NETWORK MONITORING, MANAGEMENT AND ENHANCEMENT USING VPN
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 5
Abstract
In previous years, A Method fail for increasing opportunities created by devoted in Network monitoring and management. To overcome this type of situation we introduce some Tools and macros to improve the performance.We can use the tool M2000 for monitoring of alarms and calculate the network availability with the help of outage and number of sites. If the alarms are not coming then we raise trouble ticket (TT) for missing alarms. There are several optimization tools for improving KPI (Key Performance Indicator).KPI depends upon several things such as Call Setup Success Rate (CSSR), Answer to seizure to seizure ratio (ASR), Paging Success Rate (PSR). The value of KPI determines the performance and availability of network and is agreed with the customer (operator). To improve the KPI firstly PM team sends the reports to RF team. If the RF team validates the reports then it will be circulated to customers of the project. If the RF team found any problem then they contact to Technical Assistance Centre(TAC). Circle team needs the permission of Circle head for any critical activity such as LAC(location area code) updation, site migration etc. We also calculated the number of VLR(Visitor Location Register), MOU(Minutes of Usage) in a day, BHCA(Busy Hour Call Attempt, number of incoming and outgoing sms and network traffic also.
Authors and Affiliations
Archana Verma , Dr. BalKishan , Rishabh Jain
Real Time Data Acquisition and Home Parameters Monitoring using LabVIEW
Home automation refers to a system that is used to control devices around the home. These devices can include doors, lights, surveillance systems, and consumer electronics. A smart home automation system has been develop...
A SURVEY ON CLOUD DATA SECURITY USING ENCRYPTIOIN TECHNIQUE
Cloud computing is an emerging computing paradigm in which resources of the computing infrastructures are provided as services of the internet. It allows consumers and business to use application without installation a...
QUERY PLANNING FOR CONTINUOUS AGGREGATION QUERIES USING DATA AGGREGATORS
Continuous aggregation queries are used to monitor the changes in data with time varying for online decision making. For contin uous queries low cost and scalable technique s used a network of aggregators. I...
DDS architecture for digital frequency generation
Direct digital synthesizers (DDS) are important components in many digital communication systems[4].DDSs are now available as integrated circuits and their output waveforms up to hundreds of megahertz. Direct digit...
Technologies of Cloud Computing - Architecture Concepts based on Security and its Challenges
Cloud computing is becoming a powerful network architecture to perform large-scale and complex computing. we present a survey of cloud computing, highlighting its key concepts, architectural principles, state-of-...