50 resultados para protection mechanisms
Resumo:
One of the most effective techniques offering QoS routing is minimum interference routing. However, it is complex in terms of computation time and is not oriented toward improving the network protection level. In order to include better levels of protection, new minimum interference routing algorithms are necessary. Minimizing the failure recovery time is also a complex process involving different failure recovery phases. Some of these phases depend completely on correct routing selection, such as minimizing the failure notification time. The level of protection also involves other aspects, such as the amount of resources used. In this case shared backup techniques should be considered. Therefore, minimum interference techniques should also be modified in order to include sharing resources for protection in their objectives. These aspects are reviewed and analyzed in this article, and a new proposal combining minimum interference with fast protection using shared segment backups is introduced. Results show that our proposed method improves both minimization of the request rejection ratio and the percentage of bandwidth allocated to backup paths in networks with low and medium protection requirements
Resumo:
A survey of MPLS protection methods and their utilization in combination with online routing methods is presented in this article. Usually, fault management methods pre-establish backup paths to recover traffic after a failure. In addition, MPLS allows the creation of different backup types, and hence MPLS is a suitable method to support traffic-engineered networks. In this article, an introduction of several label switch path backup types and their pros and cons are pointed out. The creation of an LSP involves a routing phase, which should include QoS aspects. In a similar way, to achieve a reliable network the LSP backups must also be routed by a QoS routing method. When LSP creation requests arrive one by one (a dynamic network scenario), online routing methods are applied. The relationship between MPLS fault management and QoS online routing methods is unavoidable, in particular during the creation of LSP backups. Both aspects are discussed in this article. Several ideas on how these actual technologies could be applied together are presented and compared
Resumo:
In this paper, a method for enhancing current QoS routing methods by means of QoS protection is presented. In an MPLS network, the segments (links) to be protected are predefined and an LSP request involves, apart from establishing a working path, creating a specific type of backup path (local, reverse or global). Different QoS parameters, such as network load balancing, resource optimization and minimization of LSP request rejection should be considered. QoS protection is defined as a function of QoS parameters, such as packet loss, restoration time, and resource optimization. A framework to add QoS protection to many of the current QoS routing algorithms is introduced. A backup decision module to select the most suitable protection method is formulated and different case studies are analyzed
Resumo:
In this paper, different recovery methods applied at different network layers and time scales are used in order to enhance the network reliability. Each layer deploys its own fault management methods. However, current recovery methods are applied to only a specific layer. New protection schemes, based on the proposed partial disjoint path algorithm, are defined in order to avoid protection duplications in a multi-layer scenario. The new protection schemes also encompass shared segment backup computation and shared risk link group identification. A complete set of experiments proves the efficiency of the proposed methods in relation with previous ones, in terms of resources used to protect the network, the failure recovery time and the request rejection ratio
Resumo:
This paper focuses on QoS routing with protection in an MPLS network over an optical layer. In this multi-layer scenario each layer deploys its own fault management methods. A partially protected optical layer is proposed and the rest of the network is protected at the MPLS layer. New protection schemes that avoid protection duplications are proposed. Moreover, this paper also introduces a new traffic classification based on the level of reliability. The failure impact is evaluated in terms of recovery time depending on the traffic class. The proposed schemes also include a novel variation of minimum interference routing and shared segment backup computation. A complete set of experiments proves that the proposed schemes are more efficient as compared to the previous ones, in terms of resources used to protect the network, failure impact and the request rejection ratio
Resumo:
La etnografía de la comunidad mixe de Salto de la Tuxpana y del grave conflicto que se produjo entre 2005 y 2007 es el punto de partida del presente artículo. La investigación realizada arrojó como resultado más destacado el descubrimiento de un violento cacicazgo, legitimado ideológicamente en la autonomía comunitaria, la identidad étnica y el reclamo de una jurisdicción propia, y asentado firmemente sobre tres mecanismos de control social: protección a través de la Policía Comunitaria Armada, acceso a la tierra y acceso a los programas de «desarrollo». El caciquismo se define como el régimen político personalista, basado en estructuras clientelares, que monopoliza y controla recursos y votos. También se propone la hipótesis de que la mayor parte de la violencia desplegada por los caciques es el resultado del proceso de reproducción social del mismo sistema político, cuando se genera una faccionalización simétrica de la comunidad, después de un periodo de estabilidad complementaria.
Resumo:
In this technical report, we approach one of the practical aspects when it comes to represent users' interests from their tagging activity, namely the categorization of tags into high-level categories of interest. The reason is that the representation of user profiles on the basis of the myriad of tags available on the Web is certainly unfeasible from various practical perspectives; mainly concerningthe unavailability of data to reliably, accurately measure interests across such fine-grained categorization, and, should the data be available, its overwhelming computational intractability. Motivated by this, our study presents the results of a categorization process whereby a collection of tags posted at BibSonomy #http://www.bibsonomy.org# are classified into 5 categories of interest. The methodology used to conduct such categorization is in line with other works in the field.
Resumo:
Pseudomonas fluorescens EPS62e was selected during a screening procedure for its high efficacy in controlling infections by Erwinia amylovora, the causal agent of fire blight disease, on different plant materials. In field trials carried out in pear trees during bloom, EPS62e colonized flowers until the carrying capacity, providing a moderate efficacy of fire-blight control. The putative mechanisms of EPS62e antagonism against E. amylovora were studied. EPS62e did not produce antimicrobial compounds described in P. fluorescens species and only developed antagonism in King’s B medium, where it produced siderophores. Interaction experiments in culture plate wells including a membrane filter, which physically separated the cultures, confirmed that inhibition of E. amylovora requires cell-to-cell contact. The spectrum of nutrient assimilation indicated that EPS62e used significantly more or different carbon sources than the pathogen. The maximum growth rate and affinity for nutrients in immature fruit extract were higher in EPS62e than in E. amylovora, but the cell yield was similar. The fitness of EPS62e and E. amylovora was studied upon inoculation in immature pear fruit wounds and hypanthia of intact flowers under controlled-environment conditions. When inoculated separately, EPS62e grew faster in flowers, whereas E. amylovora grew faster in fruit wounds because of its rapid spread to adjacent tissues. However, in preventive inoculations of EPS62e, subsequent growth of EPS101 was significantly inhibited. It is concluded that cell-to-cell interference as well as differences in growth potential and the spectrum and efficiency of nutrient use are mechanisms of antagonism of EPS62e against E. amylovora
Resumo:
The paper presents a competence-based instructional design system and a way to provide a personalization of navigation in the course content. The navigation aid tool builds on the competence graph and the student model, which includes the elements of uncertainty in the assessment of students. An individualized navigation graph is constructed for each student, suggesting the competences the student is more prepared to study. We use fuzzy set theory for dealing with uncertainty. The marks of the assessment tests are transformed into linguistic terms and used for assigning values to linguistic variables. For each competence, the level of difficulty and the level of knowing its prerequisites are calculated based on the assessment marks. Using these linguistic variables and approximate reasoning (fuzzy IF-THEN rules), a crisp category is assigned to each competence regarding its level of recommendation.
Resumo:
We analyze the political support for employment protection legislation. Unlike my previous work on the same topic, this paper pays a lot of attention to the role of obsolescence in the growth process. In voting in favour of employment protection, incumbent employees trade off lower living standards (because employment protection maintains workers in less productive activities) against longer job duration. The support for employment protection will then depend on the value of the latter relative to the cost of the former. We highlight two key deeterminants of this trade-off: first, the workers' bargaining power, second, the economy's growth rate-more precisely its rate of creative destruction.
Resumo:
We develop a model to analyse the implications of firing costs on incentives for R&D and international specialization. The Key idea is paying the firing cost, the country with a rigid labor market will tend to produce relatively secure goods, at a late stage of their product life cycle. Under international trade, an international product cycle emerges where, roughly, new goods are first produced in the low firing cost country will specialize in 'secondary innovations', that is, improvements in existing goods, while the low firing cost country will more specialize in 'primary innovation', that is, invention of new goods.
Resumo:
The largest fresh meat brand names in Spain are analyzed here to studyhow quality is signaled in agribusiness and how the underlying quality-assurance organizations work. Results show, first, that organizationalform varies according to the specialization of the brand name.Publicly-controlled brand names are grounded on market contracting withindividual producers, providing stronger incentives. In contrast,private brands rely more on hierarchy, taking advantage of itssuperiority in solving specific coordination problems. Second, theseemingly redundant coexistence of several quality indicators for agiven product is explained in efficiency terms. Multiple brands areshown to be complementary, given their specialization in guaranteeingdifferent attributes of the product.
Resumo:
Most US credit card holders revolve high-interest debt, often combined with substantial (i) asset accumulation by retirement, and (ii) low-rate liquid assets. Hyperbolic discounting can resolve only the former puzzle (Laibson et al., 2003). Bertaut and Haliassos (2002) proposed an 'accountant-shopper'framework for the latter. The current paper builds, solves, and simulates a fully-specified accountant-shopper model, to show that this framework canactually generate both types of co-existence, as well as target credit card utilization rates consistent with Gross and Souleles (2002). The benchmark model is compared to setups without self-control problems, with alternative mechanisms, and with impatient but fully rational shoppers.
Resumo:
This paper studies the relationship between the amount of publicinformation that stock market prices incorporate and the equilibriumbehavior of market participants. The analysis is framed in a static, NREEsetup where traders exchange vectors of assets accessing multidimensionalinformation under two alternative market structures. In the first(the unrestricted system), both informed and uninformed speculators cancondition their demands for each traded asset on all equilibrium prices;in the second (the restricted system), they are restricted to conditiontheir demand on the price of the asset they want to trade. I show thatinformed traders incentives to exploit multidimensional privateinformation depend on the number of prices they can condition upon whensubmitting their demand schedules, and on the specific price formationprocess one considers. Building on this insight, I then give conditionsunder which the restricted system is more efficient than the unrestrictedsystem.
Resumo:
We analyze the political support for employment protection legislation.Unlike my previous work on the same topic, this paper pays a lot ofattention to the role of obsolescence in the growth process.In voting in favour of employment protection, incumbent employeestrade off lower living standards (because employment protectionmaintains workers in less productive activities) against longer jobduration. The support for employment protection will then depend onthe value of the latter relative to the cost of the former. Wehighlight two key deeterminants of this trade-off: first, the workers'bargaining power, second, the economy's growth rate-more preciselyits rate of creative destruction.