• Title/Summary/Keyword: IP Policy

Search Result 205, Processing Time 0.028 seconds

Network Management Model for QoS-enabled Internet (QoS 인터넷 망에서의 망관리 모델)

  • 권영미;이극
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.11b
    • /
    • pp.549-552
    • /
    • 2002
  • 복잡하고 거대한 통신망을 효율적으로 구성하고 운용 관리하기 위해 ITU-T에서는 TMN 망관리 국제표준을 정하고 있다. 그러나 TCP/IP 기반의 인터넷 망에서는 TMN보다 간단하게 정의되어 있는 SNMP를 이용해 MIB를 기반으로 망 요소(network element) 제어만을 하고 있다. 인터넷 망에서 멀티미디어 데이터 교환 서비스를 수용하면서, IP 망 설계 초기에 고려하지 않았던 서비스품질(QoS)을 제공하기 위해 IntServ, DiffServ 프로토콜 등을 정의하고 있다. 이렇게 QoS를 제공하기 위한 인터넷 망은 단순한 SNMP 만으로는 관리될 수 없다. 그러나 아직까지 이에 적합한 망관리 모델이 정립되지 못한 상태인 바, 본 논문에서는 정책을 기반(policy-based)으로 하여 QoS 서비스를 위한 자원 할당을 dynamic하게 제공할 수 있도록 하는 QoS 인터넷 망관리 모델을 제안한다. 이 모델은 TMN의 관리계층 구조에 맞도록 구성되어 있다.

  • PDF

The Effects of CEO's Leadership on the Organiational Effectiveness (CEO의 리더십이 조직유효성에 미치는 영향)

  • Shin, Yong-Se;Kim, Sun-Bae
    • Journal of Digital Convergence
    • /
    • v.11 no.4
    • /
    • pp.165-175
    • /
    • 2013
  • This study identifies the empirical effects of CEO's transactional leadership & transformational leadership(LEADERSHIP) on organizational effectiveness(OE) in the consulting industry. Next, this study identifies that if there are any differences on understanding on LEADERSHIP and OE depending on consulting organizations with a propensity for individualism. The analysis of the data shows LEADERSHIP is positively related to OE. Finally it is shown in this study that the consulting organizations with a high individualistic propensity(IP) show perception differences on charismatic leadership, compared to those with a low IP.

A Study on The Performance Evaluation of Differentiated Service Using Time Sliding Window with 3 Color Marking (3 색 표식을 갖는 타임 슬라이딩 윈도우를 사용하는 차등화 서비스의 성능평가 연구)

  • Chun, Sang-Hun
    • 전자공학회논문지 IE
    • /
    • v.48 no.3
    • /
    • pp.16-19
    • /
    • 2011
  • Differentiated Service is an IP QoS ensuring method based on packet marking that allows packets to be prioritized according to user requirements. During the time of congestion, more low priority packets are dropped than high priority packets. Different policy models are used to determine how to mark the packet. This paper investigated the performance of Differentiated Service using time sliding window with 3 color marking (TSW3CM). Simulation results using NS-2 showed that Differentiated Service can provide the quality of service requirements.

New Approach to Verification in Security Protocol by using Fuzzy Algorithm (퍼지 알고리즘을 이용한 보안 프로토콜 검증)

  • 신승중;박인규
    • Proceedings of the Korea Database Society Conference
    • /
    • 2000.11a
    • /
    • pp.343-349
    • /
    • 2000
  • The objective of this paper was to cope with the verification of the message transfer protocol that integrates the electronic signature and the distribution and authentication of public key in TCP/IP using Choquet fuzzy integral compapred with fuzzy integral. They were classified into the security technology, the security policy, the electronic document processing, the electronic document transportation and the encryption and decryption keys in its function. The measures of items of the message security protocol were produced for the verification of the implemented document in every function.

  • PDF

The Intruder Traceback technology using If Encapsulation on Policy- based Network Security Architecture (정책기반 네트워크 보안구조에서 IP Encapsulation을 이 용한 실시간 침입자 추적 기술)

  • Lee, Kwang-Hee;An, Gae-Il;Jang, Jong-Su;Choi, Hun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04d
    • /
    • pp.524-526
    • /
    • 2003
  • 본 논문에서는 고도로 지능화고 복잡한 공격으로부터 광대역 네트워크를 보호하기 위한 정책기반 네트워크 보안구조와 능동적 네트워크 보안 기술의 핵심인 실시간 침입자 추적 기능의 효율적인 통합 방안을 제시하기 위해 필요한 구성요소를 정의하고 이들간의 통신 프로토콜을 확장하여 정책기반 네트워크 보안구조에 적합한 실시간 침입자 추적 기술로서 IP Encapsulation을 이용한 실시간 침입자 추적 알고리즘을 제시한다.

  • PDF

The Verification in Security Protocol for Security Continuity Management (정보보호의 연속성관리를 위한 보안프로토콜 검증)

  • Shin, Seung-Jung;Song, Young-Gyu
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04a
    • /
    • pp.445-448
    • /
    • 2001
  • The objective of this paper was to cope with the verification of the message transfer protocol that integrates the electronic signature and the distribution and authentication of public key in TCP/IP using security continuity management Choquet fuzzy integral compared with fuzzy integral. They were classified into the security technology, the security policy, the electronic document processing, the electronic document transportation and the encryption and decryption keys in its function. The measures of items of the message security protocol were produced for the verification of the implemented document in every function.

  • PDF

Design and Performance Analysis of EU Directory Service (ENUM 디렉터리 서비스 설계 및 성능 평가)

  • 이혜원;윤미연;신용태;신성우;송관우
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.4
    • /
    • pp.559-571
    • /
    • 2003
  • ENUM(tElephon NUmbering Mapping) is protocol that brings convergence between PSTN Networks and IP Networks using a unique worldwide E.164 telephone number as an identifier between different communication infrastructure. The mechanism provides a bridge between two completely different environments with E.164 number; IP based application services used in PSTN networks, and PSTN based application services used in IP networks. We propose a new way to organize and handle ENUM Tier 2 name servers to improve performance at the name resolution process in ENUM based application service. We build an ENUM based network model when NAPTR(Naming Authority PoinTeR) resource record is registered and managed by area code at the initial registration step. ENUM promises convenience and flexibility to both PSTN and IP users, yet there is no evidence how much patience is required when users decide to use ENUM instead of non-ENUM based applications. We have estimated ENUM response time, and proved how to improve performance up to 3 times when resources are managed by the proposed mechanism. The proposition of this thesis favorably influences users and helps to establish the policy for Tier 2 name server management.

A Study on Patent Indexes for Characteristics Analysis of IP Portfolios (IP포트폴리오의 특성분석을 위한 특허지표 개발에 대한 연구)

  • Yoon, Jeong-Yoen;Ryu, Tae-Kyu;Yoon, Jang-Hyeok
    • Journal of Information Management
    • /
    • v.43 no.2
    • /
    • pp.67-83
    • /
    • 2012
  • Patents are the sources reflecting technology development by research and development(R&D) as well as the tools to secure economic benefits in the market, so using patent information is crucial for decision making processes in formulating technology development strategies. Intellectual property(IP) portfolios including a set of patents related to products and individual technologies are the basic unit that has the economic meaning in making national policies and technology strategies. Therefore, this research develops a total of 69 measures to identify the collective characteristics for IP portfolios("characteristics index"), by incorporating the patent indexes that have been widely used and the patent indexes that developed recently, and applying the concepts to patent analysis that have been used in interdisciplinary studies including economics and library and information science. The results of this research produced a characteristics index manual which helps experts to identify characteristics of technological innovation systems from various dimensions. We expect that the characteristics indexes can be used as a supportive tool for comparative analysis among IP portfolios in the technology policy making process.

Performance Evaluation for TCP/IP over UBR (UBR 위에서 동작하는 TCP/IP 성능 평가)

  • Ahn, Sung-Soo;Yu, Hyung-Sik;Whang, Sun-Ho;Lee, Jun-Won;Kim, Sung-Un
    • Journal of KIISE:Information Networking
    • /
    • v.27 no.1
    • /
    • pp.76-87
    • /
    • 2000
  • ATM is a key technology of integration of multimedia service. Recently, Many study have been concentrated on performance testing for evaluation network performance are stronger everyday. The performance testing is on evaluation of maximal throughput of network by measuring and analyzing of various performance parameters. There are two ways to test ATM network performance; one is using QoS in cell level on the point of network's view, and the other is using metric in frame level in the point of user's view. And, the standardization process is also under way. In this paper, we derive a performance requirement of TCP in TCP/IP data transmission over ATM UBR service. By applying the derived requirements to ATM and packet networks, we evaluate the performance of TCP over UBR based on the result of our simulations. Therefore, we evaluate the result of simulation and find degradation of network throughput by interaction between TCP congestion control and ATM cell drop policy. So we suggest the accelerated Vegas that modify traditional TCP Vegas in congestion control mechanism for batter network throughput.

  • PDF

Distributed Virtual Topology Adaptation Method to Support IP Traffic in WDM Mesh Networks (WDM Mesh 네트워크에서 IP 트래픽을 수용하기 위한 분산형 가상토폴로지 적응 기법)

  • Kim, Eal-Lae;Lee, Sung-Kuen;Lee, Yong-Won;Chang, Sun-Hyok;Lee, Myung-Moon;Park, Jin-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.1B
    • /
    • pp.1-10
    • /
    • 2007
  • We propose a new approach to accommodate bidirectional asymmetric traffic demands as well as unexpected dynamic internet traffic variation in the WDM mesh network by using optical networking technologies. In the proposed scheme, an intermediate node determines the optical path based on the switching statistics of IP router of the node which characterizes the Internet traffic variation, which in effect provides a dynamic and distributed traffic control over the network. It is expected to reduce the efficiency deterioration of RWA(Routing and Wavelength Assignment) due to the real-time variation of Internet traffic so that expandability and flexibility of the network can be enhanced. In this paper, we describe a methodology for traffic behavior analysis at a node, and the decision policy of the establishment/release of optical path. In addition, we evaluate the performance of the proposed scheme through the computer simulations.