Research on Implementation Methods of Wired Access Service Resource Allocation Rules and Technologies

Access service configuration is almost most complicated procedure in service provision process. In past few years, many cases of access service configuration were analyzed, and some factors were found to make rules. These rules could guide the action of configuration to meet the complex needs of cus...

Full description

Saved in:
Bibliographic Details
Main Authors: Jie Yin, Jingjing Bao, Wenjun Shen, Zhiting Peng
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2014-10-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2014.10.021/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529319307870208
author Jie Yin
Jingjing Bao
Wenjun Shen
Zhiting Peng
author_facet Jie Yin
Jingjing Bao
Wenjun Shen
Zhiting Peng
author_sort Jie Yin
collection DOAJ
description Access service configuration is almost most complicated procedure in service provision process. In past few years, many cases of access service configuration were analyzed, and some factors were found to make rules. These rules could guide the action of configuration to meet the complex needs of customers. The rule engine was used to run these rules in resource management system.
format Article
id doaj-art-2f8ed456b8f841edabb341a85f2a0fb6
institution Kabale University
issn 1000-0801
language zho
publishDate 2014-10-01
publisher Beijing Xintong Media Co., Ltd
record_format Article
series Dianxin kexue
spelling doaj-art-2f8ed456b8f841edabb341a85f2a0fb62025-01-15T03:18:49ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012014-10-013014315059619157Research on Implementation Methods of Wired Access Service Resource Allocation Rules and TechnologiesJie YinJingjing BaoWenjun ShenZhiting PengAccess service configuration is almost most complicated procedure in service provision process. In past few years, many cases of access service configuration were analyzed, and some factors were found to make rules. These rules could guide the action of configuration to meet the complex needs of customers. The rule engine was used to run these rules in resource management system.http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2014.10.021/resource allocation ruleOSS domainbehavior patternbehavior rulerule baserule engine
spellingShingle Jie Yin
Jingjing Bao
Wenjun Shen
Zhiting Peng
Research on Implementation Methods of Wired Access Service Resource Allocation Rules and Technologies
Dianxin kexue
resource allocation rule
OSS domain
behavior pattern
behavior rule
rule base
rule engine
title Research on Implementation Methods of Wired Access Service Resource Allocation Rules and Technologies
title_full Research on Implementation Methods of Wired Access Service Resource Allocation Rules and Technologies
title_fullStr Research on Implementation Methods of Wired Access Service Resource Allocation Rules and Technologies
title_full_unstemmed Research on Implementation Methods of Wired Access Service Resource Allocation Rules and Technologies
title_short Research on Implementation Methods of Wired Access Service Resource Allocation Rules and Technologies
title_sort research on implementation methods of wired access service resource allocation rules and technologies
topic resource allocation rule
OSS domain
behavior pattern
behavior rule
rule base
rule engine
url http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2014.10.021/
work_keys_str_mv AT jieyin researchonimplementationmethodsofwiredaccessserviceresourceallocationrulesandtechnologies
AT jingjingbao researchonimplementationmethodsofwiredaccessserviceresourceallocationrulesandtechnologies
AT wenjunshen researchonimplementationmethodsofwiredaccessserviceresourceallocationrulesandtechnologies
AT zhitingpeng researchonimplementationmethodsofwiredaccessserviceresourceallocationrulesandtechnologies