Schemes for Fault Identi cation inCommunication
نویسنده
چکیده
| A single fault in a large communication network may result in a large number of fault indications (alarms) which makes the isolation of the primary source of failure a diicult task. The problem becomes worse in cases of multiple faults. In this paper we present an approach for modelling the problem of fault diagnosis. We propose a graph based network model which takes into account the dependencies between the diierent objects in the telecom-munication environment and a novel approach to estimate the domain of an alarm. Based on that model we design an algorithm for fault diagnosis and analyze its performance with respect to the accuracy of the fault hypotheses it provides. We also propose and analyze a fault diagnosis algorithm which is suitable for systems for which an independent failure assumption is valid. Finally, we examine the importance of the information of dependency between objects for the fault diagnosis process.
منابع مشابه
Fault Identi cation in Computer Networks: A Review and a New Approach
As computer networks increase in size, heterogeneity, complexity and pervasiveness, e ective management of such networks simultaneously becomes more important and more di cult. This paper explores in detail one aspect of network management, fault identi cation. Fault identi cation is the process whereby the existence and nature of network faults are ascertained. Characteristics of the fault ide...
متن کاملSECURING INTERPRETABILITY OF FUZZY MODELS FOR MODELING NONLINEAR MIMO SYSTEMS USING A HYBRID OF EVOLUTIONARY ALGORITHMS
In this study, a Multi-Objective Genetic Algorithm (MOGA) is utilized to extract interpretable and compact fuzzy rule bases for modeling nonlinear Multi-input Multi-output (MIMO) systems. In the process of non- linear system identi cation, structure selection, parameter estimation, model performance and model validation are important objectives. Furthermore, se- curing low-level and high-level ...
متن کاملLimiting the Visible Space Visual Secret Sharing Schemes and Their Application to Human Identification
In this paper, we propose new uses of visual secret sharing schemes. That is, we use visual secret sharing schemes to limit the space from which one can see the decoded image. (We call this scheme limiting the visible space visual secret sharing schemes (LVSVSS).) We investigate the visibility of the decoded image when the viewpoint is changed, and categorize the space where the viewpoint belon...
متن کاملSymbolic Functional Vector Generation for VHDL Speci cations
Veri cation of the functional correctness of VHDL speci cations is one of the primary and most time consuming task of design. However, it must necessarily be an incomplete task since it is impossible to completely exercise the speci cation by exhaustively applying all input patterns. The paper aims at presenting a two-step strategy based on symbolic analysis of the VHDL speci cation, using a be...
متن کاملEscApe: Diagonal Fault Analysis of APE
This work presents an adaptation of the classical diagonal fault attack on APE which is a member of the PRIMATEs family of authenticated encryption (AE) schemes. APE is the rst nonce misuseresistant permutation based AE scheme and is one of the submissions to the CAESAR competition. In this work we showcase how nonce reuse can be misused in the context of di erential fault analysis of on-line a...
متن کامل