• Title/Summary/Keyword: Policy-Based Network Management

Search Result 614, Processing Time 0.029 seconds

Policy-based Resource Management for QoS Support in Cellular Networks (셀룰라 시스템에서 서비스품질(QoS)을 보장하기 위한 정책기반 자원관리 기법 연구)

  • Choi Sung-Gu;Jun Kyung-Koo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.4B
    • /
    • pp.344-348
    • /
    • 2006
  • This paper proposes a QoS policy for cellular networks which support the policy based network management scheme. The policy exploits the existing underlying DiffServ mechanism and the priority-based packet scheduler in order to provide the packets with different handling priority depending on their belonging traffic classes. The simulation results reveals the effectiveness of the proposed policy under the network congestion; it shows that the goodput of the real-time traffic is not affected at all in spite of the surge of the non real-time traffic.

A system dynamics study on the Trust and Cooperation in the Policy Implementation Network (정책집행 네트워크에서의 신뢰와 협력생성에 관한 시스템다이내믹스 연구)

  • 박성진;맹보학
    • Korean System Dynamics Review
    • /
    • v.1 no.2
    • /
    • pp.61-89
    • /
    • 2000
  • The purpose of this study is first, to find out what factors affect the cooperation and trust within the functions in the policy implementation network and in what mechanism these factors interact, second to investigate the whys to manage trust and cooperation successfully in the dynamic situation such as the network setting. For these purpose, this study reviews the concept and characteristics of policy implementation organizations, second, extracts the various factors affecting trust and cooperation in the network situation, third applies and analyzes the relationship among factors to system dynamics model based on the game theory. The results of this study could be summarized as follows: It was found that the utility change within the participants by persuasion & mutual understanding and change of rule would be leading to success in policy implementation network. Also bureaucratic management such as power enforcement does not have any good impact in the managing network. In this study, system simulation method tried to analyze the hypothesis. Quantitative and case analyses were not accompanied and analysis was limited to two-person game theory. So there is some doubt this results could be generalized to actual situation which is N-person game.

  • PDF

Interconnection Pricing for Mobile Internet Network (무선인터넷 망 접속료 산정 방안)

  • Kim Tae-Sung;Kim Min-Jeong;Byun Jae-Ho
    • Journal of Korea Technology Innovation Society
    • /
    • v.8 no.3
    • /
    • pp.1139-1156
    • /
    • 2005
  • The explosive growth in wireless networks and Internet services has created considerable demand for mobile Internet services based on the mobile phone. Mobile Internet has become the new business model in telecommunication market, therefore the open network policy for mobile Internet has been formulated and implemented by the government in Korea. In spite of the open network policy for mobile Internet, there has been no systematic analysis of the various interconnection issues, including pricing, in mobile Internet network. This paper aims to suggest the interconnection pricing methods for mobile Internet network by reviewing the current pricing models for various communications services, and adapting them to mobile Internet communications circumstances. Results of this paper can be used as a guideline for government policy directions and management decision making after the introduction of the open network policy for mobile Internet.

  • PDF

An Enhanced Handoff Support Based on Network-based Mobility Management Protocol (향상된 핸드오프를 지원하는 망 기반의 이동성 지원 방안)

  • Lee, Sung-Kuen;Jeon, You-Chan;Lim, Tae-Hyong;Park, Jin-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.1B
    • /
    • pp.1-9
    • /
    • 2009
  • In this paper, we propose an enhanced handoff support scheme based on network-based mobility management protocol, Proxy Mobile IPv6 (PMIPv6), which is actively standardized by the IETF NETLMM working group. By utilizing the dynamic virtual hierarchy network architecture between mobile access gateways (MAGs), the proposed scheme can support network scalability and reliability to wireless access network. In addition, we propose pre-authentication process based on the policy store (PS) to support a fast and seamless handoff. We evaluate the performance of the proposed scheme in terms of handoff delay and end-to-end delay thru computer simulation. Thru, various computer simulation results, we verified the superior performance of the proposed scheme by comparing with the results of other schemes.

The Design of Router Security Management System for Secure Networking

  • Jo, Su-Hyung;Kim, Ki-Young;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1594-1597
    • /
    • 2005
  • A rapid development and a wide use of the Internet have expanded a network environment. Further, the network environment has become more complex due to a simple and convenient network connection and various services of the Internet. However, the Internet has been constantly exposed to the danger of various network attacks such as a virus, a hacking, a system intrusion, a system manager authority acquisition, an intrusion cover-up and the like. As a result, a network security technology such as a virus vaccine, a firewall, an integrated security management, an intrusion detection system, and the like are required in order to handle the security problems of Internet. Accordingly, a router, which is a key component of the Internet, controls a data packet flow in a network and determines an optimal path thereof so as to reach an appropriate destination. An error of the router or an attack against the router can damage an entire network. This paper relates to a method for RSMS (router security management system) for secure networking based on a security policy. Security router provides functions of a packet filtering, an authentication, an access control, an intrusion analysis and an audit trail in a kernel region. Security policy has the definition of security function against a network intrusion.

  • PDF

Policy-Based Security Management Model for Efficient Security Policy Management in Large-Scale Network (대규모 네트워크 망에서 효율적인 보안정책관리를 위한 정책기반 보안관리모델)

  • Hwang, Yoon-Cheol;Um, Nam-Kyeong;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.1B
    • /
    • pp.87-93
    • /
    • 2003
  • As Information Security Technology has become rather transparent, wide, and integrated than in part, exclusive, and separated, A necessity of the study about integrating the separated distributed security systems into one module, has grown However, there is no integrated framework which can manage all separate security systems as one integrated one yet. Accordingly, we propose a new policy based network admirustrative model in this paper which can integrate individual security systems and distributed control way into one effectively.

A Study on the Efficient Polling Architecture Design for SNMP (SNMP 기반의 효율적인 데이터 수집 방식에 대한 연구)

  • 윤병수;김채영
    • Proceedings of the IEEK Conference
    • /
    • 2002.06a
    • /
    • pp.271-274
    • /
    • 2002
  • This paper presents tile efficient polling architecture for simple network management protocol (SNMP). Now a day, tile internet traffics have been increasing rapidly within a few years as the subscriber's network to connect internet is provided commonly. With this trend, the network management traffics also make the same phases. To provide numerous higher Quality services to the customers, the management traffic must be controlled within the permitted limit. This paper proposes the policy-based felling architecture for SNMP MIB with several parameters and suggests the data collecting layer architecture for the efficient polling.

  • PDF

Security Policy Model for the Intrusion Detection and Response on Enterprise Security Management System (통합보안 관리시스템의 침입탐지 몇 대응을 위한 보안 정책 모델)

  • 손우용;송정길
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.2
    • /
    • pp.81-87
    • /
    • 2004
  • Very various intrusion by development of systems that is based on network is spread. To detect and respond this intrusion, security solutions such as firewall or IDS are bringing and management of security system that load these becomes more harder. Moreover, because environment of systems that require security is various, hard to manage establishing suitable security policy Therefore, need model about enterprise management of various security system and intrusion detection of each systems and response. In this paper, improve PBNM structure that manage wide network resources and presented suitable model in intrusion detection and response of security system. Also, designed policy-based enterprise security management system for effective intrusion detection and response by applying presented model to enterprise security management system.

  • PDF

Policy-Based QoS Control Management System for VoIP Service (VoIP 서비스를 위한 정책 기반의 QoS 제어 관리 시스템)

  • Cho, Bong-Kwan;Jung, Jae-Il
    • Convergence Security Journal
    • /
    • v.10 no.3
    • /
    • pp.69-75
    • /
    • 2010
  • At present, deterioration in service quality, which caused by increased network traffic from a lot of users in the same network, makes smooth communication service difficult. In this paper, we present policy-based QoS management system for VoIP service in order to supply smooth VoIP service to users. The presented system can guarantee quality of VoIP service even in huge traffic situation, and makes it possible to operate whole network in an efficient manner.

A Study on the Multilevel Electronic Commerce Security using Scalable Multicast (확장 멀티캐스트를 이용한 다중레벨 전자상거래 보안에 관한 연구)

  • 서장원
    • The Journal of Society for e-Business Studies
    • /
    • v.7 no.1
    • /
    • pp.66-74
    • /
    • 2002
  • Through the increment of requirement for EC(Electronic Commerce) oriented communication services, security multicast communications is becoming more important. However, multicast to EC environment is much different from unicast concept most network security protocols. On the network security, using mandatory access control of multilevel architecture which assigns a specific meaning to each subject, so we accomplish access control. In this way, access control security based on the information security level is proposed. A security protocol based on the architecture proposed in this paper would be utilized in security multicast communications, group key management service and leveled security service through multilevel EC security policy, Also we discuss and propose the security level scaleability and key management method on the network.

  • PDF