Skip to main content

Artificial Intelligence in Communications Networks Monitoring, Diagnosis and Operations

  • Chapter

Part of the book series: Applied Information Technology ((AITE))

Abstract

Network “reliability”, more properly specified via its availability (percentage of time the network is available to its users) and its integrity (probability that data transmitted is not lost or damaged), is essential for all users. Moreover one should never forget that the “reliability” performance may, under some distributed applications, be more important than the general network capabilities.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. W. J. Garner, Bit error probabilities relates to data link S/N, Microwaves, Vol 17, no 11, 101–105, (November 1978).

    Google Scholar 

  2. L. F. Pau, Specification of an automated test system vs. optimum maintenance policy and equipment reliability, Proc. 1979 Ann. reliability and maintainability symposium, Washington DC, 23-25, IEEE Cat. 79 CH 1429 — OR, 147-152 (January 1979).

    Google Scholar 

  3. L. F. Pau, Failure diagnosis and performance, monitoring, Marcel Dekker, Publ., New York, (1981).

    MATH  Google Scholar 

  4. W. Boghdady, Flow control with a failure detection and localization capability in high data rate transmission networks, T. R. Enst, Dept. Electronics, E.N.S. Télécommunications, Paris, (June 1979).

    Google Scholar 

  5. A. Chatterjee, N. D. Georganao, Analysis of a packet switched network with end-to-end congestion control and random routing; IEEE trans. Comm., Vol COM — 25. no 12, 1485–1489 (December 1977).

    Article  Google Scholar 

  6. M. Meri, A reliable control protocol for high-speed packet transmission, IEEE Trans. Comm., Vol COM — 25, no 10, 1203–1209 (October 1977).

    Article  Google Scholar 

  7. J. Labetoulle, G. Pujolle, Modelling and performance evaluation of the HDLC protocol, Int. Symp. on flow control in data networks, IRIA, Rocquencourt, Paper 8.2 (February 1979).

    Google Scholar 

  8. W. W. Chu, Optimal message block size for computer communications with error detection and retransmission strategies, IEEE Trans. Comm., Vol COM-22, No 10, 1516–1524 (October 1974).

    Article  Google Scholar 

  9. M. Robin, Contrôle optimal de files d’attente, T. R. 117, IRIA, Rocquencourt, (May 1975).

    Google Scholar 

  10. T. Collings, C. Stroneman, The M/M/∞ queue with varying arrival and departure rates, Operations Research, Vol 24, no 4, 760–773 (July–August 1976).

    Article  MathSciNet  MATH  Google Scholar 

  11. J, Labetoulle, G. Pujolle, Modelling of packet switching networks with finite buffer size at each node, T. R. 239. IRIA, Rocquencourt, (June 1977).

    Google Scholar 

  12. M. Dal Cin, Performance evaluation of self-diagnosing multiprocessing systems, Proc. FTCS-8 Toulouse, IEEE Cat 78.CH 1286 — 4C, 59-64 (June 1978).

    Google Scholar 

  13. B. Goldman, Deablock detection in computer networks, AD — A — 047025, p. 180 (1977).

    Google Scholar 

  14. D. Towsley, Error detection and retransmission strategies in computer communication networks, Proc. 1978 COMPCON Fall, Washington, IEEE Cat 78 CH 1388 — 8C, 12-18 (September 1978).

    Google Scholar 

  15. A. Segall, P. M. Merlin, R. G. Gallager, A recoverable protocol for loop-free distribution routing, 1978 Int. Conf. Communications, Toronto, IEEE Cat 78 CH 1350 — 8 CSCB, Paper 3.5 (June 1978).

    Google Scholar 

  16. V. Baek Iversen, Review of traffic measurement methods and application fields of measurement results, T. R. 18-78, IMSOR, Technical Univ. of Denmark, Lyngby, (1978).

    Google Scholar 

  17. G. Gardarin, B. Piot, Détection des interférences er évaluation de leur fréquence, IRIA Grant 77.007, Inst. Programmation, Univ. Paris (June 1978).

    Google Scholar 

  18. J. Clavier, N. Niquil, G. Coffinet, F. Behr, Théorie et technique de la transmission de donnees, Masson, Paris, (2nd Edition) (1977).

    Google Scholar 

  19. R. van Slyke, H. Frank, Network reliability analysis, Network, Vol 1, (1972).

    Google Scholar 

  20. L. Fratta, U. Montanari, Decomposition techniques for evaluation network reliability, Int. Teletraffic congress — 8, Melbourne (1976).

    Google Scholar 

  21. L. Svoboda, Performance problems in distributed systems, INFOR, Vol 18, No 1, 21–40 (February 1980).

    Google Scholar 

  22. A. D. Friedman, L. Simoncini, System level fault diagnosis, IEEE Computer, 47-53 (March 1980).

    Google Scholar 

  23. R. Freiburger, Statistical computer performance evaluation, Academic Press, NY, (1971).

    Google Scholar 

  24. L. F. Pau, W. Boghdady, A. Bousquet, Fault detection capability implications for flow control in data communications networks, Proc. AUTOTESTCON 1979, Mineapolis, Publ. by IEEE, (October 1979).

    Google Scholar 

  25. E. Rasel, Generating error correction codes, Systems International, 32-36 (July 1979).

    Google Scholar 

  26. L. Meeks, Characterization of instrumentation tape signal dropouts for approapriate error correction strategies in high density degital recording systems, Honeywell, Test Instruments Div., PoBox 5227, Denver, CO 80217.

    Google Scholar 

  27. R. Johannesson, E. Paaske, Further results on binary convolutional codes with an optimum distance profile, IEEE Trans. Inform. Theory, Vol IT — 24, no 2, 264–268 (March 1978).

    Article  MATH  Google Scholar 

  28. E. Paaske, Short binary convolutional codes with maximal distance for rates 2/3 and 3/4, IEEE Trans. Inform. Theory, Vol IT — 20, no 5, 683–689 (September 1974).

    Article  MathSciNet  MATH  Google Scholar 

  29. G. F. Erbrecht, Automated field measurement system for T-l characterization, ICC’80, IEEE Cat. 80 CH 1505 — 6 CSCB.

    Google Scholar 

  30. T. C. Knapp, Smart — 1: a systematic monitor and remoter of T-information, ICC’80, See {29}.

    Google Scholar 

  31. D. W. Jurling, T-carrior performance, ICC’80, See {29}.

    Google Scholar 

  32. S. Takenaka et al, Bit error rate monitor for 4 phase PSK system, ICC’80, See {29}.

    Google Scholar 

  33. Command, Control and Communications, Aviation Week and Space Technology, (December 1985).

    Google Scholar 

  34. A. Barr, E. Feigenbaum, (Ed.), Handbook of Artificial Intelligence, William Kaufman, San Francisco (1982).

    Google Scholar 

  35. M. Athans, The expert team of experts approach to command and control organizations, Control Systems Magazine, (September 1982).

    Google Scholar 

  36. J. Froscher, R. Grishman, a linguistically motivated approach to automated analysis of military messages, Proc. 1983 American Artificial Intelligence Conf., Rochester, MI, (1983).

    Google Scholar 

  37. Expert systems in government, Proc. IEEE 85 CH-2225-1, Washington, IEEE Cat. 85 CH-2225-1 (October 1985).

    Google Scholar 

  38. L. F. Pau, J. M. Negret, Intelligent contents based message routing in communications networks, Proc Nordic Teletraffic Conference, Lyngby, Denmark, (August 1986).

    Google Scholar 

  39. L. F. Pau, Data Communications network monitoring for failure diagnosis in the presence of non-digital links, T. R., E.N.S.-Télécommunications-D-80008, Paris, (1980).

    Google Scholar 

  40. L. Kleinrock, Distributed systems, IEEE Computer Magazine, (November 1985).

    Google Scholar 

  41. L. F. Pau, (Ed.), Artificial Intelligence in Economics and Management, North Holland, Amsterdam, (1986).

    Google Scholar 

  42. L. F. Pau, Foilure Diagnosis and Performance Monitoring, Marcel Dekker Publ., NY, (1981).

    Google Scholar 

  43. L. F. Pau, J. M. Negret, SOFTM, a software mmintenance expert system, Internal report, Battelle Memorial Institute, (September 1985).

    Google Scholar 

  44. L. F. Pau, Survey of expert systems for fault detection, test generation and maintenance, Expert Systems J., vol 3, no 2, 100–111 (April 1986).

    Article  Google Scholar 

  45. C. L. Heitmeyer, S. H. Wilson, Military message systems: current status and future directions, IEEE Trans. Communications, Vol COM-28, no 9, (September 1980).

    Google Scholar 

  46. Special issue on artificial intelligence techniques, IEEE J, design and Test of Computers, Vol 2, no 4, (August 1985).

    Google Scholar 

  47. D. E. Bell, L. I. La Padula, Secure Computer Systems, Vol. I–II, MTR 2547, MITRE Corp., Bedford, (November 1973).

    Google Scholar 

  48. L. F. Pau, B. Wafae, A. Bousquet, Fault detection capability implications for flow control in data communication networks, Proc. 1979 IEEE Int. Conf. AUTOTESTCON, Minneapolis, (September 1979).

    Google Scholar 

  49. L. Bole (Ed.), Natural Language, Communication with Computers, Springer Verlag, NY, (1978).

    Google Scholar 

  50. L. F. Pau, An expert system Kernel for the analysis of strategies over time in {41}, 107

    Google Scholar 

  51. L. F. Pau, Fusion of multisensor data in pattern recognition, in J. Kittler, K. S. Fu, L. F. Pau (Ed.), Pattern Recognition Theory and Applications, D. Reidel Publ. Co, Boston (1981).

    Google Scholar 

  52. L. F. Pau, Inference of the structure of economic reasoning from natural language analysis, J. Decision Support Systems, Vol 1, 313–321 (1985).

    Article  Google Scholar 

  53. B. J. Grosz, K. Sparck Jones, B. L. Webber (Ed.), Readings in Natural Language Processing, Morgan Kaufman Publ., Los Altos (CA), (1986).

    Google Scholar 

  54. A. D. Birrell, B. W. Lampson, R. M. Needham, M. D, Schroeder, A global authentification service without global trust, Proc. IEEE Symposium on security and privacy, Oakland, 223-230 (April 1986).

    Google Scholar 

  55. Use of learning algorithms in telephone traffic routing, Automatica, Vol 19, no 5, 495-502.

    Google Scholar 

  56. IEEE Communications Magazine, Vol 24, no 1, 28 (January 1986).

    Google Scholar 

  57. G. Hirst, Semantic Interpretation and the Resolution of Ambiguity, Cambridge Univ. Press (1987).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1989 Springer Science+Business Media New York

About this chapter

Cite this chapter

Pau, L.F. (1989). Artificial Intelligence in Communications Networks Monitoring, Diagnosis and Operations. In: Tzafestas, S.G. (eds) Knowledge-Based System Diagnosis, Supervision, and Control. Applied Information Technology. Springer, Boston, MA. https://doi.org/10.1007/978-1-4899-2471-1_15

Download citation

  • DOI: https://doi.org/10.1007/978-1-4899-2471-1_15

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4899-2473-5

  • Online ISBN: 978-1-4899-2471-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics