Research on Implementation Methods of Wired Access Service Resource Allocation Rules and Technologies
Access service configuration is almost most complicated procedure in service provision process. In past few years, many cases of access service configuration were analyzed, and some factors were found to make rules. These rules could guide the action of configuration to meet the complex needs of cus...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2014-10-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2014.10.021/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841529319307870208 |
---|---|
author | Jie Yin Jingjing Bao Wenjun Shen Zhiting Peng |
author_facet | Jie Yin Jingjing Bao Wenjun Shen Zhiting Peng |
author_sort | Jie Yin |
collection | DOAJ |
description | Access service configuration is almost most complicated procedure in service provision process. In past few years, many cases of access service configuration were analyzed, and some factors were found to make rules. These rules could guide the action of configuration to meet the complex needs of customers. The rule engine was used to run these rules in resource management system. |
format | Article |
id | doaj-art-2f8ed456b8f841edabb341a85f2a0fb6 |
institution | Kabale University |
issn | 1000-0801 |
language | zho |
publishDate | 2014-10-01 |
publisher | Beijing Xintong Media Co., Ltd |
record_format | Article |
series | Dianxin kexue |
spelling | doaj-art-2f8ed456b8f841edabb341a85f2a0fb62025-01-15T03:18:49ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012014-10-013014315059619157Research on Implementation Methods of Wired Access Service Resource Allocation Rules and TechnologiesJie YinJingjing BaoWenjun ShenZhiting PengAccess service configuration is almost most complicated procedure in service provision process. In past few years, many cases of access service configuration were analyzed, and some factors were found to make rules. These rules could guide the action of configuration to meet the complex needs of customers. The rule engine was used to run these rules in resource management system.http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2014.10.021/resource allocation ruleOSS domainbehavior patternbehavior rulerule baserule engine |
spellingShingle | Jie Yin Jingjing Bao Wenjun Shen Zhiting Peng Research on Implementation Methods of Wired Access Service Resource Allocation Rules and Technologies Dianxin kexue resource allocation rule OSS domain behavior pattern behavior rule rule base rule engine |
title | Research on Implementation Methods of Wired Access Service Resource Allocation Rules and Technologies |
title_full | Research on Implementation Methods of Wired Access Service Resource Allocation Rules and Technologies |
title_fullStr | Research on Implementation Methods of Wired Access Service Resource Allocation Rules and Technologies |
title_full_unstemmed | Research on Implementation Methods of Wired Access Service Resource Allocation Rules and Technologies |
title_short | Research on Implementation Methods of Wired Access Service Resource Allocation Rules and Technologies |
title_sort | research on implementation methods of wired access service resource allocation rules and technologies |
topic | resource allocation rule OSS domain behavior pattern behavior rule rule base rule engine |
url | http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2014.10.021/ |
work_keys_str_mv | AT jieyin researchonimplementationmethodsofwiredaccessserviceresourceallocationrulesandtechnologies AT jingjingbao researchonimplementationmethodsofwiredaccessserviceresourceallocationrulesandtechnologies AT wenjunshen researchonimplementationmethodsofwiredaccessserviceresourceallocationrulesandtechnologies AT zhitingpeng researchonimplementationmethodsofwiredaccessserviceresourceallocationrulesandtechnologies |