• Title/Summary/Keyword: Policy-Based Network Management

Search Result 622, Processing Time 0.027 seconds

A Design Problem of a Two-Stage Cyclic Queueing Network (두 단계로 구성된 순환대기네트워크의 설계)

  • Kim Sung-Chul
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.31 no.1
    • /
    • pp.1-13
    • /
    • 2006
  • In this paper we consider a design problem of a cyclic queueing network with two stages, each with a local buffer of limited capacity. Based on the theory of reversibility and product-form solution, we derive the throughput function of the network as a key performance measure to maximize. Two cases are considered. In case each stage consists of a single server, an optimal allocation policy of a given buffer capacity and work load between stages as well as the optimal number of customers is identified by exploiting the properties of the throughput function. In case each stage consists of multiple servers, the optimal policy developed for the single server case doesn't hold any more and an algorithm is developed to allocate with a small number of computations a given number of servers, buffer capacity as well as total work load and the total number of customers. The differences of the optimal policies between two cases and the implications of the results are also discussed. The results can be applied to support the design of certain manufacturing and computer/communication systems.

Performance Analysis of Policy-based QoS Algorithm in the IMS (IMS에서 정책기반 QoS 알고리즘의 성능 분석)

  • Han, Seok-Jun;Shon, Hyung-Doh;Kang, Seung-Chan
    • Journal of IKEEE
    • /
    • v.19 no.2
    • /
    • pp.133-141
    • /
    • 2015
  • The IMS is an architectural control framework for delivering IP multimedia services such as voice, video, audio and data, the IMS supports not only the mobile communication system but also the existing wired and wireless network based on IP. The network that is integrated by the IMS needs policy-based network management protocol for managing the limited network resources to provide efficient multimedia service. The IMS use additional device called PDF for efficient resource management, but the PDF only uses diameter which is one of the network management protocol such as SNMP and COPS. Many devices use various protocol to manage the limited network resources. There is an algorithm using a variety of protocols such as Diameter, COPS and SNMP to handle the resources management efficiently. We also analyze the performance using the proposed algorithm in the implemented IMS environment.

A Study of Hierarchical Policy Model of Policy-based Integrated Security Management for managing Heterogeneous Security Systems (이종의 보안시스템 관리를 위한 정책 기반의 통합보안관리시스템의 계층적 정책모델에 관한 연구)

  • Lee, Dong-Yeong;Kim, Dong-Su;Jeong, Tae-Myeong
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.607-614
    • /
    • 2001
  • With a remarkable growth and expansion of Internet, the security issues emerged from intrusions and attacks such as computer viruses, denial of services and hackings to destroy information have been considered as serious threats for Internet and the private networks. To protect networks from those attacks, many vendors have developed various security systems such as firewalls, intrusion detection systems, and access control systems. However, managing those systems individually requires too much work and high cost. Thus, in order to manage integrated security management and establish consistent security management for various security products, the policy model of PN-ISMS (Policy Based Integrated Security Management System) has become very important. In this paper, present the hierarchical policy model which explore the refinement of high-level/conceptual policies into a number of more specific policies to form a policy hierarchy. A formal method of policy description was used as the basis of the mode in order to achieve precision and generality. Z-Notation was chosen for this propose. The Z-Notation is mathematical notation for expressing and communicating the specifications of computer programs. Z uses conventional notations of logic and set theory organized into expressions called schemas.

  • PDF

A Virtual Topology Management Policy in Multi-Stage Reconfigurable Optical Networks (다단계 재구성 가능한 광 네트워크상에서 가상 토폴로지 관리 정책)

  • Ji-Eun Keum;Lin Zhang;Chan-Hyun Youn
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.1-8
    • /
    • 2003
  • In this paper. we develop an analytical model to evaluate the virtual topology reconfiguration phase of optical Internet networks. To counter the continual approximation problem brought by traditional heuristic approach, we take the traffic prediction into consideration and propose a new heuristic reconfiguration algorithm called Prediction based Multi-stage Reconfiguration approach. We then use this analytical model to study the different configuration operation policies in response to the changing traffic patterns in the higher layer and the congestion level on the virtual topology. This algorithm persists to decide the optimal instant of reconfiguration easily based on the network state. Simulation results show that our virtual topology management Policy significantly outperforms the conventional one, while the required physical resources are limited.

Prototype Design and Security Association Mechanism for Policy-based on Security Management Model (정책기반 보안관리 모델을 위한 프로토타입과 정책 협상 메커니즘)

  • 황윤철;현정식;이상호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.131-138
    • /
    • 2003
  • With the Internet winning a huge popularity, there rise urgent problems which are related to Network Security Managements such as Protecting Network and Communication from un-authorized user. Accordingly, Using Security equipments have been common lately such as Intrusion Detection Systems, Firewalls and VPNs. Those systems. however, operate in individual system which are independent to me another. Their usage are so limited according to their vendors that they can not provide a corporate Security Solution. In this paper, we present a Hierarchical Security Management Model which can be applicable to a Network Security Policies consistently. We also propose a Policy Negotiation Mechanism and a Prototype which help us to manage Security Policies and Negotiations easier. The results of this research also can be one of the useful guides to developing a Security Policy Server or Security Techniques which can be useful in different environments. This study also shows that it is also possible to improve a Security Characteristics as a whole network and also to support Policy Associations among hosts using our mechanisms.

Comparative Policy Analysis on ICT Small and Medium-sized Venture Using Cognitive Map Analysis (인지지도를 활용한 ICT 중소벤처 지원정책 비교분석)

  • Park, Eunyub;Lee, Jung Mann
    • Journal of Information Technology Applications and Management
    • /
    • v.29 no.3
    • /
    • pp.75-93
    • /
    • 2022
  • The purpose of this study is to compare and analyze each government's ICT SME support policies to cope with changes in the ICT ecosystem paradigm. In particular, the core policies and policy trends of the Moon's government are presented through keyword network analysis and cognitive map analysis. As a result, core technologies such as ICT(Information Communication Technology), AI(Artificial Intelligence), Big Data, and 5G, which have high values of betweenness centrality and closeness centrality, are major keywords with high propagation power. The cognitive map analysis shows that the opportunity factors for the 4th industrial revolution are being activated through the ICT infrastructure circulation process, the domestic market circulation process, and the global market circulation process. This study is meaningful in terms of cognitive map analysis and utilization based on scientific analysis.

Optimization of Air Quality Monitoring Networks in Busan Using a GIS-based Decision Support System (GIS기반 의사결정지원시스템을 이용한 부산 대기질 측정망의 최적화)

  • Yoo, Eun-Chul;Park, Ok-Hyun
    • Journal of Korean Society for Atmospheric Environment
    • /
    • v.23 no.5
    • /
    • pp.526-538
    • /
    • 2007
  • Since air quality monitoring data sets are important base for developing of air quality management strategies including policy making and policy performance assessment, the environmental protection authorities need to organize and operate monitoring network properly. Air quality monitoring network of Busan, consisting of 18 stations, was allocated under unscientific and irrational principles. Thus the current state of air quality monitoring networks was reassessed the effect and appropriateness of monitoring objectives such as population protection and sources surveillance. In the process of the reassessment, a GIS-based decision support system was constructed and used to simulate air quality over complex terrain and to conduct optimization analysis for air quality monitoring network with multi-objective. The maximization of protection capability for population appears to be the most effective and principal objective among various objectives. The relocation of current monitoring stations through optimization analysis of multi-objective appears to be better than the network building for maximization of population protection capability. The decision support system developed in this study on the basis of GIS-based database appear to be useful for the environmental protection authorities to plan and manage air quality monitoring network over complex terrain.

Security Policy Model for the Intrusion Detection and Response on Enterprise Security Management System (통합보안관리 시스템에서의 침입탐지 및 대응을 위한 보안 정책 모델에 관한 연구)

  • Kim, Seok-Hun;Kim, Eun-Soo;Song, Jung-Gil
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.9-17
    • /
    • 2005
  • Recently It's difficult to deal with about variety of attack. And Simple Security management have a problem. It is that they don't develop system measuring their system envoirment and have efficient attack detector, countermeasure organization about large network. Therefore, need model about enterprise management of various security system and intrusion detection of each systems and response. In this paper, improve PBNM structure that manage wide network resources and presented suitable model in intrusion detection and response of security system. Also, designed policy-based enterprise security management system for effective intrusion detection and response by applying presented model to enterprise security management system.

  • PDF

A reinforcement learning-based network path planning scheme for SDN in multi-access edge computing

  • MinJung Kim;Ducsun Lim
    • International journal of advanced smart convergence
    • /
    • v.13 no.2
    • /
    • pp.16-24
    • /
    • 2024
  • With an increase in the relevance of next-generation integrated networking environments, the need to effectively utilize advanced networking techniques also increases. Specifically, integrating Software-Defined Networking (SDN) with Multi-access Edge Computing (MEC) is critical for enhancing network flexibility and addressing challenges such as security vulnerabilities and complex network management. SDN enhances operational flexibility by separating the control and data planes, introducing management complexities. This paper proposes a reinforcement learning-based network path optimization strategy within SDN environments to maximize performance, minimize latency, and optimize resource usage in MEC settings. The proposed Enhanced Proximal Policy Optimization (PPO)-based scheme effectively selects optimal routing paths in dynamic conditions, reducing average delay times to about 60 ms and lowering energy consumption. As the proposed method outperforms conventional schemes, it poses significant practical applications.

Study on the Internet Industry Structure under the NgN Regime-Competitive Landscape of ISPs, CPs, and CDNs (디지털 컨버전스 인프라로서의 NgN 환경에서 인터넷 산업구조 : ISP, CP, CDN 사업자간 경쟁을 중심으로)

  • Kim, Do-Hoon
    • Korean Management Science Review
    • /
    • v.23 no.3
    • /
    • pp.243-257
    • /
    • 2006
  • ITU-T's NgN(Next generation Network) architecture is expected to offer a new Internet platforms such as QoS(Quality of Service) guaranteed services as it overcame the limitations of the existing best-effort Internet architecture. However, policy development crucial for the NgN framework(e.g., interconnections and billing) is lagging far behind technology development. For example, arguments over network neutrality clearly indicate little understanding of the Internet industry structure where diverse providers including ISP and CP coexist. This study employs a network economics approach to predict how the competitive landscape involving various providers will evolve under the traffic-based billing system under the NgN environment. Applied is the non-cooperative game theory, in particular, Stackelberg's repeated game in order to build and analyze model for competition among those providers. We also studied possible impacts that CPs would have on the competitive landscape if they have an option to replace ISP: i.e., CDN(Content Delivery Network) provider. Lastly, based on the model analysis and experiments, presented are their implications to policy development and tile future prospect.