NETWORK MONITORING, MANAGEMENT AND ENHANCEMENT USING VPN
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 5
Abstract
In previous years, A Method fail for increasing opportunities created by devoted in Network monitoring and management. To overcome this type of situation we introduce some Tools and macros to improve the performance.We can use the tool M2000 for monitoring of alarms and calculate the network availability with the help of outage and number of sites. If the alarms are not coming then we raise trouble ticket (TT) for missing alarms. There are several optimization tools for improving KPI (Key Performance Indicator).KPI depends upon several things such as Call Setup Success Rate (CSSR), Answer to seizure to seizure ratio (ASR), Paging Success Rate (PSR). The value of KPI determines the performance and availability of network and is agreed with the customer (operator). To improve the KPI firstly PM team sends the reports to RF team. If the RF team validates the reports then it will be circulated to customers of the project. If the RF team found any problem then they contact to Technical Assistance Centre(TAC). Circle team needs the permission of Circle head for any critical activity such as LAC(location area code) updation, site migration etc. We also calculated the number of VLR(Visitor Location Register), MOU(Minutes of Usage) in a day, BHCA(Busy Hour Call Attempt, number of incoming and outgoing sms and network traffic also.
Authors and Affiliations
Archana Verma , Dr. BalKishan , Rishabh Jain
Image Denoising using Dual-Tree Complex DWT and Double-Density Dual-Tree Complex DWT
Non-stationary signal processing applications use standard non-redundant DWT (Discrete Wavelet Transform) which is very powerful tool. But it suffers from shift sensitivity, absence of phase information, and poor directi...
Optimization of Hamilton Path Tournament Schedule
A Hamilton path tournament design involving n teams and n/2 stadiums, is a round robin schedule on n − 1 days in which each team plays in each stadium at most twice, and the set of games played in each stadium in...
A Survey on the different text data compression techniques
Compression is useful because it helps us to reduce the resources usage, such as data storage space or transmission capacity. Compression methods have a long list. In this paper, we shall discuss only the lossles...
2ACK-Scheme: Routing Misbehavior Detection in MANETs Using OLSR
A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes (hosts) which communicate with each other via wireless links either directly or relying on other nodes such as routers. Due to the dynamic change in t...
An Approach for Storage Security in Cloud Computing- A Survey
The many advantages of cloud computing are increasingly attracting individuals and organizations to outsource their data from local to remote cloud servers. In addition to cloud infrastructure and platform provider...