DOI QR코드

DOI QR Code

Basic System Design in the PBNM Scheme for Multiple Domains as Cyber Physical System Using Data Science and AI

  • 투고 : 2023.11.05
  • 발행 : 2023.11.30

초록

In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, basic system design for PBNM scheme for multi-domain management utilizing data science and AI is proposed.

키워드

과제정보

This work was supported by the research grant by Support Center for Advanced Telecommunications Technology Research, Foundation (SCAT). We express our gratitude.

참고문헌

  1. V. CERF and E. KAHN, "A Protocol for Packet Network Interconnection," IEEE Trans. on Commn, vol.COM-22, May 1974, pp.637-648. https://doi.org/10.1109/TCOM.1974.1092259
  2. R. Yavatkar, D. Pendarakis and R. Guerin, "A Framework for Policy-based Admission Control, " IETF RFC 2753, 2000.
  3. B. Moore at el., "Policy Core Information Model -- Version 1 Specification, " IETF RFC 3060, 2001.
  4. B. Moore., "Policy Core Information Model (PCIM) Extensions, " IETF 3460, 2003.
  5. J. Strassner, B. Moore, R. Moats, E. Ellesson, " Policy Core Lightweight Directory Access Protocol (LDAP) Schema," IETF RFC 3703, 2004.
  6. D. Durham at el., "The COPS (Common Open Policy Service) Protocol, " IETF RFC 2748, 2000.
  7. S. Herzog at el., "COPS usage for RSVP," IETF RFC 2749, 2000.
  8. K. Chan et al., "COPS Usage for Policy Provisioning (COPS-PR)," IETF RFC 3084, 2001.
  9. CIM Core Model V2.5 LDAP Mapping Specification, 2002.
  10. M. Wahl, T. Howes, S.Kille, "Lightweight Directory Access Protocol (v3)," IETF RFC 2251, 1997.
  11. CIM Schema: Version 2.30.0, 2011.
  12. ETSI ES 282 003: Telecoms and Internet converged Services and protocols for Advanced Network (TISPAN); Resource and Admission Control Subsystem (RACS); Functional Architecture, June 2006.
  13. ETSI ETSI ES 283 026: Telecommunications and Internet Converged Services and Protocols for Advanced Networking (TISPAN); Resource and Admission Control; Protocol for QoS reservation information exchange between the Service Policy Decision Function (SPDF) and the Access-Resource and Admission Control Function (A-RACF) in the Resource and Protocol specification, April 2006.
  14. K. Odagiri, R. Yaegashi,M. Tadauchi, and N. Ishii, "Secure DACS Scheme, "Journal of Network and Computer Applications," Elsevier, Vol.31, Issue 4, 2008, pp.851-861, November. https://doi.org/10.1016/j.jnca.2007.04.002
  15. K. Odagiri, S. Shimizu,M. Takizawa and N. Ishii, "Theoretical Suggestion of Policy-Based Wide Area Network Management System (wDACS system part-I)," International Journal of Networked and Distributed Computing (IJNDC), Vol.1, No.4, November 2013, pp.260-269. https://doi.org/10.2991/ijndc.2013.1.4.7
  16. K. Odagiri,S. Shimizu, N. Ishii, M. Takizawa, "Suggestion of the Cloud Type Virtual Policy Based Network Management Scheme for the Common Use between Plural Organizations," Proc of Int. Conf. on International Conference on Network-Based Information Systems (NBiS-2015),pp.180-186,Septmber, 2015