub-GHz LPWAN network coexistence, management and virtualization: an overview and open research
challenges." Wireless Personal Communications 95, no. 1 (2017): 187-213.
16 Newell, David, Annica Sandström, and Patrik Söderholm. "Network management and renewable energy development: an analytical
framework with empirical illustrations." Energy research & social science 23 (2017): 199-210.
6. Reliability and Survivability of Network analysis
Planning for reliability in context of telecommunication usually measured based on
the attributes of availability and serviceability. This can be considered while developing,
designing, maintaining and using the network of telecommunications13. The reliability can be
measured by determining all the processes and components, by measuring the performance
consistency.
Survivability for reliability in context of telecommunication usually refers to the
network ability that finds the challenges and fault in the network and ensures to recover the
network to effectively maintain the reliability14. The figure below illustrate the overview of
the network recovery methods in Pre- fault Protection Scheme and Post-fault Restoration
Scheme15.
7. Organizational policies and procedures related to Network Management
system
The organization should consider the security measures granting access to network.
Each department of the organization that develop, maintain or uses the information systems
need to develop and maintain the security infrastructure of the internal information16. The
13 White, Gary, Vivek Nallur, and Siobhán Clarke. "Quality of service approaches in IoT: A systematic mapping." Journal of Systems
and Software 132 (2017): 186-203.
14 Horalek, J., F. Holik, and V. Hurtova. "Implementation and testing of Cisco IP SLA in smart grid environments." In Information
and Communication Technology, Electronics and Microelectronics (MIPRO), 2017 40th International Convention on , pp. 450-454.
IEEE, 2017.
15 De Poorter, Eli, Jeroen Hoebeke, Matthias Strobbe, Ingrid Moerman, Steven Latré, Maarten Weyn, Bart Lannoo, and Jeroen
Famaey. "Sub-GHz LPWAN network coexistence, management and virtualization: an overview and open research
challenges." Wireless Personal Communications 95, no. 1 (2017): 187-213.
16 Newell, David, Annica Sandström, and Patrik Söderholm. "Network management and renewable energy development: an analytical
framework with empirical illustrations." Energy research & social science 23 (2017): 199-210.

6EVALUATE AND USE TELECOMMUNICATIONS MANAGEMENT NETWORKS
infrastructure of the information security consist of programs and information ensuring about
the availability, integrity, confidentiality, and accountability of the information assets17.
A periodical review of the organisation security policies ensure the security needs of
the organization18. Individual department has the responsibility to review and evaluate the
policies effectiveness and to accompany the procedures. Network security policies has been
develop by the organization to evaluate the policies and provide relevant feedback.
8. Evaluating administrative Network Management System
Service Support: They need to mainly focus on certain aspects including help desk,
troubleshooting, supporting with new application, everything over the network.
Service Delivery: As application flows across the network, the service level
agreements and objectives are being used in delivering the end users.
Security Management: It ensures unintended and unauthorised access should not be
grated to end users. Mitigating the external threats with firewalls to prevent the access.
Infrastructure Management: They are responsible for physical configuration and
installation of network devices for the organization.
Application Management: It ensures the right configuration of the application and
implement the design based on the environment and provide end-to-end services and end
users delivery.
17 Heuser, Stephan, Bradley Reaves, Praveen Kumar Pendyala, Henry Carter, Alexandra Dmitrienko, William Enck, Negar Kiyavash,
Ahmad-Reza Sadeghi, and Patrick Traynor. "Phonion: Practical protection of metadata in telephony networks." Proceedings on
Privacy Enhancing Technologies2017, no. 1 (2017): 170-187.
18 Grigoreva, Elena, Elaine Wong, Marija Furdek, Lena Wosinska, and C. Mas Machuca. "Energy consumption and reliability
performance of survivable passive optical converged networks: Public ITS case study." IEEE/OSA Journal of Optical
Communications and Networking 9, no. 4 (2017): C98-C108.
infrastructure of the information security consist of programs and information ensuring about
the availability, integrity, confidentiality, and accountability of the information assets17.
A periodical review of the organisation security policies ensure the security needs of
the organization18. Individual department has the responsibility to review and evaluate the
policies effectiveness and to accompany the procedures. Network security policies has been
develop by the organization to evaluate the policies and provide relevant feedback.
8. Evaluating administrative Network Management System
Service Support: They need to mainly focus on certain aspects including help desk,
troubleshooting, supporting with new application, everything over the network.
Service Delivery: As application flows across the network, the service level
agreements and objectives are being used in delivering the end users.
Security Management: It ensures unintended and unauthorised access should not be
grated to end users. Mitigating the external threats with firewalls to prevent the access.
Infrastructure Management: They are responsible for physical configuration and
installation of network devices for the organization.
Application Management: It ensures the right configuration of the application and
implement the design based on the environment and provide end-to-end services and end
users delivery.
17 Heuser, Stephan, Bradley Reaves, Praveen Kumar Pendyala, Henry Carter, Alexandra Dmitrienko, William Enck, Negar Kiyavash,
Ahmad-Reza Sadeghi, and Patrick Traynor. "Phonion: Practical protection of metadata in telephony networks." Proceedings on
Privacy Enhancing Technologies2017, no. 1 (2017): 170-187.
18 Grigoreva, Elena, Elaine Wong, Marija Furdek, Lena Wosinska, and C. Mas Machuca. "Energy consumption and reliability
performance of survivable passive optical converged networks: Public ITS case study." IEEE/OSA Journal of Optical
Communications and Networking 9, no. 4 (2017): C98-C108.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7EVALUATE AND USE TELECOMMUNICATIONS MANAGEMENT NETWORKS
Software asset Management: It is partially configuration management design to
provide essential information to install the software for every device.
9. Evaluating Network Management System
The following two results were found on evaluation of Network Management system:
1) The examinees find the prototype to be helpful in reducing the mistakes while
creating a configuration of VLAN19. The result that has been achieved implies that it
has an effective prototype that can reduce the managing cost of the networks of data
centre.
2) With the prototype the time could be reduced for creating procedures for operating.
However, the time that was available was quite less.
10. Business Models and Business Processes review in TMN
The organization use the functional and organizational structure of the business model
to keep control and govern the function of the business that are run within the organization.
The Telecommunication Network uses different range of business models which include the
Business management, Service Management, Networks Management and Elements
Management which have been discussed as the management focus and to the functional areas
model.
Management Focus:
The Telecommunication Management Networks mainly focus on business management,
Services management, Network Management and Element management
19 Riekstin, Ana Carolina, Bruno Bastos Rodrigues, Kim Khoa Nguyen, Tereza Cristina Melo de Brito Carvalho, Catalin Meirosu,
Burkhard Stiller, and Mohamed Cheriet. "A Survey on Metrics and Measurement Tools for Sustainable Distributed Cloud
Networks." IEEE Communications Surveys & Tutorials(2017).
Software asset Management: It is partially configuration management design to
provide essential information to install the software for every device.
9. Evaluating Network Management System
The following two results were found on evaluation of Network Management system:
1) The examinees find the prototype to be helpful in reducing the mistakes while
creating a configuration of VLAN19. The result that has been achieved implies that it
has an effective prototype that can reduce the managing cost of the networks of data
centre.
2) With the prototype the time could be reduced for creating procedures for operating.
However, the time that was available was quite less.
10. Business Models and Business Processes review in TMN
The organization use the functional and organizational structure of the business model
to keep control and govern the function of the business that are run within the organization.
The Telecommunication Network uses different range of business models which include the
Business management, Service Management, Networks Management and Elements
Management which have been discussed as the management focus and to the functional areas
model.
Management Focus:
The Telecommunication Management Networks mainly focus on business management,
Services management, Network Management and Element management
19 Riekstin, Ana Carolina, Bruno Bastos Rodrigues, Kim Khoa Nguyen, Tereza Cristina Melo de Brito Carvalho, Catalin Meirosu,
Burkhard Stiller, and Mohamed Cheriet. "A Survey on Metrics and Measurement Tools for Sustainable Distributed Cloud
Networks." IEEE Communications Surveys & Tutorials(2017).

8EVALUATE AND USE TELECOMMUNICATIONS MANAGEMENT NETWORKS
Functional areas Model:
The Telecommunication Management Networks has followed the business process
that consist of three parts. The framework that the business process include are Strategy,
Infrastructure and Product, Operations, Enterprise Management. The domain that
interconnect the points between the networks and the management functionalities are fault,
performance, configuration, accounting and security.
11 a. Analysis for Service Levels
The reason for implementation and obtaining the service levels include:
By applying all the service interruptions, a specific response time is obtained
A written agreements need to be obtained with regard to the methods that is used in
fixing the required interruptions.
Evaluating the costs and the requirement of the resources that are agreed and planed
upon
Providing a better service of performance for the liability of the carrier
The contractual agreements of the Service Level are being made between the client
and the service provider
The Service specific level is define by SLA’s as the client has an expectation from the
service provider to receive them
11 b Analysis of Linear and Exponential Trend
Linear Trend Analysis:
Trend estimation process need to conduct for statistical technique that enable data
interpretation. With linear trend analysis it is easy to determine the increase or decrease in
measurements which are distinguishable from random behaviour. Analysing the Linear
Functional areas Model:
The Telecommunication Management Networks has followed the business process
that consist of three parts. The framework that the business process include are Strategy,
Infrastructure and Product, Operations, Enterprise Management. The domain that
interconnect the points between the networks and the management functionalities are fault,
performance, configuration, accounting and security.
11 a. Analysis for Service Levels
The reason for implementation and obtaining the service levels include:
By applying all the service interruptions, a specific response time is obtained
A written agreements need to be obtained with regard to the methods that is used in
fixing the required interruptions.
Evaluating the costs and the requirement of the resources that are agreed and planed
upon
Providing a better service of performance for the liability of the carrier
The contractual agreements of the Service Level are being made between the client
and the service provider
The Service specific level is define by SLA’s as the client has an expectation from the
service provider to receive them
11 b Analysis of Linear and Exponential Trend
Linear Trend Analysis:
Trend estimation process need to conduct for statistical technique that enable data
interpretation. With linear trend analysis it is easy to determine the increase or decrease in
measurements which are distinguishable from random behaviour. Analysing the Linear

9EVALUATE AND USE TELECOMMUNICATIONS MANAGEMENT NETWORKS
Trends on real and stimulated data has been conducted by plotting the data in time series and
using the variable range of data. A formula being included for the Linear trend model:
Yt = β0 + β1 + et
Notation:
β0 - is the constant
β1 – one period to another period average change
t – time unit value
et – term error
Exponential Trend Analysis:
Some data are analyse based on the future which applied the timeline in the linear
fashion that analyse the relation between the data. The formula for analysing Exponential
trend is:
Yt = β0 β1 t + et
Notation:
β0 - is the constant
β1 – one period to another period average change
t – time unit value
et – term error
Trends on real and stimulated data has been conducted by plotting the data in time series and
using the variable range of data. A formula being included for the Linear trend model:
Yt = β0 + β1 + et
Notation:
β0 - is the constant
β1 – one period to another period average change
t – time unit value
et – term error
Exponential Trend Analysis:
Some data are analyse based on the future which applied the timeline in the linear
fashion that analyse the relation between the data. The formula for analysing Exponential
trend is:
Yt = β0 β1 t + et
Notation:
β0 - is the constant
β1 – one period to another period average change
t – time unit value
et – term error
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

10EVALUATE AND USE TELECOMMUNICATIONS MANAGEMENT NETWORKS
11 c Disaster and Security Management Policies and Procedures
Different threats and risks are considered for the reliability and survivability of the
network. The security and disaster management determine in order to remove the threats,
reduce and manage them through an appropriate method.
12 a Analysis of Billing Process Flow
For generating a billing process for telecommunication network it is necessary to
process a call for the data files. Check through the customer record and match the data with
requirements, prices and standards for a particular bill. Just after determining the bill of the
customer, it needs to reconciled and check through the invoices which has been provided to
the third parties network. Finally the data files and the invoice will be generated and deliver
to the customer with related information into the accounting system.
12 b Standards Used In SNMP Network Management Model and GSM
Network
SNMP Network Management Model uses:
• Simple network management protocol (SNMP)
• AgentX
• SNMPv1
• CMIP over TCP/IP
• Common management information protocol (CMIP)
• SNMPv2u
• Ethernet
11 c Disaster and Security Management Policies and Procedures
Different threats and risks are considered for the reliability and survivability of the
network. The security and disaster management determine in order to remove the threats,
reduce and manage them through an appropriate method.
12 a Analysis of Billing Process Flow
For generating a billing process for telecommunication network it is necessary to
process a call for the data files. Check through the customer record and match the data with
requirements, prices and standards for a particular bill. Just after determining the bill of the
customer, it needs to reconciled and check through the invoices which has been provided to
the third parties network. Finally the data files and the invoice will be generated and deliver
to the customer with related information into the accounting system.
12 b Standards Used In SNMP Network Management Model and GSM
Network
SNMP Network Management Model uses:
• Simple network management protocol (SNMP)
• AgentX
• SNMPv1
• CMIP over TCP/IP
• Common management information protocol (CMIP)
• SNMPv2u
• Ethernet

11EVALUATE AND USE TELECOMMUNICATIONS MANAGEMENT NETWORKS
• SNMPv2c
• Internet protocol (IP)
• SNMPv3
• User datagram protocol (UDP)
• SNMPv2
• Transport control protocol (TCP)
GSM Network uses:
In 1982 Groupe Special Mobile (GSM) had been created. In 1984 the features of GSM was
described. In 1985 recommendation list were settled. In 1987, the network operators has
signed the Initial MoU (Memorandum of Understanding which have drafted the technical
specifications of 13 countries. In 1988, for the radio interface there were validations and
trails. In 1991, at Telecom 91 exhibition the first system trails were demonstrated. In 1992,
Europe has launch the official commercial GSM service. In 1993, around 39 countries has 62
signatories for GSM-MoU. In 1995, GSM phase 2 specification were frozen. In 1999, GPRS
trails has begun when GSM MoU has join 3GPP (UMTS). In 2000, first GPRS networks has
rollout with 480M GSM Network operators. By the end of 202 792M GSM Network
Operators has roll out worldwide.
12 c CNET network simulation or similar data network
The network simulation of CNET would be conducted on
• Routing and transport
• WLAN
• Data link
• SNMPv2c
• Internet protocol (IP)
• SNMPv3
• User datagram protocol (UDP)
• SNMPv2
• Transport control protocol (TCP)
GSM Network uses:
In 1982 Groupe Special Mobile (GSM) had been created. In 1984 the features of GSM was
described. In 1985 recommendation list were settled. In 1987, the network operators has
signed the Initial MoU (Memorandum of Understanding which have drafted the technical
specifications of 13 countries. In 1988, for the radio interface there were validations and
trails. In 1991, at Telecom 91 exhibition the first system trails were demonstrated. In 1992,
Europe has launch the official commercial GSM service. In 1993, around 39 countries has 62
signatories for GSM-MoU. In 1995, GSM phase 2 specification were frozen. In 1999, GPRS
trails has begun when GSM MoU has join 3GPP (UMTS). In 2000, first GPRS networks has
rollout with 480M GSM Network operators. By the end of 202 792M GSM Network
Operators has roll out worldwide.
12 c CNET network simulation or similar data network
The network simulation of CNET would be conducted on
• Routing and transport
• WLAN
• Data link

12EVALUATE AND USE TELECOMMUNICATIONS MANAGEMENT NETWORKS
• WAN
• Network
• LAN
In similar data network, the network management techniques are used to test and created
tools.
13. Effectiveness of Management Processes of Fault Management
The fault management for the organization that include the failure of hardware, loss of
connectivity or change of port status. Where the fault being detected the management
platform notify it to the administrator through an alarm or alert. The notification is viewed
through the GUI of fault management systems.
A range of errors were involved in the automated fault management system which
could be resolve within the network that ensure the statistical range. It access and collect the
performance information that could determine the effectiveness of the component through
Automated Fault Management.
14. Management system features, function and configuration
Features: The TNS sets the network’s controls, flow and operation that support the network
communication of the organization.
Function: Function of TMN are:
NEF = Network Element Functions
OSF = Operations System Functions
WSF = Work Station Functions
• WAN
• Network
• LAN
In similar data network, the network management techniques are used to test and created
tools.
13. Effectiveness of Management Processes of Fault Management
The fault management for the organization that include the failure of hardware, loss of
connectivity or change of port status. Where the fault being detected the management
platform notify it to the administrator through an alarm or alert. The notification is viewed
through the GUI of fault management systems.
A range of errors were involved in the automated fault management system which
could be resolve within the network that ensure the statistical range. It access and collect the
performance information that could determine the effectiveness of the component through
Automated Fault Management.
14. Management system features, function and configuration
Features: The TNS sets the network’s controls, flow and operation that support the network
communication of the organization.
Function: Function of TMN are:
NEF = Network Element Functions
OSF = Operations System Functions
WSF = Work Station Functions
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

13EVALUATE AND USE TELECOMMUNICATIONS MANAGEMENT NETWORKS
MF = Mediation Functions
QAF = Q Adaptor Functions
Configuration: The system administrator set up a network configuration that meet the
objectives of the network which include
Router configuration: The route setting and the correct IP addresses is specifies.
Host configuration: Network connection set on host computer or laptop.
Software Configuration: Provide credentials that monitor the network traffic and
allow access to network-based software
15. Fault Management Procedure
The process of fault management notify users of, detect, log, and fix network problem
as it cause downtime. The procedure of fault management include:
The process for detecting error when the notifications is being receive while acting
Identifying and tracing the fault
Maintaining the logs error
Diagnostic testing being running
Fault correction
Reporting the condition of error
Faults being trace and localised through manipulation and examination of the
information of the database.
16. QoS agreements features and functions
The QoS is the total characteristic in the Telecommunication service has to ability to
bear to satiate its state and the end user need is implied. The end to end service of QoS is seen
by ICU through a particular telecommunication network.
MF = Mediation Functions
QAF = Q Adaptor Functions
Configuration: The system administrator set up a network configuration that meet the
objectives of the network which include
Router configuration: The route setting and the correct IP addresses is specifies.
Host configuration: Network connection set on host computer or laptop.
Software Configuration: Provide credentials that monitor the network traffic and
allow access to network-based software
15. Fault Management Procedure
The process of fault management notify users of, detect, log, and fix network problem
as it cause downtime. The procedure of fault management include:
The process for detecting error when the notifications is being receive while acting
Identifying and tracing the fault
Maintaining the logs error
Diagnostic testing being running
Fault correction
Reporting the condition of error
Faults being trace and localised through manipulation and examination of the
information of the database.
16. QoS agreements features and functions
The QoS is the total characteristic in the Telecommunication service has to ability to
bear to satiate its state and the end user need is implied. The end to end service of QoS is seen
by ICU through a particular telecommunication network.

14EVALUATE AND USE TELECOMMUNICATIONS MANAGEMENT NETWORKS
The function that are used in International Standard of QoS include Delay Counter,
Level meter and devices that are similar.
17. Network Management Techniques
Generating Account records and using in data or voice networks: The technique of the
solution to manage the data network which is the reference architecture of the Cisco Systems.
The system include the Call Manager sever. This server is for the one who plan to manage the
Voice over Internet Protocol (VoIP). In order to integrate the Call Manager server into the
Network Management System following things need to be included:
A platform of Simple Network Management Protocol (SNMP) for the fault
management
A platform of Performance Monitoring for long term trending and performance
management
For configuration management a CiscoWorks2000, software and hardware inventory
management and syslog collection.
18. Impact of Telecommunication in the workplace and industry
With the adoption of telecommunication systems, employee can easily interact from
any locations20. However, they are not able to have a one-on-one communication. The
meetings that are held are mostly through video conferencing. This meetings are most
oriented to the project and business not for socialization. Thus, it affects the business
performance. The next impact is on the setting up and acquiring the telecommunication
equipment and software. It require a huge budget to manage it. The industry need to train the
20 Ahmad, Waqar, Osman Hasan, Usman Pervez, and Junaid Qadir. "Reliability modeling and analysis of communication
networks." Journal of Network and Computer Applications 78 (2017): 191-215.
The function that are used in International Standard of QoS include Delay Counter,
Level meter and devices that are similar.
17. Network Management Techniques
Generating Account records and using in data or voice networks: The technique of the
solution to manage the data network which is the reference architecture of the Cisco Systems.
The system include the Call Manager sever. This server is for the one who plan to manage the
Voice over Internet Protocol (VoIP). In order to integrate the Call Manager server into the
Network Management System following things need to be included:
A platform of Simple Network Management Protocol (SNMP) for the fault
management
A platform of Performance Monitoring for long term trending and performance
management
For configuration management a CiscoWorks2000, software and hardware inventory
management and syslog collection.
18. Impact of Telecommunication in the workplace and industry
With the adoption of telecommunication systems, employee can easily interact from
any locations20. However, they are not able to have a one-on-one communication. The
meetings that are held are mostly through video conferencing. This meetings are most
oriented to the project and business not for socialization. Thus, it affects the business
performance. The next impact is on the setting up and acquiring the telecommunication
equipment and software. It require a huge budget to manage it. The industry need to train the
20 Ahmad, Waqar, Osman Hasan, Usman Pervez, and Junaid Qadir. "Reliability modeling and analysis of communication
networks." Journal of Network and Computer Applications 78 (2017): 191-215.

15EVALUATE AND USE TELECOMMUNICATIONS MANAGEMENT NETWORKS
employee regarding the software and equipment which they need to use as a communication
tool. Though telecommunication system may bring flexibility in the workplace and industry
but it may even lead to increase in costs.
19. Disaster Recovery Plan
In the Disaster Recovery Plan the organization need to protect their ICT system
during the time of emergency and disaster21. This have a negative impact on the system. The
disaster recovery plan include the disaster that can be natural, man-made and environmental
disaster that may pose risk to the Network Management system. It is necessary to ensure the
disaster recovery plan for the organization protection during the event of disaster. In the
disaster recovery plan it is important to identify the potential disaster that can analyse
environmentally. The organization might need to follow the risk assessment procedure that
may help in determining the potential impact and develop some strategies and action to
reduce the risk when the event of disaster occur.
Conclusion
From the above study it could be concluded that the TMN provides supports for
administration, operation and maintenance of managing the network. The system provide
standardization in the process, functions, messages and objects to ensures the necessary
functionality and support the usage of management application when with supply. Thus,
through standardization the services could be improve for the efficiency of
telecommunication operators.
21 Blackman, Deborah, Hitomi Nakanishi, and Angela M. Benson. "Disaster resilience as a complex problem: Why linearity is not
applicable for long-term recovery." Technological Forecasting and Social Change 121 (2017): 89-98.
employee regarding the software and equipment which they need to use as a communication
tool. Though telecommunication system may bring flexibility in the workplace and industry
but it may even lead to increase in costs.
19. Disaster Recovery Plan
In the Disaster Recovery Plan the organization need to protect their ICT system
during the time of emergency and disaster21. This have a negative impact on the system. The
disaster recovery plan include the disaster that can be natural, man-made and environmental
disaster that may pose risk to the Network Management system. It is necessary to ensure the
disaster recovery plan for the organization protection during the event of disaster. In the
disaster recovery plan it is important to identify the potential disaster that can analyse
environmentally. The organization might need to follow the risk assessment procedure that
may help in determining the potential impact and develop some strategies and action to
reduce the risk when the event of disaster occur.
Conclusion
From the above study it could be concluded that the TMN provides supports for
administration, operation and maintenance of managing the network. The system provide
standardization in the process, functions, messages and objects to ensures the necessary
functionality and support the usage of management application when with supply. Thus,
through standardization the services could be improve for the efficiency of
telecommunication operators.
21 Blackman, Deborah, Hitomi Nakanishi, and Angela M. Benson. "Disaster resilience as a complex problem: Why linearity is not
applicable for long-term recovery." Technological Forecasting and Social Change 121 (2017): 89-98.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

16EVALUATE AND USE TELECOMMUNICATIONS MANAGEMENT NETWORKS
Bibliography
Ahmad, Waqar, Osman Hasan, Usman Pervez, and Junaid Qadir. "Reliability modeling and
analysis of communication networks." Journal of Network and Computer Applications 78
(2017): 191-215.
Ata, Shingo, and Toshio Tonouchi. "Management of Information, Communications, and
Networking: from the Past to the Future." IEICE Transactions on Communications 100, no. 9
(2017): 1614-1622.
Bicaku, Ani, Silia Maksuti, Silke Palkovits-Rauter, Markus Tauber, Rainer Matischek,
Christoph Schmittner, Georgios Mantas, Mario Thron, and Jerker Delsing. "Towards
Trustworthy End-to-End Communication inIndustry 4.0." In Ieee 15th International
Conference Of Industrial Informatics Indin'2017. 2017.
Blackman, Deborah, Hitomi Nakanishi, and Angela M. Benson. "Disaster resilience as a
complex problem: Why linearity is not applicable for long-term recovery." Technological
Forecasting and Social Change 121 (2017): 89-98.
Bui, Nicola, Matteo Cesana, S. Amir Hosseini, Qi Liao, Ilaria Malanchini, and Joerg
Widmer. "A survey of anticipatory mobile networking: Context-based classification,
prediction methodologies, and optimization techniques." IEEE Communications Surveys &
Tutorials 19, no. 3 (2017): 1790-1821.
Cardellini, Valeria, Emiliano Casalicchio, Vincenzo Grassi, Stefano Iannucci, Francesco Lo
Presti, and Raffaela Mirandola. "MOSES: A Platform for Eperimenting with QoS-Driven
Self-Adaptation Policies for Service Oriented Systems." In Software Engineering for Self-
Adaptive Systems III. Assurances, pp. 409-433. Springer, Cham, 2017.
Bibliography
Ahmad, Waqar, Osman Hasan, Usman Pervez, and Junaid Qadir. "Reliability modeling and
analysis of communication networks." Journal of Network and Computer Applications 78
(2017): 191-215.
Ata, Shingo, and Toshio Tonouchi. "Management of Information, Communications, and
Networking: from the Past to the Future." IEICE Transactions on Communications 100, no. 9
(2017): 1614-1622.
Bicaku, Ani, Silia Maksuti, Silke Palkovits-Rauter, Markus Tauber, Rainer Matischek,
Christoph Schmittner, Georgios Mantas, Mario Thron, and Jerker Delsing. "Towards
Trustworthy End-to-End Communication inIndustry 4.0." In Ieee 15th International
Conference Of Industrial Informatics Indin'2017. 2017.
Blackman, Deborah, Hitomi Nakanishi, and Angela M. Benson. "Disaster resilience as a
complex problem: Why linearity is not applicable for long-term recovery." Technological
Forecasting and Social Change 121 (2017): 89-98.
Bui, Nicola, Matteo Cesana, S. Amir Hosseini, Qi Liao, Ilaria Malanchini, and Joerg
Widmer. "A survey of anticipatory mobile networking: Context-based classification,
prediction methodologies, and optimization techniques." IEEE Communications Surveys &
Tutorials 19, no. 3 (2017): 1790-1821.
Cardellini, Valeria, Emiliano Casalicchio, Vincenzo Grassi, Stefano Iannucci, Francesco Lo
Presti, and Raffaela Mirandola. "MOSES: A Platform for Eperimenting with QoS-Driven
Self-Adaptation Policies for Service Oriented Systems." In Software Engineering for Self-
Adaptive Systems III. Assurances, pp. 409-433. Springer, Cham, 2017.

17EVALUATE AND USE TELECOMMUNICATIONS MANAGEMENT NETWORKS
City Kong, Network Management System: What's It All About? (2018) Cityu.edu.hk
<http://www.cityu.edu.hk/csc/netcomp/mar2004-2.htm>.
Čolaković, Alem, and Himzo Bajrić. "ASSESSING CUSTOMER SATISFACTION BASED
ON QoS PARAMETERS." International Journal for Quality Research11, no. 1 (2017).
De Poorter, Eli, Jeroen Hoebeke, Matthias Strobbe, Ingrid Moerman, Steven Latré, Maarten
Weyn, Bart Lannoo, and Jeroen Famaey. "Sub-GHz LPWAN network coexistence,
management and virtualization: an overview and open research challenges." Wireless
Personal Communications 95, no. 1 (2017): 187-213.
Gravina, Raffaele, Parastoo Alinia, Hassan Ghasemzadeh, and Giancarlo Fortino. "Multi-
sensor fusion in body sensor networks: State-of-the-art and research challenges." Information
Fusion 35 (2017): 68-80.
Grigoreva, Elena, Elaine Wong, Marija Furdek, Lena Wosinska, and C. Mas Machuca.
"Energy consumption and reliability performance of survivable passive optical converged
networks: Public ITS case study." IEEE/OSA Journal of Optical Communications and
Networking 9, no. 4 (2017): C98-C108.
Heuser, Stephan, Bradley Reaves, Praveen Kumar Pendyala, Henry Carter, Alexandra
Dmitrienko, William Enck, Negar Kiyavash, Ahmad-Reza Sadeghi, and Patrick Traynor.
"Phonion: Practical protection of metadata in telephony networks." Proceedings on Privacy
Enhancing Technologies2017, no. 1 (2017): 170-187.
Horalek, J., F. Holik, and V. Hurtova. "Implementation and testing of Cisco IP SLA in smart
grid environments." In Information and Communication Technology, Electronics and
Microelectronics (MIPRO), 2017 40th International Convention on, pp. 450-454. IEEE,
2017.
City Kong, Network Management System: What's It All About? (2018) Cityu.edu.hk
<http://www.cityu.edu.hk/csc/netcomp/mar2004-2.htm>.
Čolaković, Alem, and Himzo Bajrić. "ASSESSING CUSTOMER SATISFACTION BASED
ON QoS PARAMETERS." International Journal for Quality Research11, no. 1 (2017).
De Poorter, Eli, Jeroen Hoebeke, Matthias Strobbe, Ingrid Moerman, Steven Latré, Maarten
Weyn, Bart Lannoo, and Jeroen Famaey. "Sub-GHz LPWAN network coexistence,
management and virtualization: an overview and open research challenges." Wireless
Personal Communications 95, no. 1 (2017): 187-213.
Gravina, Raffaele, Parastoo Alinia, Hassan Ghasemzadeh, and Giancarlo Fortino. "Multi-
sensor fusion in body sensor networks: State-of-the-art and research challenges." Information
Fusion 35 (2017): 68-80.
Grigoreva, Elena, Elaine Wong, Marija Furdek, Lena Wosinska, and C. Mas Machuca.
"Energy consumption and reliability performance of survivable passive optical converged
networks: Public ITS case study." IEEE/OSA Journal of Optical Communications and
Networking 9, no. 4 (2017): C98-C108.
Heuser, Stephan, Bradley Reaves, Praveen Kumar Pendyala, Henry Carter, Alexandra
Dmitrienko, William Enck, Negar Kiyavash, Ahmad-Reza Sadeghi, and Patrick Traynor.
"Phonion: Practical protection of metadata in telephony networks." Proceedings on Privacy
Enhancing Technologies2017, no. 1 (2017): 170-187.
Horalek, J., F. Holik, and V. Hurtova. "Implementation and testing of Cisco IP SLA in smart
grid environments." In Information and Communication Technology, Electronics and
Microelectronics (MIPRO), 2017 40th International Convention on, pp. 450-454. IEEE,
2017.

18EVALUATE AND USE TELECOMMUNICATIONS MANAGEMENT NETWORKS
Li, Tao, Ning Xie, Chunqiu Zeng, Wubai Zhou, Li Zheng, Yexi Jiang, Yimin Yang et al.
"Data-driven techniques in disaster information management." ACM Computing Surveys
(CSUR)50, no. 1 (2017): 1.
Newell, David, Annica Sandström, and Patrik Söderholm. "Network management and
renewable energy development: an analytical framework with empirical
illustrations." Energy research & social science 23 (2017): 199-210.
Rajesh, M., and J. M. Gnanasekar. "Congestion Control Scheme for Heterogeneous Wireless
Ad Hoc Networks Using Self-Adjust Hybrid Model." International Journal of Pure and
Applied Mathematics 116 (2017): 537-547.
Riekstin, Ana Carolina, Bruno Bastos Rodrigues, Kim Khoa Nguyen, Tereza Cristina Melo
de Brito Carvalho, Catalin Meirosu, Burkhard Stiller, and Mohamed Cheriet. "A Survey on
Metrics and Measurement Tools for Sustainable Distributed Cloud Networks." IEEE
Communications Surveys & Tutorials(2017).
Singhal, Anoop, and Xinming Ou. "Security risk analysis of enterprise networks using
probabilistic attack graphs." In Network Security Metrics, pp. 53-73. Springer, Cham, 2017.
Tode, Hideki, Konosuke Kawashima, and Tadashi Ito. "100-Year History and Future of
Network System Technologies in Japan." IEICE Transactions on Communications 100, no. 9
(2017): 1581-1594.
Tuna, Gurkan, Dimitrios G. Kogias, V. Cagri Gungor, Cengiz Gezer, Erhan Taşkın, and
Erman Ayday. "A survey on information security threats and solutions for machine to
machine (M2M) communications." Journal of Parallel and Distributed Computing 109
(2017): 142-154.
Li, Tao, Ning Xie, Chunqiu Zeng, Wubai Zhou, Li Zheng, Yexi Jiang, Yimin Yang et al.
"Data-driven techniques in disaster information management." ACM Computing Surveys
(CSUR)50, no. 1 (2017): 1.
Newell, David, Annica Sandström, and Patrik Söderholm. "Network management and
renewable energy development: an analytical framework with empirical
illustrations." Energy research & social science 23 (2017): 199-210.
Rajesh, M., and J. M. Gnanasekar. "Congestion Control Scheme for Heterogeneous Wireless
Ad Hoc Networks Using Self-Adjust Hybrid Model." International Journal of Pure and
Applied Mathematics 116 (2017): 537-547.
Riekstin, Ana Carolina, Bruno Bastos Rodrigues, Kim Khoa Nguyen, Tereza Cristina Melo
de Brito Carvalho, Catalin Meirosu, Burkhard Stiller, and Mohamed Cheriet. "A Survey on
Metrics and Measurement Tools for Sustainable Distributed Cloud Networks." IEEE
Communications Surveys & Tutorials(2017).
Singhal, Anoop, and Xinming Ou. "Security risk analysis of enterprise networks using
probabilistic attack graphs." In Network Security Metrics, pp. 53-73. Springer, Cham, 2017.
Tode, Hideki, Konosuke Kawashima, and Tadashi Ito. "100-Year History and Future of
Network System Technologies in Japan." IEICE Transactions on Communications 100, no. 9
(2017): 1581-1594.
Tuna, Gurkan, Dimitrios G. Kogias, V. Cagri Gungor, Cengiz Gezer, Erhan Taşkın, and
Erman Ayday. "A survey on information security threats and solutions for machine to
machine (M2M) communications." Journal of Parallel and Distributed Computing 109
(2017): 142-154.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

19EVALUATE AND USE TELECOMMUNICATIONS MANAGEMENT NETWORKS
White, Gary, Vivek Nallur, and Siobhán Clarke. "Quality of service approaches in IoT: A
systematic mapping." Journal of Systems and Software 132 (2017): 186-203.
White, Gary, Vivek Nallur, and Siobhán Clarke. "Quality of service approaches in IoT: A
systematic mapping." Journal of Systems and Software 132 (2017): 186-203.
1 out of 20
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.