53 resultados para Telecomunicació -- Tràfic


Relevância:

10.00% 10.00%

Publicador:

Resumo:

La Universitat de Girona disposa d'una xarxa física de comunicacions que uneix tots els campus. Es tracta d'un avantatge important que permet la transmissió de dades i telefonia de manera segura i fiable, sense haver de llogar els enllaços a operadors externs

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Resumen tomado de la publicaci??n

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Un dels camps que aquest projecte ha estat treballant és el de la telemedicina. Aquest projecte presenta una aplicació per assistir al personal mèdic rehabilitador en tasques de telerehabilitació (i teleassistència) fent servir una connexió bàsica ADSL i hardware comú. És la continuació del projecte TeleRehabilitació i Esclerosi Múltiple (TRiEM), un esforç conjunt entre el grup de recerca Comunicacions i Sistemes Distribuïts (BCDS en anglès) de la Universitat de Girona (UdG) i de la Fundació Esclerosi Múltiple (FEM) per desenvolupar una eina per ajudar a tasques de rehabilitació de l’Esclerosi Múltiple. L’aplicació AXARM és una iniciativa del grup de Comunicacions i Sistemes Distribuïts de la Universitat de Girona per impulsar una eina d’assistència telemàtica entre doctors i pacients. Facilita una eina útil als especialistes d’un centre per realitzar tasques de rehabilitació, assistència remota o monitorització (sanitària, assistencial o d’una altra mena) amb pacients que es trobin en un altre punt físic a través d’Internet

Relevância:

10.00% 10.00%

Publicador:

Resumo:

L'objectiu d'aquest projecte és dissenyar i implementar un servei de telefonia IP per a la Unitat de Tecnologies de la Informació i Comunicació (UTIC) de l'Institut Català de la Salut (ICS) a Girona. En primer lloc, es descriu el funcionament actual del servei de telefonia de l'ICS a Girona i la seva infraestructura de xarxa. A continuació s’estudia els fonaments de la VoIP. Es segueix amb el disseny, les eines escollides i la implementació realitzada, per acabar amb les conclusions

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Resumen tomado de la publicaci??n

Relevância:

10.00% 10.00%

Publicador:

Resumo:

El principal objectiu d’aquest projecte és desenvolupar una aplicació client en .NET que sigui capaç de processar les trucades IP entrants que pugui rebre un usuari al llarg de la seva jornada laboral. L’empresa per la qual es desenvoluparà aquest projecte és Caixa Girona, una empresa dedicada a la banca, fundada l’any 1940 per la Diputació de Girona i que disposa d’una plantilla d’uns 1300 empleats repartits entre unes 250 oficines disposades arreu del territori català i uns Serveis Centrals (SSCC) situats a la ciutat de Girona

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we define a new scheme to develop and evaluate protection strategies for building reliable GMPLS networks. This is based on what we have called the network protection degree (NPD). The NPD consists of an a priori evaluation, the failure sensibility degree (FSD), which provides the failure probability, and an a posteriori evaluation, the failure impact degree (FID), which determines the impact on the network in case of failure, in terms of packet loss and recovery time. Having mathematical formulated these components, experimental results demonstrate the benefits of the utilization of the NPD, when used to enhance some current QoS routing algorithms in order to offer a certain degree of protection

Relevância:

10.00% 10.00%

Publicador:

Resumo:

One of the most effective techniques offering QoS routing is minimum interference routing. However, it is complex in terms of computation time and is not oriented toward improving the network protection level. In order to include better levels of protection, new minimum interference routing algorithms are necessary. Minimizing the failure recovery time is also a complex process involving different failure recovery phases. Some of these phases depend completely on correct routing selection, such as minimizing the failure notification time. The level of protection also involves other aspects, such as the amount of resources used. In this case shared backup techniques should be considered. Therefore, minimum interference techniques should also be modified in order to include sharing resources for protection in their objectives. These aspects are reviewed and analyzed in this article, and a new proposal combining minimum interference with fast protection using shared segment backups is introduced. Results show that our proposed method improves both minimization of the request rejection ratio and the percentage of bandwidth allocated to backup paths in networks with low and medium protection requirements

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the B-ISDN there is a provision for four classes of services, all of them supported by a single transport network (the ATM network). Three of these services, the connected oriented (CO) ones, permit connection access control (CAC) but the fourth, the connectionless oriented (CLO) one, does not. Therefore, when CLO service and CO services have to share the same ATM link, a conflict may arise. This is because a bandwidth allocation to obtain maximum statistical gain can damage the contracted ATM quality of service (QOS); and vice versa, in order to guarantee the contracted QOS, the statistical gain have to be sacrificed. The paper presents a performance evaluation study of the influence of the CLO service on a CO service (a circuit emulation service or a variable bit-rate service) when sharing the same link

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper focuses on one of the methods for bandwidth allocation in an ATM network: the convolution approach. The convolution approach permits an accurate study of the system load in statistical terms by accumulated calculations, since probabilistic results of the bandwidth allocation can be obtained. Nevertheless, the convolution approach has a high cost in terms of calculation and storage requirements. This aspect makes real-time calculations difficult, so many authors do not consider this approach. With the aim of reducing the cost we propose to use the multinomial distribution function: the enhanced convolution approach (ECA). This permits direct computation of the associated probabilities of the instantaneous bandwidth requirements and makes a simple deconvolution process possible. The ECA is used in connection acceptance control, and some results are presented

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A survey of MPLS protection methods and their utilization in combination with online routing methods is presented in this article. Usually, fault management methods pre-establish backup paths to recover traffic after a failure. In addition, MPLS allows the creation of different backup types, and hence MPLS is a suitable method to support traffic-engineered networks. In this article, an introduction of several label switch path backup types and their pros and cons are pointed out. The creation of an LSP involves a routing phase, which should include QoS aspects. In a similar way, to achieve a reliable network the LSP backups must also be routed by a QoS routing method. When LSP creation requests arrive one by one (a dynamic network scenario), online routing methods are applied. The relationship between MPLS fault management and QoS online routing methods is unavoidable, in particular during the creation of LSP backups. Both aspects are discussed in this article. Several ideas on how these actual technologies could be applied together are presented and compared

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, a method for enhancing current QoS routing methods by means of QoS protection is presented. In an MPLS network, the segments (links) to be protected are predefined and an LSP request involves, apart from establishing a working path, creating a specific type of backup path (local, reverse or global). Different QoS parameters, such as network load balancing, resource optimization and minimization of LSP request rejection should be considered. QoS protection is defined as a function of QoS parameters, such as packet loss, restoration time, and resource optimization. A framework to add QoS protection to many of the current QoS routing algorithms is introduced. A backup decision module to select the most suitable protection method is formulated and different case studies are analyzed

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper proposes a multicast implementation based on adaptive routing with anticipated calculation. Three different cost measures for a point-to-multipoint connection: bandwidth cost, connection establishment cost and switching cost can be considered. The application of the method based on pre-evaluated routing tables makes possible the reduction of bandwidth cost and connection establishment cost individually

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present a system for dynamic network resource configuration in environments with bandwidth reservation. The proposed system is completely distributed and automates the mechanisms for adapting the logical network to the offered load. The system is able to manage dynamically a logical network such as a virtual path network in ATM or a label switched path network in MPLS or GMPLS. The system design and implementation is based on a multi-agent system (MAS) which make the decisions of when and how to change a logical path. Despite the lack of a centralised global network view, results show that MAS manages the network resources effectively, reducing the connection blocking probability and, therefore, achieving better utilisation of network resources. We also include details of its architecture and implementation

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The purpose of resource management is the efficient and effective use of network resources, for instance bandwidth. In this article, a connection oriented network scenario is considered, where a certain amount of bandwidth is reserved for each label switch path (LSP), which is a logical path, in a MPLS or GMPLS environment. Assuming there is also some kind of admission control (explicit or implicit), these environments typically provide quality of service (QoS) guarantees. It could happen that some LSPs become busy, thus rejecting connections, while other LSPs may be under-utilised. We propose a distributed lightweight monitoring technique, based on threshold values, the objective of which is to detect congestion when it occurs in an LSP and activate the corresponding alarm which will trigger a dynamic bandwidth reallocation mechanism