365 resources related to Service Protection
- Topics related to Service Protection
- IEEE Organizations related to Service Protection
- Conferences related to Service Protection
- Periodicals related to Service Protection
- Most published Xplore authors for Service Protection
ICC 2021 - IEEE International Conference on Communications
IEEE ICC is one of the two flagship IEEE conferences in the field of communications; Montreal is to host this conference in 2021. Each annual IEEE ICC conference typically attracts approximately 1,500-2,000 attendees, and will present over 1,000 research works over its duration. As well as being an opportunity to share pioneering research ideas and developments, the conference is also an excellent networking and publicity event, giving the opportunity for businesses and clients to link together, and presenting the scope for companies to publicize themselves and their products among the leaders of communications industries from all over the world.
To promote awareness, understanding, advancement and application of ocean engineering and marine technology. This includes all aspects of science, engineering, and technology that address research, development, and operations pertaining to all bodies of water. This includes the creation of new capabilities and technologies from concept design through prototypes, testing, and operational systems to sense, explore, understand, develop, use, and responsibly manage natural resources.
IEEE INFOCOM solicits research papers describing significant and innovative researchcontributions to the field of computer and data communication networks. We invite submissionson a wide range of research topics, spanning both theoretical and systems research.
IEEE Global Communications Conference (GLOBECOM) is one of the IEEE Communications Society’s two flagship conferences dedicated to driving innovation in nearly every aspect of communications. Each year, more than 2,900 scientific researchers and their management submit proposals for program sessions to be held at the annual conference. After extensive peer review, the best of the proposals are selected for the conference program, which includes technical papers, tutorials, workshops and industry sessions designed specifically to advance technologies, systems and infrastructure that are continuing to reshape the world and provide all users with access to an unprecedented spectrum of high-speed, seamless and cost-effective global telecommunications services.
Innovative Smart Grid Technologies
Broad coverage of concepts and methods of the physical and engineering sciences applied in biology and medicine, ranging from formalized mathematical theory through experimental science and technological development to practical clinical applications.
Broadcast technology, including devices, equipment, techniques, and systems related to broadcast technology, including the production, distribution, transmission, and propagation aspects.
IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...
Telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation, including radio; wire; aerial, underground, coaxial, and submarine cables; waveguides, communication satellites, and lasers; in marine, aeronautical, space and fixed station services; repeaters, radio relaying, signal storage, and regeneration; telecommunication error detection and correction; multiplexing and carrier techniques; communication switching systems; data communications; and communication theory. In addition to the above, ...
Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.
11th International Telecommunications Network Strategy and Planning Symposium. NETWORKS 2004,, 2004
Network providers are currently obliged to significantly overprovision their networks in order to ensure satisfactory levels of quality in case of overload. Selective service protection would largely remove this requirement since only a minority of users actually requires such stringent availability guarantees. The paper reports simulation and emulation experiments on two potential selective service protection mechanisms: differentiated services queue management ...
2009 First International Conference on Information Science and Engineering, 2009
The traditional security model, aimed at ensuring privacy and integrity of information, has limitations on special networks such as the electric power information network, which emphasizes the stable operation and cooperation of the electricity service. Then a new idea on protection of network service security is proposed in this paper. Firstly, divide the network service into two parts as processes ...
2017 International Conference on Networking and Network Applications (NaNA), 2017
Telecom networks as supporting infrastructures for cloud services are vulnerable to large-scale failures in network components due to disasters. In such networks, service protection is crucial to minimize the disruptions of service connections caused by disaster failures. In this paper, we consider the optimal backup path provisioning for service connections affected by multiple potential disasters. For a network and a ...
2007 IEEE International Conference on Multimedia and Expo, 2007
Multimedia transmission over the Internet has its quality of service (QoS) requirement. However, denial-of-service (DoS) attacks launch large volumes of traffic and consume network bandwidth, thus degrading the quality of the delivered multimedia service. In this paper, we present a differentiated service protection framework consisting of anomaly traffic detection and resource management. Data mining based anomaly traffic detection is implemented ...
IEEE Transactions on Broadcasting, 2009
Content or service delivered through IPTV is high quality and of high economic value accordingly. As digital technologies progress, illegal copy and redistribution of IPTV content become easier and simpler. Therefore it is required to protect IPTV content or service. In this paper, following the approaches taken by ITU-T IPTV Focus Group, we analyze the security threats and requirements. We ...
Shaping the Future Workforce: Transformative Impacts of Emerging Technologies | IEEE TechEthics Public Forum
2019 ICRA Keynote- Mocap as a Service
Prof. Chee Seng Chan - Intellectual Property Protection for Deep Learning Model
IMS 2010 Special Features: Recognizing Chuck Swift's 52 Years of Service
Keynote Address and Opening Remarks - IEEE AI & Ethics Summit 2016
Zipline - IEEE Spectrum Technology in the Service of Society Award - 2019 IEEE Honors Ceremony
IEEE, IEEE-HKN and Public Service
Teacher In-Service Workshop
2013 IEEE John Von Neumann Medal
Flood or Hurricane Protection?: The New Orleans Levee System and Hurricane Katrina
David G. Green - IEEE Haraden Pratt Award, 2019 IEEE Honors Ceremony
Daniel E. Rivera: The CSS Outreach Program: Providing Community Service - Studio Tech Talks: Sections Congress 2017
Navigating the (Mis)Perceptions of Autonomous Vehicles | IEEE TechEthics Public Forum
Challenges of Big Data on a Global Scale: 2017 Brain Fuel President's Chat
Group on Earth Observations(GEOSS): Applications
Knowledge as a Service Plaform for COVID19 | DSBC 2020
2015 IEEE Honors: IEEE Spectrum Technology in the Service of Society Award
Heuristics for Design for Reliability in Electrical and Electronic Products
Networking in the Cloud Computing Era
Network providers are currently obliged to significantly overprovision their networks in order to ensure satisfactory levels of quality in case of overload. Selective service protection would largely remove this requirement since only a minority of users actually requires such stringent availability guarantees. The paper reports simulation and emulation experiments on two potential selective service protection mechanisms: differentiated services queue management and implicit admission control. Results confirm that while both afford adequate protection to premium traffic, admission control achieves greater network efficiency and higher quality for the majority of best effort flows.
The traditional security model, aimed at ensuring privacy and integrity of information, has limitations on special networks such as the electric power information network, which emphasizes the stable operation and cooperation of the electricity service. Then a new idea on protection of network service security is proposed in this paper. Firstly, divide the network service into two parts as processes and data with security identifiers given respectively. The non-alterability of implementation logic in network service holds to ensure the continuous and stable operation of the service. Then the licensed access to data is implemented by comparison of the security identifiers of processes and data. In the end, a new information security model based on the network service protection is established, followed with the security features and possible implementation.
Telecom networks as supporting infrastructures for cloud services are vulnerable to large-scale failures in network components due to disasters. In such networks, service protection is crucial to minimize the disruptions of service connections caused by disaster failures. In this paper, we consider the optimal backup path provisioning for service connections affected by multiple potential disasters. For a network and a given set of service connections, we first use probabilistic region failure model to determine the failure probability of a path for service connections in the network with the consideration of multiple potential disasters. Based on the failure probabilities of paths in the network, we then propose an Integer Linear Program (ILP) to find the optimal backup paths for the disaster-affected service connections, such that the total failure probability of all backup paths is minimized, where the length of backup path is also taken into account. Extensive numerical results are also provided to illustrate the proposed framework for backup path provisioning.
Multimedia transmission over the Internet has its quality of service (QoS) requirement. However, denial-of-service (DoS) attacks launch large volumes of traffic and consume network bandwidth, thus degrading the quality of the delivered multimedia service. In this paper, we present a differentiated service protection framework consisting of anomaly traffic detection and resource management. Data mining based anomaly traffic detection is implemented at the host; whereas resource management is responsible for the allocation of network resources to the applications. Based on the deviation of the monitored traffic to the normal traffic, differentiated resources are allocated to the traffic. When suspicious traffic is detected, multimedia transmission reacts proactively via adjusting the transmission rate, which can avoid possible packet loss resulting from DoS bandwidth consumption, and thus provide better QoS. The impact of the traffic anomalies on the legitimate services can be mitigated, and the legitimate services can be protected. Simulation results show that better PSNR can be achieved for multimedia transmission during an attack in our proposed framework.
Content or service delivered through IPTV is high quality and of high economic value accordingly. As digital technologies progress, illegal copy and redistribution of IPTV content become easier and simpler. Therefore it is required to protect IPTV content or service. In this paper, following the approaches taken by ITU-T IPTV Focus Group, we analyze the security threats and requirements. We also discuss related issues and solutions for IPTV. Specially, interoperability issues among different content and service protection systems are addressed.
High reliability is one of the main challenges that the Ethernet technology achieves the request of telecom standard. This paper introduces two Ethernet protection mechanisms: MSP and UPSR which are commonly used by the MSTP network, and points out the limitations of the two protection mechanisms, combined with the advantages of the two protection mechanisms, we advance a new method that across use MSP and UPSR protection in SDH ring network which were composed by MSTP. In the testing of 2.5G MSTP network equipment, it proves that the method is better than a single protection in the protection switching and restoration effective.
The evolution of telecommunications transmission technology from analog and metallic cables to digital and optical fiber, coupled with new service demands, has caused network protection strategies to change their focus. The way in which BT (British Telecom) has addressed this problem is examined and future SONET and PON options are considered. The discussion is supported by computed path availability characteristics for a range of equipment, plant, and topology options. It is noted that network protection is not a static problem. With each new transmission technology the key sensitivity points have migrated from the line system and cable to the multiplexer and terminal equipment. Passive optical networks look set to offer the ultimate path diversity protection. In the BT network it is the local/access networks that offer the most difficult environment, with true path diversity being hard to achieve due to the inherent tree and branch topology of the ducts. In contrast, long and medium-haul networks are more fully meshed and well adapted to triangulation and diversity.<<ETX>>
This paper describes security problems in communication between DNS service and its clients. It describes the use of new technologies that provide increased safety in terms of communication, and their application to a specific case. The paper is based on the experiences gained during the implementation of security solutions in CPU Ltd., specifically the section relating to the protection of DNS service from abuse. This paper will describe some practical solutions that have been implemented.
The major requirement for the British Telecom ASDSPN system is to improve the availability of 140 Mbit/s digital transmission paths over and above that which is possible using manual procedures. The authors report on the final design and implementation of a first generation system for automatic network protection, recording departures from the original concept and discuss how the experience gained applies, in general terms, to network management. It will be appreciated that the operational experiences, gained on BT's DTN, will apply to future networks such as the synchronous digital hierarchy (SDH).<<ETX>>
With a focus on providing a higher quality of service (QoS), while minimising Capital Expenditure (CAPEX) and Operating Expenses (OPEX), EDP Distribuição (EDPD) developed a programme to optimise its current protection asset base that spans along several generations and technologies, and, consequently, with different levels of protection functions. This programme consisted of an exhaustive revision of all medium-voltage (MV) protection function settings, comprising a total of 484 substations and switching stations, and over 5100 feeders within the entire mainland Portugal distribution grid. The main goals were to ensure protection relays coordination, guarantee sensitivity for electrically distant short-circuits and minimise voltage dips duration. Firstly, EDP's Protection and Automation Department used DPlan to conduct systematic short circuit and protection studies. To optimise this process, reducing man-hours needed, EDPD and AmberTREE worked together to develop improvements within the short-circuit and reporting modules. With the newly optimised protection settings, EDPD advanced toward in-field implementation, resulting in more than 6600 protection function changes, preventing 190 potential coordination failures and reducing the voltage dips duration in 1197 MV feeders. EDPD expects to improve significantly QoS and reduce customer complaints regarding voltage dips and short interruptions by using the existing asset base, while keeping the costs low.
This recommended practice provides guidance for the design of the dc auxiliary power systems for nuclear and non-nuclear power generating stations. The components of the dc auxiliary power system addressed by this recommended practice include lead-acid storage batteries, static battery chargers, and distribution equipment. Guidance for selecting the quantity and types of equipment, the equipment ratings, interconnections, instrumentation, control, and ...
The project defines a standard for high-speed (>100 Mbps at the physical layer) communication devices via electric power lines, so-called broadband over power line (BPL) devices. This standard uses transmission frequencies below 100 MHz. It is usable by all classes of BPL devices, including BPL devices used for the first-mile/last-mile connection (<1500 m to the premise) to broadband services as ...
Insert the following text and bullets immediately after bullet z re-lettering as needed: This standard specifies protocols, procedures, and managed objects to allow support of provisioning systems that explicitly select traffic engineered paths within Provider Backbone Bridged Networks by allowing a network operator to disable unknown destination address forwarding, source address learning and spanning tree protocols for administratively selected VLAN ...
This standard applies to surge protective devices designed for application on the low-voltage supply mains (1000 V rms and less, frequency between 48 and 62 Hz) and intended to be connected at locations between, and including, the secondary terminals of the distribution transformer and the line side of the service entrance panel. Such surge protective devices are also known as ...